CN111126965B - Auditing rule optimization method, auditing rule optimization device, computer equipment and storage medium - Google Patents

Auditing rule optimization method, auditing rule optimization device, computer equipment and storage medium Download PDF

Info

Publication number
CN111126965B
CN111126965B CN201911351998.9A CN201911351998A CN111126965B CN 111126965 B CN111126965 B CN 111126965B CN 201911351998 A CN201911351998 A CN 201911351998A CN 111126965 B CN111126965 B CN 111126965B
Authority
CN
China
Prior art keywords
file
checked
hash code
code value
character strings
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201911351998.9A
Other languages
Chinese (zh)
Other versions
CN111126965A (en
Inventor
章新日
王昭日
文鹏
石祖旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd
Original Assignee
Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd filed Critical Shenzhen Qianhai Huanrong Lianyi Information Technology Service Co Ltd
Priority to CN201911351998.9A priority Critical patent/CN111126965B/en
Publication of CN111126965A publication Critical patent/CN111126965A/en
Application granted granted Critical
Publication of CN111126965B publication Critical patent/CN111126965B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application discloses an auditing rule optimization method, a device, computer equipment and a storage medium, wherein the method comprises the following steps: acquiring a character string from a file to be checked; splicing the character strings of the file to be checked by using a preset splicing method to obtain spliced long character strings; determining a hash code value of the long character string; judging whether the hash code value is the same as a preset hash code value or not; if the hash code value is the same as the preset hash code value, determining that the file to be checked is checked, otherwise, sending information for checking the file to be checked to a client. The application can intelligently distinguish the audit files, optimize the audit flow, reduce the time consumption of auditors on the history files which pass the audit, and improve the audit efficiency of auditors.

Description

Auditing rule optimization method, auditing rule optimization device, computer equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to an auditing rule optimization method, an auditing rule optimization device, a computer device, and a storage medium.
Background
In the prior art, in some business process scenarios, auditing operations are performed on the same auditing file, and it is common practice that auditing personnel are required to perform multiple auditing operations on the same auditing file, so that the auditing personnel need to repeat the same auditing operations multiple times, and the repeated operations are redundant.
Disclosure of Invention
In view of the above, the embodiment of the application provides an auditing rule optimizing method, an auditing rule optimizing device, auditing equipment and a storage medium, which can intelligently distinguish auditing files, optimize auditing flows, reduce the time consumption of auditing personnel on history files which pass auditing, and improve auditing efficiency of the auditing personnel.
In one aspect, an embodiment of the present application provides an auditing rule optimization method, where the method includes:
acquiring a character string from a file to be checked;
splicing the character strings of the file to be checked by using a preset splicing method to obtain spliced long character strings;
determining a hash code value of the long character string;
judging whether the hash code value is the same as a preset hash code value or not;
if the hash code value is the same as the preset hash code value, determining that the file to be checked is checked, otherwise, sending information for checking the file to be checked to a client.
In another aspect, an embodiment of the present application provides an audit rule optimizing apparatus, including:
the acquisition unit is used for acquiring the character strings from the file to be checked;
the splicing unit is used for splicing the character strings of the file to be checked by using a preset splicing method to obtain a spliced long character string;
a determining unit configured to determine a hash code value of the long character string;
the judging unit is used for judging whether the hash code value is the same as a preset hash code value or not;
and the execution unit is used for determining that the file to be checked passes the checking if the hash code value is the same as the preset hash code value, and otherwise, sending information for checking the file to be checked to the client.
In yet another aspect, an embodiment of the present application further provides a computer device, including a memory, a processor, and a computer program stored on the memory and capable of running on the processor, where the processor implements the auditing rule optimization method as described above when executing the computer program.
In yet another aspect, embodiments of the present application also provide a computer-readable storage medium storing one or more computer programs executable by one or more processors to implement the audit rule optimization method as described above.
The embodiment of the application provides an auditing rule optimization method, an auditing rule optimization device, computer equipment and a storage medium, wherein the auditing rule optimization method comprises the following steps: acquiring a character string from a file to be checked; splicing the character strings of the file to be checked by using a preset splicing method to obtain spliced long character strings; determining a hash code value of the long character string; judging whether the hash code value is the same as a preset hash code value or not; if the hash code value is the same as the preset hash code value, determining that the file to be checked is checked, otherwise, sending information for checking the file to be checked to a client. The application can intelligently distinguish the audit files, optimize the audit flow, reduce the time consumption of auditors on the history files which pass the audit, and improve the audit efficiency of auditors.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings required for the description of the embodiments will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of an application scenario of an audit rule optimization method provided by an embodiment of the present application;
FIG. 2 is a schematic flow chart of an audit rule optimization method provided by an embodiment of the present application;
FIG. 3 is another schematic flow chart of an audit rule optimization method provided by an embodiment of the present application;
FIG. 4 is another schematic flow chart diagram of an audit rule optimization method provided by an embodiment of the present application;
FIG. 5 is a schematic block diagram of an audit rule optimizing apparatus provided by an embodiment of the present application;
FIG. 6 is another schematic block diagram of an audit rule optimizing apparatus provided by an embodiment of the present application;
FIG. 7 is another schematic block diagram of an audit rule optimizing apparatus provided by an embodiment of the present application;
fig. 8 is a schematic structural diagram of a computer device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
It should be understood that the terms "comprises" and "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the application herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the application. As used in this specification and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in the present specification and the appended claims refers to any and all possible combinations of one or more of the associated listed items, and includes such combinations.
Referring to fig. 1 and fig. 2, fig. 1 is a schematic application scenario diagram of an auditing rule optimization method according to an embodiment of the present application, and fig. 2 is a schematic flow diagram of an auditing rule optimization method according to an embodiment of the present application. The auditing rule optimization method is applied to the client or the server. As an application, as shown in fig. 1, the auditing rule optimization method is applied to the server 10, and the server 10 is responsible for splicing the character strings, calculating the hash code values of the character strings, and comparing the hash code values with preset hash code values to send the final judging result to the client 20, wherein the client is a terminal device used by the auditor, such as a desktop computer, a notebook computer or a smart phone.
Referring to fig. 2, fig. 2 is a schematic flowchart of an audit rule optimization method according to an embodiment of the present application. As shown in fig. 2, the method includes the following steps S101 to S105.
S101, acquiring a character string from a file to be checked.
In the embodiment of the application, the file to be checked can be a contract, a financial statement or a bid, and the character string can be a character string in the file of the contract, the financial statement or the bid, and the character string is generally Chinese, and if the file to be checked contains numbers or English, the character string can also be numbers, english or any combination thereof. For example, chinese plus english: "name", "age", "last name sex", pure english: "name", "age", "sex", pure Chinese: "name", "age", "last name".
It should be noted that the character string may also be of various types, such as arabic, spanish, french, symbol, and any combination thereof.
S102, splicing the character strings of the file to be checked by using a preset splicing method to obtain a spliced long character string.
In the embodiment of the application, the preset splicing method is a StringBuilder.application () method, and the StringBuilder.application () method is a method for splicing character strings in the StringBuilder class of java, and by using the splicing method, two character strings can be spliced end to obtain a long character string; the step of splicing the character strings of the file to be checked by using a preset splicing method to obtain the spliced long character string specifically comprises the following steps: and splicing the character strings by using a StringBuilder.application () method according to the sequence of the character strings, separating two adjacent character strings by using a specified separator, and finally obtaining the spliced long character strings.
Specifically, in this embodiment, when two adjacent strings are spliced end to end, a separator is used to separate the two strings so as to distinguish different sub-strings in a long string, for example, the obtained strings are name, age, sex, and the splicing format is that using the java's string builder method is: stringBuilder sbu = new StringBuilder (); sbu.application ("-") application (age) & application ("-") application (sex), wherein the specified separator used in this embodiment is "-", and the long strings obtained after concatenation are "name-age-sex", i.e. each different string is distinguished by using the specified separator, so that each different string can be well distinguished.
More specifically, the method for splicing strings is to splice a plurality of single strings, in some embodiments, if a string list is obtained from a file to be checked, strings in different string lists need to be added to the same string list in front-to-back order, and then splice the strings in the same string list by using a string builder type splicing method of java.
S103, determining the hash code value of the long character string.
In the embodiment of the present application, the step of determining the hash code value of the long string specifically includes: the hash code value of the long string is calculated using str.hashcode (). The hash code value refers to a return value of a data structure algorithm, the data structure algorithm used in the embodiment is a hash code algorithm of String class, the algorithm calculates a return value of a long character String by calling a str.hash code () method, and the return value is the hash code value of the long character String; in some embodiments, determining the hash value of the long string may also use an Object class hashCode algorithm that calculates a return value of the long string by calling an obj. HashCode () method, where the return value is the hash value of the long string, or an intel class hashCode algorithm that calculates a return value of the long string by calling an int. HashCode () method. Specifically, for different character strings, the hash code values of the character strings calculated by the hash code data structure algorithm are different, and for the same character string, the hash code values of the character strings calculated by the hash code data structure algorithm are also the same. In this embodiment, the hash code value of the long string is determined and compared with the preset hash code value, so that if the hash code values are the same, the same string is included, that is, the same file is indicated.
S104, judging whether the hash code value is the same as a preset hash code value.
In the embodiment of the application, whether the content of the character strings is the same or not can be judged through the hash code values, and specifically, if the hash code values of the two character strings are different, the content of the two character strings is different; if the hash values of the two strings are the same, the contents of the two strings are the same. Specifically, in the practical application of the implementation, if the hash code value of the file to be checked is different from the preset hash code value, it is indicated that the checking content is changed, and re-checking is needed, if the hash code value of the file to be checked is identical to the preset hash code value, it is indicated that the checking content is unchanged and belongs to the same file, and the checking staff can choose to skip the checking node during checking.
S105, if the hash code value is the same as the preset hash code value, determining that the file to be checked is checked, otherwise, sending information for checking the file to be checked to a client.
In the embodiment of the application, if the hash code value corresponding to the file to be checked is the same as the preset hash code value, the content of the file to be checked is unchanged and the file to be checked belongs to the same file as the preset checked file, and the checking of the file to be checked is not needed to be checked again, and in the specific practical application, the checking of the file to be checked is confirmed to be passed is embodied as that the checking staff selects to skip the checking node of the file to be checked, the file to be checked is not checked, and the file to be checked is sent to the next processing node for continuous processing. If the hash code value corresponding to the file to be checked is different from the preset hash code value, the content of the file to be checked is changed, the file to be checked and the preset checked file belong to different files, the file to be checked needs to be checked again, information of the file to be checked is sent to the client, and in specific practical application, the information can be sent to the client in the form of mail, message pushing or short message.
In one embodiment, referring to fig. 3, the method further includes step S106:
s106, if a return instruction for the file to be checked is received, deleting the file to be checked.
Specifically, the return instruction may be generated by the user clicking on a return icon or cancelling an icon of the client. The return instruction is used for indicating the audit operation of the to-be-audited file to be withdrawn/cancelled, and deleting the to-be-audited file when the to-be-audited file is withdrawn/cancelled, namely deleting the record data of the to-be-audited file in the current audit flow, so that the file withdrawn from audit can be prevented from occupying the memory resource space.
In one embodiment, referring to fig. 4, before step S101, the method further includes step S101A:
S101A, creating a file data table to store file contents of the file to be checked.
Specifically, the file data TABLE is created by using an SQL sentence, for example, a file data TABLE named audio_change_info is created by using a CREATE TABLE in the SQL sentence, and a TABLE element 'pass_content' v_v_char (55) NOT NULL COMMENT of the file data TABLE is defined for storing file contents of the file to be checked; in the file data table, other table elements may be defined, for example, 'pro cdefkey' varchar (20) DEFAULT NULL COMMENT is used to distinguish different flowcharts, 'app_no' varchar (30) NOT NULL command is used to distinguish different processes initiated by the same flowchart, 'node_id' varchar (50) DEFAULT NULL COMMENT is used to query hash code values of audit contents of a certain node in a certain process, and 'pass_value' varchar (100) DEFAULT NULL COMMENT is used to store hash code values of file contents of a file to be audit.
From the above, the embodiment of the application obtains the character string from the file to be audited; splicing the character strings of the file to be checked by using a preset splicing method to obtain spliced long character strings; determining a hash code value of the long character string; judging whether the hash code value is the same as a preset hash code value or not; if the hash code value is the same as the preset hash code value, determining that the file to be checked is checked, otherwise, sending information for checking the file to be checked to a client. The application can intelligently distinguish the audit files, optimize the audit flow, reduce the time consumption of auditors on the history files which pass the audit, and improve the audit efficiency of auditors.
Referring to fig. 5, corresponding to the above-mentioned method for optimizing an audit rule, an embodiment of the present application further provides an audit rule optimizing device, where the device 100 includes: an acquisition unit 101, a splicing unit 102, a determination unit 103, a judgment unit 104, and an execution unit 105.
The acquiring unit 101 is configured to acquire a character string from a file to be checked; the splicing unit 102 is configured to splice each character string of the file to be checked by using a preset splicing method, so as to obtain a spliced long character string; a determining unit 103 for determining a hash code value of the long character string; a judging unit 104, configured to judge whether the hash code value is the same as a preset hash code value; and the execution unit 105 is used for determining that the file to be checked passes the checking if the hash code value is the same as the preset hash code value, and otherwise, sending the information for checking the file to be checked to the client.
The splicing unit 102 is specifically configured to: and splicing the character strings by using a StringBuilder.application () method according to the sequence of the character strings, separating two adjacent character strings by using a specified separator, and finally obtaining the spliced long character strings.
The determining unit 103 is specifically configured to: the hash code value of the long string is calculated using str.hashcode ().
In one embodiment, referring to fig. 6, the audit rule optimizing apparatus 100 further includes: and the deleting unit 106 is configured to delete the file to be checked if a return instruction for the file to be checked is received.
In one embodiment, referring to fig. 7, the audit rule optimizing apparatus 100 further includes: a creating unit 101a for creating a file data table to store file contents of the file to be checked.
From the above, the embodiment of the application obtains the character string from the file to be audited; splicing the character strings of the file to be checked by using a preset splicing method to obtain spliced long character strings; determining a hash code value of the long character string; judging whether the hash code value is the same as a preset hash code value or not; if the hash code value is the same as the preset hash code value, determining that the file to be checked is checked, otherwise, sending information for checking the file to be checked to a client. The application can intelligently distinguish the audit files, optimize the audit flow, reduce the time consumption of auditors on the history files which pass the audit, and improve the audit efficiency of auditors.
The auditing rule optimizing device corresponds to the auditing rule optimizing method one by one, and the specific principle and process are the same as those of the method in the embodiment and are not repeated.
The above-described audit rule optimizing means may be implemented in the form of a computer program which is executable on a computer device as shown in fig. 8.
Fig. 8 is a schematic structural diagram of a computer device according to the present application. The device may be a terminal or a server, where the terminal may be an electronic device such as a notebook computer or a desktop computer. The server may be an independent server or a server cluster formed by a plurality of servers. With reference to FIG. 8, the computer device 500 includes a processor 502, a non-volatile storage medium 503, internal memory 504, and a network interface 505, connected by a system bus 501. The non-volatile storage medium 503 of the computer device 500 may store an operating system 5031 and a computer program 5032, where the computer program 5032, when executed, may cause the processor 502 to perform an audit rule optimization method. The processor 502 of the computer device 500 is used to provide computing and control capabilities, supporting the operation of the entire computer device 500. The internal memory 504 provides an environment for the execution of a computer program 5032 in the non-volatile storage medium 503, which when executed by the processor, causes the processor 502 to perform an audit rule optimization method. The network interface 505 of the computer device 500 is for network communication. It will be appreciated by persons skilled in the art that the block diagram of the partial structure shown in fig. 8 is merely relevant to the present application and does not constitute a limitation of the computer device to which the present application is applied, and that a particular computer device may include more or less components than those shown in the figures, or may combine certain components, or have a different arrangement of components.
Wherein the processor 502, when executing the computer program, performs the following operations:
acquiring a character string from a file to be checked;
splicing the character strings of the file to be checked by using a preset splicing method to obtain spliced long character strings;
determining a hash code value of the long character string;
judging whether the hash code value is the same as a preset hash code value or not;
if the hash code value is the same as the preset hash code value, determining that the file to be checked is checked, otherwise, sending information for checking the file to be checked to a client.
In one embodiment, the splicing the character strings of the file to be checked by using a preset splicing method to obtain a long spliced character string includes:
and splicing the character strings by using a StringBuilder.application () method according to the sequence of the character strings, separating two adjacent character strings by using a specified separator, and finally obtaining the spliced long character strings.
In one embodiment, the determining the hash code value of the long string includes:
the hash code value of the long string is calculated using str.hashcode ().
In one embodiment, the processor 502 further performs the following operations when executing the computer program:
and if a return instruction aiming at the file to be checked is received, deleting the file to be checked.
In one embodiment, the processor 502 further performs the following operations when executing the computer program:
and creating a file data table to store file contents of the file to be checked.
Those skilled in the art will appreciate that the embodiment of the computer device shown in fig. 8 is not limiting of the specific construction of the computer device, and in other embodiments, the computer device may include more or less components than those shown, or certain components may be combined, or a different arrangement of components. For example, in some embodiments, the computer device includes only a memory and a processor, and in such embodiments, the structure and function of the memory and the processor are consistent with the embodiment shown in fig. 8, and will not be described again.
The present application provides a computer readable storage medium storing one or more computer programs executable by one or more processors to implement the steps of:
acquiring a character string from a file to be checked;
splicing the character strings of the file to be checked by using a preset splicing method to obtain spliced long character strings;
determining a hash code value of the long character string;
judging whether the hash code value is the same as a preset hash code value or not;
if the hash code value is the same as the preset hash code value, determining that the file to be checked is checked, otherwise, sending information for checking the file to be checked to a client.
In one embodiment, the splicing the character strings of the file to be checked by using a preset splicing method to obtain a long spliced character string includes:
and splicing the character strings by using a StringBuilder.application () method according to the sequence of the character strings, separating two adjacent character strings by using a specified separator, and finally obtaining the spliced long character strings.
In one embodiment, the determining the hash code value of the long string includes:
the hash code value of the long string is calculated using str.hashcode ().
In one embodiment, the one or more computer programs may be executed by one or more processors, further implementing the steps of:
and if a return instruction aiming at the file to be checked is received, deleting the file to be checked.
In one embodiment, the one or more computer programs may be executed by one or more processors, further implementing the steps of:
and creating a file data table to store file contents of the file to be checked.
The aforementioned storage medium of the present application includes: various media capable of storing program codes, such as magnetic disk, optical disk, read-Only Memory (ROM), etc.
The units in all embodiments of the application may be implemented by general-purpose integrated circuits, such as a CPU (Central Processing Unit ), or by ASIC (Application Specific Integrated Circuit, application specific integrated circuit).
The steps in the auditing rule optimization method can be sequentially adjusted, combined and deleted according to actual needs.
The units in the auditing rule optimizing device can be combined, divided and deleted according to actual needs.
While the application has been described with reference to certain preferred embodiments, it will be understood by those skilled in the art that various changes and substitutions of equivalents may be made and equivalents will be apparent to those skilled in the art without departing from the scope of the application. Therefore, the protection scope of the application is subject to the protection scope of the claims.

Claims (7)

1. An audit rule optimization method, the method comprising:
acquiring a character string from a file to be checked;
splicing the character strings of the file to be checked by using a preset splicing method to obtain spliced long character strings, wherein the character strings are spliced by using a StringBuilder () method according to the sequence of the character strings, and the adjacent two character strings are separated by using a specified separator, so that the spliced long character strings are finally obtained;
determining a hash code value of the long character string;
judging whether the hash code value is the same as a preset hash code value or not;
if the hash code value is the same as a preset hash code value, determining that the file to be checked is checked, otherwise, sending information for checking the file to be checked to a client;
and creating a file data table to store file contents of the file to be checked.
2. The method of claim 1, wherein the determining the hash code value of the long string comprises:
the hash code value of the long string is calculated using str.hashcode ().
3. The method of claim 1, wherein the method further comprises:
and if a return instruction aiming at the file to be checked is received, deleting the file to be checked.
4. An audit rule optimizing device, the device comprising:
the acquisition unit is used for acquiring the character strings from the file to be checked;
the splicing unit is used for splicing the character strings of the file to be checked by using a preset splicing method to obtain spliced long character strings, wherein the character strings are spliced by using a StringBuilder () method according to the sequence of the character strings, and the adjacent two character strings are separated by using a specified separator, so that the spliced long character strings are finally obtained;
a determining unit configured to determine a hash code value of the long character string;
the judging unit is used for judging whether the hash code value is the same as a preset hash code value or not;
the execution unit is used for determining that the file to be checked passes the checking if the hash code value is the same as a preset hash code value, and otherwise, sending information for checking the file to be checked to a client;
and the creating unit is used for creating a file data table to store the file content of the file to be checked.
5. The apparatus according to claim 4, wherein the determining unit is specifically configured to: the hash code value of the long string is calculated using str.hashcode ().
6. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the audit rule optimization method according to any of claims 1-3 when executing the computer program.
7. A computer readable storage medium storing one or more computer programs executable by one or more processors to implement the auditing rule optimization method of any of claims 1-3.
CN201911351998.9A 2019-12-25 2019-12-25 Auditing rule optimization method, auditing rule optimization device, computer equipment and storage medium Active CN111126965B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911351998.9A CN111126965B (en) 2019-12-25 2019-12-25 Auditing rule optimization method, auditing rule optimization device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911351998.9A CN111126965B (en) 2019-12-25 2019-12-25 Auditing rule optimization method, auditing rule optimization device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111126965A CN111126965A (en) 2020-05-08
CN111126965B true CN111126965B (en) 2023-08-29

Family

ID=70502315

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911351998.9A Active CN111126965B (en) 2019-12-25 2019-12-25 Auditing rule optimization method, auditing rule optimization device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111126965B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112836160A (en) * 2021-01-29 2021-05-25 世纪龙信息网络有限责任公司 Content auditing method, device and equipment
CN113590647B (en) * 2021-07-29 2024-02-23 中国联合网络通信集团有限公司 SQL sentence optimization method, device, equipment, storage medium and product

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018090642A1 (en) * 2016-11-15 2018-05-24 平安科技(深圳)有限公司 Application program upgrade method, user terminal and storage medium

Family Cites Families (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP4179660B2 (en) * 1998-04-23 2008-11-12 シャープ株式会社 Hash value calculation method for character string, machine-readable recording medium storing program for realizing the method, hash value calculation device for character string, and information management device
US10256977B2 (en) * 2014-02-18 2019-04-09 Synopsys, Inc. Methods and systems for efficient representation of file sets
CN107480950A (en) * 2017-08-15 2017-12-15 天津大学 automatic auditing system and method
CN108427733B (en) * 2018-02-28 2021-08-10 网易(杭州)网络有限公司 Method, device and system for setting audit rule, equipment and storage medium
CN110457628B (en) * 2019-07-05 2020-09-22 平安国际智慧城市科技股份有限公司 Webpage version checking method, device, equipment and storage medium
CN110505051B (en) * 2019-08-28 2022-11-01 无锡科技职业学院 Character string hash processing method and device

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2018090642A1 (en) * 2016-11-15 2018-05-24 平安科技(深圳)有限公司 Application program upgrade method, user terminal and storage medium

Also Published As

Publication number Publication date
CN111126965A (en) 2020-05-08

Similar Documents

Publication Publication Date Title
CN110968325B (en) Applet conversion method and device
US10621211B2 (en) Language tag management on international data storage
CN109617646B (en) Message conversion method and device, computer equipment and computer readable storage medium
CN101231651A (en) Computer apparatus and method, for calculating importance of electronic document on computer network
WO2019060010A1 (en) Content pattern based automatic document classification
CN111797594B (en) Character string processing method based on artificial intelligence and related equipment
CN111126965B (en) Auditing rule optimization method, auditing rule optimization device, computer equipment and storage medium
CN104320312A (en) Network application safety test tool and fuzz test case generation method and system
US9390073B2 (en) Electronic file comparator
CN110782169A (en) Method and device for updating business process
CN114489950A (en) Component adapting method and device, electronic equipment and storage medium
CN114036561A (en) Information hiding method, information acquiring method, information hiding device, information acquiring device, storage medium and electronic equipment
GB2521637A (en) Messaging digest
WO2023151397A1 (en) Application program deployment method and apparatus, device, and medium
CN112084046B (en) Method and device for calling generalization interface in distributed computing
CN113792232B (en) Page feature calculation method, page feature calculation device, electronic equipment, page feature calculation medium and page feature calculation program product
CN113342647A (en) Test data generation method and device
US10915594B2 (en) Associating documents with application programming interfaces
CN110780983A (en) Task exception handling method and device, computer equipment and storage medium
CN113890756B (en) Method, device, medium and computing equipment for detecting confusion of user account
CN111079391B (en) Report generation method and device
US20070136298A1 (en) Detection of inaccessible resources
CN112311931B (en) Method and device for processing contact information at terminal and electronic equipment
US20230053344A1 (en) Scenario generation apparatus, scenario generation method, and computer-readablerecording medium
US12014169B2 (en) Software recognition using tree-structured pattern matching rules for software asset management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant