CN112241883A - Method and system for processing digital asset data packet to be authenticated - Google Patents

Method and system for processing digital asset data packet to be authenticated Download PDF

Info

Publication number
CN112241883A
CN112241883A CN201910656677.3A CN201910656677A CN112241883A CN 112241883 A CN112241883 A CN 112241883A CN 201910656677 A CN201910656677 A CN 201910656677A CN 112241883 A CN112241883 A CN 112241883A
Authority
CN
China
Prior art keywords
data
data packet
authenticated
item
processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910656677.3A
Other languages
Chinese (zh)
Inventor
白杰
李冬云
吴先锋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aowei Information Technology Jiangsu Co ltd
Original Assignee
Aowei Information Technology Jiangsu Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aowei Information Technology Jiangsu Co ltd filed Critical Aowei Information Technology Jiangsu Co ltd
Priority to CN201910656677.3A priority Critical patent/CN112241883A/en
Priority to PCT/CN2020/094360 priority patent/WO2021012816A1/en
Priority to JP2021573713A priority patent/JP2022536734A/en
Priority to FR2007547A priority patent/FR3099331A1/en
Publication of CN112241883A publication Critical patent/CN112241883A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/123Shopping for digital content
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/08Payment architectures
    • G06Q20/12Payment architectures specially adapted for electronic shopping systems
    • G06Q20/123Shopping for digital content
    • G06Q20/1235Shopping for digital content with control of digital rights management [DRM]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/42Confirmation, e.g. check or permission by the legal debtor of payment
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/18Legal services
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L47/00Traffic control in data switching networks
    • H04L47/50Queue scheduling
    • H04L47/62Queue scheduling characterised by scheduling criteria
    • H04L47/625Queue scheduling characterised by scheduling criteria for service slots or service orders
    • H04L47/6275Queue scheduling characterised by scheduling criteria for service slots or service orders based on priority
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/10Integrity
    • H04W12/106Packet or message integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • G06Q2220/10Usage protection of distributed data files
    • G06Q2220/18Licensing

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Signal Processing (AREA)
  • Development Economics (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Tourism & Hospitality (AREA)
  • General Engineering & Computer Science (AREA)
  • Technology Law (AREA)
  • Human Resources & Organizations (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Primary Health Care (AREA)
  • Bioethics (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application provides a method and a system for processing a digital asset data packet to be authenticated. In practical application, after a point-to-point relation is established between a client and a digital asset certification platform, a data packet uploaded by the client is determined, the uploaded data packet is stored in a queue to be processed according to priority arrangement, and then the bibliographic data part data of the data packet is checked in sequence according to the sequence of the queue to be processed; if unqualified data items appear, giving an examination result for analysis and continuing examination until all the recorded data parts are examined and finished; if the qualified items exist, the auditing result is fed back to the client side in a centralized way; continuing to perform the operation of the physical portion of the digital asset on the data packet for which no ineligible entry exists. The method and the device adopt uninterrupted item-by-item auditing on the bibliographic item part of the data packet, and feed back the data auditing result once after auditing, so that a user can modify the unqualified items once, and the problem of low auditing efficiency caused by multiple auditing-error checking-correcting is avoided.

Description

Method and system for processing digital asset data packet to be authenticated
Technical Field
The embodiment of the application relates to the technical field of digital assets, in particular to a method and a system for processing a digital asset data packet to be authenticated.
Background
The digital asset certification platform, also called a rights confirmation platform, is mainly directed to a right confirmation operation for a large number of intellectual works or achievements registered for copyright. The function of the device is mainly embodied in two aspects: firstly, carrying out right transacting confirmation operation on registered copyright, trademark or patent with patent certificate; and secondly, carrying out an entitlement confirmation operation on a large number of unregistered intellectual works or achievements. In the scenario shown in fig. 1, a peer-to-peer connection is formed between the digital asset certification platform 2 and various types of terminals 1 (e.g., fixed terminals, mobile terminals, etc.) through the internet, and a user establishes a connection through an installed client 11 (or APP, etc.) on the terminal side, and requests the digital asset certification platform 2 to provide a digital asset authentication operation or a digital asset transaction operation for the user through the connection.
The basic structure of the digital asset attestation platform 2 can be illustrated by fig. 2. The data receiving unit 21 is configured to receive a digital asset data packet (hereinafter referred to as a data packet) to be authenticated, which is uploaded by the client 11 through a web page or a dedicated APP, and store the data packet into the internal first database 25; the data selection unit 22 is used for obtaining the data to be authenticated or traded to be processed from the first database 25 and sending the data to the data processing unit 23; a data processing unit 23 for processing the obtained data as required, performing a right confirming or authenticating operation, then storing the result in the second database 26, and feeding back right confirming information, authentication information, etc. through the information feedback unit.
The data packets to be authenticated uploaded by the client 11, or stored in the first database 25, typically include a bibliographic portion and a digital asset entity portion. As shown in fig. 3, wherein the bibliographic portion 10 typically contains the name of the rightist, the address, priority file information, etc.; the digital asset entity part 20 is typically a collection of various legal, technical documents that document the core content of the digital asset. In the process of data asset authentication, the data processing unit 23 usually performs an audit operation on the data of the entity part of the digital asset after the data of the bibliographic project part is approved. However, due to the fact that the bibliographic data to be reviewed may be unqualified, for example, the content or the format does not meet the specification requirement, and the data processing unit 23 may need to provide data review operations for a large number of clients at the same time, when a certain bibliographic data review fails, the data processing unit cannot wait for the client to correct the faulty data by means of suspending the review; on the other hand, since the data processing unit 23 usually adopts an automatic batch processing manner to audit data, it is impossible to suspend the auditing operation because a specific bibliographic data is not approved, so as to avoid backlog of the data to be audited; to solve this problem, the simplest method is to reject packets containing non-qualified data so as not to affect the auditing of subsequent packets. Assuming that 5 items in the bibliographic part of a data packet are not qualified, the bibliographic part should be fed back at least 5 times theoretically to pass the bibliographic examination and approval. Obviously, the traditional data packet auditing method not only delays the solution of the unqualified recorded item problem, but also reduces the data auditing efficiency on the whole. In addition, a plurality of unqualified recorded items may exist in one file, even if only the current unqualified item can be prompted in the data auditing process, the processing of the unqualified item possibly existing in the follow-up process still cannot play any role, and the problem of data unqualified can be solved only through multiple cycles of auditing, error finding and prompt correction.
Disclosure of Invention
The application provides a processing method and a processing system for a digital asset data packet to be authenticated, which aim to solve the problem that the auditing efficiency of the existing system is reduced when the data volume to be audited is large.
In a first aspect, the present application provides a method for processing a digital asset data packet to be authenticated, where the method includes:
determining a data packet uploaded by a client;
selecting data of the bibliographic project part from the data packet, and auditing the data of the bibliographic project part item by item;
for the checked unqualified data items, giving a reference value of a virtual qualified data item and analyzing a checking result, and continuing checking item by item until the data of all the bibliographic project parts are checked;
and if the audited data of the bibliographic project part has unqualified data items, feeding the audit result back to the corresponding client, otherwise, continuing to operate the entity part of the digital assets in the data packet.
In a second aspect, the present application further provides a system for processing a data packet to be authenticated, including a first database for storing the data packet to be authenticated and a second database for storing a qualified data packet, and further including:
the data receiving unit is used for receiving a data packet to be authenticated uploaded by a client through a webpage or a special APP and the like, and storing the data packet to be authenticated and a given application code into the first database;
the data selection unit is provided with a first-in first-out queue to be processed and a selection unit; the queue to be processed is used for sequentially storing the data packets to be authenticated, which are obtained from the first database by the selection unit and need to be processed according to the priority;
the data processing unit comprises a bibliographic examination thread and an entity data processing thread; the bibliographic item auditing thread is used for reading data packets to be authenticated in a queue to be processed item by item and selecting data of bibliographic item parts from the data packets to be authenticated for auditing; for the checked unqualified data items, giving a reference value of a virtual qualified data item and analyzing a checking result, and continuing checking item by item until the data of all the bibliographic project parts are checked; and if the audited data of the bibliographic project part has unqualified data items, feeding back the audit result to the corresponding client through the information feedback unit, otherwise, continuing to operate the entity part of the digital assets in the data packet through the entity data processing thread.
The application provides a method and a system for processing a digital asset data packet to be authenticated. In practical application, after a client establishes point-to-point contact with a digital asset certification platform, a data packet uploaded by the client is determined, the uploaded data packet is stored in a queue to be processed according to priority arrangement, and then the bibliographic data part data of the data packet is checked in sequence according to the sequence of the queue to be processed; if unqualified data items appear, giving an examination result for analysis and continuing examination until all the recorded data parts are examined and finished; if the qualified items exist, the auditing result is fed back to the client side in a centralized way; continuing to perform the operation of the physical portion of the digital asset on the data packet for which no ineligible entry exists. The method adopts uninterrupted item-by-item auditing to the bibliographic item part of the data packet, and feeds back the data auditing result once after auditing is finished, so that a user can modify the unqualified items once, and the problem of low auditing efficiency caused by multiple auditing, error checking and correcting is avoided.
Drawings
FIG. 1 is a diagram of an application scenario of a digital asset platform;
FIG. 2 is a schematic diagram of a basic architecture of a digital asset attestation platform;
FIG. 3 is a data composition diagram of a digital asset package to be authenticated;
FIG. 4 is a flow chart of a method of processing a digital asset package to be authenticated according to the present application;
FIG. 5 is an exploded view of step S1 of the flowchart of FIG. 4;
FIG. 6 is a schematic diagram illustrating formation of queues to be processed in a method for processing digital asset data packets to be authenticated according to the present application;
FIG. 7 is a schematic diagram illustrating a process of adjusting a to-be-authenticated data packet in the method for processing a to-be-authenticated digital asset data packet according to the present application;
FIG. 8 is a preferred flow chart of the process of tuning up a digital asset package to be authenticated according to the method of processing a digital asset package to be authenticated of the present application;
FIG. 9 is a schematic diagram illustrating a process of transferring data to be verified to a special processing queue in a method for processing a digital asset data packet to be authenticated according to the present application;
FIG. 10 is a flow diagram of another embodiment of a method for processing a digital asset package to be authenticated according to the present application;
FIG. 11 is a flow diagram of yet another embodiment of a method for processing a digital asset package to be authenticated according to the present application;
FIG. 12 is a schematic diagram illustrating a connection between a data selection unit and a data processing unit in a system for processing a data packet to be authenticated according to the present application;
fig. 13 is a schematic diagram of a preferred structure of a data selecting unit in a system for processing a data packet to be authenticated according to the present application.
Detailed Description
Reference will now be made in detail to embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following examples do not represent all embodiments consistent with the present application. But merely as exemplifications of systems and methods consistent with certain aspects of the application, as recited in the claims.
It should be noted that, in the solution provided in the present application, the digital asset data packet to be authenticated (hereinafter referred to as data packet) refers to the sum of digital asset related data of intellectual works or achievements that can perform operations such as right confirmation, right transaction, etc., and for the digital asset related data uploaded by the client, if the digital asset related data is a transaction object, the digital asset related data is transmitted to the subsequent platform; for digital works which only need to be authenticated, such as words, music, film and television works and the like, only the timestamp, the public key and the private key are fed back, and the work or the link thereof is linked up and the like.
Referring to fig. 4, a flowchart of a method for processing a digital asset data packet to be authenticated according to the present application is shown;
as can be seen from fig. 4, the present application provides a processing method for a digital asset data packet to be authenticated, where the processing method includes the following steps:
s1: determining a data packet uploaded by a client;
in the technical scheme provided by the application, the client can upload data materials to be authenticated to a digital asset authentication platform, which can be configured in various types of terminals (such as fixed terminals or mobile terminals), and can also have other expression forms (such as APP, functional software, etc.); a user establishes contact with a digital asset authentication platform through a client on terminal equipment such as a computer, a mobile phone and the like, and when the client establishes contact with the digital asset authentication platform, data packets received by the platform can be from a plurality of data packets uploaded by one client or a plurality of data packets uploaded by a plurality of clients; the number of clients and data packets to which the present application is directed should be considered in a very large range.
In general, a client may have multiple data uploading operations, and after each uploading operation, there are two auditing results: the data packet passes the audit or fails the audit; if the data package is not approved, the user is required to perform modification related operation on the data package which is not approved on the client side, and then the data package is uploaded again; therefore, for each independent client, there are not only a huge number of packets to be uploaded each time, but also different properties, and since each packet contains different data contents and may be uploaded for the first time or for more than two times, it is important to determine the uploading order of the packets during uploading. Therefore, in the application, the determination of the data packets uploaded by the client needs not only to determine the type of the data packets, but also to determine the uploading sequence of the data packets.
Determining the type of the data packet, specifically, determining the data type contained in the data packet according to inspection of the data packet, or acquiring whether the data packet is uploaded, the number of times of uploading, and the like according to inspection of the data packet; according to different types of the data packets, the importance of the data packets is divided through set rules, so that the uploading sequence is divided; for example, for data packets of the same data type, if it is checked and known that a certain data packet is a data packet which has been uploaded but has not passed the examination, the data packet can be prioritized over other data packets of the same data type when being uploaded again; for the data packets which are uploaded for the first time or are uploaded for the same times, if the importance index of a certain data packet is superior to that of other data packets, the data packet can be uploaded preferentially to other data packets when being uploaded again.
Determining the uploading sequence of the data packets, specifically, distinguishing each data packet in a large number of data packets to be authenticated by different grades, for example, sorting the data packets from high to low by adopting priority, or adopting other modes; when each data packet has different grades, the uploading sequence can be determined according to the different grades.
Further, referring to fig. 5, the step S1 of determining that the data packet uploaded by the client may include the following steps:
s11: sorting all data packets to be authenticated from high to low according to priority; in this embodiment, the priority of the data packet to be authenticated refers to the priority level of the data packet to be authenticated, and in practical applications, the priority may be represented in the form of numbers, letters, or other forms, for example, the priority level 1, 2, 3, … …, or n is set, and the larger the number is, the higher the priority is, the earlier the data packet is audited; further, when the number of packets is extremely large, in order to effectively distinguish the priorities of all the packets from each other, the priorities may be expressed by specific values or symbols.
There are many bases for setting the priority, and the bases can be set according to the importance of the contents of the data packets to be authenticated, for example, the data packets (object specification, type, image data, etc.) closely related to the transaction and authentication object will obtain higher priority, and the data packets (process number, etc.) not highly related to the transaction and authentication object will obtain lower priority; for another example, for a data packet with a large number of accumulated uploading times, the content of the data packet can be regarded as important, and a higher priority can be correspondingly specified;
the priority can be set according to the transaction duration besides the setting basis; for example, a packet that is up to the deadline of the transaction will get a relatively high priority; packets with the same or similar content, packets with shorter transaction duration will get higher priority than packets with longer transaction duration;
the two priority levels can be set independently or combined; moreover, the embodiments of the present application are not limited to the combination of the two formulation bases, and other feasible formulation bases can be adopted to be considered alone or combined.
S12: sequentially selecting data packets to be authenticated according to the sorting result, and storing the data packets to be authenticated into a first-in first-out queue to be processed; when all the data packets to be authenticated are distinguished by different priority levels, all the data packets to be authenticated can be sequentially selected according to the priority levels before uploading, specifically, a first-in first-out queue, namely a queue to be processed, of the data packets to be processed is set at the moment, and then the corresponding data packets to be authenticated are sequentially stored into the queue to be processed according to the priority levels by a structural unit with a data selection function (for example, the data selection unit 22 in fig. 2); the queue to be processed may be set in the data selecting unit 22 by default, or a memory may be set separately to carry the queue to be processed, and the data selecting unit 22 is adopted to perform data storage operation;
fig. 6 is a schematic diagram of a process of selecting and storing a to-be-authenticated data packet; when selecting a to-be-authenticated data packet to be stored in a to-be-processed queue, it is necessary to determine an uploading order according to a priority level of the to-be-authenticated data packet, for example, in fig. 6, the to-be-authenticated data packet B having the highest priority level will be used as a first priority selection object, the to-be-authenticated data packet C having the lowest priority level will be used as a second priority selection object, and the to-be-authenticated data packet a having the lowest priority level will be stored as a third selection object; at this time, if there is a packet D to be authenticated and its priority is located between the packets B, C to be authenticated, it is necessary to arrange the packet D to be authenticated as a second priority selection object with the packet C, A to be authenticated in sequence. In the queue to be processed, the data packet selected to enter is arranged in front of the queue, and when the data packet is examined in the following process, the data packet in front of the queue is operated first, so that the first-in first-out of the queue is realized.
S13: and determining the data packets uploaded by the client according to the sequence of the data packets output by the queue to be processed, namely determining the number, the content and the checking sequence of the data packets uploaded at the time. Because the data packets in the queue to be processed have the priority, the data packets with higher priority can be audited earlier, so that the data packets with higher priority pass the audit earlier; if the data packet which is not passed by the previous audit exists in the queue, the probability that the data packet passes the audit after being modified is increased, the data packet can be earlier audited by improving the priority of the data packet, and therefore the data packet can also pass the audit earlier. Therefore, the embodiment of the application has the effects of reducing the current data backlog and improving the efficiency.
Furthermore, a method for improving the priority of the data packet which is not approved last time can be set, so that the data packet can be approved earlier when being approved again, and the data packet can be approved as soon as possible. Specifically, the priority of the data packet that fails to pass the audit can be adjusted up, referring to fig. 7, the data packet a to be authenticated is located at a position with a lower priority in the queue to be processed in the previous uploading process, and when the audit result after the previous audit is that the data packet a fails to pass the audit, the user needs to modify and upload the data packet again, and at this time, before uploading the data packet for the second time, the priority of the data packet is automatically adjusted up by the system, which is specifically represented as: if the priority of the data packet in the previous uploading process is 1 level, the modified priority of the data packet in the previous uploading process can be 2 level, 3 level or higher, and the ascending amplitude of the priority level can be preset or can be determined according to the importance of the content of the data packet, the transaction duration and the like.
Meanwhile, in the above embodiment, if the data packet fails to pass the audit after being uploaded for many times, the probability that the data packet passes the audit cannot be effectively improved by continuously uploading the data packet, and the data packet occupies the data auditing space of the system, so that the auditing efficiency is affected; therefore, referring to fig. 8, the step of determining the data packet uploaded by the client further includes:
s121: setting a data auditing frequency threshold value; the data audit number threshold may be represented by T, and a value of T may be set in advance, for example, T is 3, which represents that the maximum allowable audit number is three times.
S122: if the data packet to be authenticated fails to pass one audit, counting the total audited times of the data packet to be authenticated, wherein the total audited times can be represented by t, and t is an integer greater than zero; if the total times are less than or equal to the data auditing time threshold, namely T is less than or equal to T, the priority of the data when the data are uploaded again is adjusted, and the data are stored into a queue to be processed when the data are uploaded again;
s123: if the total times is greater than the data auditing time threshold value, namely T is greater than T, the data packet to be authenticated is moved to a special processing queue; in this embodiment, the special processing queue is configured to store data packets that are not qualified in multiple uploads, and perform processing operations on such data packets in a centralized manner, where a specific processing operation process is not limited in this embodiment; it should be noted that the special processing queue and the queue to be processed are not affected by each other, and as with the queue to be processed, the special processing queue may be set in the data selecting unit 22 by default, or may be set in a memory carrying the queue to be processed, and the data selecting unit 22 is adopted to perform the data storage operation.
As can be specifically illustrated in fig. 9, when the preset data audit time threshold T is 3, that is, the maximum allowed audit time is three times, and when the data packet does not pass after the first audit, and is uploaded for the second time, according to the scheme in step S122, it is determined that T is 2 < T, and the uploaded data packet will have a higher priority than the first audit; when the data packet does not pass the second audit and is uploaded for the third time, according to the scheme in step S122, it is determined that T is 3 and T at this time, and similarly, the uploaded data packet will obtain a higher priority than the second audit; when the data packet does not pass after the third audit, if uploading is desired again, according to the scheme in step S123, when T is 4 > T, the uploaded data packet is stored in the special processing queue.
As can be seen from fig. 4, after the step of determining the data packet uploaded by the client is completed, an operation of performing an audit on the data packet is required:
s2: selecting data of the bibliographic project part from the data packet, and auditing the data of the bibliographic project part item by item;
according to the technical scheme, a bibliographic project part in a data packet to be authenticated is selected for auditing, and after the bibliographic project part passes the auditing, the digital asset entity part corresponding to the bibliographic project part is operated; for the bibliographic item part, the data file usually includes information of name, address, priority file, etc., and its representation form may be table, data bar or any other form, wherein, the examination of the bibliographic item part data includes whether the examination item is missing, whether the examination item data is correct, whether there are redundant examination items, etc.;
in the application, item-by-item auditing of the bibliographic item part means that according to the sequence of data packets in a queue to be processed, a data packet positioned at the forefront end of the queue is selected first, auditing is carried out on the bibliographic item part in the data packet, and an auditing result is obtained, wherein the auditing result comprises that the auditing is passed or the auditing is not passed; then, on the premise of not feeding back the checking result, continuously selecting a data packet in the next queue to be processed, checking the bibliographic item part in the data packet, and obtaining the checking result; and repeating the steps until the bibliographic item parts of all the data packets in the queue to be processed are checked, and finishing the item-by-item checking of the bibliographic item parts.
S3: for the checked unqualified data items, giving a reference value of a virtual qualified data item and analyzing a checking result, and continuing checking item by item until the data of all the bibliographic project parts are checked;
when the review result obtained by the review of the bibliographic item part is that the review is not passed, the reason can be attributed to that the bibliographic item part has unqualified data items, and the unqualified data items in the embodiment may be a certain data error in the bibliographic item part, may also be the missing of one or more items in the bibliographic item part, may also have redundant data items, and the like; after the system obtains the audit result, in order to facilitate the user to quickly perform the modification operation, it is necessary to give the reference value of the corresponding qualified data item to the unqualified data item, and give the audit result analysis, where the content of the audit result analysis may include the location of the unqualified item, i.e. which data packet is located, the preliminary reason analysis and modification suggestion for generating the unqualified item, and so on. For example, when a certain packet audit result is found to be: if the name of the authorized person is wrong, the given reference value of the virtual qualified data item and the analysis of the examination result can be expressed as "examination result: does not pass; not for the reason: a wrongly written word exists; reason analysis: inputting by mistake with the same tone; qualification item reference value: chapter three; and (3) modification suggestion: changing 'Zhangthree' into 'Chapter three'; it should be noted that there are many other possibilities for each analysis result, which is not limited in this embodiment, and the expression manner of the result analysis may be many kinds, such as a chart and a message bar.
S4: if the audited data of the bibliographic project part has unqualified data items, feeding back the audit result to the corresponding client, otherwise, continuing to operate the entity part of the digital assets in the data packet;
according to the technical scheme, after all data packets in the queue to be processed are examined and checked on the bibliographic project part, whether unqualified data items exist in item-by-item examination needs to be judged, and if the unqualified data items exist, data in the data packets need to be modified; because information such as result analysis and the like is generated for the unqualified data items in the previous step, at this time, only relevant information of all unqualified data items needs to be integrated and then is intensively fed back to the corresponding client, and operations such as modification, confirmation and the like are uniformly performed by a user.
Specifically, the process can be illustrated by the following example:
for any client, assuming that five data packets to be authenticated are uploaded, namely data packets A-G, after the system executes an auditing process, the data packets with unqualified items are counted to obtain a data packet B and a data packet G, and specific auditing result analysis content can be checked in an auditing result fed back to the client; the data packet A/C/D which does not comprise the unqualified data item in the auditing result is considered to pass the auditing, and the digital asset entity part in the data packet can be continuously operated; because the examination result is fed back in a centralized way once by taking the client as a unit, the problem of low examination efficiency caused by prompting the user to correct when an unqualified item is found can be avoided;
the feedback form of the auditing result can adopt a list or other possible forms, so that the user can more intuitively and easily perform operations such as modification confirmation and the like.
Further, referring to fig. 10, the method provided by the present application further includes the steps of:
s41: giving a re-audit processing identifier in the audit result fed back to the client, wherein the re-audit processing identifier is used for marking the priority of the re-uploaded data packet;
in the technical scheme provided by this embodiment, a re-audit processing identifier is given in the audit result fed back to the client, that is, an identifier is added to a data packet that does not pass after the audit, which is equivalent to marking the priority of a data packet to be uploaded again, and the purpose is that when the data packet uploaded by the client is determined, the priority of the data packet to which the re-audit processing identifier is added can be adjusted upwards;
for the addition of the review processing identifier, the user can select a repeated submission item at the client to complete, specifically, a display operation item can be added at a client page, the user selects a data packet to be repeatedly submitted, once the data packet is selected, the selected data packet obtains a system asset code, the system asset code can be an application code or an A code, and the priority of the data packet to be adjusted is obtained according to the system asset code;
for the representation form of the re-audit processing identifier, taking one of the feasible examples as an example, a "+" symbol of the data packet identifier may be used, and assuming that the priority of a certain data packet during the previous audit is 2, after one audit, the data packet fed back to the client is identified as 2+ level, and if two audits are performed, the data packet may be identified as 2+ + level, where it may be considered that the priority of 2+ level is higher than 2 level, and the priority of 2+ + level is higher than 2+ level.
Further, referring to fig. 11, the method provided by the present application further includes the steps of:
s42: judging whether the unqualified data items have key items or not; if so, executing the step of feeding back the auditing result to the corresponding client, otherwise, moving the corresponding data packet to a correction queue to process according to a correction flow;
in the solution provided in this embodiment, a determination process for the unqualified data items is added, and the purpose is to indicate that the unqualified data has critical problems affecting the authority determination if a key item exists in the unqualified data items, for example, the inventor has wrongly written data, a date error, an address error, and the like, and needs to be modified; however, if there is no key item in the unqualified data item, for example, the font does not meet the rules, there is a blank space between words, etc., which does not affect the normal understanding error, if it fails to pass the examination, the re-uploading will reduce the overall authorization efficiency, and also waste the system resources; therefore, when the key item with no influence is judged to be large, the mode that the audit is temporarily passed, the corresponding data packet is moved to the correction queue to be processed according to the correction flow can be adopted, so that the right confirming time is shortened, the system resources can be saved, and a user only needs to perform correction operation on the part of the content in a centralized mode.
Based on the above processing method, the present application further provides a system for processing a data packet to be authenticated, which is shown in fig. 2, 12 and 13, and includes a first database 25 for storing the data packet to be authenticated and a second database 26 for storing a qualified data packet, and is characterized by further including:
a data receiving unit 21, configured to receive a to-be-authenticated data packet uploaded by the client 11 through a web page or a dedicated APP, and store the to-be-authenticated data packet and a given application code in the first database 25; the given application code may be generated by the data receiving unit 21 when the data packet is received for the first time, or may be given by the information feedback unit 24 in the previous audit result of the feedback;
a data selection unit 22 provided with a first-in first-out queue to be processed 221 and a selection unit 222; the queue 221 to be processed is used for sequentially storing the data packets to be authenticated, which are obtained from the first database 25 by the selecting unit 222 and need to be processed according to the priority;
a data processing unit 23 including a bibliographic review thread 231 and an entity data processing thread 232; the bibliographic item auditing thread 231 is configured to read the to-be-authenticated data packets in the to-be-processed queue 221 item by item, and select data of a bibliographic item portion from the to-be-authenticated data packets for auditing; for the checked unqualified data items, giving a reference value of a virtual qualified data item and analyzing a checking result, and continuing checking item by item until the data of all the bibliographic project parts are checked; if the audited data of the bibliographic project part has unqualified data items, the audited result is fed back to the corresponding client 11 through the information feedback unit 24, otherwise, the entity data processing thread 232 continues to operate the entity part of the digital assets in the data packet.
Wherein the bibliographic review thread 231 includes a normal review thread 2311 and a virtual review thread 2312, wherein:
a normal examination thread 2311, configured to select data of a bibliographic item portion from a data packet to be authenticated, and examine items by items, and if an unqualified data item exists, transfer an examination operation to the virtual examination thread 2312, otherwise, continue to operate on the entity portion of the digital asset by the entity data processing thread 232;
the virtual review thread 2312 is configured to continue to review item by item until the data of all bibliographic item portions are reviewed, and feed back the review result to the corresponding client 11 through the information feedback unit 24.
The data selecting unit 22 is further provided with an auditing frequency judging unit 223 and a special processing queue 224; wherein,
an audit number judging unit 223, configured to set a data audit number threshold; if the data packet to be authenticated fails to pass one audit, counting the total audited times, and if the total audited times is less than or equal to the data audit time threshold, the selection unit 222 increases the priority of the data packet to be authenticated when the data packet is uploaded again; if the total number of times is greater than the data audit number threshold, the to-be-authenticated data packet is moved to the special processing queue 224.
The feedback unit 24 is further configured to give a review processing identifier in the review result fed back to the client, where the review processing identifier is used to label the priority of the re-uploaded data packet.
It should be noted that, since the embodiment of the present application is provided based on the processing method, the execution manner of each constituent unit of the system provided by the present application in an actual application scenario corresponds to that of the method, and details are not described herein again.
According to the technical scheme, the application provides a method and a system for processing the digital asset data packet to be authenticated. In practical application, after a client establishes point-to-point contact with a digital asset certification platform, a data packet uploaded by the client is determined, the uploaded data packet is stored in a queue to be processed according to priority arrangement, and then the bibliographic data part data of the data packet is checked in sequence according to the sequence of the queue to be processed; if unqualified data items appear, giving an examination result for analysis and continuing examination until all the recorded data parts are examined and finished; if the qualified items exist, the auditing result is fed back to the client side in a centralized way; continuing to perform the operation of the physical portion of the digital asset on the data packet for which no ineligible entry exists. The method adopts uninterrupted item-by-item auditing to the bibliographic item part of the data packet, and feeds back the data auditing result once after auditing is finished, so that a user can modify the unqualified items once, and the problem of low auditing efficiency caused by multiple auditing, error checking and correcting is avoided.
The embodiments provided in the present application are only a few examples of the general concept of the present application, and do not limit the scope of the present application. Any other embodiments extended according to the scheme of the present application without inventive efforts will be within the scope of protection of the present application for a person skilled in the art.

Claims (10)

1. A method for processing a digital asset data package to be authenticated, the method comprising:
determining a data packet uploaded by a client;
selecting data of the bibliographic project part from the data packet, and auditing the data of the bibliographic project part item by item;
for the checked unqualified data items, giving a reference value of a virtual qualified data item and analyzing a checking result, and continuing checking item by item until the data of all the bibliographic project parts are checked;
and if the audited data of the bibliographic project part has unqualified data items, feeding the audit result back to the corresponding client, otherwise, continuing to operate the entity part of the digital assets in the data packet.
2. The method for processing the digital asset data packet to be authenticated according to claim 1, wherein the step of determining the data packet uploaded by the client comprises:
sorting all data packets to be authenticated from high to low according to priority;
sequentially selecting data packets to be authenticated according to the sorting result, and storing the data packets to be authenticated into a first-in first-out queue to be processed;
and determining the data packets uploaded by the client according to the sequence of the data packets output by the queue to be processed.
3. A method for processing a digital asset package to be authenticated according to claim 2, wherein the priority is determined according to the importance of the package content to be authenticated and/or the transaction duration.
4. The method for processing the digital asset data packet to be authenticated according to claim 3, wherein the step of determining the data packet uploaded by the client further comprises:
if the data packet to be authenticated fails to pass one-time audit, counting the total number of audited data packets, and if the total number of audited data packets is less than or equal to the threshold value of the number of data audits, increasing the priority of the data packets when the data packets are uploaded again;
and if the total times are greater than the data auditing time threshold, moving the data packet to be authenticated to a special processing queue.
5. The method for processing the digital asset data packet to be authenticated according to any one of claims 2 to 4, wherein the feeding back the audit result to the corresponding client comprises:
and giving a re-audit processing identifier in the audit result fed back to the client, wherein the re-audit processing identifier is used for marking the priority of the re-uploaded data packet.
6. The method for processing the digital asset data package to be authenticated according to claim 5, wherein before the auditing result is fed back to the corresponding client, the method further comprises:
judging whether the unqualified data items have key items or not; if so, the step of feeding back the auditing result to the corresponding client is executed, otherwise, the corresponding data packet is moved to a correction queue to be processed according to a correction flow.
7. A system for processing data packets to be authenticated, comprising a first database (25) for storing data packets to be authenticated and a second database (26) for storing qualified data packets, characterized in that it further comprises:
the data receiving unit (21) is used for receiving a data packet to be authenticated uploaded by a client (11) through a webpage or a special APP and the like, and storing the data packet to be authenticated and a given application code into the first database (25);
the data selection unit (22) is provided with a first-in first-out queue (221) to be processed and a selection unit (222); the queue (221) to be processed is used for sequentially storing the data packets to be authenticated, which are obtained by the selection unit (222) from the first database (25) and need to be processed according to the priority;
a data processing unit (23) comprising a bibliographic review thread (231) and an entity data processing thread (232); the bibliographic item auditing thread (231) is used for reading data packets to be authenticated in a queue (221) to be processed item by item, and selecting data of bibliographic item parts from the data packets to be authenticated for auditing; for the checked unqualified data items, giving a reference value of a virtual qualified data item and analyzing a checking result, and continuing checking item by item until the data of all the bibliographic project parts are checked; and if the audited data of the bibliographic project part has unqualified data items, feeding back the audit result to the corresponding client (11) through the information feedback unit (24), otherwise, continuing to operate the entity part of the digital assets in the data packet through the entity data processing thread (232).
8. The system for processing the data packet to be authenticated according to claim 7, wherein the bibliographic review thread (231) comprises a normal review thread (2311) and a virtual review thread (2312), wherein:
the normal examination thread (2311) is used for selecting data of the bibliographic item part from the data packet to be authenticated and examining item by item, if unqualified data items exist, the examination operation is handed over to the virtual examination thread (2312), otherwise, the entity data processing thread (232) continues to operate the entity part of the digital asset;
and the virtual examination thread (2312) is used for continuously examining item by item until the data of all the bibliographic item parts are examined, and feeding back the examination result to the corresponding client (11) through the information feedback unit (24).
9. The system for processing the data packet to be authenticated according to claim 7, wherein the data selection unit (22) is further provided with an audit number judgment unit (223) and a special processing queue (224); wherein,
an audit frequency judging unit (223) for setting a data audit frequency threshold value; if the data packet to be authenticated fails to pass one-time audit, counting the total audited times, and if the total audited times is less than or equal to the data audit time threshold, the selection unit (222) up-regulates the priority of the data packet to be authenticated when the data packet is uploaded again; if the total number of times is greater than the data auditing number threshold, the data packet to be authenticated is moved to a special processing queue (224).
10. The system for processing the data packet to be authenticated, according to claim 7, wherein the feedback unit (24) is further configured to give a re-audit processing identifier in the audit result fed back to the client, where the re-audit processing identifier is used to label the priority of the re-uploaded data packet.
CN201910656677.3A 2019-07-19 2019-07-19 Method and system for processing digital asset data packet to be authenticated Pending CN112241883A (en)

Priority Applications (4)

Application Number Priority Date Filing Date Title
CN201910656677.3A CN112241883A (en) 2019-07-19 2019-07-19 Method and system for processing digital asset data packet to be authenticated
PCT/CN2020/094360 WO2021012816A1 (en) 2019-07-19 2020-06-04 Method and system for processing digital asset data packet to be authenticated
JP2021573713A JP2022536734A (en) 2019-07-19 2020-06-04 Method and system for processing digital asset packets pending authentication
FR2007547A FR3099331A1 (en) 2019-07-19 2020-07-17 Method and system for processing digital asset data packets to be authenticated

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910656677.3A CN112241883A (en) 2019-07-19 2019-07-19 Method and system for processing digital asset data packet to be authenticated

Publications (1)

Publication Number Publication Date
CN112241883A true CN112241883A (en) 2021-01-19

Family

ID=74168215

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910656677.3A Pending CN112241883A (en) 2019-07-19 2019-07-19 Method and system for processing digital asset data packet to be authenticated

Country Status (4)

Country Link
JP (1) JP2022536734A (en)
CN (1) CN112241883A (en)
FR (1) FR3099331A1 (en)
WO (1) WO2021012816A1 (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102314457A (en) * 2010-06-30 2012-01-11 百度在线网络技术(北京)有限公司 Automatic information auditing method and system
CN103139104A (en) * 2011-12-05 2013-06-05 深圳迈瑞生物医疗电子股份有限公司 Network transmission service class adjustment method, data terminal and network server
CN105760450A (en) * 2016-02-04 2016-07-13 浪潮通用软件有限公司 Form file analyzing method and device
CN109670963A (en) * 2018-09-26 2019-04-23 深圳壹账通智能科技有限公司 Assets information screening technique, device, equipment and storage medium

Family Cites Families (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH0830687A (en) * 1994-07-15 1996-02-02 Hitachi Ltd Application terminal device
JP2002183278A (en) * 2000-12-12 2002-06-28 Sony Corp Device and method for evaluating application document, and recording medium
US7164678B2 (en) * 2001-06-25 2007-01-16 Intel Corporation Control of processing order for received network packets
US8676162B2 (en) * 2005-05-24 2014-03-18 Marshall Feature Recognition Llc Remote subscriber identification (RSID) system and method
US8239820B1 (en) * 2005-07-18 2012-08-07 Progress Software Corporation Compliance method and system for XML-based applications
JP2016085681A (en) * 2014-10-28 2016-05-19 有限会社アイ・アール・ディー Patent document quality inspection device, patent document quality inspection method, and program
CN105574646A (en) * 2015-12-12 2016-05-11 公安部交通管理科学研究所 Motor vehicle safety technology inspection and supervision system and running method for same
CN107464194A (en) * 2017-09-21 2017-12-12 合肥集知网知识产权运营有限公司 A kind of big data patent management system based on Apriori data mining algorithms
CN109636624A (en) * 2018-10-29 2019-04-16 平安医疗健康管理股份有限公司 Generation method, device, equipment and the storage medium of air control audit model

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102314457A (en) * 2010-06-30 2012-01-11 百度在线网络技术(北京)有限公司 Automatic information auditing method and system
CN103139104A (en) * 2011-12-05 2013-06-05 深圳迈瑞生物医疗电子股份有限公司 Network transmission service class adjustment method, data terminal and network server
CN105760450A (en) * 2016-02-04 2016-07-13 浪潮通用软件有限公司 Form file analyzing method and device
CN109670963A (en) * 2018-09-26 2019-04-23 深圳壹账通智能科技有限公司 Assets information screening technique, device, equipment and storage medium

Also Published As

Publication number Publication date
JP2022536734A (en) 2022-08-18
WO2021012816A1 (en) 2021-01-28
FR3099331A1 (en) 2021-01-29

Similar Documents

Publication Publication Date Title
US8621223B2 (en) Data security method and system
CN110888838B (en) Request processing method, device, equipment and storage medium based on object storage
CN107122258A (en) Method and apparatus for the state code check of test interface
JP4285658B2 (en) Apparatus and method for providing web service
US20080243751A1 (en) Method and Apparatus for Recording Associations with Logs
CN114328017B (en) Database backup method, system, computer equipment and storage medium
CN116883108A (en) Bidding method, electronic device and storage medium
CN101151874A (en) Network node and method for providing internet services on internet marketplaces
US10489734B2 (en) Managed assessment of submitted digital content
CN112241883A (en) Method and system for processing digital asset data packet to be authenticated
US20080243752A1 (en) Method and Apparatus for Process Logging
US20070030515A1 (en) Electronic document having authentication function
CN112241515A (en) Digital asset authentication processing system
CN111680279B (en) Login verification method, device and system
CN116546102A (en) Http request gray level distribution method, device and equipment
US20230325825A1 (en) Methods and systems for synchronised and atomic tracking
CN113378130A (en) Login authentication method and device, computer equipment and storage medium
CN112966288A (en) Data processing method and device, electronic equipment and storage medium
CN114756467B (en) Buried data detection method, buried data detection device, storage medium and storage device
EP1975822A1 (en) Method and apparatus for recording associations with logs
CN110457954A (en) Contract management apparatus and method
US12010109B2 (en) Methods and apparatus for secure access to online events
CN111178995B (en) Method and system for processing bill based on cloud bill system
US20180284991A1 (en) Method and system for dynamic dispersed saving
US11588647B2 (en) Method and validation device for validating a digital certificate

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 210000 A-002, building D4, No.15 Wanshou Road, Nanjing area, China (Jiangsu) pilot Free Trade Zone, Nanjing City, Jiangsu Province

Applicant after: Jiangsu Aowei Holding Co.,Ltd.

Address before: Room 309, 3 / F, building B, No.9 Xinghuo Road, Jiangbei new district, Nanjing City, Jiangsu Province, 210000

Applicant before: Aowei information technology (Jiangsu) Co.,Ltd.

Address after: 210000 A-002, building D4, No.15 Wanshou Road, Nanjing area, China (Jiangsu) pilot Free Trade Zone, Nanjing City, Jiangsu Province

Applicant after: Aowei Co.,Ltd.

Address before: 210000 A-002, building D4, No.15 Wanshou Road, Nanjing area, China (Jiangsu) pilot Free Trade Zone, Nanjing City, Jiangsu Province

Applicant before: Jiangsu Aowei Holding Co.,Ltd.

CB02 Change of applicant information