Detailed Description
To make the objects, technical solutions and advantages of the exemplary embodiments of the present application clearer, the technical solutions in the exemplary embodiments of the present application will be clearly and completely described below with reference to the drawings in the exemplary embodiments of the present application, and it is obvious that the described exemplary embodiments are only a part of the embodiments of the present application, but not all the embodiments.
Example 1:
in order to solve the technical problems in the prior art, an embodiment of the present application illustrates a digital asset authentication processing system, which may specifically refer to fig. 3, including: the system comprises a client 1 and a digital asset authentication platform 2, wherein the digital asset authentication platform comprises: a first data receiving unit 21 connected to an output end of the client 1, a first database 25 connected to an output end of the first data receiving unit 21, a data selecting unit 22 connected to an output end of the first database 25, a data authenticating unit 23 connected to an output end of the data selecting unit 22, and an information feedback unit 24 connected to an output end of the data authenticating unit 23, wherein the digital asset authentication platform further includes: a block chain thread 27, an input end of which is connected with an input end of the client 1, an input end of the first data receiving unit 21, an input end of the data selecting unit 22, and an input end of the data authentication unit 23, wherein:
the blockchain thread 27 is configured to: and receiving the data uploaded by the client 1, the first data receiving unit 21, the data selecting unit 22 and the data authenticating unit 23, and sending the data to the blockchain network.
The client is installed on a terminal, and the terminal can be a computer, a mobile phone, a tablet computer, a laptop, a personal digital assistant, a mobile internet device or a wearable device. It should be noted that the digital assets are of any type, including: patents, trademarks, copyrights, etc., all exist in the form of digital asset packages in embodiments of the present application.
According to the technical scheme, the block chain network has the characteristics of decentralization, tamper resistance and repudiation resistance, and data uploaded by the client, the first data receiving unit, the data selecting unit and the data authentication unit are uploaded to the block chain network through a block chain process, so that the data can be guaranteed not to be tampered, the reliability of digital asset data is guaranteed, and meanwhile the data can be guaranteed to be recorded in time.
Example 2:
in the technical solution shown in embodiment 1, since the partial digital asset entity has a large capacity, which may reach several hundred M or even exceed 1G, the digital asset uploaded to the digital asset authentication platform 2 by the client 1 may occupy more transmission resources and storage resources. In addition, the authentication process of the digital assets is based on the online operation of the internet, a large number of digital assets are uploaded randomly from different clients 1 and cannot be matched with the use condition of network transmission resources of the digital asset authentication platform 2, and the uploading of the digital assets is delayed or transmission fails. In order to solve the problems in the prior art, embodiments of the present application provide a digital asset processing system to be authenticated.
In order to solve the above problem, the technical solution implemented and shown in the present application further includes, on the basis of the technical solution shown in embodiment 1, a preprocessing platform 3 connected to an output end of the client 1, specifically, refer to fig. 4, where the preprocessing platform includes: a second data receiving unit 31 connected to an output terminal of the client 1, an encrypted packet generating unit 32 connected to an output terminal of the data receiving unit 31, and a digest generating unit 33 connected to an output terminal of the encrypted packet generating unit 32, an output terminal of the digest generating unit 33 being connected to the first data receiving unit 21, wherein:
the second data receiving unit 31 is configured to receive a digital asset data package, perform a digital signature operation on the digital asset data package by using a determined digital signature algorithm, and generate a signature string, where the digital asset data package includes a digital asset entity and a bibliographic item;
the encrypted packet generating unit 32 is configured to encrypt the signature string, the bibliographic item, and the link address of the digital asset entity by using an asymmetric encryption algorithm, and generate an encrypted asset data packet;
and the digest generating unit 33 is configured to generate a digest of the asset package to be authenticated according to the encrypted asset data package and the public key, send the digest of the asset package to be authenticated to the first data receiving unit, and upload the digest to the blockchain network and the digital asset authentication platform.
It should be noted that, in the technical solution shown in the embodiment of the present application, the data received by the first data receiving unit is collectively referred to as the digital asset package to be authenticated, and when the preprocessing platform 3 transmits the data to the first data receiving unit, the data is also referred to as the abstract of the asset package to be authenticated.
The digital signature algorithm can be determined by pre-negotiation between the client and the digital asset authentication platform. The digital signature algorithm can also be one of a set of algorithm programs provided in advance, when the client and the digital asset authentication platform transmit a digital asset data packet, the client selects one of the algorithm programs from the set of algorithm programs and sends the digital asset authentication platform to inform the digital asset authentication platform to use the same digital signature algorithm. It should be noted that the algorithm program set includes a plurality of digital signature algorithms. The digital signature algorithm may be SHA256, SHA384, SHA512, or the like. The digital signature operation may be a Hash operation.
According to the embodiment of the application, the Hash operation is performed on the digital asset data packet by using the digital signature algorithm, and due to the property of the Hash operation, a generated signature character string is a unique value after the Hash operation is performed on the digital asset data packet. For example, the digital signature algorithm uses the SHA256, and the digital asset package performs a Hash operation using the SHA256 to obtain a 256-bit string, which is a unique value. After different digital asset data packets are subjected to Hash operation by using the same digital signature algorithm, the obtained signature character strings are different. Therefore, the signature string may be used to verify the authenticity of the digital asset package.
For example, when buyer a wants to buy a picture, after the picture is converted into digital assets expressed in electronic data form by technical means, a digital asset data packet is obtained, and a digital signature operation is performed by using SHA256 digital signature algorithm to obtain a real signature character string, wherein the signature character string is unique. Seller B claims to own the picture, and after the picture shown by seller B is converted into a digital asset data packet, the digital signature operation is carried out by using the SHA256 digital signature algorithm to obtain a group of new signature character strings. At the moment, whether the real signature character string is the same as the new signature character string is judged, and if yes, the seller B is a true owner of the picture; if the pictures are not the same, the picture shown by the seller B is a counterfeit, the seller B is the owner pretending the picture, the seller B is not the true owner of the picture, and therefore the buyer A cannot trade with the seller B. Due to the uniqueness of the signature string, the signature string can verify the authenticity of the digital asset pack.
Encrypting the signature character string and the link address of the digital asset entity by adopting an asymmetric encryption algorithm to generate an encrypted asset data packet;
because the capacity of the digital asset entity may be particularly huge, the link address of the digital asset entity with smaller capacity is adopted as a part of the encrypted asset data packet, and the capacity of the encrypted asset data packet is further reduced.
It should be noted that, according to the link address of the digital asset entity, the storage location of the digital asset entity can be determined. In one possible embodiment, the digital asset data package is stored in a client, and in another possible embodiment, the preprocessing platform may include a third party server, and the digital asset data package is stored in the third party server. The digital asset data packet is stored in the third-party server, so that the storage resource of the client occupied by the digital asset data packet can be reduced, and the condition that the client runs at a low speed is avoided.
In the embodiment of the application, the asymmetric encryption algorithm is complex in strength, so that the security is extremely high. The asymmetric encryption algorithm comprises two keys, namely a public key and a private key, wherein the public key and the private key are different keys, and the encrypted asset data packet is obtained by encrypting the signature character string and the link address of the digital asset entity through the private key; in the process of decrypting the encrypted asset data packet, the public key is used, and the public key is used for decrypting the encrypted asset data packet, so that the signature character string in the encrypted asset data packet and the link address of the digital asset entity can be obtained.
And generating an asset package abstract to be authenticated according to the encrypted asset data package and the public key, and uploading the abstract to a block chain thread and a first data receiving unit. The block chain process uploads the received data to a block chain network, and the block chain network has the characteristics of decentralization, tamper resistance and repudiation resistance, so that the summary of the asset package to be authenticated, which is composed of the encrypted asset data package and the public key, is uploaded to the block chain network, and the digital asset entity corresponding to the link address of the digital asset entity in the encrypted asset data package can be guaranteed not to be tampered, and can be recorded in time.
The method and the device have the advantages that the abstract of the asset package to be authenticated is uploaded to the digital asset authentication platform from the client, and the abstract of the asset package to be authenticated is composed of the encrypted asset package and the public key, and the encrypted asset package is obtained by encrypting the link address and the signature character string of the digital asset entity with smaller capacity.
Example 3:
referring to fig. 5, in the technical solution shown in embodiment 2, the data authentication unit 23 includes: a bibliographic examination thread 23a connected to an output terminal of the data selection unit 22, an entity authentication unit 23b connected to an output terminal of the bibliographic examination thread 23a, and an authentication digital asset generation unit 23c connected to an output terminal of the entity authentication unit 23 b;
the data selecting unit 22 is configured to obtain a digest of the to-be-authenticated data packet, which needs to be processed according to priority, from the first database 25;
the bibliographic item auditing thread 23a is used for auditing data of a bibliographic item part in the to-be-authenticated data packet abstract; for the checked unqualified data items, giving a reference value of a virtual qualified data item and analyzing a checking result, and continuing checking item by item until the data of all the bibliographic project parts are checked; if the audited data of the bibliographic project part has unqualified data items, the audited result is fed back to the corresponding client 1 through the information feedback unit 24; otherwise, the entity authentication unit 23b continues to operate on the entity part of the digital asset in the data packet;
the authenticated digital asset generating unit 23c generates an authenticated digital asset from the authenticated digital asset entity and the bibliographic item.
In general, a client may have multiple data uploading operations, and after each uploading operation, there are two auditing results: the data packet is also called as a summary of the data packet to be authenticated or the data to be authenticated passes or fails the audit in some embodiments; if the data package is not approved, the user is required to perform modification related operation on the data package which is not approved on the client side, and then the data package is uploaded again; therefore, for each independent client, there are not only a huge number of packets to be uploaded each time, but also different properties, and since each packet contains different data contents and may be uploaded for the first time or for more than two times, it is important to determine the uploading order of the packets during uploading. Therefore, the function of the data selection unit in the present application is to determine the type of the data packet, and also to determine the uploading sequence of the data packet.
Determining the type of the data packet, specifically, determining the data type contained in the data packet according to inspection of the data packet, or acquiring whether the data packet is uploaded, the number of times of uploading, and the like according to inspection of the data packet; according to different types of the data packets, the importance of the data packets is divided through set rules, so that the uploading sequence is divided; for example, for data packets of the same data type, if it is checked and known that a certain data packet is a data packet which has been uploaded but has not passed the examination, the data packet can be prioritized over other data packets of the same data type when being uploaded again; for the data packets which are uploaded for the first time or are uploaded for the same times, if the importance index of a certain data packet is superior to that of other data packets, the data packet can be uploaded preferentially to other data packets when being uploaded again.
All data packets to be authenticated can be sorted from high to low according to priority; in this embodiment, the priority of the data packet to be authenticated refers to the priority level of the data packet to be authenticated, and in practical applications, the priority may be represented in the form of numbers, letters, or other forms, for example, the priority level 1, 2, 3, … …, or n is set, and the larger the number is, the higher the priority is, the earlier the data packet is audited; further, when the number of packets is extremely large, in order to effectively distinguish the priorities of all the packets from each other, the priorities may be expressed by specific values or symbols.
There are many bases for setting the priority, and the bases can be set according to the importance of the contents of the data packet to be authenticated, for example, the data packet object specification, type, image data and the like closely related to the transaction and the authentication object will obtain higher priority, and the data packet procedure number and the like not highly related to the transaction and the authentication object will obtain lower priority; for another example, for a data packet with a large number of accumulated uploading times, the content of the data packet can be regarded as important, and a higher priority can be correspondingly specified;
the priority can be set according to the transaction duration besides the setting basis; for example, a packet that is up to the deadline of the transaction will get a relatively high priority; packets with the same or similar content, packets with shorter transaction duration will get higher priority than packets with longer transaction duration; the two priority levels can be set independently or combined; moreover, the embodiments of the present application are not limited to the combination of the two formulation bases, and other feasible formulation bases can be adopted to be considered alone or combined.
Sequentially selecting data packets to be authenticated according to the sorting result, and storing the data packets to be authenticated into a first-in first-out queue to be processed; when all the data packets to be authenticated are distinguished by different priority levels, all the data packets to be authenticated can be sequentially selected according to the priority levels before uploading, specifically, a first-in first-out queue, namely a queue to be processed, of the data packets to be processed is set at the moment, and then the corresponding data packets to be authenticated are sequentially stored into the queue to be processed by a structural unit with a data selection function according to the priority levels; the queue to be processed can be set in the data selection unit by default, or a memory can be independently set to bear the queue to be processed, and the data selection unit is adopted to execute data storage operation;
fig. 6 is a schematic diagram of a process of selecting and storing a to-be-authenticated data packet; when selecting a to-be-authenticated data packet to be stored in a to-be-processed queue, it is necessary to determine an uploading order according to a priority level of the to-be-authenticated data packet, for example, in fig. 10, the to-be-authenticated data packet B having the highest priority level will be used as a first priority selection object, the to-be-authenticated data packet C having the lowest priority level will be used as a second priority selection object, and the to-be-authenticated data packet a having the lowest priority level will be stored as a third selection object; at this time, if there is a packet D to be authenticated and its priority is located between the packets B, C to be authenticated, it is necessary to arrange the packet D to be authenticated as a second priority selection object with the packet C, A to be authenticated in sequence. In the queue to be processed, the data packet selected to enter is arranged in front of the queue, and when the data packet is examined in the following process, the data packet in front of the queue is operated first, so that the first-in first-out of the queue is realized.
Example 4:
generally, a digital asset authentication platform internally sets a classification distributor, a plurality of authentication threads, and an authentication digital asset generation unit. And the classification distributor sends the digital assets to corresponding authentication threads according to the corresponding classifications of the digital assets. And each thread authenticates the digital assets of the corresponding category, and finally, the authenticated digital asset generating unit generates authenticated digital assets. However, regardless of how the digital assets are classified, the data processing traffic and efficiency of each thread are unbalanced, thereby reducing the efficiency of the overall authentication.
Referring to fig. 7, in order to solve the above technical problem, in the technical solution shown in the embodiment of the present application, on the basis of the technical solution shown in embodiment 3, the entity authentication unit 23b includes: a balanced distributor 23b1 coupled to an output of the project audit thread 23a, a plurality of hash threads 23b2 coupled to the output, an authentication thread 23b3 coupled to an output of the hash threads 23b2, an output of the authentication thread 23b3 coupled to the authentication digital asset generation unit 23c, wherein:
the equilibrium distributor 23b1, configured to assign a digital asset entity and a corresponding registration code to the hash thread 23b 2;
in particular, the balanced distributor distributes the digital asset entity portions to the hash threads 23b2 according to a global load distribution principle. The global load distribution principle can determine which next thread provides service by determining the load of each hash thread 23b2, which may include CPU occupation, bandwidth occupation, and the like, and determining the availability determination of the hash thread 23b2, thereby achieving balanced operation of each hash thread 23b 2. The balanced distributor can also implement the global load distribution principle by a polling mode. For example, the digital asset authentication processing platform includes 10 hash threads, namely hash thread 1, hash thread 2, hash thread 3, hash thread 4 … … hash thread 10; the balanced distributor distributes the received 1-10 digital asset entity parts to a Hash thread 1, a Hash thread 2, a Hash thread 3 and a Hash thread 4 … … Hash thread 10 in sequence; the received digital asset entity portions 11-20 are then distributed again in order Hashthread 1, Hashthread 2, Hashthread 3, Hashthread 4 … … Hashthread 10, and so on. In the specific application process, all allocation manners that can achieve full-load usage of the hash thread are within the scope of the embodiments of the present application, and are not necessarily described herein due to limited sections.
The hash thread 23b2, configured to calculate a hash value of the digital asset entity according to a digital signature algorithm;
the technical scheme shown in the embodiment of the application calculates the hash value of each digital asset entity part through a hash thread.
The hash queue transforms the received digital asset entity part into an output hash value with a fixed length through a hash algorithm, then compares the hash value with the signature character string, if the hash value is consistent with the signature character string, the authentication is successful, and the data which is successfully authenticated is sent to the authentication queue to be covered with a time stamp.
The authentication thread 23b3 is configured to use the hash value as an authentication object and give a corresponding timestamp;
the authentication digital asset generating unit 23c is configured to generate an authentication digital asset including an authentication code and a registration code according to the hash value and the timestamp.
According to the technical scheme, the authentication operation mainly provides the corresponding time stamp for the hash value, and the data processing amount is small. Therefore, a design mode that a plurality of hash queues correspond to one authentication queue can be adopted.
And the authentication digital asset generating unit is used for generating an authentication digital asset comprising an authentication code and a registration code according to the hash value and the timestamp.
According to the technical scheme, firstly, according to the global load distribution principle, digital asset entity parts are distributed to hash threads, the digital asset entity parts are guaranteed to be uniformly distributed to all the hash threads, and therefore the hash threads are used for processing the calculation of the hash values of the digital asset entity parts in a full-load mode. And then, authenticating the hash value through an authentication thread, wherein in the technical scheme shown in the embodiment of the application, the authentication operation mainly provides a corresponding timestamp for the hash value. The technical scheme shown in the embodiment of the application can ensure that all hash threads simultaneously calculate the hash value of the entity part of the digital asset on line, and further ensure that the data processing flow and efficiency are in a balanced state, thereby improving the efficiency of the whole authentication.
Example 5:
in order to improve the efficiency of data authentication, in the technical solution shown in the embodiment of the present application, there may be a plurality of authentication threads. Specifically, referring to fig. 8, on the basis of the technical solution shown in embodiment 4, there may be a plurality of authentication threads, and a centralized repeater is further disposed between the hash thread and the authentication thread; the centralized forwarder 23b4 is configured to store the hash value sent by the hash thread, and send the hash value to the authentication thread.
According to the technical scheme, the authentication efficiency is improved by arranging a plurality of authentication threads, and the number of the authentication threads can be different from the number of the hash threads. Meanwhile, a centralized repeater is also arranged between the hash thread and the authentication thread 22. The centralized repeater is used for storing the hash value sent by the hash thread and sending the hash value to the authentication thread; by adopting the centralized repeater, the problem of data blockage in the process of transmitting the data from the hash thread to the authentication thread can be avoided.
Example 6:
on the basis of the technical scheme shown in embodiment 5, the centralized forwarder is an authentication queue; specifically, referring to fig. 8, the authentication queue is further configured to control the start and the stop of the authentication thread according to whether an authentication idle capacity is smaller than or equal to a preset capacity, where the authentication idle capacity is an idle capacity of the authentication queue.
The authentication thread is mainly used for authenticating the hash value, and in the technical scheme shown in the embodiment of the application, the authentication operation mainly provides a corresponding timestamp for the hash value, so that the data processing amount is small, and the time required by authentication of each hash value is relatively fixed. The Hash thread is mainly used for calculating the Hash value of the entity part of the digital asset; wherein the digital asset entity part comprises: the character product class and the shadow are regarded as the product class, and the like, and the sizes and the file formats of the digital asset data packets are different due to different contents, so that the calculation rates of the hash threads on the entity part hash values of the digital assets are different, and the time required for calculating the entity part hash values of each digital asset is relatively unfixed. In this case, if the number of hash threads to be started and the number of authentication threads to be started are fixed, it is inevitable to waste resources.
In order to solve the above problem, in the technical solution shown in the embodiment of the present application, the authentication queue is configured to control starting and closing of an authentication thread according to whether an authentication free capacity is smaller than or equal to a preset capacity, where the authentication free capacity is a free capacity of the authentication queue. The starting and the closing of the authentication thread are controlled through the authentication queue, and the maximum utilization of the authentication thread resource can be achieved.
For example, the following steps are carried out:
the digital asset authentication processing platform comprises: 20 hash threads and 10 authentication threads. In a period of time, 20 hash threads are started, and 5 authentication threads are started. In this period, the entity part of the digital assets processed by the hash thread is mostly a video file, and correspondingly, the time consumed by the hash thread for calculating the hash value of the video file is longer. And 18 hash values are queued in the authentication queue, in this case, the authentication idle capacity of the authentication thread is always larger than the preset capacity, and at this time, the state that 5 authentication threads are opened is continuously maintained. In another time period, the physical part of the digital assets processed by the hash thread is mostly patents, and accordingly, the time consumed for the hash thread 23b2 to calculate the hash value of the movie file is short. 35-40 of the authentication queue and the hash value are queued for authentication, in this case, the authentication idle capacity of the authentication thread is smaller than the preset capacity, and at this time, the authentication thread controls the other authentication threads to be opened. In another time period, the authentication idle capacity of the authentication thread is smaller than the preset capacity, and at this time, the authentication thread can also control the closing of the authentication thread.
Therefore, according to the technical scheme shown in the embodiment of the application, the authentication queue controls the starting and the closing of the authentication thread according to whether the authentication idle capacity is less than or equal to the preset capacity, so that the maximum utilization of the authentication thread resource is achieved.
Example 7:
since the hash thread is used to calculate the hash value of the digital asset, for some digital assets that may be viewed as an article class, it takes a lot of time to calculate the hash value of the digital asset, in this case, the identification may cause the data in the hash queue to be blocked if the digital asset is continuously transported to the hash queue. In order to solve the above technical problem, in the technical solution shown in the embodiment of the present application, on the basis of the technical solution shown in embodiment 6, a hash queue 23b5 is further disposed between the equilibrium distributor 23b1 and the hash thread 23b 2; the hash queue 23b5 is used for storing the digital assets and corresponding registration codes including the entity part output by the equilibrium distributor in a FIFO manner, and storing the digital assets and corresponding registration codes for the hash thread 23b2 in a FIFO manner.
And the hash queues correspond to the hash threads one to one. In particular, reference may be made to FIG. 9. In fig. 9, the hash queue is configured to store the digital assets and corresponding registration codes including the entity portions output by the equilibrium distributor in the FIFO manner, and store the digital assets and corresponding registration codes for the hash threads in the FIFO manner. By adopting the Hash queue, the problem of data blockage in the process of transmitting data to the Hash thread by the balanced distributor can be avoided.
In a feasible embodiment, the hash queue is further configured to send hash free capacity to the balanced distributor in real time, where the hash free capacity is the free capacity of the hash queue; and the balanced distributor is also used for distributing the digital asset entity part to the hash queue according to the hash spare capacity.
The spare capacity of the hash queue can be spare capacity, mainly surplus memory, and the hash queue with the largest surplus memory can provide more memory space and computing resources. The hash queue may send hash free capacity to the balanced distributor at preset intervals. And the balanced distributor distributes the digital asset entity part to the hash queue according to the hash spare capacity. The hash queue can also send the hash free capacity to the balanced distributor in real time. And the balanced distributor distributes the digital asset entity part to the hash queue according to the hash spare capacity. The following describes the distribution of the physical portion of the digital assets in detail with reference to specific examples.
The hash thread may send hash spare capacity to the balanced distributor at preset intervals. Under the condition, the balanced distributor can screen out the hash queue with the hash spare capacity larger than the preset spare capacity as the hash queue to be distributed. The balanced distributor continuously distributes the received digital asset entity portions to the hash queue to be distributed. For example, the following steps are carried out: for a digital asset authentication processing platform comprising: 10 hash threads and 10 hash queues, which are respectively: hash thread 1, hash thread 2, hash thread 3, hash thread 4 … … hash thread 10; hash queue 1, hash queue 2, hash queue 3, hash queue 4 … … hash queue 10. In the process of the operation, the hash queue 1, the hash queue 2, the hash queue 3 and the hash queue 4 … … send the hash free capacities of the hash queues to the equilibrium distributor at preset intervals, wherein the hash free capacities correspond to the hash queues. The hash free capacity corresponding to each hash queue at a certain time point is shown in table 1. In this embodiment, the preset spare capacity is 8G. And balancing the distributor, and determining the hash queues to be distributed as a hash queue 2, a hash queue 4, a hash queue 5, a hash queue 6 and a hash queue 10. And continuously distributing the received digital asset entity parts to the to-be-distributed hash queue 2, the hash queue 4, the hash queue 5, the hash queue 6 and the hash queue 10 by the balanced distributor in the next time period. And dynamically allocating the digital asset entity parts to the hash queue in turn.
Table 1:
hash queue
|
Spare capacity
|
Hash queue |
1
|
5.8G
|
Hash queue 2
|
10.8G
|
Hash queue 3
|
2.4G
|
Hash queue 4
|
9.6G
|
Hash queue 5
|
8.4G
|
Hash queue 6
|
9.4G
|
Hash queue 7
|
5.2G
|
Hash queue 8
|
5.8G
|
Hash queue 9
|
3.6G
|
Hash queue 10
|
12.5G |
In a possible embodiment, the hash thread 23b2 may send the hash free capacity to the balanced distributor in real time. In this case, the equilibrium distributor may sort the received hash free capacities in real time, and screen out the prospective queue generating the largest hash free capacity as the hash queue to be distributed. At this point in time the balanced distributor distributes the received digital asset entity portions to the to-be-distributed hash queues. For example, the following steps are carried out: for a digital asset authentication processing platform comprising: 10 hash threads and 10 hash queues. Respectively as follows: hash thread 1, hash thread 2, hash thread 3, hash thread 4 … … hash thread 10; hash queue 1, hash queue 2, hash queue 3, hash queue 4 … … hash queue 10. In the process of the job, the hash queues 1, 2, 3 and 4 … … send their hash free capacities to the balanced distributor in real time, and the hash free capacities corresponding to the hash queues at a certain time point can be referred to the data in table 1 continuously. In this embodiment, the distributor is balanced, and the hash queue to be distributed is determined to be the hash queue 10. The balanced distributor distributes the received digital asset entity portions to the to-be-divided hash queue 10. And dynamically allocating the digital asset entity parts to the hash queue in turn.
Therefore, according to the technical scheme shown in the application in real time, the balanced distributor dynamically allocates the digital asset entity part to the hash queue according to the hash free capacity, so that the maximum utilization of the hash queue and the hash thread 23b2 resource is achieved.
Example 8:
referring to FIG. 10, the bibliographic examination thread 23a includes a normal examination thread 23a1 connected to the output of the data selection unit 22 and a virtual examination thread 23a3 connected to the output of the normal examination thread 23a1, wherein:
the normal examination thread 23a1 is used for selecting data of the bibliographic item part from the data packet to be authenticated and examining item by item, if an unqualified data item exists, the examination operation is handed over to the virtual examination thread 23a2, otherwise, the entity authentication unit 23b continues to operate the entity part of the digital asset;
the virtual review thread 23a2 is configured to continue to review item by item until the data of all bibliographic item portions are reviewed, and feed back the review result to the corresponding client 1 through the information feedback unit 24.
And the normal examination thread is used for selecting data of the bibliographic item part from the data packet to be authenticated, examining the data item by item, and if a unqualified data item exists, handing over the examination operation to the virtual examination thread 23a 2.
The method comprises a normal examination thread and a virtual examination thread, wherein the normal examination thread is used for examining and verifying bibliographic items item by item, the data processing amount is large, some examination items which do not pass are further included in the examination process, and the virtual examination thread is arranged in the technical scheme shown in the embodiment of the application in order to share the data processing amount of the normal examination thread. If the normal inspection thread finds a disqualified data item, the inspection operation is handed over to the virtual inspection thread. In order to facilitate the user to perform the modification operation quickly, the virtual inspection thread needs to give reference values of corresponding qualified data items to unqualified data items and give inspection result analysis, wherein the content of the inspection result analysis may include the positions of the unqualified items, namely, which data packets are located, the preliminary reason analysis and modification suggestions of the unqualified items are generated, and the like. For example, when a certain packet audit result is found to be: if the name of the authorized person is wrong, the given reference value of the virtual qualified data item and the analysis of the examination result can be expressed as "examination result: does not pass; not for the reason: a wrongly written word exists; reason analysis: inputting by mistake with the same tone; qualification item reference value: chapter three; and (3) modification suggestion: changing 'Zhangthree' into 'Chapter three'; it should be noted that there are many other possibilities for each analysis result, which is not limited in this embodiment, and the expression manner of the result analysis may be many kinds, such as a chart and a message bar.
According to the technical scheme, after all items of the injection item part are audited, all problem items contained in the digital asset package pair are fed back to the client by the virtual audit thread. For example, for any client, it is assumed that five data packets to be authenticated are uploaded, which are data packets a to G, respectively, and after the system executes an audit process, it is obtained through statistics that data packets having unqualified items are data packet B and data packet G, and specific audit result analysis content can be checked in the audit result fed back to the client; the data packet A/C/D which does not comprise the unqualified data item in the auditing result is considered to pass the auditing, and the digital asset entity part in the data packet can be continuously operated; because the examination result is fed back in a centralized way once by taking the client as a unit, the problem of low examination efficiency caused by prompting the user to correct when an unqualified item is found can be avoided;
therefore, the technical scheme shown in the embodiment of the application is provided with the virtual inspection thread, and the virtual inspection thread gives the reference value of the corresponding qualified data item for the unqualified data item and gives the inspection result analysis. In one aspect, the reference value may facilitate a user to quickly perform the modification operation. On the other hand, the virtual censoring thread may share the data throughput of the normal censoring thread.
Example 9:
referring to fig. 11, the data selecting unit 22 includes an audit number judging unit 22a connected to an output end of the first database 25, and a special processing queue 22b connected to an output end of the audit number judging unit 22 a;
the auditing number judging unit 223 is configured to set a data auditing number threshold; if the data packet to be authenticated fails to pass one audit, counting the total audited times, and if the total audited times is less than or equal to the data audit time threshold, the selection unit 222 increases the priority of the data packet to be authenticated when the data packet is uploaded again; if the total number of times is greater than the data audit number threshold, the to-be-authenticated data packet is moved to the special processing queue 224.
In the technical scheme shown in embodiment 8, if a data packet fails to be audited after being uploaded for multiple times, the probability that the data packet passes the audit cannot be effectively improved by continuously uploading the data packet, and the data packet occupies a system audit data space, so that the audit efficiency is affected;
in order to solve the above technical problem, in the technical solution shown in the embodiment of the present application, an audit number judging unit is arranged in the data selecting unit. Wherein the audit frequency judging unit is configured to set a data audit frequency threshold value; the data audit number threshold may be represented by T, and a value of T may be set in advance, for example, T is 3, which represents that the maximum allowable audit number is three times.
If the data packet to be authenticated fails to pass one audit, counting the total audited times of the data packet to be authenticated, wherein the total audited times can be represented by t, and t is an integer greater than zero; if the total number of times is less than or equal to the data auditing number threshold value, namely T is less than or equal to T, the priority of the data is adjusted when the data is uploaded again, and the data is stored in a queue to be processed when the data is uploaded again.
If the total times is greater than the data auditing time threshold value, namely T is greater than T, the data packet to be authenticated is moved to a special processing queue; in this embodiment, the special processing queue is configured to store data packets that are not qualified in multiple uploads, and perform processing operations on such data packets in a centralized manner, where a specific processing operation process is not limited in this embodiment; it should be noted that the special processing queue and the queue to be processed are not affected by each other, and as with the queue to be processed, the special processing queue may be set in the data selection unit by default, or may be set in a memory that carries the queue to be processed, and the data selection unit is used to perform data storage operation.
The above process of the step can be specifically described with reference to fig. 12, when the preset data audit time threshold T is 3, that is, the maximum allowed audit time is three times, when the data packet does not pass after the first audit, and when the data packet is uploaded for the second time, it is determined that T is 2 < T, and the data packet uploaded at this time will obtain a higher priority than the first audit; when the data packet does not pass the second audit, judging that T is 3 and T is T when the data packet is uploaded for the third time, and similarly, the uploaded data packet can obtain a higher priority than the second audit; when the data packet does not pass after the third audit, if uploading is desired again, at this time, T is 4 > T, and the data packet uploaded at this time is stored in the special processing queue.
An embodiment of the present invention further provides a storage medium, where a computer program is stored, and when the computer program is executed by a processor, the computer program implements part or all of the steps in each embodiment of the control method for a display device provided by the present invention. The storage medium can be a magnetic disc, an optical disc, a read-only memory English: Read-Only Memory, for short: ROM or random access memory english: random Access Memory, for short: RAM, etc.
Those skilled in the art will readily appreciate that the techniques of the embodiments of the present invention may be implemented as software plus a required general purpose hardware platform. Based on such understanding, the technical solutions in the embodiments of the present invention may be embodied in the form of a software product, which may be stored in a storage medium, such as a ROM/RAM, a magnetic disk, an optical disk, or the like, and includes several instructions for enabling a computer device, such as a personal computer, a server, or a network device, to execute the method according to the embodiments or some parts of the embodiments of the present invention.
The same and similar parts in the various embodiments in this specification may be referred to each other. In particular, for the embodiment of the display control device, since it is substantially similar to the embodiment of the method, the description is relatively simple, and the relevant points refer to the description in the embodiment of the method.