CN114219565A - Order data processing method, server, storage medium and program product - Google Patents

Order data processing method, server, storage medium and program product Download PDF

Info

Publication number
CN114219565A
CN114219565A CN202111525395.3A CN202111525395A CN114219565A CN 114219565 A CN114219565 A CN 114219565A CN 202111525395 A CN202111525395 A CN 202111525395A CN 114219565 A CN114219565 A CN 114219565A
Authority
CN
China
Prior art keywords
order
order data
data
updated
online
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111525395.3A
Other languages
Chinese (zh)
Inventor
李义
高一寒
田雨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN202111525395.3A priority Critical patent/CN114219565A/en
Publication of CN114219565A publication Critical patent/CN114219565A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0633Lists, e.g. purchase orders, compilation or processing
    • G06Q30/0635Processing of requisition or of purchase orders
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The application provides an order data processing method, a server, a storage medium and a program product. The method is applied to the technical field of data processing. The specific implementation scheme is as follows: monitoring whether order data updating occurs; if the fact that the order data are updated is monitored, performing digital signature processing on the updated order data to obtain signed order data; pushing the signed order data to a second order system so that the second order system conducts signature verification processing on the signed order data and synchronously updates the updated order data after signature verification is passed, wherein the first order system is one of an online order system and an online order placing system, and the second order system is the other of the online order system and the online order placing system; and receiving a pushing result sent by the second order system. The participation of an intermediate service layer is not needed, the development workload of the intermediate service layer is reduced, and the safety of order data is effectively ensured.

Description

Order data processing method, server, storage medium and program product
Technical Field
The embodiment of the invention relates to the technical field of data processing, in particular to an order data processing method, a server, a storage medium and a program product.
Background
With the continuous development of the entity industry and the e-commerce platform, the online and offline sales channels have specific audience groups, so that the online and offline sales channels are continuously developed. However, at present, the online system and the offline system are incompatible with each other, so that the order data of the commodities can only be presented in the respective systems. Therefore, the customer cannot check the online order data by the online order system and cannot check the online order data by the online order system, and the situation that the order data in the online order system and the online order system are not communicated with each other needs to be solved urgently in the era of the trend of universal interconnection and intercommunication.
At present, in order to enable order data in the online ordering system and the online ordering system to be communicated, a data encapsulation intermediate service layer is added between the online ordering system and the online ordering system. And processing and distributing order data in the intermediate service layer to ensure the order data intercommunication between the two systems. However, because the intermediate business layer is added, the workload of development is increased, and when data processing and distribution are performed, order data are easily tampered, and the security of the order data cannot be effectively ensured.
Disclosure of Invention
Embodiments of the present invention provide an order data processing method, a server, a storage medium, and a program product, so as to solve the technical problems in the prior art that a development workload is increased due to the addition of the intermediate service layer, and when data processing and distribution are performed, order data are easily tampered with, and security of the order data cannot be effectively ensured.
In a first aspect, an embodiment of the present invention provides an order data processing method, where the method is applied to a server of a first order system, and the method includes:
monitoring whether order data updating occurs;
if the fact that the order data are updated is monitored, performing digital signature processing on the updated order data to obtain signed order data;
pushing the signed order data to a second order system so that the second order system performs signature verification processing on the signed order data and synchronously updates the updated order data after the signature verification is passed, wherein the first order system is one of an online order system and an online order placing system, and the second order system is the other of the online order system and the online order placing system;
and receiving a pushing result sent by the second order system.
In a second aspect, an embodiment of the present invention provides an order data processing method, where the method is applied to a server of a second order system, and the method includes:
receiving signed order data sent by a first order system; the signed order data is obtained after the first order system monitors that the order data is updated and carries out digital signature processing on the updated order data;
performing signature checking processing on the signed order data, and synchronously updating the updated order data after the signature checking is passed;
and sending a pushing result to the first order system.
In a third aspect, an embodiment of the present invention provides an order system server, including: at least one processor, memory, and transceiver;
the processor, the memory and the transceiver circuitry are interconnected;
the memory stores computer-executable instructions; the transceiver is used for transceiving data;
the at least one processor executing the computer-executable instructions stored by the memory causes the at least one processor to perform the method of the first or second aspect.
In a fourth aspect, the present invention provides a computer-readable storage medium, in which computer-executable instructions are stored, and when the computer-executable instructions are executed by a processor, the computer-executable instructions are used to implement the method according to the first aspect or the second aspect.
The order data processing method, the server, the storage medium and the program product provided by the embodiment of the invention are applied to a first order system in electronic equipment, and the order data is updated by monitoring whether the order data is updated or not; if the fact that the order data are updated is monitored, performing digital signature processing on the updated order data to obtain signed order data; pushing the signed order data to a second order system so that the second order system performs signature verification processing on the signed order data and synchronously updates the updated order data after the signature verification is passed, wherein the first order system is one of an online order system and an online order placing system, and the second order system is the other of the online order system and the online order placing system; and receiving a pushing result sent by the second order system. Because the on-line order system and the on-line order placing system are directly communicated and the on-line order data and the on-line order placing data are synchronized, the participation of an intermediate service layer is not needed, and the development workload of the intermediate service layer is reduced. And before the first order system pushes the updated order data to the second order system, the updated order data is subjected to digital signature processing to obtain the signed order data, so that the safety of the order data is effectively ensured.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and together with the description, serve to explain the principles of the disclosure.
FIG. 1 is a diagram of an application scenario in which an order data processing method according to an embodiment of the present invention may be implemented;
FIG. 2 is a detailed application scenario diagram of an order data processing method that can implement the embodiment of the present invention;
FIG. 3 is a diagram of another detailed application scenario in which the order data processing method of the embodiment of the present invention may be implemented;
FIG. 4 is a flowchart illustrating an order data processing method according to an embodiment of the present invention;
FIG. 5 is a flowchart illustrating an order data processing method according to another embodiment of the present invention;
fig. 6 is a schematic diagram of a digital signature in an order data processing method according to another embodiment of the present invention;
FIG. 7 is a flowchart illustrating an order data processing method according to another embodiment of the present invention;
FIG. 8 is a flowchart illustrating an order data processing method according to yet another embodiment of the present invention;
FIG. 9 is a flowchart illustrating an order data processing method according to yet another embodiment of the present invention;
FIG. 10 is a schematic diagram of a signature verification in an order data processing method according to still another embodiment of the present invention;
FIG. 11 is a flowchart illustrating an order data processing method according to another embodiment of the present invention;
FIG. 12 is a schematic structural diagram of a server of an order system for implementing the order data processing method according to the embodiment of the present invention;
fig. 13 is a block diagram of a server of an order system for implementing the order data processing method of the embodiment of the present invention.
With the foregoing drawings in mind, certain embodiments of the disclosure have been shown and described in more detail below. These drawings and written description are not intended to limit the scope of the disclosed concepts in any way, but rather to illustrate the concepts of the disclosure to those skilled in the art by reference to specific embodiments.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, like numbers in different drawings represent the same or similar elements unless otherwise indicated. The implementations described in the exemplary embodiments below are not intended to represent all implementations consistent with the present disclosure. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present disclosure, as detailed in the appended claims.
First, terms related to embodiments of the present invention are explained:
WebSocket: the protocol is a full duplex communication protocol on a single TCP connection, so that data interaction between a client and a server is simpler, and the server is allowed to actively push data to the client.
Redis: is a high-performance key-value database. The occurrence of redis greatly compensates the shortage of key/value storage such as memcached, and can play a good role in supplementing the relational database in some occasions. Redis supports master-slave synchronization. Data may be synchronized from a master server to any number of slave servers, which may be master servers associated with other slave servers. This enables Redis to perform single-level tree replication. The storage disk can write data intentionally or unintentionally. Due to the fact that the publish/subscribe mechanism is completely achieved, when the trees are synchronized anywhere from the database, one channel can be subscribed and the complete message publishing record of the main server can be received. Synchronization is helpful for scalability of read operations and data redundancy.
Digital signature: the digital string can be generated only by the sender of the information and cannot be forged by others, and the digital string is also a valid proof of the authenticity of the information sent by the sender of the information.
For a clear understanding of the technical solutions of the present application, the prior art solutions are described in detail.
At present, in order to enable order data in an online ordering system and an online ordering system to be communicated, a data packaging intermediate service layer is added in the online ordering system and the online ordering system. Namely, the intermediate service layer respectively carries out data interaction with the online ordering system and the online ordering system, and carries out processing and distribution of order data in the intermediate service layer, thereby ensuring the order data intercommunication between the two systems. However, since the intermediate service layer is added, when the intermediate service layer is developed, developers need to perform corresponding development according to the functions of the intermediate service layer, so that the development workload is increased, and when data processing and distribution are performed, security protection is not performed on order information, so that order data is easily tampered, and the security of the order data cannot be effectively ensured.
Therefore, in order to solve the technical problems of the prior art, the inventor of the present invention has found through creative research that, in order to reduce the workload of development, a communication connection can be directly established between an online ordering system and an online ordering system, and the synchronization, fusion and unified management of online ordering data and online ordering is realized through the direct interaction between the online ordering system and the online ordering system. Specifically, one of the online order system and the online order placing system monitors whether order data is updated, if so, the updated order data is pushed to the other of the online order system and the online order placing system, and the other order system synchronously updates the updated order data and sends a pushing result to the one order system. In order to effectively ensure the safety of order data, one order system of the online order system and the online order placing system carries out digital signature processing on the updated order data before pushing the updated order data to the other order system so as to obtain the signed order data. After the other order system receives the signed order data, the signed order data is subjected to signature verification processing, and the updated order data is synchronously updated after the signature verification is passed.
Therefore, the inventor proposes a technical scheme of the embodiment of the invention based on the above creative discovery. The following describes a network architecture and an application scenario of the order data processing method provided by the embodiment of the present invention.
Fig. 1 is an application scenario diagram of an order data processing method that can implement the embodiment of the present invention, and as shown in fig. 1, a network architecture of the order data processing method provided in this embodiment includes an offline user terminal 11 and an offline server 12 corresponding to an online order system, and an online user terminal 13 and an online server 14 corresponding to an online order system. The offline user interacts with the client of the offline user terminal 11 to perform an order placing or order modifying operation. The online user interacts with the client of the online user terminal 13 to perform online ordering or order modification operations. The offline user terminal 11 interacts with the offline server 12, and the order data is updated on the offline server 12. The online user terminal 13 interacts with the online server 14 and the order data is updated on the online server 14. The online server 12 and the offline server 13 are in direct communication connection, the server of each order system monitors whether order data is updated, if so, the updated order data is digitally signed to obtain signed order data, and the signed order data is pushed to the server of another order system. And the server of the other order system performs signature verification processing on the signed order data and synchronously updates the updated order data after the signature verification is passed.
In a more detailed application scenario, as shown in fig. 2, in the online order placing system, a counter staff assists an online user to place an order, and the online order placing system monitors that the order data is updated, and then creates new order data. And pushing the signed order data to an online order system. And after the on-line order system checks the signed order data, the on-line order system synchronously creates new order data and feeds back a pushing result to the on-line order system. And if the online order system is monitored to have the modified order data and the updated order data, pushing the signed order data to the online order system. And after the on-line order system checks the signed order data, the on-line order system synchronously updates the order data and feeds back a pushing result to the on-line order system. And the signed order data is obtained by performing digital signature processing on the updated order data.
In another more detailed application scenario, as shown in fig. 3, a user autonomously places an order in the online order system, and the online order system monitors that the update of order data occurs, and then creates new order data. And pushing the signed order data to an online order placing system. And after the on-line order placing system checks the signed order data, the on-line order placing system synchronously creates new order data and feeds back a pushing result to the on-line order placing system. And if the online order system is monitored to have the modified order data and the updated order data, pushing the signed order data to the online order system. And after the on-line order placing system checks the signed order data, the on-line order placing system synchronously updates the order data and feeds back a pushing result to the on-line order placing system.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Example one
Fig. 4 is a flowchart illustrating an order data processing method according to an embodiment of the present invention, and as shown in fig. 4, an execution subject of the order data processing method according to the embodiment is an order data processing apparatus. The order data processing device is located in a server of the first order system. The order data processing method provided by this embodiment includes the following steps:
step 201, monitoring whether the order data is updated.
In this embodiment, the first order system is one of an online order system and an online order placing system, and the second order system is the other of the online order system and the online order placing system.
The order data is generated by the user performing order placing operation of the commodity in the first order system. The type of the article is not limited. For example, the metal can be a precious metal in the financial field, and can also be a living article. Order codes, order status, recipient information, etc. may be included in the order data.
In this embodiment, when a user performs a relevant operation on order data at a client of the first order system, such as placing an order, modifying an order, and the like, the user terminal loaded with the first order system sends an order data update request to the server, where the order data update request carries an order code, an update type, update data, and the like. And the server correspondingly updates the order data according to the order data updating request, and for example, for order placing operation, the server creates new order data. For the modify order operation, the server modifies the corresponding order data.
Therefore, in this embodiment, the server monitors whether the order data is updated according to whether the server updates the order data according to the order data update request.
Step 202, if it is monitored that the order data is updated, performing digital signature processing on the updated order data to obtain signed order data.
In this embodiment, if it is monitored that creation of order data and modification of order data occur, it is determined that update of order data occurs. And after the fact that the order data are updated is monitored, acquiring the updated order data, carrying out digital signature processing on the updated order data by adopting a preset encryption algorithm and a hash function, and determining the order data subjected to digital signature processing as the signed order data.
Step 203, pushing the signed order data to a second order system, so that the second order system performs signature verification processing on the signed order data, and synchronously updating the updated order data after the signature verification is passed.
In this embodiment, the server of the first order system communicates with the server of the second order system, and pushes the signed order data to the second order system. And the server corresponding to the second order system can perform signature verification processing on the signed order data according to the decryption algorithm and the hash function to obtain a signature verification result. And after the signature checking result is that the signature checking is passed, acquiring updated order data after the signature checking is passed, and synchronously updating the updated order data in the server of the second order system according to the updating type of the updated order data.
For example, if the update type of the updated order data is the creation type, the creation of the order data is performed in the server of the second order system. And if the update type of the updated order data is the modification type, modifying the order data in a server of the second order system.
It is understood that the first order system server and the second order system server each have a database for storing order data, so that when the second order system synchronously updates the updated order data, the updated order data can be synchronously updated in the database of the second order system server.
And step 204, receiving a pushing result sent by the second order system.
In this embodiment, after the second order system performs synchronous update on the updated order data, if the synchronous update result is an update success result, the second order system pushes the update success push result to the first order system. If the synchronous updating result is the updating failure result, the pushing result of the updating failure is pushed to the first order system, and the pushing result can include the reason of the updating failure.
In the order data processing method provided by this embodiment, whether the order data is updated or not is monitored; if the fact that the order data are updated is monitored, performing digital signature processing on the updated order data to obtain signed order data; pushing the signed order data to a second order system so that the second order system conducts signature verification processing on the signed order data and synchronously updates the updated order data after signature verification is passed, wherein the first order system is one of an online order system and an online order placing system, and the second order system is the other of the online order system and the online order placing system; and receiving a pushing result sent by the second order system. Because the on-line order system and the on-line order placing system are directly communicated and the on-line order data and the on-line order placing data are synchronized, the participation of an intermediate service layer is not needed, and the development workload of the intermediate service layer is reduced. And before the first order system pushes the updated order data to the second order system, the updated order data is subjected to digital signature processing to obtain the signed order data, so that the safety of the order data is effectively ensured.
