CN110618989B - Information processing method, information processing device and related products - Google Patents

Information processing method, information processing device and related products Download PDF

Info

Publication number
CN110618989B
CN110618989B CN201910751648.5A CN201910751648A CN110618989B CN 110618989 B CN110618989 B CN 110618989B CN 201910751648 A CN201910751648 A CN 201910751648A CN 110618989 B CN110618989 B CN 110618989B
Authority
CN
China
Prior art keywords
target
complemented
data
complement
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910751648.5A
Other languages
Chinese (zh)
Other versions
CN110618989A (en
Inventor
郑炳秋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Property and Casualty Insurance Company of China Ltd
Original Assignee
Ping An Property and Casualty Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Property and Casualty Insurance Company of China Ltd filed Critical Ping An Property and Casualty Insurance Company of China Ltd
Priority to CN201910751648.5A priority Critical patent/CN110618989B/en
Publication of CN110618989A publication Critical patent/CN110618989A/en
Application granted granted Critical
Publication of CN110618989B publication Critical patent/CN110618989B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2246Trees, e.g. B+trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/70Arrangements for image or video recognition or understanding using pattern recognition or machine learning
    • G06V10/74Image or video pattern matching; Proximity measures in feature spaces
    • G06V10/75Organisation of the matching processes, e.g. simultaneous or sequential comparisons of image or video features; Coarse-fine approaches, e.g. multi-scale approaches; using context analysis; Selection of dictionaries
    • G06V10/751Comparing pixel values or logical combinations thereof, or feature values having positional relevance, e.g. template matching
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V40/00Recognition of biometric, human-related or animal-related patterns in image or video data
    • G06V40/10Human or animal bodies, e.g. vehicle occupants or pedestrians; Body parts, e.g. hands
    • G06V40/14Vascular patterns
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • General Health & Medical Sciences (AREA)
  • Computing Systems (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Multimedia (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Human Computer Interaction (AREA)
  • Development Economics (AREA)
  • Bioethics (AREA)
  • Artificial Intelligence (AREA)
  • Evolutionary Computation (AREA)
  • Medical Informatics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application relates to the technical field of data transmission optimization, and particularly discloses an information processing method, an information processing device and related products, which are applied to a supplementary recording device, and comprise the following steps: the method comprises the steps that the supplementary recording device stores the comprehensive information of a to-be-supplementary recording mechanism, which is input in advance, in a preset database, wherein the comprehensive information at least comprises the service range of the to-be-supplementary recording mechanism; the complement device receives the data to be complement, and determines at least one mechanism to be complement corresponding to the data to be complement according to the service range of the mechanism to be complement stored in the preset database; and the complement device determines at least one target complement mechanism in the at least one complement mechanism, and sends the complement data to a target terminal corresponding to each target complement mechanism through an asynchronous task. The embodiment of the application is beneficial to simplifying the supplementary recording process of the data and improving the user experience.

Description

Information processing method, information processing device and related products
Technical Field
The present application relates to the field of electronic technologies, and in particular, to an information processing method, an information processing apparatus, and related products.
Background
With the development of technology, more and more data information is required, in order to process the data information faster, a plurality of systems are generally set up to process a plurality of data information simultaneously, and data among the conventional systems are independent, i.e. one data information can be processed only by one system, and after the data information is processed, the data information needs to be issued to a related institution to update or replace the original data information stored by the related institution. For example, when an insurance company performs information supplementary recording on a policy, supplementary recording data needs to be issued to each relevant mechanism, but in the prior art, supplementary recording of document information is performed in an asynchronous task, whether transmission is successful or not, or whether the opposite party receives the document information or not, and the information is not timely known, so that the error rate is high, and the supplementary recording process is complicated and low in efficiency only for one relevant mechanism at a time.
Disclosure of Invention
The embodiment of the application provides an information processing method, an information processing device and related products, which are used for simplifying the supplementary recording process of policy information, shortening the supplementary recording period and improving the user experience.
In a first aspect, an embodiment of the present application provides an information processing method, which is applied to a supplementary recording device, including:
the method comprises the steps that the supplementary recording device stores the comprehensive information of a to-be-supplementary recording mechanism, which is input in advance, in a preset database, wherein the comprehensive information at least comprises the service range of the to-be-supplementary recording mechanism;
the complement device receives data to be complement, and determines at least one complement mechanism corresponding to the data to be complement according to the service range of the complement mechanism stored in the preset database;
the complement device determines at least one target complement mechanism in the at least one complement mechanism, and sends the complement data to a target terminal corresponding to each target complement mechanism through an asynchronous task.
In a second aspect, an embodiment of the present application provides an information processing apparatus including:
the storage unit is used for storing the pre-input comprehensive information of the mechanism to be complemented in a preset database, wherein the comprehensive information at least comprises the service range of the mechanism to be complemented;
The receiving unit is used for receiving the data to be complemented, and determining at least one mechanism to be complemented corresponding to the data to be complemented according to the service range of the mechanism to be complemented stored in the preset database;
and the sending unit is used for determining at least one target to-be-repaired mechanism in the at least one to-be-repaired mechanism, and sending the to-be-repaired data to a target terminal corresponding to each target to-be-repaired mechanism through an asynchronous task.
In a third aspect, an embodiment of the present application provides an electronic device comprising a processor, a memory, a communication interface, and one or more programs, wherein the one or more programs are stored in the memory and configured to be executed by the processor, the programs comprising instructions for performing the steps in the method according to the first aspect.
In a fourth aspect, embodiments of the present application provide a computer-readable storage medium storing a computer program that causes a computer to perform the method according to the first aspect.
The embodiment of the application has the following beneficial effects:
it can be seen that, in the embodiment of the application, based on the complementary recording device, the mechanism information is stored in advance, when the complementary recording is performed, the to-be-complementary recording data can be transmitted in real time only by inputting the to-be-complementary recording data again, and a plurality of target terminals of the to-be-complementary recording mechanism can be selected at one time, and the to-be-complementary recording data of a plurality of target terminals are synchronized at one time through an asynchronous task, so that the complementary recording process of the data information is simplified, and the complementary recording efficiency is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1A is a schematic flow chart of an information processing method according to an embodiment of the present application;
FIG. 1B is a schematic diagram of storing integrated information according to an embodiment of the present application;
fig. 1C is a schematic diagram of sending data to be re-recorded according to an embodiment of the present application;
FIG. 1D is a schematic diagram of another embodiment of transmitting data to be re-recorded;
FIG. 2 is a flowchart of another information processing method according to an embodiment of the present application;
FIG. 3 is a flowchart of another information processing method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present application;
fig. 5 is a block diagram showing functional units of an information processing apparatus according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The terms "first," "second," "third," and "fourth" and the like in the description and in the claims and drawings are used for distinguishing between different objects and not necessarily for describing a particular sequential or chronological order. Furthermore, the terms "comprise" and "have," as well as any variations thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, system, article, or apparatus that comprises a list of steps or elements is not limited to only those listed steps or elements but may include other steps or elements not listed or inherent to such process, method, article, or apparatus.
Reference herein to "an embodiment" means that a particular feature, result, or characteristic described in connection with the embodiment may be included in at least one embodiment of the application. The appearances of such phrases in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Those of skill in the art will explicitly and implicitly appreciate that the embodiments described herein may be combined with other embodiments.
The information processing apparatus in the present application may include a smart Phone (such as an Android mobile Phone, an iOS mobile Phone, a Windows Phone mobile Phone, etc.), a tablet computer, a palm computer, a notebook computer, a mobile internet device MID (Mobile Internet Devices, abbreviated as "MID") or a wearable device, etc., which is merely exemplary, but not exhaustive, including but not limited to the electronic device, and in practical application, the information processing apparatus may further include: intelligent vehicle terminals, computer devices, etc.
Referring to fig. 1A, fig. 1A is a flowchart of an information processing method according to an embodiment of the present application, where the method is applied to a supplementary recording device, and the method includes the following steps S101 to S103:
step S101, the supplementary recording device stores the pre-input comprehensive information of the mechanism to be supplementary recorded in a preset database, wherein the comprehensive information at least comprises the service range of the mechanism to be supplementary recorded.
Wherein the integrated information may further include: the mechanism name, the mechanism number, the mechanism type, the position information, the preset communication mode and the like of the mechanism to be complemented.
The preset database can be a relational database, such as an Oracle database; alternatively, a non-relational database, such as an ES database.
In some possible embodiments, the implementation process of storing the pre-input comprehensive information of the mechanism to be re-recorded in the preset database may be: carrying out keyword recognition on the comprehensive information of each mechanism to be complemented, and determining a keyword cluster corresponding to the comprehensive information of each mechanism to be complemented; dividing information belonging to the same keyword cluster into the same information dimension to obtain a plurality of information dimensions; acquiring an importance level of each of the plurality of information dimensions; taking the information dimension with the highest importance level as a root node, and taking other information dimensions except the information dimension with the highest importance level in the information dimensions as child nodes to create a tree model; storing information corresponding to the plurality of information dimensions on respective corresponding child nodes in the tree model; and storing the tree model after storing the information into a preset database.
Specifically, each keyword cluster includes a plurality of keywords, for example, the keyword cluster may include keywords: the method comprises the steps of carrying out keyword recognition on each item of information in comprehensive information to determine a keyword cluster corresponding to each keyword, so that after determining the keyword clusters corresponding to each item of information, each item of information belonging to the same keyword cluster is divided into the same information dimension to obtain a plurality of information dimensions.
Further, the implementation process of obtaining the importance level of each of the plurality of information dimensions may be: and acquiring the identification information of each information dimension, determining the importance level of each information dimension according to the identification information, for example, if the identification information has unique identification function on each institution, determining the importance level of the information dimension to be high, otherwise, determining the importance level of the information dimension to be low.
Further, the implementation process of storing the information corresponding to the plurality of information dimensions on the respective corresponding child nodes in the tree model may be: determining a theme zone corresponding to each of the plurality of information dimensions; acquiring the number of topics in the topic domain; acquiring the information quantity corresponding to each topic in the topic domain, and determining a target topic with the maximum information quantity in the topic domain; establishing an Excel table of the information dimension by taking the number of information corresponding to the target subject as the number of lines and the number of subjects in the subject domain as the number of columns; adding information corresponding to the information dimension into the Excel table; and hanging the Excel table added with the information at the node corresponding to each information dimension, and taking the topic domain corresponding to each node as index information of each node.
As shown in FIG. 1B, the information dimensions may include organization numbers, organization names, service ranges, and organization types, so organization numbers are used as root nodes, organization numbers are stored in an Excel table at the root nodes, as shown in FIG. 1B, tree models are created respectively as child nodes, and information corresponding to each information dimension is stored in the Excel table at each node in the tree models.
Step S102, the complement device receives the data to be complement, and determines at least one complement mechanism corresponding to the data to be complement according to the service range of the complement mechanism stored in the preset database.
The data to be supplemented includes a policy number, a policy type (such as car insurance, endowment insurance, accident insurance, etc.), an supplemented content (such as license plate number), an supplemented time, an supplemented person, etc.; the target terminal of the mechanism to be complemented inquires the original policy from the database according to the policy number, complements the original policy according to the complement content to obtain a new policy, and stores the new policy into the database.
Optionally, comparing the type of the policy in the data to be complemented with the service range of each mechanism to be complemented, and determining whether the type of the policy is in the service range of the mechanism to be complemented, if so, obtaining at least one mechanism to be complemented corresponding to the data to be complemented.
Specifically, index information corresponding to a service range in each tree model is obtained, a child node of a service range information dimension in each tree model is determined according to the index (index 3 shown in fig. 1B), the service range corresponding to each mechanism is taken out from EXCEL hung on the child node, and the service range is compared with a policy type of data to be complemented to determine a mechanism to be complemented corresponding to the data to be complemented.
Further, after determining at least one corresponding mechanism to be complemented, displaying the mechanism to be complemented in a form of a drop-down frame on a visual interface of the device to be complemented, and prompting a user to select the mechanism to be complemented which needs to be complemented.
For example, if the data to be complemented is the license plate number of the complement vehicle insurance, the to-be-complemented mechanism stored with the vehicle insurance has traffic police, line assistant and line assistant service, and the traffic police, line assistant and line assistant service are displayed on the visual interface of the complement device in the form of a pull-down frame for the user to confirm and select.
Step S103, the complement device determines at least one target complement mechanism in the at least one complement mechanism, and sends the complement data to a target terminal corresponding to each target complement mechanism through an asynchronous task.
Optionally, the complement device determines the to-be-complement mechanism selected by the user as the target complement mechanism.
It can be seen that, in the embodiment of the application, based on the complementary recording device, the mechanism information is stored in advance, when the complementary recording is performed, the to-be-complementary recording data can be transmitted in real time only by inputting the to-be-complementary recording data again, and a plurality of target terminals of the to-be-complementary recording mechanism can be selected at one time, and the to-be-complementary recording data of a plurality of target terminals are synchronized at one time through an asynchronous task, so that the complementary recording process of the data information is simplified, and the complementary recording efficiency is improved.
In some possible examples, the data to be re-recorded includes authentication information, and before determining at least one mechanism to be re-recorded corresponding to the data to be re-recorded according to a service range of the mechanism to be re-recorded stored in the preset database, the method further includes: the supplementary recording device verifies whether the input user of the data to be supplementary recorded has supplementary recording authority or not according to the authentication information; when the authentication information is a vein image, verifying whether the input user of the data to be complemented has the complement authority according to the authentication information specifically includes: and comparing the vein image with a vein template to obtain a matching value, and determining that the input user of the data to be complemented has the complement authority when the matching value is larger than a threshold value. By vein authentication, malicious supplementary recording of illegal personnel is prevented, so that the safety in the supplementary recording process is ensured.
Optionally, the step of comparing the vein image with a vein template to obtain a matching value may be:
b1, analyzing the characteristic point distribution of a target vein region image in a vein image;
b2, carrying out circular image interception on the target vein region image according to M different circle centers to obtain M circular vein region images, wherein M is an integer greater than 3;
b3, selecting a target circular vein region image from the M circular vein region images, wherein the number of characteristic points contained in the target circular vein region image is larger than that of other circular vein region images in the M circular vein region images;
b4, dividing the target circular vein region image to obtain N circular rings, wherein the N circular rings have the same ring width;
b5, starting from the ring with the smallest radius of the N rings, sequentially matching the N rings with the vein template by feature points, accumulating the matched values of the matched rings, and taking the accumulated matched values as the matched values;
therefore, when the matching value is greater than a threshold value, determining that the input user of the data to be complemented has the complement authority specifically includes: and when any matching value in the accumulated matching values is larger than a threshold value, immediately stopping feature point matching, and determining that the input user of the data to be complemented has the complement authority.
In some possible examples, the implementation process of sequentially sending the to-be-repaired data to the at least one target to-be-repaired mechanism through an asynchronous task may be: inserting the data to be complemented into a task table, and inserting task parameters in a parameter table, wherein the task parameters are gateway IDs and/or IP addresses of target terminals corresponding to each target mechanism to be complemented; periodically scanning the task table, circularly taking out the data to be complemented from the task table, and sequentially taking out task parameters of a target terminal corresponding to each target mechanism to be complemented from the parameter table; and configuring the to-be-repaired device according to task parameters of the target terminals corresponding to each target to-be-repaired mechanism so as to establish communication connection with the target terminals corresponding to each target to-be-repaired mechanism, and sending the to-be-repaired data to the target terminals corresponding to each target to-be-repaired mechanism through an asynchronous task. The task table is an asyn_task_wait table in the acss system, the parameter table is an asyn_task_parameter table, and the two tables are associated through an ID, so when the data to be complemented is taken out from the asyn_task_wait table, the task parameter corresponding to the data to be complemented is taken out from the corresponding asyn_task_parameter table through the ID, and the task parameter of the target terminal to be complemented is determined. It can be seen that, in this example, the data to be complemented is stored in the task table, and the data to be complemented can be sequentially and circularly taken out, so that the data to be complemented is continuously sent to the mechanism to be complemented, and the efficiency of complement is improved.
In some possible examples, the configuring the to-be-repaired device according to the task parameter of the target terminal corresponding to each target to-be-repaired mechanism to establish the communication connection with the target terminal corresponding to each target to-be-repaired mechanism may be: acquiring a terminal identifier of a target terminal corresponding to each target mechanism to be complemented; determining a network protocol cluster corresponding to a target terminal corresponding to each target mechanism to be complemented according to the mapping relation between the terminal identification and the network protocol cluster; acquiring a preset communication mode corresponding to each target mechanism to be complemented (acquiring the preset communication mode of each target mechanism to be complemented from comprehensive information), and determining a network protocol corresponding to the preset communication mode in the network protocol cluster; and acquiring a driving program corresponding to the network protocol from a driving database, and loading the driving program so as to establish communication connection with a target terminal corresponding to each target mechanism to be complemented through the network protocol.
For example, when the target terminal corresponding to the mechanism to be re-recorded is a NAS storage system, determining that the network protocol corresponding to the NAS storage system is TCP/IP according to the terminal identifier of the NAS storage system, and determining that the network protocol corresponding to the NAS storage system is IPX/SPX when the preset communication mode corresponding to the NAS storage system is a wireless lan according to the network protocol cluster corresponding to the NAS storage system (transmission Control Protocol/Internet Protocol, abbreviated as TCP/IP), packet-switched/sequential packet-switched protocol IPX/SPX (Internetwork Packet Exchange/Sequences Packet Exchange, abbreviated as IPX/SPX), and RS-485; therefore, the network protocol corresponding to the target terminal can be determined according to the terminal identification of the target terminal, the mapping relation between the preset communication mode and the network protocol; and extracting a driving program corresponding to the network protocol from a driving program database, loading the driving program, and transmitting the data to be complemented with the target terminal through the network protocol.
In some possible embodiments, as shown in fig. 1C, when the number of the at least one target to-be-repaired mechanisms is N and N is greater than or equal to 2, the implementation process of sending the to-be-repaired data to the target terminal corresponding to each target to-be-repaired mechanism through an asynchronous task may be: connecting N target terminals corresponding to the N target to-be-complemented mechanisms in a tree topology structure, wherein the to-be-complemented mechanisms are in one-to-one correspondence with the target terminals; and sending the data to be complemented to a first target terminal corresponding to a root node of the tree topology structure through an asynchronous task, and indicating the first target terminal to send the data to be complemented to a second target terminal and a third target terminal, wherein the data to be complemented is sent to N target terminals of the tree topology structure through step-by-step transmission, and the second target terminal and the third target terminal are target terminals corresponding to two tree nodes connected with the root node in the N target terminals. It can be seen that in this example, the data to be recorded is transmitted through the tree structure, so as to accelerate the data recording process, and the processing pressure of the recording device is reduced through step-by-step transmission.
In some possible embodiments, as shown in fig. 1D, when the comprehensive information includes the location information of each mechanism to be complemented, if the number of the at least one target mechanism to be complemented is N and N is greater than or equal to 2, the implementation process of sending the data to be complemented to the target terminal corresponding to each target mechanism to be complemented through an asynchronous task may be: acquiring the position information of each target mechanism to be complemented; dividing the N target to-be-complemented mechanisms into M groups according to the position information of each target to-be-complemented mechanism, wherein each group corresponds to a central mechanism, the sum of the distances between the central mechanism and other target to-be-complemented mechanisms in the group is minimum, M is an integer greater than or equal to 1, and the to-be-complemented mechanisms are in one-to-one correspondence with target terminals; acquiring p task parameters from the parameter table, wherein the p task parameters are task parameters of p target terminals, the p target terminals are p target terminals corresponding to p target to-be-complemented mechanisms of a j-th group in M groups, the p target to-be-complemented mechanisms are other target to-be-complemented mechanisms of the j-th group except a central mechanism A, p is an integer greater than 1, j is an integer, and j is not less than 1 and not more than M; and sending the data to be complemented and the p parameters to target terminals corresponding to the central mechanism A, and indicating the target terminals corresponding to the central mechanism A to send the data to be complemented to the p target terminals according to the p parameters. It can be seen that, in this example, the data to be complemented is transmitted by packets, so that the transmission efficiency of the data to be complemented is improved, and the distance between the target terminals in each group is closer, so that the probability of data loss in the transmission process is reduced, and the success rate of data transmission is improved.
In a possible example, after sending the to-be-repaired data to the target terminal corresponding to each target to-be-repaired mechanism, the method further includes: and indicating each target terminal to carry out the supplementary recording on the receipt according to the data to be supplementary recorded, receiving acknowledgement character ACK returned by each target terminal aiming at the data to be supplementary recorded, counting whether the terminal which receives the returned ACK is consistent with the target terminal corresponding to the supplementary recording mechanism from the selected target, if so, displaying prompt information of successful supplementary recording on a display interface of the device to be supplementary recorded, if not, displaying prompt information of failed supplementary recording on the display interface of the device to be supplementary recorded, and displaying the target terminal with failed supplementary recording according to the returned ACK so as to carry out the data supplementary recording on the target terminal again, wherein the target terminal specifically comprises the steps of determining a field to be supplementary recorded in the original receipt according to the data to be supplementary recorded, and carrying out information addition on the field to be supplementary recorded to obtain new receipt information. It can be seen that, in this example, based on the ACK acknowledgement mechanism, whether the data is successfully re-recorded can be acknowledged, so as to solve the disadvantage that the transmission result cannot be known in the asynchronous task.
Referring to fig. 2, fig. 2 is a flowchart of another information processing method according to an embodiment of the present application, where the method is applied to a supplementary recording device, and the method includes the following steps S201 to S207:
Step 201, the supplementary recording device stores the pre-input comprehensive information of the to-be-supplementary recording mechanism in a preset database, where the comprehensive information at least includes a service range of the to-be-supplementary recording mechanism.
Step S202, the complement device receives the data to be complement, and determines at least one complement mechanism corresponding to the data to be complement according to the service range of the complement mechanism stored in the preset database.
Step S203, the complement device determines at least one target to-be-complement mechanism in the at least one to-be-complement mechanism.
Step S204, the re-recording device obtains the information abstract of the data to be re-recorded according to a hash algorithm, and encrypts the information abstract by using a first public key in an asymmetric encryption algorithm to obtain a digital signature of the information abstract.
The hash algorithm comprises an MD4 algorithm, an MD5 algorithm, an SHA-1 algorithm and the like.
The following specifically describes a procedure for obtaining the information abstract by taking the MD5 algorithm as an example:
acquiring the bit length L of the data (i.e. character strings) to be complemented; filling the data to be complemented, and expanding the bit length of the data to be complemented to be L=N×512+448, namely filling 1 and a plurality of 0 behind the data to be complemented, wherein L is larger than N and is a positive integer; adding 64-bit binary numbers behind the filled data to obtain target information, wherein the 64-bit binary numbers are the bit length of the data to be complemented, and the bit length of the target information is N×512+448+64= (n+1) ×512; initial link variables A, B, C and D, which are 128 bits long, are set, for example, A, B, C and D are expressed in big-end endian: a=0x01234567, b=0x89abcdef, c=0xfedcba98, d=0x 76543210, so the values of variable A, B, C, D in the procedure are 0x67452301,0xefcdab89,0x98badcfe, 0x10325476); dividing the target information into (n+1) group data, and calculating an information abstract (i.e. a hash value) of the data to be complemented according to the (n+1) group data, wherein the information abstract (i.e. the hash value) specifically comprises the following steps: the hash value of the first set of data is calculated, i.e. A, B, C and D are copied to four variables a1, b1, c1, D1: namely, A- & gt a1, B- & gt B1, C- & gt C1, D- & gt D1, and obtaining initial variables of the first group of data; carrying out nonlinear operation on three variables a1, b1, c1 and d1 to obtain nonlinear operation results; summing the nonlinear operation result, a fourth variable in a1, b1, c1, d1, a grouping sequence of target information and a constant to obtain a summation result, circularly shifting the summation result to the left by an indefinite number, adding one of a1, b1, c1 or d1, and finally replacing one of a1, b1, c1 or d1 with the result to obtain a calculation result of the first round of the first group of data; and then, based on the calculation result, carrying out second round of round robin, and so on, obtaining final calculation results a, b, c and D of the first group of data, summing the calculation results with initial variables A, B, C and D respectively, taking the calculation results as initial variables of the second group, and so on, obtaining output results a, b, c and D corresponding to the (n+1) th group, and cascading the a, b, c and D to obtain an information abstract of the data to be complemented.
Step S205, the complement device adds the digital signature to the data to be complement.
Step S206, the re-entry device randomly generates a second key, encrypts the data to be re-entered added with the digital signature by using the second key to form a first ciphertext, and encrypts the second key by using the first public key to obtain a second ciphertext.
Step S207, the supplementary recording device sends the first ciphertext and the second ciphertext to the target terminal corresponding to each target mechanism to be supplementary recorded through an asynchronous task.
It can be seen that, in the embodiment of the application, based on the complement device, the mechanism information is stored in advance, when the complement data is input, the complement data can be transmitted in real time only by inputting the complement data, and a plurality of target terminals to be complement can be selected at a time, so that the complement process of the data information is simplified, and the complement efficiency is improved; in addition, before the additional recording data is sent, the additional recording data is encrypted based on an asymmetric encryption algorithm, so that the safety of the data in the transmission process is ensured, and the security level of the additional recording is improved.
It should be noted that, the specific implementation of each step of the method shown in fig. 2 may be referred to the specific implementation of the method shown in fig. 1A, which is not described herein.
Referring to fig. 3, fig. 3 is a flowchart of another information processing method according to an embodiment of the present application, where the method is applied to a supplementary recording device, and the method includes the following steps S301 to S305:
step 301, the supplementary recording device stores the pre-input comprehensive information of the to-be-supplementary recording mechanism in a preset database, where the comprehensive information at least includes a service range of the to-be-supplementary recording mechanism.
Step S302, the complement device receives data to be complement, analyzes the data to be complement, and obtains a user identifier carried in the data to be complement.
Step S303, the re-entry device compares the user identifier with a target user identifier set to determine the validity of the data to be re-entered, wherein the target user identifier set is based on an FP-Growth algorithm, processes the user identifier of the user executing the re-entry operation in a preset time period, and obtains a frequent item set.
The user identification can be the work number, name, identification card number or other identification information for identifying the identity of the user, and the frequent item set obtained by the FP-Growth algorithm is the prior art and is not described.
Wherein the preset time period may be 1 month, 2 months, 5 months or other values.
Step S304, when the data to be complemented is legal, the complemented recording device determines at least one mechanism to be complemented corresponding to the data to be complemented according to the service range of the mechanism to be complemented stored in the preset database.
Optionally, if the user identifier belongs to the target user identifier set, determining that the data to be recorded is illegal, and if the data to be recorded is illegal, displaying prompt information of illegal recording on a visual interface of the recording device, and prohibiting the execution of the recording operation.
Step S305, the complement device determines at least one target to-be-complement mechanism in the at least one to-be-complement mechanism, and sends the to-be-complement data to a target terminal corresponding to each target to-be-complement mechanism through an asynchronous task.
It can be seen that, in the embodiment of the application, based on the complement device, the mechanism information is stored in advance, when the complement data is input, the complement data can be transmitted in real time only by inputting the complement data, and a plurality of target terminals to be complement can be selected at a time, so that the complement process of the data information is simplified, and the complement efficiency is improved; in addition, before the additional recording data is sent, validity verification is carried out on the additional recording data, so that the reasonability of the additional recording is ensured, and malicious additional recording behaviors are avoided.
It should be noted that, the specific implementation of each step of the method shown in fig. 3 may be referred to the specific implementation of the method shown in fig. 1A, which is not described herein.
Referring to fig. 4, fig. 4 is a schematic diagram of a mechanism of an information processing apparatus 400 according to an embodiment of the present application, as shown in fig. 4, where the information processing apparatus 400 includes a processor, a memory, a communication interface, and one or more programs, and the one or more programs are different from the one or more application programs, and are stored in the memory and configured to be executed by the processor, and the programs include instructions for performing the following steps:
storing the pre-input comprehensive information of the mechanism to be complemented in a preset database, wherein the comprehensive information at least comprises the service range of the mechanism to be complemented;
receiving data to be complemented, and determining at least one mechanism to be complemented corresponding to the data to be complemented according to the service range of the mechanism to be complemented stored in the preset database;
determining at least one target to-be-repaired mechanism in the at least one to-be-repaired mechanism, and sending the to-be-repaired data to a target terminal corresponding to each target to-be-repaired mechanism through an asynchronous task.
In a possible example, the data to be complemented includes authentication information, and before determining at least one mechanism to be complemented corresponding to the data to be complemented according to a service range of the mechanism to be complemented stored in the preset database, the program is further configured to execute instructions of: the supplementary recording device verifies whether the input user of the data to be supplementary recorded has supplementary recording authority or not according to the authentication information; when the authentication information is a vein image, verifying whether the input user of the data to be complemented has the complement authority according to the authentication information, wherein the program is specifically used for executing the following steps: and comparing the vein image with a vein template to obtain a matching value, and determining that the input user of the data to be complemented has the complement authority when the matching value is larger than a threshold value.
In one possible example, in sending the to-be-repaired data to the target terminal corresponding to each target to-be-repaired mechanism through an asynchronous task, the above program is specifically configured to execute the following instructions:
inserting the data to be complemented into a task table, and inserting task parameters in a parameter table, wherein the task parameters are gateway IDs and/or IP addresses of target terminals corresponding to each target mechanism to be complemented;
Periodically scanning the task table, circularly taking out the data to be complemented from the task table, and sequentially taking out task parameters of a target terminal corresponding to each target mechanism to be complemented from the parameter table;
and configuring the to-be-repaired device according to task parameters of the target terminals corresponding to each target to-be-repaired mechanism so as to establish communication connection with the target terminals corresponding to each target to-be-repaired mechanism, and sending the to-be-repaired data to the target terminals corresponding to each target to-be-repaired mechanism through an asynchronous task.
In one possible example, in configuring the to-be-repaired device according to the task parameters of the target terminal corresponding to each target to-be-repaired mechanism to establish communication connection with the target terminal corresponding to each target to-be-repaired mechanism, the above program is specifically configured to execute the following instructions:
acquiring a terminal identifier of a target terminal corresponding to each target mechanism to be complemented;
determining a network protocol cluster corresponding to a target terminal corresponding to each target mechanism to be complemented according to the mapping relation between the terminal identification and the network protocol cluster;
acquiring a preset communication mode corresponding to each target mechanism to be complemented, and determining a network protocol corresponding to the preset communication mode in the network protocol cluster;
And acquiring a driving program corresponding to the network protocol from a driving database, and loading the driving program so as to establish communication connection with a target terminal corresponding to each target mechanism to be complemented through the network protocol.
In a possible example, if the number of the at least one target to-be-repaired mechanisms is N, and N is greater than or equal to 2, in sending the to-be-repaired data to the target terminal corresponding to each target to-be-repaired mechanism through an asynchronous task, the above procedure is specifically configured to execute the following instructions:
connecting N target terminals corresponding to the N target to-be-complemented mechanisms in a tree topology structure, wherein the to-be-complemented mechanisms are in one-to-one correspondence with the target terminals;
and sending the data to be complemented to a first target terminal corresponding to a root node of the tree topology structure through an asynchronous task, and indicating the first target terminal to send the data to be complemented to a second target terminal and a third target terminal, wherein the data to be complemented is sent to N target terminals of the tree topology structure through step-by-step transmission, and the second target terminal and the third target terminal are target terminals corresponding to two tree nodes connected with the root node in the N target terminals.
In a possible example, if the comprehensive information includes location information of each mechanism to be complemented, and if the number of the at least one target mechanism to be complemented is N and N is greater than or equal to 2, the above procedure is specifically configured to execute the following instructions in sending the data to be complemented to the target terminal corresponding to each target mechanism to be complemented through an asynchronous task:
dividing the N target to-be-complemented mechanisms into M groups according to the position information of each target to-be-complemented mechanism, wherein each group corresponds to a central mechanism, the sum of the distances between the central mechanism and other target to-be-complemented mechanisms in the group is minimum, M is an integer greater than or equal to 1, and the to-be-complemented mechanisms are in one-to-one correspondence with target terminals;
acquiring p task parameters from the parameter table, wherein the p task parameters are task parameters of p target terminals, the p target terminals are p target terminals corresponding to p target to-be-complemented mechanisms of a j-th group in M groups, the p target to-be-complemented mechanisms are other target to-be-complemented mechanisms of the j-th group except a central mechanism A, p is an integer greater than 1, j is an integer, and j is not less than 1 and not more than M;
and sending the data to be complemented and the p parameters to target terminals corresponding to the central mechanism A, and indicating the target terminals corresponding to the central mechanism A to send the data to be complemented to the p target terminals according to the p parameters.
In a possible example, before sending the to-be-repaired data to the target terminal corresponding to each target to-be-repaired mechanism, the above program is further configured to execute the following instructions:
obtaining the information abstract of the data to be complemented according to a hash algorithm;
encrypting the information abstract by using a first public key in an asymmetric encryption algorithm to obtain a digital signature of the information abstract;
adding the digital signature to the data to be complemented;
randomly generating a second key, encrypting the data to be complemented added with the digital signature by using the second key to form a first ciphertext, and encrypting the second key by using the first public key to obtain a second ciphertext;
in the aspect of sending the data to be complemented to the target terminal corresponding to each target mechanism to be complemented, the program is further used for executing the following instructions:
and sending the first ciphertext and the second ciphertext to the target terminal corresponding to each target mechanism to be complemented.
Referring to fig. 5, fig. 5 shows a block diagram of one possible functional unit composition of the information processing apparatus 500 related to the above embodiment, and the information processing apparatus 500 includes: a storage unit 510, a receiving unit 520, a transmitting unit 530, wherein:
The storage unit 510 is configured to store, in a preset database, pre-input comprehensive information of the mechanism to be re-recorded, where the comprehensive information at least includes a service range of the mechanism to be re-recorded;
the receiving unit 520 is configured to receive data to be complemented, and determine at least one mechanism to be complemented corresponding to the data to be complemented according to a service range of the mechanism to be complemented stored in the preset database;
and the sending unit 530 is configured to determine at least one target to-be-repaired mechanism in the at least one to-be-repaired mechanisms, and send the to-be-repaired data to a target terminal corresponding to each target to-be-repaired mechanism through an asynchronous task.
In a possible example, the information processing apparatus 500 further includes an authentication unit 540; the data to be complemented includes authentication information, and before determining at least one mechanism to be complemented corresponding to the data to be complemented according to the service range of the mechanism to be complemented stored in the preset database, the verification unit 540 is configured to: the supplementary recording device verifies whether the input user of the data to be supplementary recorded has supplementary recording authority or not according to the authentication information; when the authentication information is a vein image, the verification unit 540 is specifically configured to execute the following steps in terms of verifying whether the input user of the data to be re-recorded has the re-recording authority according to the authentication information: and comparing the vein image with a vein template to obtain a matching value, and determining that the input user of the data to be complemented has the complement authority when the matching value is larger than a threshold value.
In one possible example, in sending the to-be-repaired data to the target terminal corresponding to each target to-be-repaired mechanism through an asynchronous task, the sending unit 530 is specifically configured to: inserting the data to be complemented into a task table, and inserting task parameters in a parameter table, wherein the task parameters are gateway IDs and/or IP addresses of target terminals corresponding to each target mechanism to be complemented; periodically scanning the task table, circularly taking out the data to be complemented from the task table, and sequentially taking out task parameters of a target terminal corresponding to each target mechanism to be complemented from the parameter table; and configuring the to-be-repaired device according to task parameters of the target terminals corresponding to each target to-be-repaired mechanism so as to establish communication connection with the target terminals corresponding to each target to-be-repaired mechanism, and sending the to-be-repaired data to the target terminals corresponding to each target to-be-repaired mechanism through an asynchronous task.
In one possible example, in configuring the to-be-repaired device according to the task parameter of the target terminal corresponding to each target to-be-repaired mechanism to establish a communication connection with the target terminal corresponding to each target to-be-repaired mechanism, the sending unit 530 is specifically configured to: acquiring a terminal identifier of a target terminal corresponding to each target mechanism to be complemented; determining a network protocol cluster corresponding to a target terminal corresponding to each target mechanism to be complemented according to the mapping relation between the terminal identification and the network protocol cluster; acquiring a preset communication mode corresponding to each target mechanism to be complemented, and determining a network protocol corresponding to the preset communication mode in the network protocol cluster; and acquiring a driving program corresponding to the network protocol from a driving database, and loading the driving program so as to establish communication connection with a target terminal corresponding to each target mechanism to be complemented through the network protocol.
In a possible example, if the number of the at least one target to-be-repaired mechanisms is N, and N is greater than or equal to 2, in sending the to-be-repaired data to the target terminal corresponding to each target to-be-repaired mechanism through an asynchronous task, the sending unit 530 is specifically configured to: connecting N target terminals corresponding to the N target to-be-complemented mechanisms in a tree topology structure, wherein the to-be-complemented mechanisms are in one-to-one correspondence with the target terminals; and sending the data to be complemented to a first target terminal corresponding to a root node of the tree topology structure through an asynchronous task, and indicating the first target terminal to send the data to be complemented to a second target terminal and a third target terminal, wherein the data to be complemented is sent to N target terminals of the tree topology structure through step-by-step transmission, and the second target terminal and the third target terminal are target terminals corresponding to two tree nodes connected with the root node in the N target terminals.
In a possible example, if the comprehensive information includes location information of each mechanism to be complemented, and if the number of the at least one target mechanism to be complemented is N and N is greater than or equal to 2, the sending unit 530 is specifically configured to: dividing the N target to-be-complemented mechanisms into M groups according to the position information of each target to-be-complemented mechanism, wherein each group corresponds to a central mechanism, the sum of the distances between the central mechanism and other target to-be-complemented mechanisms in the group is minimum, M is an integer greater than or equal to 1, and the to-be-complemented mechanisms are in one-to-one correspondence with target terminals; acquiring p task parameters from the parameter table, wherein the p task parameters are task parameters of p target terminals, the p target terminals are p target terminals corresponding to p target to-be-complemented mechanisms of a j-th group in M groups, the p target to-be-complemented mechanisms are other target to-be-complemented mechanisms of the j-th group except a central mechanism A, p is an integer greater than 1, j is an integer, and j is not less than 1 and not more than M; and sending the data to be complemented and the p parameters to target terminals corresponding to the central mechanism A, and indicating the target terminals corresponding to the central mechanism A to send the data to be complemented to the p target terminals according to the p parameters.
In a possible example, the information processing apparatus further includes an encryption unit 550:
before sending the data to be complemented to the target terminal corresponding to each target mechanism to be complemented, the encryption unit 540 is configured to: obtaining the information abstract of the data to be complemented according to a hash algorithm; encrypting the information abstract by using a first public key in an asymmetric encryption algorithm to obtain a digital signature of the information abstract; adding the digital signature to the data to be complemented; randomly generating a second key, encrypting the data to be complemented added with the digital signature by using the second key to form a first ciphertext, and encrypting the second key by using the first public key to obtain a second ciphertext; the method comprises the steps of carrying out a first treatment on the surface of the
In a possible example, in sending the to-be-repaired data to the target terminal corresponding to each target to-be-repaired mechanism, the sending unit 530 is specifically configured to: and sending the first ciphertext and the second ciphertext to the target terminal corresponding to each target mechanism to be complemented.
The embodiment of the present application also provides a computer storage medium storing a computer program that is executed by a processor to implement part or all of the steps of any one of the information processing methods described in the above method embodiments.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer-readable storage medium storing a computer program operable to cause a computer to perform part or all of the steps of any one of the information processing methods described in the method embodiments above.
It should be noted that, for simplicity of description, the foregoing method embodiments are all described as a series of acts, but it should be understood by those skilled in the art that the present application is not limited by the order of acts described, as some steps may be performed in other orders or concurrently in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are alternative embodiments, and that the acts and modules referred to are not necessarily required for the present application.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to related descriptions of other embodiments.
In the several embodiments provided by the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the apparatus embodiments described above are merely illustrative, such as the division of the units, merely a logical function division, and there may be additional manners of dividing the actual implementation, such as multiple units or components may be combined or integrated into another system, or some features may be omitted, or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with each other may be an indirect coupling or communication connection via some interfaces, devices or units, or may be in electrical or other forms.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units described above may be implemented either in hardware or in software program modules.
The integrated units, if implemented in the form of software program modules, may be stored in a computer-readable memory for sale or use as a stand-alone product. Based on this understanding, the technical solution of the present application may be embodied essentially or partly in the form of a software product, or all or part of the technical solution, which is stored in a memory, and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned memory includes: a U-disk, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), a removable hard disk, a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Those of ordinary skill in the art will appreciate that all or a portion of the steps in the various methods of the above embodiments may be implemented by a program that instructs associated hardware, and the program may be stored in a computer readable memory, which may include: flash disk, read-Only Memory (ROM), random access Memory (Random Access Memory, RAM), magnetic disk or optical disk.
The foregoing has outlined rather broadly the more detailed description of embodiments of the application, wherein the principles and embodiments of the application are explained in detail using specific examples, the above examples being provided solely to facilitate the understanding of the method and core concepts of the application; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present application, the present description should not be construed as limiting the present application in view of the above.

Claims (8)

1. An information processing method, which is applied to a supplementary recording device, comprising:
the method comprises the steps that the supplementary recording device stores the comprehensive information of a to-be-supplementary recording mechanism, which is input in advance, in a preset database, wherein the comprehensive information at least comprises the service range of the to-be-supplementary recording mechanism;
The complement device receives data to be complement, and determines at least one complement mechanism corresponding to the data to be complement according to the service range of the complement mechanism stored in the preset database;
the complement device determines at least one target complement mechanism in the at least one complement mechanism, and sends the complement data to a target terminal corresponding to each target complement mechanism through an asynchronous task, including: inserting the data to be complemented into a task table, and inserting task parameters in a parameter table, wherein the task parameters are gateway IDs and/or IP addresses of target terminals corresponding to each target mechanism to be complemented;
periodically scanning the task table, circularly taking out the data to be complemented from the task table, and sequentially taking out task parameters of a target terminal corresponding to each target mechanism to be complemented from the parameter table;
acquiring a terminal identifier of a target terminal corresponding to each target mechanism to be complemented;
determining a network protocol cluster corresponding to a target terminal corresponding to each target mechanism to be complemented according to the mapping relation between the terminal identification and the network protocol cluster;
acquiring a preset communication mode corresponding to each target mechanism to be complemented, and determining a network protocol corresponding to the preset communication mode in the network protocol cluster;
Acquiring a driving program corresponding to the network protocol from a driving database, and loading the driving program to establish communication connection with a target terminal corresponding to each target mechanism to be complemented through the network protocol;
and sending the data to be complemented to the target terminal corresponding to each target mechanism to be complemented through an asynchronous task.
2. The method of claim 1, wherein the data to be re-recorded includes authentication information, the method further comprising, before determining at least one mechanism to be re-recorded corresponding to the data to be re-recorded according to a service range of the mechanism to be re-recorded stored in the preset database: the supplementary recording device verifies whether the input user of the data to be supplementary recorded has supplementary recording authority or not according to the authentication information; when the authentication information is a vein image, verifying whether the input user of the data to be complemented has the complement authority according to the authentication information specifically includes:
and comparing the vein image with a vein template to obtain a matching value, and determining that the input user of the data to be complemented has the complement authority when the matching value is larger than a threshold value.
3. The method according to claim 1 or 2, wherein the number of the at least one target to-be-repaired mechanisms is N, and N is greater than or equal to 2, and the sending the to-be-repaired data to the target terminal corresponding to each target to-be-repaired mechanism through an asynchronous task includes:
Connecting N target terminals corresponding to the N target to-be-complemented mechanisms in a tree topology structure, wherein the to-be-complemented mechanisms are in one-to-one correspondence with the target terminals;
and sending the data to be complemented to a first target terminal corresponding to a root node of the tree topology structure through an asynchronous task, and indicating the first target terminal to send the data to be complemented to a second target terminal and a third target terminal, wherein the data to be complemented is sent to N target terminals of the tree topology structure through step-by-step transmission, and the second target terminal and the third target terminal are target terminals corresponding to two tree nodes connected with the root node in the N target terminals.
4. The method according to claim 1 or 2, wherein the comprehensive information includes location information of each mechanism to be complemented, the number of the at least one target mechanism to be complemented is N, and N is greater than or equal to 2, and the sending the data to be complemented to the target terminal corresponding to each target mechanism to be complemented through an asynchronous task includes:
dividing the N target to-be-complemented mechanisms into M groups according to the position information of each target to-be-complemented mechanism, wherein each group corresponds to a central mechanism, the sum of the distances between the central mechanism and other target to-be-complemented mechanisms in the group is minimum, M is an integer greater than or equal to 1, and the to-be-complemented mechanisms are in one-to-one correspondence with target terminals;
Acquiring p task parameters from the parameter table, wherein the p task parameters are task parameters of p target terminals, the p target terminals are p target terminals corresponding to p target to-be-complemented mechanisms of a j-th group in M groups, the p target to-be-complemented mechanisms are other target to-be-complemented mechanisms except a center mechanism A in the j-th group, p is an integer greater than 1, j is an integer, and j is not less than 1 and not more than M;
and sending the data to be complemented and the p task parameters to the target terminals corresponding to the central mechanism A, and indicating the target terminals corresponding to the central mechanism A to send the data to be complemented to the p target terminals according to the p task parameters.
5. The method of claim 1, wherein before the sending the to-be-repaired data to the target terminal corresponding to each target to-be-repaired organization, the method further comprises:
obtaining the information abstract of the data to be complemented according to a hash algorithm;
encrypting the information abstract by using a first public key in an asymmetric encryption algorithm to obtain a digital signature of the information abstract;
adding the digital signature to the data to be complemented;
randomly generating a second key, encrypting the data to be complemented added with the digital signature by using the second key to form a first ciphertext, and encrypting the second key by using the first public key to obtain a second ciphertext;
The sending the data to be complemented to the target terminal corresponding to each target mechanism to be complemented includes:
and sending the first ciphertext and the second ciphertext to the target terminal corresponding to each target mechanism to be complemented.
6. An information processing apparatus for implementing the method of any one of claims 1-5, the apparatus comprising:
the storage unit is used for storing the pre-input comprehensive information of the mechanism to be complemented in a preset database, wherein the comprehensive information at least comprises the service range of the mechanism to be complemented;
the receiving unit is used for receiving the data to be complemented, and determining at least one mechanism to be complemented corresponding to the data to be complemented according to the service range of the mechanism to be complemented stored in the preset database;
and the sending unit is used for determining at least one target to-be-repaired mechanism in the at least one to-be-repaired mechanism, and sending the to-be-repaired data to a target terminal corresponding to each target to-be-repaired mechanism through an asynchronous task.
7. An electronic device comprising a processor, a memory, a communication interface, and one or more programs, wherein the one or more programs are stored in the memory and configured for execution by the processor, the programs comprising instructions for performing the steps of the method of any of claims 1-5.
8. A computer readable storage medium, characterized in that the computer readable storage medium stores a computer program, which is executed by a processor to implement the method of any of claims 1-5.
CN201910751648.5A 2019-08-15 2019-08-15 Information processing method, information processing device and related products Active CN110618989B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910751648.5A CN110618989B (en) 2019-08-15 2019-08-15 Information processing method, information processing device and related products

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910751648.5A CN110618989B (en) 2019-08-15 2019-08-15 Information processing method, information processing device and related products

Publications (2)

Publication Number Publication Date
CN110618989A CN110618989A (en) 2019-12-27
CN110618989B true CN110618989B (en) 2023-09-08

Family

ID=68921185

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910751648.5A Active CN110618989B (en) 2019-08-15 2019-08-15 Information processing method, information processing device and related products

Country Status (1)

Country Link
CN (1) CN110618989B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113786626B (en) * 2021-09-29 2023-07-18 腾讯科技(深圳)有限公司 Activity sign-in method, related device, equipment and storage medium
CN115115443A (en) * 2022-05-30 2022-09-27 中银金融科技有限公司 Policy reimbursement method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
KR101806394B1 (en) * 2016-07-05 2017-12-07 주식회사 리얼타임테크 A data processing method having a structure of the cache index specified to the transaction in a mobile environment dbms
CN107463555A (en) * 2016-06-01 2017-12-12 北京京东尚科信息技术有限公司 The mthods, systems and devices of layer data among deleting
CN108153858A (en) * 2017-12-22 2018-06-12 平安养老保险股份有限公司 Information-pushing method, device, storage medium and computer equipment
CN109325873A (en) * 2018-11-12 2019-02-12 平安科技(深圳)有限公司 Self-service method for processing business, device, computer equipment and storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107463555A (en) * 2016-06-01 2017-12-12 北京京东尚科信息技术有限公司 The mthods, systems and devices of layer data among deleting
KR101806394B1 (en) * 2016-07-05 2017-12-07 주식회사 리얼타임테크 A data processing method having a structure of the cache index specified to the transaction in a mobile environment dbms
CN108153858A (en) * 2017-12-22 2018-06-12 平安养老保险股份有限公司 Information-pushing method, device, storage medium and computer equipment
CN109325873A (en) * 2018-11-12 2019-02-12 平安科技(深圳)有限公司 Self-service method for processing business, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN110618989A (en) 2019-12-27

Similar Documents

Publication Publication Date Title
CN109862041B (en) Digital identity authentication method, equipment, device, system and storage medium
CN107396360B (en) Block verification method and device
US20210209373A1 (en) Media authentication using distributed ledger
CN107426165B (en) Bidirectional secure cloud storage data integrity detection method supporting key updating
CN102624705B (en) A kind of intelligent image verification method and system
EP4002181A1 (en) A consensus method and framework for a blockchain system
CN108734028B (en) Data management method based on block chain, block chain link point and storage medium
CN108256340B (en) Data acquisition method and device, terminal equipment and storage medium
CN110096903B (en) Asset verification method based on block chain and block chain network system
CN109379343B (en) Heterogeneous consensus method of block chains and terminal
CN112073440B (en) Internet of things information recording method and system
CN111523890A (en) Data processing method and device based on block chain, storage medium and equipment
CN111815321A (en) Transaction proposal processing method, device, system, storage medium and electronic device
CN111130770A (en) Block chain based information evidence storage method and system, user terminal, electronic equipment and storage medium
US20240121089A1 (en) Protecting data using controlled corruption in computer networks
CN110233850B (en) Registration method, application server, user side and system based on alliance chain
CN110618989B (en) Information processing method, information processing device and related products
CN104080059A (en) Method, device and system of implementing short message sending and receiving
EP2913973A1 (en) Trusted NFC smart poster tag
CN110597922A (en) Data processing method, device, terminal and storage medium
CN113704357A (en) Smart city data sharing method and system based on block chain
CN108377319B (en) Picture transmission method and device
CN108768975A (en) Support the data integrity verification method of key updating and third party's secret protection
CN108846671B (en) Online secure transaction method and system based on block chain
GB2587541A (en) A consensus method and framework for a blockchain system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant