CN114386853A - Data auditing processing method, device and equipment based on universal auditing model - Google Patents
Data auditing processing method, device and equipment based on universal auditing model Download PDFInfo
- Publication number
- CN114386853A CN114386853A CN202210040389.7A CN202210040389A CN114386853A CN 114386853 A CN114386853 A CN 114386853A CN 202210040389 A CN202210040389 A CN 202210040389A CN 114386853 A CN114386853 A CN 114386853A
- Authority
- CN
- China
- Prior art keywords
- data
- auditing
- field
- audit
- audited
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
- G06Q10/06311—Scheduling, planning or task assignment for a person or group
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/22—Indexing; Data structures therefor; Storage structures
- G06F16/2282—Tablespace storage structures; Management thereof
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0631—Resource planning, allocation, distributing or scheduling for enterprises or organisations
- G06Q10/06315—Needs-based resource requirements planning or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0633—Workflow analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
Landscapes
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Engineering & Computer Science (AREA)
- Strategic Management (AREA)
- Entrepreneurship & Innovation (AREA)
- Economics (AREA)
- Theoretical Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Physics & Mathematics (AREA)
- Operations Research (AREA)
- Marketing (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- General Business, Economics & Management (AREA)
- Game Theory and Decision Science (AREA)
- Educational Administration (AREA)
- Development Economics (AREA)
- Data Mining & Analysis (AREA)
- Software Systems (AREA)
- Databases & Information Systems (AREA)
- General Engineering & Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The invention relates to a big data technology, and provides a data auditing processing method, a device, equipment and a medium based on a universal auditing model, wherein the method comprises the steps of firstly obtaining to-be-audited nuclear data and an auditing bill configuration table, adding an auditing bill in the auditing bill configuration table, correspondingly generating an auditing bill code according to the auditing bill, then sequentially configuring a current auditing bill module table, a current auditing single word section table and a current auditing staff table, storing the to-be-audited nuclear data in an auditing bill detailed table corresponding to the auditing bill to update the auditing bill detailed table, and finally sending the auditing bill detailed table to a target auditing module corresponding to the current auditing bill module table. The method and the device realize the rapid configuration of the audit list detail table capable of storing the data to be audited based on the universal field table, automatically complete the configuration of the current audit list module table, the current audit single field table and the current auditor table, do not need to create the storage tables with the same structure according to the data to be audited, avoid the generation of wide tables and improve the efficiency of data storage.
Description
Technical Field
The invention relates to the technical field of data storage of big data, in particular to a data auditing processing method and device based on a general auditing model, computer equipment and a storage medium.
Background
At present, most of auditing systems are coupled with a business system of a calling party, such as material auditing, credit card approval auditing and the like, and are based on an auditing system in business logic.
The existing auditing contents are diverse, the challenge to a database storage model is large, the difference of the contents actually required to be audited and displayed by each service is large, the entity relational structure of the database is not easy to store, the phenomenon of 'wide table' is easy to cause, and the storage efficiency is low.
Disclosure of Invention
The embodiment of the invention provides a data auditing processing method and device based on a general auditing model, computer equipment and a storage medium, and aims to solve the problems that in the prior art, an existing auditing platform is coupled with a service system of a calling party, an existing database storage model of the auditing platform cannot meet the storage of various auditing data, and the storage of data in the existing database storage model is wide in storage result and low in storage efficiency due to various types of auditing data.
In a first aspect, an embodiment of the present invention provides a data auditing processing method based on a general auditing model, which includes:
responding to a data auditing instruction, acquiring to-be-audited data and an auditing bill configuration table corresponding to the data auditing instruction, adding an auditing bill in the auditing bill configuration table, and generating an auditing bill code according to the auditing bill;
acquiring field IDs of all fields in the data to be audited according to the fields in the data to be audited and a pre-stored field table, and storing the field IDs into an initial auditing single-word field table to obtain a current auditing single-word field table;
determining a target auditing module of the to-be-audited nuclear data according to the field ID of each field in the to-be-audited nuclear data and the classification type corresponding to each field ID, and storing the target auditing module corresponding to the to-be-audited data into an initial auditing module table to obtain a current auditing list module table;
obtaining reviewer information corresponding to each target review module in the current review list module table, and storing the reviewer information corresponding to each target review module into an initial reviewer table to obtain a current reviewer table;
storing the data to be audited in an audit list corresponding to the audit list according to the field ID of each field so as to update the audit list;
acquiring important fields from the examination and review list according to a preset important field extraction strategy so as to update the examination and review list; and
and sending the audit list to a receiving end corresponding to each target audit module in the current audit list.
In a second aspect, an embodiment of the present invention provides a data auditing processing apparatus based on a general auditing model, which includes:
the first configuration unit is used for responding to a data auditing instruction, acquiring to-be-audited nuclear data and an auditing bill configuration table corresponding to the data auditing instruction, adding an auditing bill in the auditing bill configuration table, and generating an auditing bill code according to the auditing bill;
the second configuration unit is used for acquiring the field ID of each field in the data to be audited according to the fields in the data to be audited and the pre-stored field table, and storing the field ID into the initial audited single word field table to obtain the current audited single word field table;
the third configuration unit is used for determining a target auditing module of the to-be-audited nuclear data according to the field ID of each field in the to-be-audited nuclear data and the classification type corresponding to each field ID, and storing the target auditing module corresponding to the to-be-audited data into the initial auditing module table to obtain a current auditing list;
the fourth configuration unit is used for acquiring the auditor information corresponding to each target audit module in the current audit list, and storing the auditor information corresponding to each target audit module into the initial auditor list to obtain the current auditor list;
the data storage unit is used for storing the data to be audited in an audit list detail table corresponding to the audit list according to the field ID of each field so as to update the audit list detail table;
the audit list updating unit is used for acquiring important fields from the audit list according to a preset important field extraction strategy so as to update the audit list; and
and the data sending unit is used for sending the audit list detail table to the receiving end corresponding to each target audit module in the current audit list module table.
In a third aspect, an embodiment of the present invention further provides a computer device, which includes a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor, when executing the computer program, implements the data auditing processing method based on the universal auditing model according to the first aspect.
In a fourth aspect, an embodiment of the present invention further provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program, and the computer program, when executed by a processor, causes the processor to execute the method for processing data audit based on a universal audit model according to the first aspect.
The embodiment of the invention provides a data auditing processing method, a device, computer equipment and a storage medium based on a universal auditing model, which comprises the steps of firstly obtaining to-be-audited nuclear data and an auditing bill configuration table, adding an auditing bill in the auditing bill configuration table, correspondingly generating an auditing bill code according to the auditing bill, then sequentially configuring a current auditing bill module table, a current auditing bill section table and a current auditing staff table, storing the to-be-audited nuclear data in an auditing bill detailed table corresponding to the auditing bill to update the auditing bill detailed table, and finally sending the auditing bill detailed table to a target auditing module corresponding to the current auditing bill module table. The method and the device realize the rapid configuration of the audit list detail table capable of storing the data to be audited based on the universal field table, automatically complete the configuration of the current audit list module table, the current audit single field table and the current auditor table, do not need to create the storage tables with the same structure according to the data to be audited, avoid the generation of wide tables and improve the efficiency of data storage.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic view of an application scenario of a data auditing processing method based on a general auditing model according to an embodiment of the present invention;
fig. 2 is a schematic flow chart of a data auditing processing method based on a general auditing model according to an embodiment of the present invention;
FIG. 3 is a schematic block diagram of a data auditing processing apparatus based on a general auditing model according to an embodiment of the present invention;
FIG. 4 is a schematic block diagram of a computer device provided by an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
It will be understood that the terms "comprises" and/or "comprising," when used in this specification and the appended claims, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
It is also to be understood that the terminology used in the description of the invention herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the invention. As used in the specification of the present invention and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise.
It should be further understood that the term "and/or" as used in this specification and the appended claims refers to and includes any and all possible combinations of one or more of the associated listed items.
Referring to fig. 1 and fig. 2, fig. 1 is a schematic view of an application scenario of a data auditing processing method based on a general auditing model according to an embodiment of the present invention; fig. 2 is a schematic flow chart of a data auditing processing method based on a general auditing model according to an embodiment of the present invention, where the data auditing processing method based on the general auditing model is applied in a server, and the method is executed by application software installed in the server.
As shown in fig. 2, the method includes steps S101 to S107.
S101, responding to a data auditing instruction, acquiring to-be-audited data and an auditing sheet configuration table corresponding to the data auditing instruction, adding an auditing sheet in the auditing sheet configuration table, and generating an auditing sheet code according to the auditing sheet.
In this embodiment, the technical solution is described with a server as an execution subject. When the uploading end uploads the data to be audited to the server for auditing, an audit list needs to be newly added in an audit list configuration table stored locally in the server, and an audit code is correspondingly allocated to the audit list. At this time, the data to be audited is not directly stored in the audit list configuration table, but the relevant information of the audit list is subjected to field query and module query based on the pre-stored field table, audit single word field table and audit list module table to obtain various configuration information, so that the configuration information of the audit list is completely supplemented.
In the server, a field table, which can be understood as a field pool, is stored in advance. The field table is set because when different uploading terminals upload audit data to the server, because the names of the field names of the audit data at the uploading terminals are not completely the same, the field table in the server is required to be used as a field pool for collecting and summarizing the various field names, and a unique field ID is assigned to each field name. Therefore, when the target field is screened based on the field table to obtain the single-word field table for auditing, the target field can be rapidly screened and accurately obtained. And the field table can play a role of a general auditing model so as to quickly generate a detailed list of the subsequent auditing bill to be audited.
In an embodiment, the adding of the audit list to the audit list configuration table in step S101 and generating the audit list code according to the audit list correspondingly includes:
and acquiring a configuration code of the audit list and the establishment time of the audit list corresponding to the data to be audited, establishing the audit list corresponding to the configuration code of the audit list and the establishment time of the audit list, and generating an audit list code.
In this embodiment, when corresponding audit list information (such as audit list name, creation time, creator, modification time, modifier, etc. information constituting audit list information) is created in an audit list configuration table of a server local according to data to be audited and an audit list code is generated, an audit list configuration code (which may be understood as an audit code automatically allocated when the audit list is created, for example, 01 represents an audit list configuration code corresponding to a first type of audit list, 02 represents an audit list configuration code corresponding to a second type of audit list, where the first type of audit list refers to an audit list corresponding to uploaded audit data on a first type of uploading terminal, and the second type of audit list refers to an audit list corresponding to uploaded audit data on a second type of uploading terminal) and an audit list creation time are obtained first, and then the audit list configuration code and the audit list creation time are combined to obtain the audit list code, and finally, establishing an audit list by taking the audit list code as key information. The audit list configuration code is a code which is automatically allocated to the audit list corresponding to the data to be audited. As can be seen, the audit list can be rapidly configured and the audit list code can be generated through the method.
S102, according to fields included in the data to be audited and a pre-stored field table, obtaining field IDs of all fields in the data to be audited, storing the field IDs into an initial audited single-word field table, and obtaining a current audited single-word field table.
In this embodiment, because the field table is a field pool, and each field in the field table is correspondingly assigned with a unique field ID, when the field included in the data to be audited is known, and after each field in the data to be audited is retrieved from the field table to obtain the corresponding field ID, all the specific field names in the data to be audited can be replaced from the field name form to the field ID form, that is, the one-to-one mapping relationship between all the specific field names in the data to be audited and the corresponding field IDs in the field table is realized. The current audit single word segment table correspondingly stores the audit list configuration code mentioned in step S101, so as to ensure that a mapping relationship is established with the audit list configuration table.
In one embodiment, the step S102 includes:
acquiring field IDs of all fields in the to-be-audited data, which correspond to the same fields in the field table, and storing the field IDs into an initial audit single-word field table to obtain a current audit single-word field table; and storing the audit list configuration code of the audit list in the current audit single word segment table.
In this embodiment, the function of configuring the current audit single-field table is to convert the field name of the data to be audited into the corresponding field ID for storage, instead of storing the field name with an actual name, so that the audit single-field table can be quickly configured based on the field table query no matter what field set the data to be audited is uploaded to the server. Instead of creating a data table with the same format in the server for storage every time one type of data to be audited is uploaded, an audit single-word field table is rapidly configured based on the field ID in the field table, so that an audit list detail table can be rapidly obtained.
S103, determining a target auditing module of the to-be-audited data according to the field ID of each field in the to-be-audited data and the classification type corresponding to each field ID, and storing the target auditing module corresponding to the to-be-audited data into an initial auditing module table to obtain a current auditing list module table.
In this embodiment, in addition to assigning a unique field ID for each field, a classification type (which may also be understood as a field classification type) to which each field belongs may be configured in advance in the field table, for example, if fields such as a user address, a user contact address, a user name, and the like are included in the data to be audited, these fields are all used to represent user information, and therefore all fields may belong to the field classification type of the user information. After the classification types to which all fields in the field data to be audited belong are determined, and the field table can be queried to obtain which classification type field is sent to which target auditing module to audit, so that after the target auditing modules corresponding to all fields of the data to be audited are determined based on the field table, the target auditing modules corresponding to the data to be audited are stored in the initial auditing module table, and the current auditing list module table is obtained. The current audit list module table correspondingly stores the audit list configuration code mentioned in step S101, so as to ensure that a mapping relationship is established with the audit list configuration table.
In an embodiment, the determining, according to the field ID of each field in the pending audit data and the classification type corresponding to each field ID, a target audit module of the pending audit data includes:
the method comprises the steps of obtaining field IDs of fields in the data to be audited, obtaining preset classification types corresponding to the field IDs in the field table, determining the classification types corresponding to the field IDs in the data to be audited according to the classification types to which the field IDs in the field table belong, and determining a target auditing module according to the classification types in the data to be audited.
In this embodiment, 3 target auditing modules corresponding to all fields of the to-be-audited data are acquired, which are a target auditing module a, a target auditing module B and a target auditing module C, at this time, a first field range, which needs to be sent to the target auditing module a for auditing, in the to-be-audited data can be acquired, a second field range, which needs to be sent to the target auditing module B for auditing, in the to-be-audited data is acquired, a third field range, which needs to be sent to the target auditing module C for auditing, in the to-be-audited data is acquired, and data information corresponding to the first field range, the second field range and the third field range is stored in the current audit list module table, so that configuration of the audit list module table is realized.
And S104, obtaining the reviewer information corresponding to each target review module in the current review list module table, and storing the reviewer information corresponding to each target review module into the initial reviewer table to obtain the current reviewer table.
In this embodiment, after the configuration of the audit list module table is completed, the auditor information corresponding to each target audit module needs to be determined, and at this time, only the auditor information corresponding to each target audit module needs to be stored in the initial auditor table to obtain the current auditor table, so that the configuration of the auditor table is realized. The current auditor table stores the audit ticket configuration code mentioned in step S101 correspondingly, so as to ensure that a mapping relationship is established with the audit ticket configuration table.
For example, with reference to the above example, the first reviewer information corresponding to the target review module a may be stored in the reviewer table, the second reviewer information corresponding to the target review module B may be stored, and the third reviewer information corresponding to the target review module C may be stored, and information about which specific reviewers to which data of the target review modules in the data to be reviewed are specifically allocated may be obtained through querying based on the reviewer table.
And S105, storing the data to be audited in an audit list detail table corresponding to the audit list according to the field ID of each field so as to update the audit list detail table.
In this embodiment, after the configuration of the various tables is completed, the specific data of the to-be-audited data needs to be stored in the audit list detail table. Because the data such as pictures may exist in the to-be-audited data, if the to-be-audited data is directly filled into the audit list detail table, normal filling cannot be performed, because only data in a text form can be stored in the audit list detail table, in order to realize normal filling of the data in the audit list detail table, it is necessary to first judge whether picture data exists in the to-be-audited data, and if the picture data exists, the picture data is refilled into the audit list detail table after the text data is identified.
And because the actual field names of the to-be-audited data in each field are correspondingly converted into the field IDs, when the initial audit list is created, the field IDs corresponding to the fields in the to-be-audited data respectively are used as the field names in the initial audit list, and the actual field names are not required to be used as the field names in the initial audit list. The audit list configuration code mentioned in step S101 is stored in the audit list detail table, so as to ensure that a mapping relationship is established with the audit list configuration table.
In one embodiment, step S105 includes:
and if the field value corresponding to the field ID in the to-be-audited data is determined to be the picture data, identifying and acquiring the text data corresponding to the picture data through an OCR (optical character recognition) model so as to update the to-be-audited data.
In this embodiment, image Character Recognition is realized by an OCR (Optical Character Recognition) Recognition technology and a general Character Recognition technology, and after characters are recognized, a part of automatic auditing functions can be completed by combining some automatic configuration functions.
And S106, acquiring important fields from the examination and review list according to a preset important field extraction strategy so as to update the examination and review list.
In this embodiment, the important field extraction policy may also be that identification is completed in the field table in advance, some important fields in the field table may be attributed to important field types, and generally, field IDs in the audit list detail table belong to important field type categories, and these target field IDs may be screened out, so as to obtain an audit list simplified with respect to the audit list detail table, and view the audit list, that is, preview the audit list detail table. The updated audit list also stores the audit list configuration code mentioned in step S101 correspondingly, so as to ensure that a mapping relationship is established with the audit list configuration table.
And S107, sending the audit list to a receiving end corresponding to each target audit module in the current audit list module table.
In this embodiment, after the audit list detail table of the specific data to be audited is loaded, the currently configured audit list module table may be obtained first, and the target audit module included in the currently configured audit list module table may be obtained, and then the audit list detail table may be sent to the receiving end corresponding to each target audit module for auditing. Therefore, the audit list is pertinently distributed to different target audit modules for separate audit, and the audit does not need to be centralized at one position for audit, so that the efficiency of data audit is improved.
In an embodiment, step S107 is preceded by:
and if the sensitive data corresponding to the sensitive fields exist in the audit list, encrypting each sensitive data to update the audit list.
In this embodiment, in order to improve data security, when the audit list is distributed to each target module for auditing, it is further necessary to detect whether there is sensitive data therein. The sensitive fields corresponding to general sensitive data can be marked out through notes in advance, so that once the specific positions of the notes are identified and positioned, the fields with the nearest intervals can be positioned to be the sensitive fields, and the data security can be improved by encrypting the sensitive fields.
In one embodiment, step S107 includes:
and acquiring a pre-stored SM4 encryption model, encrypting each sensitive data based on the SM4 encryption model to obtain encrypted sensitive data, and replacing the corresponding encrypted data by the encrypted sensitive data to update the detailed statement of the audit list.
In this embodiment, the sensitive data corresponding to the sensitive field may be encrypted by using a national cryptographic algorithm SM4, where the national cryptographic algorithm SM4 (i.e., a national cryptographic SM4 encryption model) is a 32-round iterative unbalanced Feistel-structured block encryption algorithm, and both the key length and the block length are 128 bits. And after the encryption of the sensitive data corresponding to the sensitive fields in the audit list is completed, obtaining the audit list with higher security.
The embodiment of the application can acquire and process data in the related server based on the artificial intelligence technology. Among them, Artificial Intelligence (AI) is a theory, method, technique and application system that simulates, extends and expands human Intelligence using a digital computer or a machine controlled by a digital computer, senses the environment, acquires knowledge and uses the knowledge to obtain the best result.
The artificial intelligence infrastructure generally includes technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a robot technology, a biological recognition technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and the like.
The method realizes the rapid configuration of the audit list detail table capable of storing the data to be audited based on the universal field table, and automatically completes the configuration of the current audit list module table, the current audit single field table and the current auditor table, without creating a storage table with the same structure according to the data to be audited, thereby avoiding the generation of a wide table and improving the efficiency of data storage.
The embodiment of the invention also provides a data auditing processing device based on the universal auditing model, which is used for executing any embodiment of the data auditing processing method based on the universal auditing model. Specifically, referring to fig. 3, fig. 3 is a schematic block diagram of a data auditing processing device 100 based on a universal auditing model according to an embodiment of the present invention.
As shown in fig. 3, the data audit processing apparatus 100 based on the universal audit model includes a first configuration unit 101, a second configuration unit 102, a third configuration unit 103, a fourth configuration unit 104, a data storage unit 105, an audit ticket update unit 106, and a data transmission unit 107.
The first configuration unit 101 is configured to, in response to a data audit instruction, obtain audit data and an audit list configuration table corresponding to the data audit instruction, add an audit list to the audit list configuration table, and generate an audit list code according to the audit list.
In this embodiment, the technical solution is described with a server as an execution subject. When the uploading end uploads the data to be audited to the server for auditing, an audit list needs to be newly added in an audit list configuration table stored locally in the server, and an audit code is correspondingly allocated to the audit list. At this time, the data to be audited is not directly stored in the audit list configuration table, but the relevant information of the audit list is subjected to field query and module query based on the pre-stored field table, audit single word field table and audit list module table to obtain various configuration information, so that the configuration information of the audit list is completely supplemented.
In the server, a field table, which can be understood as a field pool, is stored in advance. The field table is set because when different uploading terminals upload audit data to the server, because the names of the field names of the audit data at the uploading terminals are not completely the same, the field table in the server is required to be used as a field pool for collecting and summarizing the various field names, and a unique field ID is assigned to each field name. Therefore, when the target field is screened based on the field table to obtain the single-word field table for auditing, the target field can be rapidly screened and accurately obtained. And the field table can play a role of a general auditing model so as to quickly generate a detailed list of the subsequent auditing bill to be audited.
In an embodiment, the first configuration unit 101 is specifically configured to:
and acquiring a configuration code of the audit list and the establishment time of the audit list corresponding to the data to be audited, establishing the audit list corresponding to the configuration code of the audit list and the establishment time of the audit list, and generating an audit list code.
In this embodiment, when corresponding audit list information (such as audit list name, creation time, creator, modification time, modifier, etc. information constituting audit list information) is created in an audit list configuration table of a server local according to data to be audited and an audit list code is generated, an audit list configuration code (which may be understood as an audit code automatically allocated when the audit list is created, for example, 01 represents an audit list configuration code corresponding to a first type of audit list, 02 represents an audit list configuration code corresponding to a second type of audit list, where the first type of audit list refers to an audit list corresponding to uploaded audit data on a first type of uploading terminal, and the second type of audit list refers to an audit list corresponding to uploaded audit data on a second type of uploading terminal) and an audit list creation time are obtained first, and then the audit list configuration code and the audit list creation time are combined to obtain the audit list code, and finally, establishing an audit list by taking the audit list code as key information. The audit list configuration code is a code which is automatically allocated to the audit list corresponding to the data to be audited. As can be seen, the audit list can be rapidly configured and the audit list code can be generated through the method.
And the second configuration unit 102 is configured to obtain, according to fields included in the to-be-audited data and a pre-stored field table, field IDs of the fields in the to-be-audited data, store the field IDs in the initial audit single word field table, and obtain a current audit single word field table.
In this embodiment, because the field table is a field pool, and each field in the field table is correspondingly assigned with a unique field ID, when the field included in the data to be audited is known, and after each field in the data to be audited is retrieved from the field table to obtain the corresponding field ID, all the specific field names in the data to be audited can be replaced from the field name form to the field ID form, that is, the one-to-one mapping relationship between all the specific field names in the data to be audited and the corresponding field IDs in the field table is realized. The current audit single word segment table is stored with the audit ticket configuration code mentioned in the first configuration unit 101, so as to ensure that a mapping relationship is established with the audit ticket configuration table.
In an embodiment, the second configuration unit 102 is specifically configured to:
acquiring field IDs of all fields in the to-be-audited data, which correspond to the same fields in the field table, and storing the field IDs into an initial audit single-word field table to obtain a current audit single-word field table; and storing the audit list configuration code of the audit list in the current audit single word segment table.
In this embodiment, the function of configuring the current audit single-field table is to convert the field name of the data to be audited into the corresponding field ID for storage, instead of storing the field name with an actual name, so that the audit single-field table can be quickly configured based on the field table query no matter what field set the data to be audited is uploaded to the server. Instead of creating a data table with the same format in the server for storage every time one type of data to be audited is uploaded, an audit single-word field table is rapidly configured based on the field ID in the field table, so that an audit list detail table can be rapidly obtained.
A third configuration unit 103, configured to determine a target review module of the to-be-reviewed nuclear data according to the field ID of each field in the to-be-reviewed nuclear data and the classification type corresponding to each field ID, and store the target review module corresponding to the to-be-reviewed nuclear data in the initial review module table to obtain a current review list module table.
In this embodiment, in addition to assigning a unique field ID for each field, a classification type (which may also be understood as a field classification type) to which each field belongs may be configured in advance in the field table, for example, if fields such as a user address, a user contact address, a user name, and the like are included in the data to be audited, these fields are all used to represent user information, and therefore all fields may belong to the field classification type of the user information. After the classification types to which all fields in the field data to be audited belong are determined, and the field table can be queried to obtain which classification type field is sent to which target auditing module to audit, so that after the target auditing modules corresponding to all fields of the data to be audited are determined based on the field table, the target auditing modules corresponding to the data to be audited are stored in the initial auditing module table, and the current auditing list module table is obtained. The current audit list module table is stored with the audit list configuration code mentioned in the first configuration unit 101, so as to ensure that a mapping relationship is established with the audit list configuration table.
In an embodiment, the third configuration unit 103 is specifically configured to:
the method comprises the steps of obtaining field IDs of fields in the data to be audited, obtaining preset classification types corresponding to the field IDs in the field table, determining the classification types corresponding to the field IDs in the data to be audited according to the classification types to which the field IDs in the field table belong, and determining a target auditing module according to the classification types in the data to be audited.
In this embodiment, 3 target auditing modules corresponding to all fields of the to-be-audited data are acquired, which are a target auditing module a, a target auditing module B and a target auditing module C, at this time, a first field range, which needs to be sent to the target auditing module a for auditing, in the to-be-audited data can be acquired, a second field range, which needs to be sent to the target auditing module B for auditing, in the to-be-audited data is acquired, a third field range, which needs to be sent to the target auditing module C for auditing, in the to-be-audited data is acquired, and data information corresponding to the first field range, the second field range and the third field range is stored in the current audit list module table, so that configuration of the audit list module table is realized.
A fourth configuration unit 104, configured to obtain reviewer information corresponding to each target review module in the current review list module table, and store the reviewer information corresponding to each target review module in the initial reviewer table to obtain the current reviewer table.
In this embodiment, after the configuration of the audit list module table is completed, the auditor information corresponding to each target audit module needs to be determined, and at this time, only the auditor information corresponding to each target audit module needs to be stored in the initial auditor table to obtain the current auditor table, so that the configuration of the auditor table is realized. The current auditor table stores corresponding audit ticket configuration codes mentioned in the first configuration unit 101, so as to ensure that a mapping relationship is established with the audit ticket configuration table.
For example, with reference to the above example, the first reviewer information corresponding to the target review module a may be stored in the reviewer table, the second reviewer information corresponding to the target review module B may be stored, and the third reviewer information corresponding to the target review module C may be stored, and information about which specific reviewers to which data of the target review modules in the data to be reviewed are specifically allocated may be obtained through querying based on the reviewer table.
And the data storage unit 105 is configured to store the data to be audited in an audit list detail table corresponding to the audit list according to the field ID of each field, so as to update the audit list detail table.
In this embodiment, after the configuration of the various tables is completed, the specific data of the to-be-audited data needs to be stored in the audit list detail table. Because the data such as pictures may exist in the to-be-audited data, if the to-be-audited data is directly filled into the audit list detail table, normal filling cannot be performed, because only data in a text form can be stored in the audit list detail table, in order to realize normal filling of the data in the audit list detail table, it is necessary to first judge whether picture data exists in the to-be-audited data, and if the picture data exists, the picture data is refilled into the audit list detail table after the text data is identified.
And because the actual field names of the to-be-audited data in each field are correspondingly converted into the field IDs, when the initial audit list is created, the field IDs corresponding to the fields in the to-be-audited data respectively are used as the field names in the initial audit list, and the actual field names are not required to be used as the field names in the initial audit list. The audit list detail table is stored with the audit list configuration code mentioned in the first configuration unit 101, so as to ensure that a mapping relationship is established with the audit list configuration table.
In one embodiment, the data store 105 is specifically configured to:
and if the field value corresponding to the field ID in the to-be-audited data is determined to be the picture data, identifying and acquiring the text data corresponding to the picture data through an OCR (optical character recognition) model so as to update the to-be-audited data.
In this embodiment, image Character Recognition is realized by an OCR (Optical Character Recognition) Recognition technology and a general Character Recognition technology, and after characters are recognized, a part of automatic auditing functions can be completed by combining some automatic configuration functions.
And the audit list updating unit 106 is configured to obtain the important field from the audit list according to a preset important field extraction policy, so as to update the audit list.
In this embodiment, the important field extraction policy may also be that identification is completed in the field table in advance, some important fields in the field table may be attributed to important field types, and generally, field IDs in the audit list detail table belong to important field type categories, and these target field IDs may be screened out, so as to obtain an audit list simplified with respect to the audit list detail table, and view the audit list, that is, preview the audit list detail table. The updated audit list also stores the audit list configuration code mentioned in the first configuration unit 101 correspondingly, so as to ensure that a mapping relationship is established with the audit list configuration table.
A data sending unit 107, configured to send the audit list detail table to the receiving end corresponding to each target audit module in the current audit list module table.
In this embodiment, after the audit list detail table of the specific data to be audited is loaded, the currently configured audit list module table may be obtained first, and the target audit module included in the currently configured audit list module table may be obtained, and then the audit list detail table may be sent to the receiving end corresponding to each target audit module for auditing. Therefore, the audit list is pertinently distributed to different target audit modules for separate audit, and the audit does not need to be centralized at one position for audit, so that the efficiency of data audit is improved.
In one embodiment, the data audit processing apparatus 100 based on the universal audit model further includes:
and the sensitive data encryption unit is used for encrypting each sensitive data to update the audit list if the sensitive data corresponding to the sensitive field exists in the audit list.
In this embodiment, in order to improve data security, when the audit list is distributed to each target module for auditing, it is further necessary to detect whether there is sensitive data therein. The sensitive fields corresponding to general sensitive data can be marked out through notes in advance, so that once the specific positions of the notes are identified and positioned, the fields with the nearest intervals can be positioned to be the sensitive fields, and the data security can be improved by encrypting the sensitive fields.
In an embodiment, the sensitive data encryption unit is specifically configured to:
and acquiring a pre-stored SM4 encryption model, encrypting each sensitive data based on the SM4 encryption model to obtain encrypted sensitive data, and replacing the corresponding encrypted data by the encrypted sensitive data to update the detailed statement of the audit list.
In this embodiment, the sensitive data corresponding to the sensitive field may be encrypted by using a national cryptographic algorithm SM4, where the national cryptographic algorithm SM4 (i.e., a national cryptographic SM4 encryption model) is a 32-round iterative unbalanced Feistel-structured block encryption algorithm, and both the key length and the block length are 128 bits. And after the encryption of the sensitive data corresponding to the sensitive fields in the audit list is completed, obtaining the audit list with higher security.
The device realizes the rapid configuration of the audit list detail table capable of storing the data to be audited based on the universal field table, and automatically completes the configuration of the current audit list module table, the current audit single field table and the current auditor table, without establishing the storage tables with the same structure according to the data to be audited, thereby avoiding the generation of wide tables and improving the efficiency of data storage.
The above-mentioned data audit processing apparatus based on the general audit model may be implemented in the form of a computer program, which may be run on a computer device as shown in fig. 4.
Referring to fig. 4, fig. 4 is a schematic block diagram of a computer device according to an embodiment of the present invention. The computer device 500 may be a server or a server cluster. The server may be an independent server, or may be a cloud server that provides basic cloud computing services such as a cloud service, a cloud database, cloud computing, a cloud function, cloud storage, a Network service, cloud communication, a middleware service, a domain name service, a security service, a Content Delivery Network (CDN), and a big data and artificial intelligence platform.
Referring to fig. 4, the computer apparatus 500 includes a processor 502, a memory, which may include a storage medium 503 and an internal memory 504, and a network interface 505 connected by a device bus 501.
The storage medium 503 may store an operating device 5031 and a computer program 5032. The computer programs 5032, when executed, cause the processor 502 to perform a general audit model based data audit processing method.
The processor 502 is used to provide computing and control capabilities that support the operation of the overall computer device 500.
The internal memory 504 provides an environment for running the computer program 5032 in the storage medium 503, and when the computer program 5032 is executed by the processor 502, the processor 502 can execute a data auditing processing method based on a universal auditing model.
The network interface 505 is used for network communication, such as providing transmission of data information. Those skilled in the art will appreciate that the configuration shown in fig. 4 is a block diagram of only a portion of the configuration associated with aspects of the present invention and is not intended to limit the computing device 500 to which aspects of the present invention may be applied, and that a particular computing device 500 may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
The processor 502 is configured to run the computer program 5032 stored in the memory to implement the data auditing processing method based on the universal auditing model disclosed in the embodiment of the present invention.
Those skilled in the art will appreciate that the embodiment of a computer device illustrated in fig. 4 does not constitute a limitation on the specific construction of the computer device, and that in other embodiments a computer device may include more or fewer components than those illustrated, or some components may be combined, or a different arrangement of components. For example, in some embodiments, the computer device may only include a memory and a processor, and in such embodiments, the structures and functions of the memory and the processor are consistent with those of the embodiment shown in fig. 4, and are not described herein again.
It should be understood that, in the embodiment of the present invention, the Processor 502 may be a Central Processing Unit (CPU), and the Processor 502 may also be other general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete gate or transistor logic devices, discrete hardware components, etc. Wherein a general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
In another embodiment of the invention, a computer-readable storage medium is provided. The computer-readable storage medium may be a nonvolatile computer-readable storage medium or a volatile computer-readable storage medium. The computer readable storage medium stores a computer program, wherein the computer program, when executed by the processor, implements the data auditing processing method based on the universal auditing model disclosed by the embodiments of the present invention.
It is clear to those skilled in the art that, for convenience and brevity of description, the specific working processes of the above-described apparatuses, devices and units may refer to the corresponding processes in the foregoing method embodiments, and are not described herein again. Those of ordinary skill in the art will appreciate that the elements and algorithm steps of the examples described in connection with the embodiments disclosed herein may be embodied in electronic hardware, computer software, or combinations of both, and that the components and steps of the examples have been described in a functional general in the foregoing description for the purpose of illustrating clearly the interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present invention.
In the embodiments provided by the present invention, it should be understood that the disclosed apparatus, device and method can be implemented in other ways. For example, the above-described device embodiments are merely illustrative, and for example, the division of the units is only a logical division, and there may be other divisions when the actual implementation is performed, or units having the same function may be grouped into one unit, for example, a plurality of units or components may be combined or may be integrated into another device, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may also be an electric, mechanical or other form of connection.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment of the present invention.
In addition, functional units in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a storage medium. Based on such understanding, the technical solution of the present invention essentially or partially contributes to the prior art, or all or part of the technical solution can be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a background server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present invention. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a magnetic disk, or an optical disk.
While the invention has been described with reference to specific embodiments, the invention is not limited thereto, and various equivalent modifications and substitutions can be easily made by those skilled in the art within the technical scope of the invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. A data auditing processing method based on a general auditing model is characterized by comprising the following steps:
responding to a data auditing instruction, acquiring to-be-audited data and an auditing bill configuration table corresponding to the data auditing instruction, adding an auditing bill in the auditing bill configuration table, and generating an auditing bill code according to the auditing bill;
acquiring field IDs of all fields in the data to be audited according to the fields in the data to be audited and a pre-stored field table, and storing the field IDs into an initial auditing single-word field table to obtain a current auditing single-word field table;
determining a target auditing module of the to-be-audited nuclear data according to the field ID of each field in the to-be-audited nuclear data and the classification type corresponding to each field ID, and storing the target auditing module corresponding to the to-be-audited data into an initial auditing module table to obtain a current auditing list module table;
obtaining reviewer information corresponding to each target review module in the current review list module table, and storing the reviewer information corresponding to each target review module into an initial reviewer table to obtain a current reviewer table;
storing the data to be audited in an audit list corresponding to the audit list according to the field ID of each field so as to update the audit list;
acquiring important fields from the examination and review list according to a preset important field extraction strategy so as to update the examination and review list; and
and sending the audit list to a receiving end corresponding to each target audit module in the current audit list.
2. The data auditing processing method based on general auditing model according to claim 1, where adding an audit ticket to the audit ticket configuration table and generating an audit ticket code according to the audit ticket correspondence includes:
and acquiring a configuration code of the audit list and the establishment time of the audit list corresponding to the data to be audited, establishing the audit list corresponding to the configuration code of the audit list and the establishment time of the audit list, and generating an audit list code.
3. The data auditing processing method based on a generic auditing model according to claim 1 where obtaining the field IDs of each field in the data to be audited and saving them in the initial audit single word field table to obtain the current audit single word field table includes:
acquiring field IDs of all fields in the to-be-audited data, which correspond to the same fields in the field table, and storing the field IDs into an initial audit single-word field table to obtain a current audit single-word field table; and storing the audit list configuration code of the audit list in the current audit single word segment table.
4. The data auditing processing method based on a generic auditing model according to claim 1, where determining the target auditing module of the data to be audited according to the field IDs of each field in the data to be audited and the classification type corresponding to each field ID includes:
the method comprises the steps of obtaining field IDs of fields in the data to be audited, obtaining preset classification types corresponding to the field IDs in the field table, determining the classification types corresponding to the field IDs in the data to be audited according to the classification types to which the field IDs in the field table belong, and determining a target auditing module according to the classification types in the data to be audited.
5. The data auditing processing method based on general auditing model according to claim 1, where storing the data to be audited in an audit list detail table corresponding to the audit list according to the field ID of each field to update the audit list detail table includes:
and if the field value corresponding to the field ID in the to-be-audited data is determined to be the picture data, identifying and acquiring the text data corresponding to the picture data through an OCR (optical character recognition) model so as to update the to-be-audited data.
6. The data auditing processing method based on general auditing models according to claim 1, before sending the audit list detail table to the receiving end corresponding to each target audit module in the current audit list module table, further comprising:
and if the sensitive data corresponding to the sensitive fields exist in the audit list, encrypting each sensitive data to update the audit list.
7. The data auditing processing method based on general auditing model according to claim 6, where encrypting each sensitive data to update an audit list detail includes:
and acquiring a pre-stored SM4 encryption model, encrypting each sensitive data based on the SM4 encryption model to obtain encrypted sensitive data, and replacing the corresponding encrypted data by the encrypted sensitive data to update the detailed statement of the audit list.
8. A data auditing processing device based on a universal auditing model is characterized by comprising:
the first configuration unit is used for responding to a data auditing instruction, acquiring to-be-audited nuclear data and an auditing bill configuration table corresponding to the data auditing instruction, adding an auditing bill in the auditing bill configuration table, and generating an auditing bill code according to the auditing bill;
the second configuration unit is used for acquiring the field ID of each field in the data to be audited according to the fields in the data to be audited and the pre-stored field table, and storing the field ID into the initial audited single word field table to obtain the current audited single word field table;
the third configuration unit is used for determining a target auditing module of the to-be-audited nuclear data according to the field ID of each field in the to-be-audited nuclear data and the classification type corresponding to each field ID, and storing the target auditing module corresponding to the to-be-audited data into the initial auditing module table to obtain a current auditing list;
the fourth configuration unit is used for acquiring the auditor information corresponding to each target audit module in the current audit list, and storing the auditor information corresponding to each target audit module into the initial auditor list to obtain the current auditor list;
the data storage unit is used for storing the data to be audited in an audit list detail table corresponding to the audit list according to the field ID of each field so as to update the audit list detail table;
the audit list updating unit is used for acquiring important fields from the audit list according to a preset important field extraction strategy so as to update the audit list; and
and the data sending unit is used for sending the audit list detail table to the receiving end corresponding to each target audit module in the current audit list module table.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method for processing data audit based on a generic audit model according to any one of claims 1 to 7 when executing the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium stores a computer program which, when executed by a processor, causes the processor to execute the universal audit model based data audit processing method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210040389.7A CN114386853A (en) | 2022-01-14 | 2022-01-14 | Data auditing processing method, device and equipment based on universal auditing model |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210040389.7A CN114386853A (en) | 2022-01-14 | 2022-01-14 | Data auditing processing method, device and equipment based on universal auditing model |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114386853A true CN114386853A (en) | 2022-04-22 |
Family
ID=81201250
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210040389.7A Pending CN114386853A (en) | 2022-01-14 | 2022-01-14 | Data auditing processing method, device and equipment based on universal auditing model |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114386853A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115423929A (en) * | 2022-07-27 | 2022-12-02 | 华建数创(上海)科技有限公司 | BIM model equipment code auditing method based on intelligent building operation system |
CN116522030A (en) * | 2023-04-28 | 2023-08-01 | 上海任意门科技有限公司 | Information processing method, apparatus and storage medium |
-
2022
- 2022-01-14 CN CN202210040389.7A patent/CN114386853A/en active Pending
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115423929A (en) * | 2022-07-27 | 2022-12-02 | 华建数创(上海)科技有限公司 | BIM model equipment code auditing method based on intelligent building operation system |
CN115423929B (en) * | 2022-07-27 | 2023-11-17 | 华建数创(上海)科技有限公司 | BIM model equipment coding auditing method based on intelligent building operation system |
CN116522030A (en) * | 2023-04-28 | 2023-08-01 | 上海任意门科技有限公司 | Information processing method, apparatus and storage medium |
CN116522030B (en) * | 2023-04-28 | 2024-05-24 | 上海任意门科技有限公司 | Information processing method, apparatus and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106371825B (en) | A kind of mobile terminal application interface list dynamic creation method and device | |
US11163906B2 (en) | Adaptive redaction and data releasability systems using dynamic parameters and user defined rule sets | |
CN110659206B (en) | Simulation architecture establishment method and device based on micro-service, medium and electronic equipment | |
CN110738038A (en) | Contract text generation method, device, equipment and computer readable storage medium | |
CN114386853A (en) | Data auditing processing method, device and equipment based on universal auditing model | |
CN110472109B (en) | Dynamic data quality analysis method and platform system | |
CN113626223A (en) | Interface calling method and device | |
CN112308727A (en) | Insurance claim settlement service processing method and device | |
CN114185895A (en) | Data import and export method and device, electronic equipment and storage medium | |
CN111090976A (en) | Method and device for generating inspection document based on dynamic data | |
CN113268232B (en) | Page skin generation method and device and computer readable storage medium | |
CN115484560B (en) | Intelligent short message processing method and device, electronic equipment and storage medium | |
CN117909335A (en) | Data center resource management method and system | |
CN117149631A (en) | Parameter verification method, device, equipment and medium | |
CN115033605A (en) | Data query method and device, electronic equipment and storage medium | |
CN111639478B (en) | Automatic data auditing method and system based on EXCEL document | |
KR101697061B1 (en) | Cloud-based creative work registration system | |
CN115544566A (en) | Log desensitization method, device, equipment and storage medium | |
CN114387429A (en) | Vehicle property right processing method, device, equipment and medium based on RPA and AI | |
CN114911479A (en) | Interface generation method, device, equipment and storage medium based on configuration | |
CN115204870A (en) | Block chain application management method and device, computer equipment and storage medium | |
CN113010129A (en) | Virtual studio full-flow multi-terminal blackboard writing extraction method and device | |
CN114595153A (en) | Video generation method, device, equipment and storage medium based on automatic test | |
CN117008950A (en) | Application interaction service processing method and related equipment | |
CN115526731A (en) | Task batch processing method and device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |