Background
The digital asset certification platform, also called a rights confirmation platform, is mainly directed to a right confirmation operation for a large number of intellectual works or achievements registered for copyright. The function of the device is mainly embodied in two aspects: firstly, carrying out right transacting confirmation operation on registered copyright, trademark or patent with patent certificate; and secondly, carrying out an entitlement confirmation operation on a large number of unregistered intellectual works or achievements. In the scenario shown in fig. 1, a peer-to-peer connection is formed between the digital asset certification platform 2 and various types of terminals 1 (e.g., fixed terminals, mobile terminals, etc.) through the internet, and a user establishes a connection through an installed client 11 (or APP, etc.) on the terminal side, and requests the digital asset certification platform 2 to provide a digital asset authentication operation or a digital asset transaction operation for the user through the connection.
The basic structure of the digital asset attestation platform 2 can be illustrated by fig. 2. The data receiving unit 21 is configured to receive a digital asset data packet (hereinafter referred to as a data packet) to be authenticated, which is uploaded by the client 11 through a web page or a dedicated APP, and store the data packet into the internal first database 25; the data selection unit 22 is used for obtaining the data to be authenticated or traded to be processed from the first database 25 and sending the data to the data processing unit 23; a data processing unit 23 for processing the obtained data as required, performing a right confirming or authenticating operation, then storing the result in the second database 26, and feeding back right confirming information, authentication information, etc. through the information feedback unit.
The data packets to be authenticated uploaded by the client 11, or stored in the first database 25, typically include a bibliographic portion and a digital asset entity portion. As shown in fig. 3, wherein the bibliographic portion 10 typically contains the name of the rightist, the address, priority file information, etc.; the digital asset entity part 20 is typically a collection of various legal, technical documents that document the core content of the digital asset. In the process of data asset authentication, the data processing unit 23 usually performs an audit operation on the data of the entity part of the digital asset after the data of the bibliographic project part is approved. However, due to the fact that the bibliographic data to be reviewed may be unqualified, for example, the content or the format does not meet the specification requirement, and the data processing unit 23 may need to provide data review operations for a large number of clients at the same time, when a certain bibliographic data review fails, the data processing unit cannot wait for the client to correct the faulty data by means of suspending the review; on the other hand, since the data processing unit 23 usually adopts an automatic batch processing manner to audit data, it is impossible to suspend the auditing operation because a specific bibliographic data is not approved, so as to avoid backlog of the data to be audited; to solve this problem, the simplest method is to reject packets containing non-qualified data so as not to affect the auditing of subsequent packets. Assuming that 5 items in the bibliographic part of a data packet are not qualified, the bibliographic part should be fed back at least 5 times theoretically to pass the bibliographic examination and approval. Obviously, the traditional data packet auditing method not only delays the solution of the unqualified recorded item problem, but also reduces the data auditing efficiency on the whole. In addition, a plurality of unqualified recorded items may exist in one file, even if only the current unqualified item can be prompted in the data auditing process, the processing of the unqualified item possibly existing in the follow-up process still cannot play any role, and the problem of data unqualified can be solved only through multiple cycles of auditing, error finding and prompt correction.
Disclosure of Invention
The application provides a processing method and a processing system for a digital asset data packet to be authenticated, which aim to solve the problem that the auditing efficiency of the existing system is reduced when the data volume to be audited is large.
In a first aspect, the present application provides a method for processing a digital asset data packet to be authenticated, where the method includes:
determining a data packet uploaded by a client;
selecting data of the bibliographic project part from the data packet, and auditing the data of the bibliographic project part item by item;
for the checked unqualified data items, giving a reference value of a virtual qualified data item and analyzing a checking result, and continuing checking item by item until the data of all the bibliographic project parts are checked;
and if the audited data of the bibliographic project part has unqualified data items, feeding the audit result back to the corresponding client, otherwise, continuing to operate the entity part of the digital assets in the data packet.
In a second aspect, the present application further provides a system for processing a data packet to be authenticated, including a first database for storing the data packet to be authenticated and a second database for storing a qualified data packet, and further including:
the data receiving unit is used for receiving a data packet to be authenticated uploaded by a client through a webpage or a special APP and the like, and storing the data packet to be authenticated and a given application code into the first database;
the data selection unit is provided with a first-in first-out queue to be processed and a selection unit; the queue to be processed is used for sequentially storing the data packets to be authenticated, which are obtained from the first database by the selection unit and need to be processed according to the priority;
the data processing unit comprises a bibliographic examination thread and an entity data processing thread; the bibliographic item auditing thread is used for reading data packets to be authenticated in a queue to be processed item by item and selecting data of bibliographic item parts from the data packets to be authenticated for auditing; for the checked unqualified data items, giving a reference value of a virtual qualified data item and analyzing a checking result, and continuing checking item by item until the data of all the bibliographic project parts are checked; and if the audited data of the bibliographic project part has unqualified data items, feeding back the audit result to the corresponding client through the information feedback unit, otherwise, continuing to operate the entity part of the digital assets in the data packet through the entity data processing thread.
The application provides a method and a system for processing a digital asset data packet to be authenticated. In practical application, after a client establishes point-to-point contact with a digital asset certification platform, a data packet uploaded by the client is determined, the uploaded data packet is stored in a queue to be processed according to priority arrangement, and then the bibliographic data part data of the data packet is checked in sequence according to the sequence of the queue to be processed; if unqualified data items appear, giving an examination result for analysis and continuing examination until all the recorded data parts are examined and finished; if the qualified items exist, the auditing result is fed back to the client side in a centralized way; continuing to perform the operation of the physical portion of the digital asset on the data packet for which no ineligible entry exists. The method adopts uninterrupted item-by-item auditing to the bibliographic item part of the data packet, and feeds back the data auditing result once after auditing is finished, so that a user can modify the unqualified items once, and the problem of low auditing efficiency caused by multiple auditing, error checking and correcting is avoided.
Detailed Description
Reference will now be made in detail to embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following examples do not represent all embodiments consistent with the present application. But merely as exemplifications of systems and methods consistent with certain aspects of the application, as recited in the claims.
It should be noted that, in the solution provided in the present application, the digital asset data packet to be authenticated (hereinafter referred to as data packet) refers to the sum of digital asset related data of intellectual works or achievements that can perform operations such as right confirmation, right transaction, etc., and for the digital asset related data uploaded by the client, if the digital asset related data is a transaction object, the digital asset related data is transmitted to the subsequent platform; for digital works which only need to be authenticated, such as words, music, film and television works and the like, only the timestamp, the public key and the private key are fed back, and the work or the link thereof is linked up and the like.
Referring to fig. 4, a flowchart of a method for processing a digital asset data packet to be authenticated according to the present application is shown;
as can be seen from fig. 4, the present application provides a processing method for a digital asset data packet to be authenticated, where the processing method includes the following steps:
s1: determining a data packet uploaded by a client;
in the technical scheme provided by the application, the client can upload data materials to be authenticated to a digital asset authentication platform, which can be configured in various types of terminals (such as fixed terminals or mobile terminals), and can also have other expression forms (such as APP, functional software, etc.); a user establishes contact with a digital asset authentication platform through a client on terminal equipment such as a computer, a mobile phone and the like, and when the client establishes contact with the digital asset authentication platform, data packets received by the platform can be from a plurality of data packets uploaded by one client or a plurality of data packets uploaded by a plurality of clients; the number of clients and data packets to which the present application is directed should be considered in a very large range.
In general, a client may have multiple data uploading operations, and after each uploading operation, there are two auditing results: the data packet passes the audit or fails the audit; if the data package is not approved, the user is required to perform modification related operation on the data package which is not approved on the client side, and then the data package is uploaded again; therefore, for each independent client, there are not only a huge number of packets to be uploaded each time, but also different properties, and since each packet contains different data contents and may be uploaded for the first time or for more than two times, it is important to determine the uploading order of the packets during uploading. Therefore, in the application, the determination of the data packets uploaded by the client needs not only to determine the type of the data packets, but also to determine the uploading sequence of the data packets.
Determining the type of the data packet, specifically, determining the data type contained in the data packet according to inspection of the data packet, or acquiring whether the data packet is uploaded, the number of times of uploading, and the like according to inspection of the data packet; according to different types of the data packets, the importance of the data packets is divided through set rules, so that the uploading sequence is divided; for example, for data packets of the same data type, if it is checked and known that a certain data packet is a data packet which has been uploaded but has not passed the examination, the data packet can be prioritized over other data packets of the same data type when being uploaded again; for the data packets which are uploaded for the first time or are uploaded for the same times, if the importance index of a certain data packet is superior to that of other data packets, the data packet can be uploaded preferentially to other data packets when being uploaded again.
Determining the uploading sequence of the data packets, specifically, distinguishing each data packet in a large number of data packets to be authenticated by different grades, for example, sorting the data packets from high to low by adopting priority, or adopting other modes; when each data packet has different grades, the uploading sequence can be determined according to the different grades.
Further, referring to fig. 5, the step S1 of determining that the data packet uploaded by the client may include the following steps:
s11: sorting all data packets to be authenticated from high to low according to priority; in this embodiment, the priority of the data packet to be authenticated refers to the priority level of the data packet to be authenticated, and in practical applications, the priority may be represented in the form of numbers, letters, or other forms, for example, the priority level 1, 2, 3, … …, or n is set, and the larger the number is, the higher the priority is, the earlier the data packet is audited; further, when the number of packets is extremely large, in order to effectively distinguish the priorities of all the packets from each other, the priorities may be expressed by specific values or symbols.
There are many bases for setting the priority, and the bases can be set according to the importance of the contents of the data packets to be authenticated, for example, the data packets (object specification, type, image data, etc.) closely related to the transaction and authentication object will obtain higher priority, and the data packets (process number, etc.) not highly related to the transaction and authentication object will obtain lower priority; for another example, for a data packet with a large number of accumulated uploading times, the content of the data packet can be regarded as important, and a higher priority can be correspondingly specified;
the priority can be set according to the transaction duration besides the setting basis; for example, a packet that is up to the deadline of the transaction will get a relatively high priority; packets with the same or similar content, packets with shorter transaction duration will get higher priority than packets with longer transaction duration;
the two priority levels can be set independently or combined; moreover, the embodiments of the present application are not limited to the combination of the two formulation bases, and other feasible formulation bases can be adopted to be considered alone or combined.
S12: sequentially selecting data packets to be authenticated according to the sorting result, and storing the data packets to be authenticated into a first-in first-out queue to be processed; when all the data packets to be authenticated are distinguished by different priority levels, all the data packets to be authenticated can be sequentially selected according to the priority levels before uploading, specifically, a first-in first-out queue, namely a queue to be processed, of the data packets to be processed is set at the moment, and then the corresponding data packets to be authenticated are sequentially stored into the queue to be processed according to the priority levels by a structural unit with a data selection function (for example, the data selection unit 22 in fig. 2); the queue to be processed may be set in the data selecting unit 22 by default, or a memory may be set separately to carry the queue to be processed, and the data selecting unit 22 is adopted to perform data storage operation;
fig. 6 is a schematic diagram of a process of selecting and storing a to-be-authenticated data packet; when selecting a to-be-authenticated data packet to be stored in a to-be-processed queue, it is necessary to determine an uploading order according to a priority level of the to-be-authenticated data packet, for example, in fig. 6, the to-be-authenticated data packet B having the highest priority level will be used as a first priority selection object, the to-be-authenticated data packet C having the lowest priority level will be used as a second priority selection object, and the to-be-authenticated data packet a having the lowest priority level will be stored as a third selection object; at this time, if there is a packet D to be authenticated and its priority is located between the packets B, C to be authenticated, it is necessary to arrange the packet D to be authenticated as a second priority selection object with the packet C, A to be authenticated in sequence. In the queue to be processed, the data packet selected to enter is arranged in front of the queue, and when the data packet is examined in the following process, the data packet in front of the queue is operated first, so that the first-in first-out of the queue is realized.
S13: and determining the data packets uploaded by the client according to the sequence of the data packets output by the queue to be processed, namely determining the number, the content and the checking sequence of the data packets uploaded at the time. Because the data packets in the queue to be processed have the priority, the data packets with higher priority can be audited earlier, so that the data packets with higher priority pass the audit earlier; if the data packet which is not passed by the previous audit exists in the queue, the probability that the data packet passes the audit after being modified is increased, the data packet can be earlier audited by improving the priority of the data packet, and therefore the data packet can also pass the audit earlier. Therefore, the embodiment of the application has the effects of reducing the current data backlog and improving the efficiency.
Furthermore, a method for improving the priority of the data packet which is not approved last time can be set, so that the data packet can be approved earlier when being approved again, and the data packet can be approved as soon as possible. Specifically, the priority of the data packet that fails to pass the audit can be adjusted up, referring to fig. 7, the data packet a to be authenticated is located at a position with a lower priority in the queue to be processed in the previous uploading process, and when the audit result after the previous audit is that the data packet a fails to pass the audit, the user needs to modify and upload the data packet again, and at this time, before uploading the data packet for the second time, the priority of the data packet is automatically adjusted up by the system, which is specifically represented as: if the priority of the data packet in the previous uploading process is 1 level, the modified priority of the data packet in the previous uploading process can be 2 level, 3 level or higher, and the ascending amplitude of the priority level can be preset or can be determined according to the importance of the content of the data packet, the transaction duration and the like.
Meanwhile, in the above embodiment, if the data packet fails to pass the audit after being uploaded for many times, the probability that the data packet passes the audit cannot be effectively improved by continuously uploading the data packet, and the data packet occupies the data auditing space of the system, so that the auditing efficiency is affected; therefore, referring to fig. 8, the step of determining the data packet uploaded by the client further includes:
s121: setting a data auditing frequency threshold value; the data audit number threshold may be represented by T, and a value of T may be set in advance, for example, T is 3, which represents that the maximum allowable audit number is three times.
S122: if the data packet to be authenticated fails to pass one audit, counting the total audited times of the data packet to be authenticated, wherein the total audited times can be represented by t, and t is an integer greater than zero; if the total times are less than or equal to the data auditing time threshold, namely T is less than or equal to T, the priority of the data when the data are uploaded again is adjusted, and the data are stored into a queue to be processed when the data are uploaded again;
s123: if the total times is greater than the data auditing time threshold value, namely T is greater than T, the data packet to be authenticated is moved to a special processing queue; in this embodiment, the special processing queue is configured to store data packets that are not qualified in multiple uploads, and perform processing operations on such data packets in a centralized manner, where a specific processing operation process is not limited in this embodiment; it should be noted that the special processing queue and the queue to be processed are not affected by each other, and as with the queue to be processed, the special processing queue may be set in the data selecting unit 22 by default, or may be set in a memory carrying the queue to be processed, and the data selecting unit 22 is adopted to perform the data storage operation.
As can be specifically illustrated in fig. 9, when the preset data audit time threshold T is 3, that is, the maximum allowed audit time is three times, and when the data packet does not pass after the first audit, and is uploaded for the second time, according to the scheme in step S122, it is determined that T is 2 < T, and the uploaded data packet will have a higher priority than the first audit; when the data packet does not pass the second audit and is uploaded for the third time, according to the scheme in step S122, it is determined that T is 3 and T at this time, and similarly, the uploaded data packet will obtain a higher priority than the second audit; when the data packet does not pass after the third audit, if uploading is desired again, according to the scheme in step S123, when T is 4 > T, the uploaded data packet is stored in the special processing queue.
As can be seen from fig. 4, after the step of determining the data packet uploaded by the client is completed, an operation of performing an audit on the data packet is required:
s2: selecting data of the bibliographic project part from the data packet, and auditing the data of the bibliographic project part item by item;
according to the technical scheme, a bibliographic project part in a data packet to be authenticated is selected for auditing, and after the bibliographic project part passes the auditing, the digital asset entity part corresponding to the bibliographic project part is operated; for the bibliographic item part, the data file usually includes information of name, address, priority file, etc., and its representation form may be table, data bar or any other form, wherein, the examination of the bibliographic item part data includes whether the examination item is missing, whether the examination item data is correct, whether there are redundant examination items, etc.;
in the application, item-by-item auditing of the bibliographic item part means that according to the sequence of data packets in a queue to be processed, a data packet positioned at the forefront end of the queue is selected first, auditing is carried out on the bibliographic item part in the data packet, and an auditing result is obtained, wherein the auditing result comprises that the auditing is passed or the auditing is not passed; then, on the premise of not feeding back the checking result, continuously selecting a data packet in the next queue to be processed, checking the bibliographic item part in the data packet, and obtaining the checking result; and repeating the steps until the bibliographic item parts of all the data packets in the queue to be processed are checked, and finishing the item-by-item checking of the bibliographic item parts.
S3: for the checked unqualified data items, giving a reference value of a virtual qualified data item and analyzing a checking result, and continuing checking item by item until the data of all the bibliographic project parts are checked;
when the review result obtained by the review of the bibliographic item part is that the review is not passed, the reason can be attributed to that the bibliographic item part has unqualified data items, and the unqualified data items in the embodiment may be a certain data error in the bibliographic item part, may also be the missing of one or more items in the bibliographic item part, may also have redundant data items, and the like; after the system obtains the audit result, in order to facilitate the user to quickly perform the modification operation, it is necessary to give the reference value of the corresponding qualified data item to the unqualified data item, and give the audit result analysis, where the content of the audit result analysis may include the location of the unqualified item, i.e. which data packet is located, the preliminary reason analysis and modification suggestion for generating the unqualified item, and so on. For example, when a certain packet audit result is found to be: if the name of the authorized person is wrong, the given reference value of the virtual qualified data item and the analysis of the examination result can be expressed as "examination result: does not pass; not for the reason: a wrongly written word exists; reason analysis: inputting by mistake with the same tone; qualification item reference value: chapter three; and (3) modification suggestion: changing 'Zhangthree' into 'Chapter three'; it should be noted that there are many other possibilities for each analysis result, which is not limited in this embodiment, and the expression manner of the result analysis may be many kinds, such as a chart and a message bar.
S4: if the audited data of the bibliographic project part has unqualified data items, feeding back the audit result to the corresponding client, otherwise, continuing to operate the entity part of the digital assets in the data packet;
according to the technical scheme, after all data packets in the queue to be processed are examined and checked on the bibliographic project part, whether unqualified data items exist in item-by-item examination needs to be judged, and if the unqualified data items exist, data in the data packets need to be modified; because information such as result analysis and the like is generated for the unqualified data items in the previous step, at this time, only relevant information of all unqualified data items needs to be integrated and then is intensively fed back to the corresponding client, and operations such as modification, confirmation and the like are uniformly performed by a user.
Specifically, the process can be illustrated by the following example:
for any client, assuming that five data packets to be authenticated are uploaded, namely data packets A-G, after the system executes an auditing process, the data packets with unqualified items are counted to obtain a data packet B and a data packet G, and specific auditing result analysis content can be checked in an auditing result fed back to the client; the data packet A/C/D which does not comprise the unqualified data item in the auditing result is considered to pass the auditing, and the digital asset entity part in the data packet can be continuously operated; because the examination result is fed back in a centralized way once by taking the client as a unit, the problem of low examination efficiency caused by prompting the user to correct when an unqualified item is found can be avoided;
the feedback form of the auditing result can adopt a list or other possible forms, so that the user can more intuitively and easily perform operations such as modification confirmation and the like.
Further, referring to fig. 10, the method provided by the present application further includes the steps of:
s41: giving a re-audit processing identifier in the audit result fed back to the client, wherein the re-audit processing identifier is used for marking the priority of the re-uploaded data packet;
in the technical scheme provided by this embodiment, a re-audit processing identifier is given in the audit result fed back to the client, that is, an identifier is added to a data packet that does not pass after the audit, which is equivalent to marking the priority of a data packet to be uploaded again, and the purpose is that when the data packet uploaded by the client is determined, the priority of the data packet to which the re-audit processing identifier is added can be adjusted upwards;
for the addition of the review processing identifier, the user can select a repeated submission item at the client to complete, specifically, a display operation item can be added at a client page, the user selects a data packet to be repeatedly submitted, once the data packet is selected, the selected data packet obtains a system asset code, the system asset code can be an application code or an A code, and the priority of the data packet to be adjusted is obtained according to the system asset code;
for the representation form of the re-audit processing identifier, taking one of the feasible examples as an example, a "+" symbol of the data packet identifier may be used, and assuming that the priority of a certain data packet during the previous audit is 2, after one audit, the data packet fed back to the client is identified as 2+ level, and if two audits are performed, the data packet may be identified as 2+ + level, where it may be considered that the priority of 2+ level is higher than 2 level, and the priority of 2+ + level is higher than 2+ level.
Further, referring to fig. 11, the method provided by the present application further includes the steps of:
s42: judging whether the unqualified data items have key items or not; if so, executing the step of feeding back the auditing result to the corresponding client, otherwise, moving the corresponding data packet to a correction queue to process according to a correction flow;
in the solution provided in this embodiment, a determination process for the unqualified data items is added, and the purpose is to indicate that the unqualified data has critical problems affecting the authority determination if a key item exists in the unqualified data items, for example, the inventor has wrongly written data, a date error, an address error, and the like, and needs to be modified; however, if there is no key item in the unqualified data item, for example, the font does not meet the rules, there is a blank space between words, etc., which does not affect the normal understanding error, if it fails to pass the examination, the re-uploading will reduce the overall authorization efficiency, and also waste the system resources; therefore, when the key item with no influence is judged to be large, the mode that the audit is temporarily passed, the corresponding data packet is moved to the correction queue to be processed according to the correction flow can be adopted, so that the right confirming time is shortened, the system resources can be saved, and a user only needs to perform correction operation on the part of the content in a centralized mode.
Based on the above processing method, the present application further provides a system for processing a data packet to be authenticated, which is shown in fig. 2, 12 and 13, and includes a first database 25 for storing the data packet to be authenticated and a second database 26 for storing a qualified data packet, and is characterized by further including:
a data receiving unit 21, configured to receive a to-be-authenticated data packet uploaded by the client 11 through a web page or a dedicated APP, and store the to-be-authenticated data packet and a given application code in the first database 25; the given application code may be generated by the data receiving unit 21 when the data packet is received for the first time, or may be given by the information feedback unit 24 in the previous audit result of the feedback;
a data selection unit 22 provided with a first-in first-out queue to be processed 221 and a selection unit 222; the queue 221 to be processed is used for sequentially storing the data packets to be authenticated, which are obtained from the first database 25 by the selecting unit 222 and need to be processed according to the priority;
a data processing unit 23 including a bibliographic review thread 231 and an entity data processing thread 232; the bibliographic item auditing thread 231 is configured to read the to-be-authenticated data packets in the to-be-processed queue 221 item by item, and select data of a bibliographic item portion from the to-be-authenticated data packets for auditing; for the checked unqualified data items, giving a reference value of a virtual qualified data item and analyzing a checking result, and continuing checking item by item until the data of all the bibliographic project parts are checked; if the audited data of the bibliographic project part has unqualified data items, the audited result is fed back to the corresponding client 11 through the information feedback unit 24, otherwise, the entity data processing thread 232 continues to operate the entity part of the digital assets in the data packet.
Wherein the bibliographic review thread 231 includes a normal review thread 2311 and a virtual review thread 2312, wherein:
a normal examination thread 2311, configured to select data of a bibliographic item portion from a data packet to be authenticated, and examine items by items, and if an unqualified data item exists, transfer an examination operation to the virtual examination thread 2312, otherwise, continue to operate on the entity portion of the digital asset by the entity data processing thread 232;
the virtual review thread 2312 is configured to continue to review item by item until the data of all bibliographic item portions are reviewed, and feed back the review result to the corresponding client 11 through the information feedback unit 24.
The data selecting unit 22 is further provided with an auditing frequency judging unit 223 and a special processing queue 224; wherein,
an audit number judging unit 223, configured to set a data audit number threshold; if the data packet to be authenticated fails to pass one audit, counting the total audited times, and if the total audited times is less than or equal to the data audit time threshold, the selection unit 222 increases the priority of the data packet to be authenticated when the data packet is uploaded again; if the total number of times is greater than the data audit number threshold, the to-be-authenticated data packet is moved to the special processing queue 224.
The feedback unit 24 is further configured to give a review processing identifier in the review result fed back to the client, where the review processing identifier is used to label the priority of the re-uploaded data packet.
It should be noted that, since the embodiment of the present application is provided based on the processing method, the execution manner of each constituent unit of the system provided by the present application in an actual application scenario corresponds to that of the method, and details are not described herein again.
According to the technical scheme, the application provides a method and a system for processing the digital asset data packet to be authenticated. In practical application, after a client establishes point-to-point contact with a digital asset certification platform, a data packet uploaded by the client is determined, the uploaded data packet is stored in a queue to be processed according to priority arrangement, and then the bibliographic data part data of the data packet is checked in sequence according to the sequence of the queue to be processed; if unqualified data items appear, giving an examination result for analysis and continuing examination until all the recorded data parts are examined and finished; if the qualified items exist, the auditing result is fed back to the client side in a centralized way; continuing to perform the operation of the physical portion of the digital asset on the data packet for which no ineligible entry exists. The method adopts uninterrupted item-by-item auditing to the bibliographic item part of the data packet, and feeds back the data auditing result once after auditing is finished, so that a user can modify the unqualified items once, and the problem of low auditing efficiency caused by multiple auditing, error checking and correcting is avoided.
The embodiments provided in the present application are only a few examples of the general concept of the present application, and do not limit the scope of the present application. Any other embodiments extended according to the scheme of the present application without inventive efforts will be within the scope of protection of the present application for a person skilled in the art.