Example two
Fig. 5 is a flowchart illustrating an order data processing method according to another embodiment of the invention. As shown in fig. 5, the order data processing method provided in this embodiment further refines step 202, and then step 202 of the order data processing method provided in this embodiment includes the following steps:
step 301, performing encryption processing on the updated order data to obtain an encrypted ciphertext.
The updated order data may include the number of the updated order data and the type of the update. The number of the order data is information indicating a unique order, and the updated type may be any one of a creation type and a modification type. If the type of the update is a modification type, the data of the specific update can be included. The data that is specifically updated may be order status, consignee information, etc.
Specifically, in this embodiment, as shown in fig. 6, the updated order data is input into a preset symmetric encryption algorithm, the updated order data is encrypted by using a preset symmetric encryption algorithm and a symmetric encryption algorithm key, and the encrypted data is output and referred to as an encrypted ciphertext.
And 302, performing asymmetric encryption processing on the symmetric encryption algorithm key by using the public key of the second order system to obtain an encrypted key ciphertext.
And the public key of the second order system is the public key of the receiver system. The public key may be preconfigured.
Specifically, in this embodiment, as shown in fig. 6, a preconfigured symmetric encryption algorithm key is obtained, the symmetric encryption algorithm key and the public key of the second order system are input into the asymmetric encryption algorithm, the symmetric encryption algorithm key is encrypted by using the asymmetric encryption algorithm and the public key of the second order system, and an encrypted key ciphertext is output.
And 303, processing the updated order data by adopting a first hash function to generate a corresponding digital abstract before encryption, and performing asymmetric encryption processing on the digital abstract before encryption by adopting a private key corresponding to a first order system to obtain an encrypted digital abstract.
And the private key corresponding to the first order system is the private key of the sender system. The private key may be preconfigured.
In this embodiment, the first hash function is a function for performing hash processing on updated order data.
Specifically, in this embodiment, as shown in fig. 6, the updated order data is input into a first hash function, and the updated order data is subjected to hash processing by using the first hash function, so as to generate and output a digital digest. The digital digest is a digital digest before encryption. And acquiring a private key corresponding to the first order system, inputting the private key corresponding to the first order system and the digital digest before encryption into an asymmetric encryption algorithm, encrypting the digital digest before encryption by adopting the asymmetric encryption algorithm, and generating and outputting the encrypted digital digest.
Step 304, determining the encrypted ciphertext, the encrypted key ciphertext and the encrypted digital digest as the signed order data.
In this embodiment, the encrypted ciphertext, the encrypted key ciphertext, and the encrypted digital digest may be spliced according to a preset sequence, and are determined together as signed order data.
In the order data processing method provided in this embodiment, when performing digital signature processing on updated order data to obtain signed order data, encryption processing is performed on the updated order data to obtain an encrypted ciphertext; adopting a public key of a second order system to carry out asymmetric encryption processing on the symmetric encryption algorithm key so as to obtain an encrypted key ciphertext; processing the updated order data by adopting a first hash function to generate a corresponding digital abstract before encryption, and performing asymmetric encryption processing on the digital abstract before encryption by adopting a private key corresponding to a first order system to obtain an encrypted digital abstract; the encrypted ciphertext, the encrypted key ciphertext and the encrypted digital digest are determined as signed order data, and the updated order data, the symmetric encryption algorithm key and the digital digest are encrypted and jointly used as the signed order data, so that the updated order data can be further ensured not to be tampered in the transmission process, and the safety of the updated order data in the transmission process is further improved.
EXAMPLE III
Fig. 7 is a flowchart illustrating an order data processing method according to yet another embodiment of the present invention, and as shown in fig. 7, the order data processing method according to this embodiment further includes other steps based on the order data processing method according to any one of the embodiments. The order data processing method provided by this embodiment further includes the following steps:
step 401, reading at least one first order data obtained from a first order system in a second order system according to a preset time period.
In this embodiment, the preset time period may be configured in advance, for example, every 15 minutes may be a time period, or every 1 hour may be a time period, and a value of the preset time period is not limited in this embodiment.
Specifically, in this embodiment, after the second order system receives the updated order data pushed by the first order system and synchronously updates the updated order data, the updated order data may be marked to determine that the updated order data is the order data pushed by the first order system.
In this embodiment, the server of the first order system accesses the database of the second order system according to the preset time period, and acquires the order data marked with the information acquired from the first order system from the database of the second order system, where the order data acquired from the first order system is the first order data.
Wherein, include at least in the first order data: the serial number of the first order data and the order state of the first order data. The serial number of the first order data is a first order serial number, and the order state of the first order data is a first order state.
Step 402, respectively placing each first order data in a key value pair of a second hash function; key stores a first order number corresponding to the first order data, and Value stores a first order state corresponding to the first order data.
And storing a function of the key value pair corresponding to the first order data as a second hash function.
Specifically, in this embodiment, the order number and the order state in each first order data are extracted, the order number in each first order data is stored in a Key in the second hash function Key Value pair, and the order state in each first order data is stored in a Value in the second hash function Key Value pair. And the same order number and order state in the first order data are stored in a key value pair of the second hash function.
Step 403, obtaining second order data corresponding to a preset time period from the first order system.
In this embodiment, order data of operations such as creation, modification, and the like within a preset time period is acquired in a database of a first order system server, and the order data corresponding to the preset time period acquired from the own system is second order data.
Step 404, verifying the first order data and the second order data according to the second order and the key value of the second hash function.
As an alternative implementation, in this embodiment, step 404 includes the following steps:
step 4041, a second order number and a second order status in the second order data are obtained.
In this embodiment, the second order data at least includes an order number and an order status. The order in the second order data is encoded as a second order number. The order status in the second order data is a second order status.
Specifically, after second order data corresponding to a preset time period is acquired in the first order system, the second order data is analyzed, and a second order number and a second order state in the second order data are acquired.
Step 4042, traversing keys in the Key value pairs of the second hash function through the second order numbers to determine whether missing order data occurs in the first order data and the second order data, and if it is determined that the missing order data occurs, performing additional recording on the missing order data in the corresponding order system.
In this embodiment, each second order number is compared with a Key in a Key value pair of the second hash function, and whether each second order number exists in the keys in the Key value pair of the second hash function and whether the keys in the Key value pair of the second hash function exist in each second order number is determined. If it is determined that a certain second order number does not exist in the Key of the Key value pair of the second hash function, it indicates that the second order system misses the order data pushed from the first order system, and then the missing order data is subjected to additional recording in a database of the second order system. If it is determined that a certain key in the key value pair of the second hash function does not exist in each second order number, it indicates that the first order system does not update the updated order data when pushing the updated order data to the second order system, and that missing occurs, and then the missing order data is added in the database of the first order system.
Step 4043, traversing Value in the key Value pair of the second hash function according to the second order states to determine whether the order states in the first order data and the second order data are consistent, and if it is determined that the order states are inconsistent, modifying the corresponding order states in the corresponding order systems by using the latest updated order data as a reference.
In this embodiment, after the second order states in the second order data are obtained, each second order state is respectively compared with a Value in a key Value pair of the second hash function, and whether each second order state is consistent with the corresponding Value is determined. And if the state of a certain second order is determined to be inconsistent with the corresponding Value, acquiring inconsistent second order data and the corresponding updating time of the corresponding first order data, and determining whether the latest updated order data is the first order data or the second order data according to the updating time. And if the order data is the first order data, modifying the second order state of the corresponding second order data in the first order system by taking the first order data as a reference. And if the order data is the second order data, modifying the first order state of the corresponding first order data in the second order system by taking the second order data as a reference.
Step 405, backing up the missing order data and the original order data with inconsistent order states.
In this embodiment, the missing order data in step 4042 and the original order data with inconsistent order status in step 4043 are obtained, and the missing order data and the original order data with inconsistent order status can be synchronously backed up in the first order system and the second order system. When the commodity purchased by the user has problems, the circulation process of the commodity is combed according to the backed-up order data, and the responsibility is effectively followed.
In the order data processing method provided by this embodiment, at least one piece of first order data acquired from a first order system in a second order system is read according to a preset time period; respectively placing each first order data in a key value pair of a second hash function; key stores a corresponding first order number in first order data, and Value stores a first order state corresponding to the first order data; acquiring second order data corresponding to a preset time period from the first order system; and verifying the first order data and the second order data according to the second order and the key value of the second hash function. When the order data is verified, all the order data which occur in the preset time period can be verified at one time according to the key value in the second hash function, so that the problem that the verification efficiency is low when whether the order data is missed or not and whether the order states are inconsistent or not are verified can be effectively solved, and the verification efficiency of the order data is effectively improved.
Example four
Fig. 8 is a flowchart illustrating an order data processing method according to yet another embodiment of the present invention, and as shown in fig. 8, an executing entity of this embodiment is an order data processing device, and the order data processing device is located in a server of a second order system. The order data processing method provided by this embodiment includes the following steps:
step 501, receiving signed order data sent by a first order system; the signed order data is obtained after the first order system monitors that the order data is updated and carries out digital signature processing on the updated order data.
In this embodiment, the server of the second order system communicates with the server of the first order system, and when the server of the first order system monitors that an order update occurs, the server of the second order system performs digital signature processing on updated order information and sends the updated order information to the server of the second order system, so that the server of the second order system receives signed order data.
Step 502, performing signature verification processing on the signed order data, and synchronously updating the updated order data after the signature verification is passed.
In this embodiment, a preset decryption algorithm and a hash function are adopted to perform signature verification processing on the signed order data, and a signature verification processing result is obtained. And if the result of the signature checking processing is that the signature checking is passed, synchronously updating the updated order data in the server of the second order system according to the update type of the updated order data.
Step 503, sending the pushing result to the first order system.
In this embodiment, after the second order system synchronously updates the updated order data, a push result is generated. And if the synchronous updating result is a successful updating result, the generated pushing result is a successful updating pushing result. Pushing the push result with successful update to the first order system. And if the synchronous updating result is an updating failure result, the generated pushing result is the updating failure pushing result. Pushing the pushing result of which the updating fails to the first order system.
In the order data processing method provided by this embodiment, signed order data sent by a first order system is received; the signed order data is obtained after the first order system monitors that the order data is updated and carries out digital signature processing on the updated order data; carrying out signature checking processing on the signed order data, and synchronously updating the updated order data after the signature checking is passed; and sending a pushing result to the first order system. Because the on-line order system and the on-line order placing system are directly communicated and the on-line order data and the on-line order placing data are synchronized, the participation of an intermediate service layer is not needed, and the development workload of the intermediate service layer is reduced. And before the first order system pushes the updated order data to the second order system, the updated order data is subjected to digital signature processing to obtain the signed order data, so that the safety of the order data is effectively ensured.
EXAMPLE five
Fig. 9 is a schematic flowchart of an order data processing method according to yet another embodiment of the present invention, and as shown in fig. 9, in the order data processing method according to this embodiment, on the basis of the order data processing method according to the fourth embodiment, further details of the signature verification processing on the signed order data in step 502 are performed, and then step 502 of the order data processing method according to this embodiment includes the following steps:
step 601, decrypting the encrypted key ciphertext by using a private key of the second order system to obtain a symmetric encryption algorithm key.
The private key of the second order system is the private key of the receiving party system, and the private key can be configured in advance.
In step 302 of the second embodiment, the public key of the second order system is used to perform asymmetric encryption processing on the symmetric encryption algorithm key, so as to obtain an encrypted key ciphertext. Therefore, in the server of the second order system, the encrypted key ciphertext needs to be decrypted by using the private key of the second order system and the asymmetric decryption algorithm, and the symmetric encryption algorithm key is obtained after decryption.
Wherein the asymmetric decryption algorithm and the asymmetric encryption algorithm are matched.
Specifically, as shown in fig. 10, a pre-configured private key of the second order system is obtained, the private key of the second order system and the encrypted key ciphertext are input into the asymmetric decryption algorithm, the encrypted key ciphertext is decrypted by using the asymmetric decryption algorithm and the private key of the second order system, and the decrypted symmetric encryption algorithm key is output.
And step 602, decrypting the encrypted ciphertext by using the symmetric encryption algorithm key and the symmetric decryption algorithm to obtain decrypted order data.
In this embodiment, in step 302 of the second embodiment, since the encrypted ciphertext is obtained by encrypting the updated order data by using the preset symmetric encryption algorithm and the symmetric encryption algorithm key, in step 602, the encrypted ciphertext is decrypted by using the symmetric encryption algorithm key and the symmetric decryption algorithm obtained in step 601, so as to obtain the decrypted order data.
Wherein the symmetric decryption algorithm is matched with the symmetric encryption algorithm.
Specifically, in this embodiment, as shown in fig. 10, a symmetric encryption algorithm key is obtained, and the symmetric encryption algorithm key and an encrypted ciphertext are input into a symmetric decryption algorithm. And decrypting the encrypted ciphertext by adopting a symmetric decryption algorithm and a symmetric encryption algorithm key, and outputting decrypted order data.
Step 603, decrypting the encrypted digital digest by using an asymmetric decryption algorithm and a public key corresponding to the first order system to obtain the decrypted digital digest.
The public key corresponding to the first order system is a public key corresponding to the sender system, and can be configured in advance.
In this embodiment, in step 303 in the second embodiment, since the encrypted digital digest is generated by performing asymmetric encryption processing on the digital digest before encryption by using the private key corresponding to the first order system, in step 603 in this embodiment, the encrypted digital digest is decrypted by using an asymmetric decryption algorithm and the public key corresponding to the first order system, so as to obtain the decrypted digital digest.
Wherein the asymmetric decryption algorithm and the asymmetric encryption algorithm are matched.
Specifically, in this embodiment, the public key of the first order system is obtained, the public key of the first order system and the encrypted digital digest are input to the asymmetric decryption algorithm, the encrypted digital digest is decrypted by using the public key of the first order system and the asymmetric decryption algorithm, and the decrypted digital digest is output.
Step 604, the decrypted order data is processed by using a first hash function to generate a comparative digital digest.
In this embodiment, the decrypted order data is input into the first hash function, and the decrypted order data is subjected to hash processing by using the first hash function, so as to generate and output a digital digest, where the digital digest is referred to as a comparative digital digest.
And step 605, comparing the compared digital abstract with the decrypted digital abstract, and determining whether the signature passes the signature verification according to the comparison result.
Specifically, in this embodiment, if the signed order data is not subjected to a tampering operation during the transmission to the server of the second order system, the compared digital digest should be consistent with the decrypted digital digest. If the signed order data is tampered during transmission to the server of the second order system, the compared digital digest is inconsistent with the decrypted digital digest. Therefore, a comparison result is obtained, and if the comparison result is that the two digital signatures are consistent, the signature verification is determined to be passed. Otherwise, if the comparison result is that the two digital signatures are inconsistent, the signature verification is determined not to be passed.
In the order data processing method provided by this embodiment, when signature verification processing is performed on signed order data, a private key of a second order system is used to decrypt an encrypted key ciphertext to obtain a symmetric encryption algorithm key; decrypting the encrypted ciphertext by adopting a symmetric encryption algorithm key and a symmetric decryption algorithm to obtain decrypted order data; decrypting the encrypted digital abstract by adopting an asymmetric decryption algorithm and a public key corresponding to the first order system to obtain a decrypted digital abstract; processing the decrypted order data by adopting a first hash function to generate a compared digital abstract; and comparing the compared digital abstract with the decrypted digital abstract, and determining whether the signature passes the signature verification according to the comparison result. When the signature is verified, the key ciphertext, the encrypted ciphertext and the encrypted digital digest are respectively decrypted, and the compared digital digest is obtained by processing the decrypted order data through the first hash function, so that when the compared digital digest is compared with the decrypted digital digest, if any one of the key ciphertext, the encrypted ciphertext and the encrypted digital digest is tampered, the verification cannot be passed, the updated order data can be further guaranteed not to be tampered in the transmission process, and the safety of the updated order data in the transmission process is further improved.
EXAMPLE six
Fig. 11 is a flowchart of an order data processing method according to yet another embodiment of the present invention, and as shown in fig. 11, the order data processing method according to this embodiment further includes, on the basis of the order data processing method according to the fourth or fifth embodiment, the following steps that the second order system is an online order system, and after the updated order data is synchronously updated after the checkup is passed:
step 701, monitoring whether a client side of the second order system with order data synchronous update is in an online state.
In this embodiment, the online order system obtains the user to which the order data is updated synchronously, and monitors whether the online order system of the user is in an online state. When monitoring whether the online order system of the user is in an online state, judging whether the client of the online order system of the user has interaction with the server within the latest preset time period, and if the client of the online order system of the user has interaction with the server, determining that the online order system of the user is in the online state. Otherwise, if the online ordering system of the user is determined to be in the offline state, the online ordering system of the user is determined to be in the offline state.
Step 702, if the online status is determined, pushing the updated order data to the client.
In this embodiment, if the online status is determined, the updated order data is immediately pushed to the client in a WebSocket manner, so as to remind the user that the order data is updated successfully. Such as successful order placement, successful order status modification, etc.
And 703, caching the updated order data if the offline state is determined, monitoring the state of the client by using the thread, pushing the updated order data to the client and deleting the cache corresponding to the updated order data if the online state is monitored.
In this embodiment, if the offline state is determined, Redis is adopted to cache the updated order data. And monitoring the state of the client of the user in real time by using a certain thread in the thread pool, and immediately pushing updated order data to the client in a WebSocket mode if the online state is monitored, so as to remind the user of the success of updating the order data. And deleting the updated order data in the Redis cache.
In the order data processing method provided by this embodiment, whether a client in which order data is synchronously updated in the second order system is in an online state is monitored; if the online status is determined, pushing the updated order data to the client; and if the online state is monitored, pushing the updated order data to the client and deleting the cache corresponding to the updated order data. When the client of the user is in an online state, the updated order data is received at the first time, so that the management experience of the user on the online and offline order data is improved.
It should be noted that, in this embodiment, the user may also perform unified management on the order data in the second order system and the order data in the first order system through the client of the first order system. Similarly, the user can also perform unified management on the order data in the first order system and the primary order data in the second order system through the client of the second order system. And the management experience of the user on the online and offline order data is further improved.
EXAMPLE seven
Fig. 12 is a schematic structural diagram of an order system server for implementing the order data processing method according to the embodiment of the present invention, and as shown in fig. 12, the server 80 of the order system provided in the embodiment includes: at least one processor 82, a memory 81, and a transceiver 83.
The processor 82, memory 81 and transceiver 83 are electrically interconnected.
Wherein the memory 81 stores computer-executable instructions. The transceiver 83 is used for transmitting and receiving data.
The at least one processor 82 executes the computer-executable instructions stored by the memory to cause the at least one processor to perform a method as provided in any one of embodiments one through six.
Example eight
Fig. 13 is a block diagram of a server of an order system for implementing the order data processing method according to the embodiment of the present invention, and as shown in fig. 13, the server of the order system may be a computer, a blade server, a slice server, a server cluster, or the like.
The server 900 of the order system may include one or more of the following components: processing component 902, memory 904, power component 906, input/output (I/O) interface 912, sensor component 914, and communication component 916.
The processing component 902 generally controls the overall operation of the server 900 of the order system, such as operations associated with display, phone calls, data communications, camera operations, and recording operations. Processing component 902 may include one or more processors 920 to execute instructions to perform all or a portion of the steps of the methods described above. Further, processing component 902 can include one or more modules that facilitate interaction between processing component 902 and other components.
The memory 904 is configured to store various types of data to support the operation of the server 900 at the ordering system. Examples of such data include instructions for any application or method operating on the server 900 of the order system, contact data, phonebook data, messages, pictures, videos, and the like. The memory 904 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power component 906 provides power to the various components of the server 900 of the order system. The power components 906 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the server 900 of the order system.
I/O interface 912 provides an interface between processing component 902 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor component 914 includes one or more sensors for providing status assessment of various aspects to the server 900 of the order system. For example, the sensor component 914 may detect an open/closed status of the server 900 of the order system, a relative positioning of components, such as a display and keypad of the server 900 of the order system, a change in position of the server 900 of the order system or a component of the server 900 of the order system, the presence or absence of user contact with the server 900 of the order system, an orientation or acceleration/deceleration of the server 900 of the order system, and a change in temperature of the server 900 of the order system. The sensor assembly 914 may include a proximity sensor configured to detect the presence of a nearby object in the absence of any physical contact. The sensor assembly 914 may also include a light sensor, such as a CMOS or CCD image sensor, for use in imaging applications. In some embodiments, the sensor assembly 914 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 916 is configured to facilitate wired or wireless communication between the server 900 of the order system and other devices. The server 900 of the order system may have access to a wireless network based on a communication standard, such as WiFi, 2G or 3G, or a combination thereof. In an exemplary embodiment, the communication component 916 receives a broadcast signal or broadcast associated information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 916 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the server 900 of the order system may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors, or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer readable storage medium comprising instructions, such as the memory 904 comprising instructions, executable by the processor 920 of the server 900 of the order system to perform the above method is also provided. For example, the non-transitory computer readable storage medium may be a ROM, a Random Access Memory (RAM), a CD-ROM, a magnetic tape, a floppy disk, an optical data storage device, and the like.
A non-transitory computer readable storage medium having instructions stored thereon that, when executed by a processor of a server of an order system, enable the server of the order system to perform the method provided by any one of the first through sixth embodiments.
In an exemplary embodiment, a computer program product is also provided, which includes a computer program that is executed by a processor to perform the method provided by any of the first to sixth embodiments.
Other embodiments of the disclosure will be apparent to those skilled in the art from consideration of the specification and practice of the disclosure disclosed herein. This application is intended to cover any variations, uses, or adaptations of the disclosure following, in general, the principles of the disclosure and including such departures from the present disclosure as come within known or customary practice within the art to which the disclosure pertains. It is intended that the specification and examples be considered as exemplary only, with a true scope and spirit of the disclosure being indicated by the following claims.
It will be understood that the present disclosure is not limited to the precise arrangements described above and shown in the drawings and that various modifications and changes may be made without departing from the scope thereof. The scope of the present disclosure is limited only by the appended claims.

Claims (11)

1. An order data processing method is applied to a server of a first order system, and comprises the following steps:
monitoring whether order data updating occurs;
if the fact that the order data are updated is monitored, performing digital signature processing on the updated order data to obtain signed order data;
pushing the signed order data to a second order system so that the second order system performs signature verification processing on the signed order data and synchronously updates the updated order data after the signature verification is passed, wherein the first order system is one of an online order system and an online order placing system, and the second order system is the other of the online order system and the online order placing system;
and receiving a pushing result sent by the second order system.
2. The method of claim 1, wherein digitally signing the updated order data to obtain signed order data comprises:
encrypting the updated order data to obtain an encrypted ciphertext;
adopting a public key of a second order system to carry out asymmetric encryption processing on the symmetric encryption algorithm key so as to obtain an encrypted key ciphertext;
processing the updated order data by adopting a first hash function to generate a corresponding digital abstract before encryption, and performing asymmetric encryption processing on the digital abstract before encryption by adopting a private key corresponding to a first order system to obtain an encrypted digital abstract;
and determining the encrypted ciphertext, the encrypted key ciphertext and the encrypted digital digest as signed order data.
3. The method according to claim 1 or 2, wherein the order data comprises: order number and order status;
the method further comprises the following steps:
reading at least one first order data acquired from a first order system in a second order system according to a preset time period;
respectively placing each first order data in a key value pair of a second hash function; key stores a corresponding first order number in first order data, and Value stores a first order state corresponding to the first order data;
acquiring second order data corresponding to a preset time period from the first order system;
and checking the first order data and the second order data according to the second order and the key value of the second hash function.
4. The method of claim 3, wherein the verifying the first order data and the second order data according to the second order and the key value of the second hash function comprises:
acquiring a second order number and a second order state in second order data;
traversing keys in Key value pairs of a second hash function through the second order numbers to determine whether missing order data occur in the first order data and the second order data, and if the missing order data occur, performing additional recording on the missing order data in a corresponding order system;
and traversing Value in the key Value pair of the second hash function according to the second order state to determine whether the order states in the first order data and the second order data are consistent, and if the order states are determined to be inconsistent, modifying the corresponding order states in the corresponding order system by taking the latest updated order data as a reference.
5. The method of claim 4, further comprising:
and backing up the missing order data and the original order data with inconsistent order states.
6. An order data processing method is applied to a server of a second order system, and comprises the following steps:
receiving signed order data sent by a first order system; the signed order data is obtained after the first order system monitors that the order data is updated and carries out digital signature processing on the updated order data;
performing signature checking processing on the signed order data, and synchronously updating the updated order data after the signature checking is passed;
and sending a pushing result to the first order system.
7. The method of claim 6, wherein said signing the signed order data comprises:
decrypting the encrypted key ciphertext by using a private key of a second order system to obtain a symmetric encryption algorithm key;
decrypting the encrypted ciphertext by adopting the symmetric encryption algorithm key and the symmetric decryption algorithm to obtain decrypted order data;
decrypting the encrypted digital abstract by adopting an asymmetric decryption algorithm and a public key corresponding to the first order system to obtain a decrypted digital abstract;
processing the decrypted order data by adopting a first hash function to generate a compared digital abstract;
and comparing the compared digital abstract with the decrypted digital abstract, and determining whether the signature passes the signature verification according to the comparison result.
8. The method according to claim 6 or 7, wherein the second order system is an online order system, and after the synchronous update of the updated order data after the verification passes, the method further comprises:
monitoring whether a client side of the second order system with order data synchronous updating is in an online state;
if the online state is determined, pushing the updated order data to the client;
if the client-side is determined to be in the off-line state, caching the updated order data, monitoring the state of the client-side by using a thread, and pushing the updated order data to the client-side and deleting the cache corresponding to the updated order data if the client-side is monitored to be in the on-line state.
9. A server of an order system, comprising: at least one processor, memory, and transceiver;
the processor, the memory and the transceiver circuitry are interconnected;
the memory stores computer-executable instructions; the transceiver is used for transceiving data;
the at least one processor executing the computer-executable instructions stored by the memory causes the at least one processor to perform the method of any one of claims 1-5 or 6-8.
10. A computer-readable storage medium having computer-executable instructions stored thereon, which when executed by a processor, perform the method of any one of claims 1-5 or 6-8.
11. A computer program product comprising a computer program, characterized in that the computer program realizes the method according to any of claims 1-8 when executed by a processor.
CN202111525395.3A 2021-12-14 2021-12-14 Order data processing method, server, storage medium and program product Pending CN114219565A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111525395.3A CN114219565A (en) 2021-12-14 2021-12-14 Order data processing method, server, storage medium and program product

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111525395.3A CN114219565A (en) 2021-12-14 2021-12-14 Order data processing method, server, storage medium and program product

Publications (1)

Publication Number Publication Date
CN114219565A true CN114219565A (en) 2022-03-22

Family

ID=80701649

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111525395.3A Pending CN114219565A (en) 2021-12-14 2021-12-14 Order data processing method, server, storage medium and program product

Country Status (1)

Country Link
CN (1) CN114219565A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117474635A (en) * 2023-12-26 2024-01-30 深圳市安科讯电子制造有限公司 Online sales system for energy products

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117474635A (en) * 2023-12-26 2024-01-30 深圳市安科讯电子制造有限公司 Online sales system for energy products
CN117474635B (en) * 2023-12-26 2024-03-22 深圳市安科讯电子制造有限公司 Online sales system for energy products

Similar Documents

Publication Publication Date Title
US11223477B2 (en) Data sharing method, client, server, computing device, and storage medium
US8539231B1 (en) Encryption key management
US11057359B2 (en) Key encryption key rotation
US20190288858A1 (en) Management of cryptographically secure exchanges of data using permissioned distributed ledgers
CN111492634A (en) Secure and confidential custody transaction systems, methods, and apparatus using zero-knowledge protocols
CN109522363B (en) Cloud platform synchronization method, system, equipment and storage medium based on block chain
CN111108521A (en) Implementing a blockchain based workflow
US20210367756A1 (en) Methods, systems, and media for using dynamic public key infrastructure to send and receive encrypted messages
US11074353B2 (en) Blockchain universal RFID translator
US8321925B1 (en) Distributed encryption key management
CN112532646B (en) Data sharing method, system, device, equipment and storage medium
WO2022100892A1 (en) Distributed ledger system
CN112804354A (en) Method and device for data transmission across chains, computer equipment and storage medium
CN114219565A (en) Order data processing method, server, storage medium and program product
CN111325878B (en) Method, apparatus and medium for information interaction
CN111698198A (en) Secret generation and share distribution
CN115021894B (en) Data protection method, system and electronic equipment
CN114095165B (en) Key updating method, server device, client device and storage medium
EP4022872B1 (en) Distributed ledger system
CN115131029A (en) Block chain-based digital file signing method and device
CN106874793B (en) Database processing method and device
CN115208630B (en) Block chain-based data acquisition method and system and block chain system
CN114095254B (en) Message encryption method, server device, client device and storage medium
CN114430343B (en) Data synchronization method and device, electronic equipment and readable storage medium
CN115037450B (en) Data protection method and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination