CN111126965A - Audit rule optimization method and device, computer equipment and storage medium - Google Patents

Audit rule optimization method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN111126965A
CN111126965A CN201911351998.9A CN201911351998A CN111126965A CN 111126965 A CN111126965 A CN 111126965A CN 201911351998 A CN201911351998 A CN 201911351998A CN 111126965 A CN111126965 A CN 111126965A
Authority
CN
China
Prior art keywords
file
hash code
code value
audited
character strings
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911351998.9A
Other languages
Chinese (zh)
Other versions
CN111126965B (en
Inventor
章新日
王昭日
文鹏
石祖旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd
Original Assignee
Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd filed Critical Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd
Priority to CN201911351998.9A priority Critical patent/CN111126965B/en
Publication of CN111126965A publication Critical patent/CN111126965A/en
Application granted granted Critical
Publication of CN111126965B publication Critical patent/CN111126965B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the invention discloses an auditing rule optimization method, an auditing rule optimization device, computer equipment and a storage medium, wherein the method comprises the following steps: acquiring a character string from a file to be checked; splicing all character strings of the file to be checked by using a preset splicing method to obtain spliced long character strings; determining a hash code value of the long character string; judging whether the hash code value is the same as a preset hash code value or not; and if the hash code value is the same as the preset hash code value, determining that the file to be audited passes auditing, otherwise, sending information for auditing the file to be audited to a client. The invention can intelligently distinguish the audit files, optimize the audit process, reduce the time consumption of auditors on the approved history files and improve the audit efficiency of the auditors.

Description

Audit rule optimization method and device, computer equipment and storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method and an apparatus for optimizing an audit rule, a computer device, and a storage medium.
Background
In the prior art, in some service flow scenarios, it is common that an auditor needs to perform multiple auditions on the same audit file, so that the auditor needs to repeat the same audit operation for multiple times, and such repetitive operations are redundant, and if the service flow volume is large, such an audit mode consumes relatively large manpower and causes low audit efficiency.
Disclosure of Invention
In view of this, embodiments of the present invention provide an audit rule optimization method, apparatus, device and storage medium, which can intelligently distinguish audit files, optimize an audit process, reduce time consumption of auditors on history files that have been audited, and improve audit efficiency of auditors.
In one aspect, an embodiment of the present invention provides an audit rule optimization method, where the method includes:
acquiring a character string from a file to be checked;
splicing all character strings of the file to be checked by using a preset splicing method to obtain spliced long character strings;
determining a hash code value of the long character string;
judging whether the hash code value is the same as a preset hash code value or not;
and if the hash code value is the same as the preset hash code value, determining that the file to be audited passes auditing, otherwise, sending information for auditing the file to be audited to a client.
In another aspect, an embodiment of the present invention provides an apparatus for optimizing an audit rule, where the apparatus includes:
the acquiring unit is used for acquiring the character string from the file to be checked;
the splicing unit is used for splicing the character strings of the file to be checked by using a preset splicing method to obtain a spliced long character string;
a determination unit configured to determine a hash code value of the long character string;
the judging unit is used for judging whether the hash code value is the same as a preset hash code value or not;
and the execution unit is used for determining that the file to be audited passes auditing if the hash code value is the same as a preset hash code value, and otherwise, sending information for auditing the file to be audited to the client.
In yet another aspect, an embodiment of the present invention further provides a computer device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor implements the audit rule optimization method as described above when executing the computer program.
In yet another aspect, the present invention further provides a computer-readable storage medium, where one or more computer programs are stored, and the one or more computer programs are executable by one or more processors to implement the audit rule optimization method described above.
The embodiment of the invention provides an auditing rule optimization method, an auditing rule optimization device, computer equipment and a storage medium, wherein the method comprises the following steps: acquiring a character string from a file to be checked; splicing all character strings of the file to be checked by using a preset splicing method to obtain spliced long character strings; determining a hash code value of the long character string; judging whether the hash code value is the same as a preset hash code value or not; and if the hash code value is the same as the preset hash code value, determining that the file to be audited passes auditing, otherwise, sending information for auditing the file to be audited to a client. The invention can intelligently distinguish the audit files, optimize the audit process, reduce the time consumption of auditors on the approved history files and improve the audit efficiency of the auditors.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic view of an application scenario of an audit rule optimization method according to an embodiment of the present invention;
FIG. 2 is a schematic flow chart diagram of a method for optimizing audit rules according to an embodiment of the present invention;
FIG. 3 is another schematic flow chart of a method for optimizing audit rules according to an embodiment of the present invention;
FIG. 4 is another schematic flow chart diagram of a method for optimizing audit rules according to an embodiment of the present invention;
FIG. 5 is a schematic block diagram of an audit rule optimization apparatus according to an embodiment of the present invention;
FIG. 6 is another schematic block diagram of an audit rule optimization apparatus according to an embodiment of the present invention;
FIG. 7 is another schematic block diagram of an audit rule optimization apparatus according to an embodiment of the present invention;
fig. 8 is a schematic structural diagram of a computer device according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1 and fig. 2, fig. 1 is a schematic view of an application scenario of an audit rule optimization method according to an embodiment of the present invention, and fig. 2 is a schematic flow diagram of the audit rule optimization method according to the embodiment of the present invention. The auditing rule optimization method is applied to a client or a server. As an application, as shown in fig. 1, the auditing rule optimization method is applied to a server 10, where the server 10 is responsible for splicing a character string, calculating a hash code value of the character string, and sending a final judgment result to a client 20 by comparing the hash code value with a preset hash code value, where the client is a terminal device used by an auditor, such as a desktop computer, a notebook, or a smart phone.
Referring to fig. 2, fig. 2 is a schematic flow chart of an audit rule optimization method according to an embodiment of the present invention. As shown in fig. 2, the method includes the following steps S101 to S105.
S101, acquiring character strings from the file to be checked.
In the embodiment of the present invention, the document to be audited may be a contract, a financial statement, a tender book, or the like, the character string may be a character string in the document such as the contract, the financial statement, or the tender book, and generally, the character string is chinese, and if the document to be audited includes numbers or english, the character string may also be numbers, english, or any combination thereof. For example, Chinese plus English: "name", "age", "family name sex", pure english: "name", "age", "sex", pure Chinese: "name", "age", and "family name".
It should be noted that the character string may be of various types, such as arabic, spanish, french, symbols, any combination thereof, and so on.
And S102, splicing the character strings of the file to be checked by using a preset splicing method to obtain a spliced long character string.
In the embodiment of the invention, the preset splicing method is a StringBuilder.append () method, the StringBuilder.append () method is a method for splicing character strings in the StringBuilder class of java, and two character strings can be spliced end to end by using the splicing method to finally obtain a long character string; the step of splicing the character strings of the file to be checked by using a preset splicing method to obtain a spliced long character string specifically comprises the following steps: splicing the character strings by using a StringBuilder.applied () method according to the sequence of the character strings, separating two adjacent character strings by using a specified separator, and finally obtaining the spliced long character string.
Specifically, in this embodiment, when two adjacent character strings are spliced end to end, the two character strings are separated by using separators so as to distinguish different sub-character strings in a long character string, for example, the obtained character strings are respectively name, age, and six, and the splicing format by using the method StringBuilder of the StringBuilder class of java is: StringBuilder sbu ═ new StringBuilder (); the long character string is "name-age-six", that is, each different character string is distinguished by using a designated separator, so that each different character string can be distinguished well.
More specifically, the method for splicing character strings is to splice a plurality of single character strings, in some embodiments, if a character string list is obtained from a file to be checked, character strings in different character string lists need to be added to the same character string list in a front-back order, and then a java string builder splicing method, namely a string builder () method, is used for splicing the character strings in the same added character string list.
S103, determining the hash code value of the long character string.
In this embodiment of the present invention, the step of determining the hash code value of the long character string specifically includes: the hash code value of the long string is calculated using the str. The hash code value refers to a return value of a data structure algorithm, the data structure algorithm used in this embodiment is a String-type hash code algorithm, the algorithm calculates a return value of a long character String by calling a String. In some embodiments, the hash value of the long string may be determined by using an Object-type hashCode algorithm, which calculates a return value of the long string by calling an obj. Specifically, the hash code values of the character strings calculated by the hash code data structure algorithm are different for different character strings, and the hash code values of the character strings calculated by the hash code data structure algorithm are the same for the same character strings. In this embodiment, the hash code value of the long character string is determined and compared with the preset hash code value, so that if the hash code values are the same, the long character string belongs to the same character string, that is, the long character string belongs to the same file.
And S104, judging whether the hash code value is the same as a preset hash code value.
In the embodiment of the invention, whether the contents of the character strings are the same or not can be judged through the hash code values, specifically, if the hash code values of the two character strings are different, the contents of the two character strings are different; and if the hash code values of the two character strings are the same, the contents of the two character strings are the same. Specifically, in the practical application of the implementation, if the hash code value of the file to be audited is different from the preset hash code value, it indicates that the audit content is changed, and the audit needs to be performed again, and if the hash code value of the file to be audited is the same as the preset hash code value, it indicates that the audit content is not changed, and the file belongs to the same file, and an auditor can choose to skip the audit node during audit.
And S105, if the hash code value is the same as a preset hash code value, determining that the file to be audited passes auditing, otherwise, sending information for auditing the file to be audited to the client.
In the embodiment of the invention, if the hash code value corresponding to the file to be audited is the same as the preset hash code value, which indicates that the content of the file to be audited is not changed and belongs to the same file as the preset audited file, and the audit does not need to be performed again, the audit of the file to be audited is determined to be passed, in the specific practical application, the auditor is determined to specifically skip the audit node of the file to be audited, the file to be audited is not audited, and the file to be audited is sent to the next processing node for continuous processing. If the hash code value corresponding to the file to be audited is different from the preset hash code value, the content of the file to be audited is changed, the file to be audited is different from the preset audited file, the audit needs to be carried out again, information which needs to be audited of the file to be audited is sent to the client, and in specific practical application, the information can be sent to the client in the form of mails, message push or short messages.
In one embodiment, referring to fig. 3, the method further includes step S106:
and S106, if a return instruction aiming at the file to be audited is received, deleting the file to be audited.
Specifically, the return instruction may be generated by the user clicking a return icon or a cancel icon of the client. The return instruction is used for indicating to quit/cancel the auditing operation of the file to be audited, and when the file to be audited quits/cancels the auditing operation, the file to be audited is deleted, namely the recorded data of the file to be audited in the current auditing process is deleted, so that the file quitting auditing can be prevented from occupying the memory resource space.
In one embodiment, referring to fig. 4, before step S101, the method further includes step S101A:
S101A, creating a file data table to store the file content of the file to be audited.
Specifically, the file data table is created by using an SQL statement, for example, a file data table named audio _ change _ info is created by using CREATETABLE in the SQL statement, and a table element 'pass _ content' varchar (55) NOT NULL command of the file data table is defined for storing the file content of the file to be checked; in the file data table, other table elements may also be defined, for example, "procaefkey 'varchar (20) DEFAULT NULL component for distinguishing different flow charts," app _ no' varchar (30) NOT NULL component for distinguishing different flow charts initiated by the same flow chart, "node _ id 'varchar (50) DEFAULT NULL component for querying a hashCode value of the audit content of a certain node in a certain flow chart, and" pas _ value' NULL component (100) defaulnull component for storing a hash code value of the file content of the file to be audited.
As can be seen from the above, in the embodiment of the present invention, the character string is obtained from the file to be audited; splicing all character strings of the file to be checked by using a preset splicing method to obtain spliced long character strings; determining a hash code value of the long character string; judging whether the hash code value is the same as a preset hash code value or not; and if the hash code value is the same as the preset hash code value, determining that the file to be audited passes auditing, otherwise, sending information for auditing the file to be audited to a client. The invention can intelligently distinguish the audit files, optimize the audit process, reduce the time consumption of auditors on the approved history files and improve the audit efficiency of the auditors.
Referring to fig. 5, in response to the above-mentioned audit rule optimization method, an embodiment of the present invention further provides an audit rule optimization apparatus, where the apparatus 100 includes: the device comprises an acquisition unit 101, a splicing unit 102, a determination unit 103, a judgment unit 104 and an execution unit 105.
The acquiring unit 101 is configured to acquire a character string from a file to be checked; the splicing unit 102 is configured to splice the character strings of the file to be checked by using a preset splicing method to obtain a spliced long character string; a determining unit 103, configured to determine a hash code value of the long character string; a judging unit 104, configured to judge whether the hash code value is the same as a preset hash code value; and the execution unit 105 is configured to determine that the file to be audited passes auditing if the hash code value is the same as a preset hash code value, and otherwise, send information for auditing the file to be audited to the client.
The splicing unit 102 is specifically configured to: splicing the character strings by using a StringBuilder.applied () method according to the sequence of the character strings, separating two adjacent character strings by using a specified separator, and finally obtaining the spliced long character string.
The determining unit 103 is specifically configured to: the hash code value of the long string is calculated using the str.
In an embodiment, referring to fig. 6, the audit rule optimizing apparatus 100 further includes: a deleting unit 106, configured to delete the to-be-audited file if a return instruction for the to-be-audited file is received.
In an embodiment, referring to fig. 7, the audit rule optimizing apparatus 100 further includes: the creating unit 101a is configured to create a file data table to store file contents of the file to be audited.
As can be seen from the above, in the embodiment of the present invention, the character string is obtained from the file to be audited; splicing all character strings of the file to be checked by using a preset splicing method to obtain spliced long character strings; determining a hash code value of the long character string; judging whether the hash code value is the same as a preset hash code value or not; and if the hash code value is the same as the preset hash code value, determining that the file to be audited passes auditing, otherwise, sending information for auditing the file to be audited to a client. The invention can intelligently distinguish the audit files, optimize the audit process, reduce the time consumption of auditors on the approved history files and improve the audit efficiency of the auditors.
The audit rule optimization device corresponds to the audit rule optimization method one to one, and the specific principle and process are the same as those of the method in the embodiment, and are not described again.
The above-mentioned audit rule optimizing device may be implemented in a form of a computer program, and the computer program may be run on a computer device as shown in fig. 8.
FIG. 8 is a schematic diagram of a computer device according to the present invention. The device can be a terminal or a server, wherein the terminal can be an electronic device such as a notebook computer, a desktop computer and the like. The server may be an independent server or a server cluster composed of a plurality of servers. Referring to fig. 8, the computer apparatus 500 includes a processor 502, a nonvolatile storage medium 503, an internal memory 504, and a network interface 505, which are connected by a system bus 501. The non-volatile storage medium 503 of the computer device 500 may store an operating system 5031 and a computer program 5032, which when executed causes the processor 502 to perform an audit rule optimization method, the computer program 5032. The processor 502 of the computer device 500 is used to provide computing and control capabilities that support the overall operation of the computer device 500. The internal memory 504 provides an environment for the execution of a computer program 5032 in the non-volatile storage medium 503, which when executed by the processor causes the processor 502 to perform a method for audit rule optimization. The network interface 505 of the computer device 500 is used for network communication. Those skilled in the art will appreciate that the illustration in fig. 8 is merely a block diagram of a portion of the structure associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those illustrated, or may combine certain components, or have a different arrangement of components.
Wherein the processor 502 implements the following operations when executing the computer program:
acquiring a character string from a file to be checked;
splicing all character strings of the file to be checked by using a preset splicing method to obtain spliced long character strings;
determining a hash code value of the long character string;
judging whether the hash code value is the same as a preset hash code value or not;
and if the hash code value is the same as the preset hash code value, determining that the file to be audited passes auditing, otherwise, sending information for auditing the file to be audited to a client.
In an embodiment, the splicing the character strings of the file to be checked by using a preset splicing method to obtain a spliced long character string includes:
splicing the character strings by using a StringBuilder.applied () method according to the sequence of the character strings, separating two adjacent character strings by using a specified separator, and finally obtaining the spliced long character string.
In one embodiment, the determining the hash code value for the long string comprises:
the hash code value of the long string is calculated using the str.
In one embodiment, the processor 502, when executing the computer program, further performs the following:
and if a return instruction aiming at the file to be audited is received, deleting the file to be audited.
In one embodiment, the processor 502, when executing the computer program, further performs the following:
and creating a file data table to store the file content of the file to be checked.
Those skilled in the art will appreciate that the embodiment of a computer device illustrated in fig. 8 does not constitute a limitation on the specific construction of the computer device, and that in other embodiments a computer device may include more or fewer components than those illustrated, or some components may be combined, or a different arrangement of components. For example, in some embodiments, the computer device only includes a memory and a processor, and in such embodiments, the structures and functions of the memory and the processor are the same as those of the embodiment shown in fig. 8, and are not described herein again.
The present invention provides a computer readable storage medium storing one or more computer programs, the one or more computer programs being executable by one or more processors to perform the steps of:
acquiring a character string from a file to be checked;
splicing all character strings of the file to be checked by using a preset splicing method to obtain spliced long character strings;
determining a hash code value of the long character string;
judging whether the hash code value is the same as a preset hash code value or not;
and if the hash code value is the same as the preset hash code value, determining that the file to be audited passes auditing, otherwise, sending information for auditing the file to be audited to a client.
In an embodiment, the splicing the character strings of the file to be checked by using a preset splicing method to obtain a spliced long character string includes:
splicing the character strings by using a StringBuilder.applied () method according to the sequence of the character strings, separating two adjacent character strings by using a specified separator, and finally obtaining the spliced long character string.
In one embodiment, the determining the hash code value for the long string comprises:
the hash code value of the long string is calculated using the str.
In one embodiment, the one or more computer programs, which are executable by one or more processors, further implement the steps of:
and if a return instruction aiming at the file to be audited is received, deleting the file to be audited.
In one embodiment, the one or more computer programs, which are executable by one or more processors, further implement the steps of:
and creating a file data table to store the file content of the file to be checked.
The foregoing storage medium of the present invention includes: various media that can store program codes, such as a magnetic disk, an optical disk, and a Read-Only Memory (ROM).
The elements of all embodiments of the present invention may be implemented by a general purpose integrated circuit, such as a CPU (central processing Unit), or by an ASIC (Application Specific integrated circuit).
The steps in the auditing rule optimization method of the embodiment of the invention can be sequentially adjusted, combined and deleted according to actual needs.
The units in the audit rule optimization device can be merged, divided and deleted according to actual needs.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.

Claims (10)

1. An audit rule optimization method, the method comprising:
acquiring a character string from a file to be checked;
splicing all character strings of the file to be checked by using a preset splicing method to obtain spliced long character strings;
determining a hash code value of the long character string;
judging whether the hash code value is the same as a preset hash code value or not;
and if the hash code value is the same as the preset hash code value, determining that the file to be audited passes auditing, otherwise, sending information for auditing the file to be audited to a client.
2. The method of claim 1, wherein the using a preset splicing method to splice the character strings of the file to be checked to obtain a spliced long character string comprises:
splicing the character strings by using a StringBuilder.applied () method according to the sequence of the character strings, separating two adjacent character strings by using a specified separator, and finally obtaining the spliced long character string.
3. The method of claim 1, wherein said determining a hash code value for said long string comprises:
the hash code value of the long string is calculated using the str.
4. The method of claim 1, wherein the method further comprises:
and if a return instruction aiming at the file to be audited is received, deleting the file to be audited.
5. The method of claim 1, wherein prior to the obtaining the string from the document to be audited, the method further comprises:
and creating a file data table to store the file content of the file to be checked.
6. An audit rule optimization device, the device comprising:
the acquiring unit is used for acquiring the character string from the file to be checked;
the splicing unit is used for splicing the character strings of the file to be checked by using a preset splicing method to obtain a spliced long character string;
a determination unit configured to determine a hash code value of the long character string;
the judging unit is used for judging whether the hash code value is the same as a preset hash code value or not;
and the execution unit is used for determining that the file to be audited passes auditing if the hash code value is the same as a preset hash code value, and otherwise, sending information for auditing the file to be audited to the client.
7. The apparatus of claim 6, wherein the splicing unit is specifically configured to: splicing the character strings by using a StringBuilder.applied () method according to the sequence of the character strings, separating two adjacent character strings by using a specified separator, and finally obtaining the spliced long character string.
8. The apparatus of claim 6, wherein the determining unit is specifically configured to: the hash code value of the long string is calculated using the str.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor when executing the computer program implements an audit rule optimization method according to any one of claims 1 to 5.
10. A computer-readable storage medium, storing one or more computer programs, the one or more computer programs being executable by one or more processors to implement the audit rule optimization method of any one of claims 1-5.
CN201911351998.9A 2019-12-25 2019-12-25 Auditing rule optimization method, auditing rule optimization device, computer equipment and storage medium Active CN111126965B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911351998.9A CN111126965B (en) 2019-12-25 2019-12-25 Auditing rule optimization method, auditing rule optimization device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911351998.9A CN111126965B (en) 2019-12-25 2019-12-25 Auditing rule optimization method, auditing rule optimization device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111126965A true CN111126965A (en) 2020-05-08
CN111126965B CN111126965B (en) 2023-08-29

Family

ID=70502315

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911351998.9A Active CN111126965B (en) 2019-12-25 2019-12-25 Auditing rule optimization method, auditing rule optimization device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111126965B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112836160A (en) * 2021-01-29 2021-05-25 世纪龙信息网络有限责任公司 Content auditing method, device and equipment
CN113590647A (en) * 2021-07-29 2021-11-02 中国联合网络通信集团有限公司 SQL statement optimization method, device, equipment, storage medium and product

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11306194A (en) * 1998-04-23 1999-11-05 Sharp Corp Method for calculating hash value of character string and machine-readable recording medium where program for implementing same method is recorded
US20150234848A1 (en) * 2014-02-18 2015-08-20 Black Duck Software, Inc. Methods and systems for efficient representation of file sets
CN107480950A (en) * 2017-08-15 2017-12-15 天津大学 automatic auditing system and method
WO2018090642A1 (en) * 2016-11-15 2018-05-24 平安科技(深圳)有限公司 Application program upgrade method, user terminal and storage medium
CN108427733A (en) * 2018-02-28 2018-08-21 网易(杭州)网络有限公司 The setting method of auditing rule, device and system, equipment, storage medium
CN110457628A (en) * 2019-07-05 2019-11-15 平安国际智慧城市科技股份有限公司 Webpage edition correcting method, device, equipment and storage medium
CN110505051A (en) * 2019-08-28 2019-11-26 无锡科技职业学院 Character string Hash processing method and processing device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH11306194A (en) * 1998-04-23 1999-11-05 Sharp Corp Method for calculating hash value of character string and machine-readable recording medium where program for implementing same method is recorded
US20150234848A1 (en) * 2014-02-18 2015-08-20 Black Duck Software, Inc. Methods and systems for efficient representation of file sets
WO2018090642A1 (en) * 2016-11-15 2018-05-24 平安科技(深圳)有限公司 Application program upgrade method, user terminal and storage medium
CN107480950A (en) * 2017-08-15 2017-12-15 天津大学 automatic auditing system and method
CN108427733A (en) * 2018-02-28 2018-08-21 网易(杭州)网络有限公司 The setting method of auditing rule, device and system, equipment, storage medium
CN110457628A (en) * 2019-07-05 2019-11-15 平安国际智慧城市科技股份有限公司 Webpage edition correcting method, device, equipment and storage medium
CN110505051A (en) * 2019-08-28 2019-11-26 无锡科技职业学院 Character string Hash processing method and processing device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112836160A (en) * 2021-01-29 2021-05-25 世纪龙信息网络有限责任公司 Content auditing method, device and equipment
CN113590647A (en) * 2021-07-29 2021-11-02 中国联合网络通信集团有限公司 SQL statement optimization method, device, equipment, storage medium and product
CN113590647B (en) * 2021-07-29 2024-02-23 中国联合网络通信集团有限公司 SQL sentence optimization method, device, equipment, storage medium and product

Also Published As

Publication number Publication date
CN111126965B (en) 2023-08-29

Similar Documents

Publication Publication Date Title
US8997041B2 (en) Method of managing script, server performing the same and storage media storing the same
US8626786B2 (en) Dynamic language checking
US8930401B2 (en) Accessing and providing access to computer files over a computer network
US7856626B2 (en) Method of refactoring methods within an application
CN110580189A (en) method and device for generating front-end page, computer equipment and storage medium
CN111126965A (en) Audit rule optimization method and device, computer equipment and storage medium
CN104320312A (en) Network application safety test tool and fuzz test case generation method and system
CN110334086A (en) Data duplicate removal method, device, computer equipment and storage medium
CN108415998B (en) Application dependency relationship updating method, terminal, device and storage medium
CN111858083A (en) Remote service calling method and device, electronic equipment and storage medium
CN114553784A (en) Current limiting processing method and device
US9390073B2 (en) Electronic file comparator
CN112052413A (en) URL fuzzy matching method, device and system
CN112084046B (en) Method and device for calling generalization interface in distributed computing
CN110780983A (en) Task exception handling method and device, computer equipment and storage medium
CN113342647A (en) Test data generation method and device
CN111459911A (en) Service data processing method and device
CN112311931B (en) Method and device for processing contact information at terminal and electronic equipment
CN113890756B (en) Method, device, medium and computing equipment for detecting confusion of user account
CN115576624A (en) Programming framework optimization method, system, terminal equipment and storage medium
CN117931174A (en) Software package validation method and device, target electronic equipment and computer storage medium
JP2024074207A (en) How to analyze cloud API changes
CN111046841A (en) Character extraction method, system, terminal and storage medium of PowerPoint file
KR100668212B1 (en) Combination method of web document data and any form through way that separates its data and form
CN112394934A (en) File processing method and device, electronic equipment and readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant