CN114648398A - Voucher generation method and device, computer equipment and storage medium - Google Patents

Voucher generation method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN114648398A
CN114648398A CN202210299532.4A CN202210299532A CN114648398A CN 114648398 A CN114648398 A CN 114648398A CN 202210299532 A CN202210299532 A CN 202210299532A CN 114648398 A CN114648398 A CN 114648398A
Authority
CN
China
Prior art keywords
document
attachment
key
field data
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210299532.4A
Other languages
Chinese (zh)
Inventor
章华锋
王黎
陈娇智
王晓娟
李瑞华
梁先飞
廖桂涛
黄从敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Kingdee Deeking Cloud Computing Co ltd
Original Assignee
Kingdee Deeking Cloud Computing Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Kingdee Deeking Cloud Computing Co ltd filed Critical Kingdee Deeking Cloud Computing Co ltd
Priority to CN202210299532.4A priority Critical patent/CN114648398A/en
Publication of CN114648398A publication Critical patent/CN114648398A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/12Accounting
    • G06Q40/125Finance or payroll
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/14Details of searching files based on file metadata
    • G06F16/148File search processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • G06F40/186Templates

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Development Economics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • Computational Linguistics (AREA)
  • General Health & Medical Sciences (AREA)
  • Databases & Information Systems (AREA)
  • Artificial Intelligence (AREA)
  • Library & Information Science (AREA)
  • Health & Medical Sciences (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application relates to a credential generation method, apparatus, computer device, storage medium and computer program product, which may be applied to a financial system or other systems. The method comprises the following steps: in response to a credential generation instruction, obtaining a credential template comprising at least two first key-value pairs; the first key-value pair takes a first field identifier as a key and takes first field data as a value; for each first key value pair in the voucher template, searching second field data matched with the first field data in bill model data corresponding to a target bill, and forming a second key value pair by taking the second field data as a value and the first field identifier as a key; generating a credential based on the second key-value pair. By adopting the method, the efficiency of generating the voucher can be improved.

Description

Voucher generation method and device, computer equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a credential generation method, apparatus, computer device, storage medium, and computer program product.
Background
In the financial system, the accounting document is a written certificate for recording the occurrence or completion of the economic business, and is an important basis for registering an account book, and with the wide use of the financial system, how to generate the accounting document in the financial system becomes an important issue. In the traditional technology, document data are manually input, and an accounting voucher is generated according to the input document data, but the efficiency of manually inputting the document data is low and the efficiency of generating the voucher is low in the traditional technology.
Disclosure of Invention
In view of the above, it is necessary to provide a credential generation method, apparatus, computer device, computer readable storage medium and computer program product capable of improving generation efficiency.
In a first aspect, the present application provides a credential generation method. The method comprises the following steps:
in response to a credential generation instruction, obtaining a credential template comprising at least two first key-value pairs; the first key-value pair takes a first field identifier as a key and takes first field data as a value;
for each first key value pair in the voucher template, searching second field data matched with the first field data in document model data, and forming a second key value pair by taking the second field data as a value and the first field identifier as a key;
generating a credential based on the second key-value pair.
In a second aspect, the present application further provides a credential generating device. The device comprises:
the acquisition module is used for responding to the certificate generation instruction and acquiring a certificate template comprising at least two first key value pairs; the first key-value pair takes a first field identifier as a key and takes first field data as a value;
the searching module is used for searching second field data matched with the first field data in the document model data aiming at each first key value pair in the voucher template, and forming a second key value pair by taking the second field data as a value and the first field identifier as a key;
a generating module for generating a credential based on the second key-value pair.
In a third aspect, the present application also provides a computer device. The computer device comprises a memory storing a computer program and a processor implementing the following steps when executing the computer program:
in response to a credential generation instruction, obtaining a credential template comprising at least two first key-value pairs; the first key value pair takes a first field identifier as a key and takes first field data as a value;
for each first key value pair in the voucher template, searching second field data matched with the first field data in document model data, and forming a second key value pair by taking the second field data as a value and the first field identifier as a key;
generating a credential based on the second key-value pair.
In a fourth aspect, the present application further provides a computer-readable storage medium. The computer-readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of:
in response to a credential generation instruction, obtaining a credential template comprising at least two first key-value pairs; the first key-value pair takes a first field identifier as a key and takes first field data as a value;
for each first key value pair in the voucher template, searching second field data matched with the first field data in document model data, and forming a second key value pair by taking the second field data as a value and the first field identifier as a key;
generating a credential based on the second key-value pair.
In a fifth aspect, the present application further provides a computer program product. The computer program product comprising a computer program which when executed by a processor performs the steps of:
in response to a credential generation instruction, obtaining a credential template comprising at least two first key-value pairs; the first key-value pair takes a first field identifier as a key and takes first field data as a value;
for each first key value pair in the voucher template, searching second field data matched with the first field data in document model data, and forming a second key value pair by taking the second field data as a value and the first field identifier as a key;
generating a credential based on the second key-value pair.
The credential generation method, the credential generation device, the computer device, the storage medium and the computer program product respond to a credential generation instruction to acquire a credential template including at least two first key-value pairs, wherein the first key-value pairs take a first field identifier as a key and first field data as a value. And searching second field data matched with the first field data in the bill model data corresponding to the target bill aiming at each first key value pair in the bill template, so that the second field data required for generating the bill can be searched in the bill model data corresponding to the target bill according to the bill template. And then, forming a second key-value pair by taking the second field data as a value and the first field identifier as a key, and generating the certificate based on the second key-value pair. Therefore, data of the target document can be automatically input according to the document template to generate the document, and the document generating efficiency is improved.
Drawings
FIG. 1 is a diagram of an application environment for a credential generation method in one embodiment;
FIG. 2 is a flowchart illustrating a credential generation method in one embodiment;
FIG. 3 is a diagram of a credential template in one embodiment;
FIG. 4 is a schematic illustration of a target document in one embodiment;
FIG. 5 is a flow diagram illustrating a method for downloading an attachment in one embodiment;
FIG. 6 is a schematic diagram of a document attachment list in one embodiment;
FIG. 7 is a diagram of uploading a document attachment, under an embodiment;
FIG. 8 is a schematic diagram of a credential generation method in one embodiment;
FIG. 9 is a diagram illustrating the acquisition of a document from a business system and the generation of credentials from the document, under an embodiment;
FIG. 10 is a schematic illustration of a document attachment processing sub-flow in one embodiment;
FIG. 11 is a flowchart illustrating a credential generation method in another embodiment;
FIG. 12 is a block diagram showing the construction of a credential generation means in one embodiment;
FIG. 13 is a block diagram showing the construction of a credential generating device in another embodiment;
FIG. 14 is a diagram showing an internal structure of a computer device in one embodiment;
fig. 15 is an internal structural view of a computer device in another embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The credential generation method provided by the embodiment of the application can be applied to the application environment shown in fig. 1. Wherein the data storage system may store data that the computer device 102 needs to process. The data storage system may be integrated on the computer device 102, or may be placed on the cloud or other network server. In response to the credential generation instruction, the computer device 102 obtains a credential template comprising at least two first key-value pairs, the first key-value pairs having a first field identification as a key and a first field data as a value. And aiming at each first key value pair in the voucher template, searching second field data matched with the first field data in the bill model data corresponding to the target bill, taking the second field data as a value, taking the first field identifier as a key to form a second key value pair, and generating the voucher based on the second key value pair. The computer device 102 may be a terminal or a server, the terminal may be but is not limited to various personal computers, notebook computers, smart phones, tablet computers, internet of things devices and portable wearable devices, and the internet of things devices may be smart speakers, smart televisions, smart air conditioners, smart car-mounted devices, and the like. The portable wearable device can be a smart watch, a smart bracelet, a head-mounted device, and the like. The server may be implemented as a stand-alone server or as a server cluster comprised of multiple servers.
In one embodiment, as shown in fig. 2, a credential generation method is provided, which is described by taking the method as an example applied to the computer device in fig. 1, and includes the following steps:
s202, in response to a certificate generation instruction, acquiring a certificate template comprising at least two first key value pairs; the first key-value pair takes the first field identification as a key and the first field data as a value.
The credential generation instruction is an instruction for instructing the computer device to generate a credential, and may be an instruction triggered by clicking, sliding, dragging, or other operations. The credential template is a template used as a basis for generating a credential, includes at least two first key-value pairs, and may be in a JSON (JavaScript Object Notation) data format. The first key-value pair takes the first field identification as a key and the first field data as a value. For example, as shown in FIG. 3, the credential template includes a plurality of first key-value pairs, e.g., "date" and "billdate", to form a first key-value pair, keyed by the first field identification "date" and valued by the first field data "billdate".
S204, aiming at each first key value pair in the voucher template, searching second field data matched with the first field data in the bill model data corresponding to the target bill, and forming a second key value pair by taking the second field data as a value and the first field identifier as a key.
The document is a written certificate for recording economic business conditions, and comprises an invoice, a shipping bill, a packing bill or a place of origin certificate and the like. The document model data is data for describing a document, and includes identifiers of fields in the document and data in the fields, and may be data in a JSON format, or may also be data in other data formats. For example, as shown in fig. 4, the target document is an invoice, the invoice includes an invoice code, an invoicing date, an item name, an item number, and the like, and the document model data corresponding to the target document may be { "invoice code": "0123", "invoicing date": "2021-12-10", "attachment address": "https:/xxxxx.png", "article": [ { "item name": "computer", "number": "99"}]}.
And the computer equipment searches for second field data matched with the first field data in the document model data by taking the first field data in the first key value pair as a key for each first key value pair in the document template. For example, the document model data is { "invoice code": "0123", "date of invoicing": "2021-12-10", "attachment address": "https:/xxxxx.png", "article": [ { "item name": "computer", "number": "99" }, if the first key-value pair in the credential template is the "date": and if the 'invoicing date', the first field is marked as the 'date', the first field data is the 'invoicing date', the computer device searches second field data matched with the 'invoicing date' in the bill model data, and the obtained second field data is '2021-12-10'. The computer device combines the second field data "2021-12-10" with the first field identification "date" into a second key-value pair.
In one embodiment, the computer device searches, for each first key-value pair in the voucher template, a target field identifier consistent with the first field data in document model data corresponding to the target document; extracting target field data with a target field identifier as a key from the document model data; in the document model data, the target field identification is used as a key, and the target field data is used as a value; and taking the target field data as second field data matched with the first field data.
Wherein the target field identification is the identification of the target field in the document. The computer device searches the document model data for a target field identification consistent with the first field data. For example, the first field data is "date of invoicing", and the target field that coincides with the first field data is identified as "date of invoicing". The computer device extracts target field data having the target field identifier as a key in the document model data. For example, "date of billing: 2021-12-10 "is the key value pair in the document model data, the key is" date of making an invoice ", the value is" 2021-12-10 ", and the target field data with" date of making an invoice "as the key is" 2021-12-10 ".
S206, generating the voucher based on the second key-value pair.
The computer device generates a credential based on a first field identification in the second key value pair and second field data corresponding to the first field identification. For example, the second key-value pair comprises { "date": "2021-12-10", "extension": "computer", "deboramount": and 99, generating the voucher by the computer equipment according to the second key-value pair.
In one embodiment, S206 specifically includes: generating credential model data in a target format based on the second key-value pair; creating a certificate data table according to the certificate model data; the credentials are generated based on the credential data table.
Wherein the voucher model data is data for recording contents in the voucher. The target format may be a JSON format, or may be other data formats. The voucher data table is a relational data table for recording the contents of the voucher and may include a plurality of fields. For example, a "date" field, a "number" field, etc. are included in the credential data table. The computer device may create a credential data table with the key of the second key-value pair as an identification of a field in the data table, the value of the second key-value pair as a value of a field in the data table, and generate the credential based on the credential data table.
In the above embodiment, in response to the credential generation instruction, the credential template including at least two first key-value pairs is obtained, where the first field identifier is used as a key and the first field data is used as a value. And searching second field data matched with the first field data in the bill model data corresponding to the target bill aiming at each first key value pair in the bill template, so that the second field data required for generating the bill can be searched in the bill model data corresponding to the target bill according to the bill template. And then, forming a second key-value pair by taking the second field data as a value and the first field identifier as a key, and generating the certificate based on the second key-value pair. Therefore, data of the target document can be automatically input according to the document template and the document is generated, and the document generation efficiency is improved.
In one embodiment, as shown in fig. 5, the following steps are further included after S206:
and S502, extracting the document attachment address from the document model data.
The document attachment is a file used for performing supplementary explanation on the document, and comprises a picture, a data table and the like. The document attachment address is the network address of the document attachment and may be a URL (Uniform Resource Locator) address, for example, the document attachment address is "https:/xxxxx.
S504, the document attachment is downloaded according to the document attachment address.
The computer device downloads the document attachment from the network based on the document attachment address. In one embodiment, S504 is preceded by: writing the address of the document attachment into a document attachment list; s504 specifically includes: and downloading the document attachments from each document attachment storage platform according to the document attachment addresses in the document attachment list in sequence.
Wherein the document attachment list is a list for storing the address of the document attachment. Each document may correspond to a list of document attachments in which the network addresses of all attachments to the document are stored. For example, as shown in fig. 6, the document attachment list of the target document a stores URL addresses of 4 attachments of the target document a. The document accessory storage platform is various platforms for storing document accessories, comprises an electronic invoice service platform, a banking service platform, a purchasing platform, a selling platform and the like, and can be a platform which is different from a financial system. The computer device may download the document attachment from the document attachment storage platform via an HTTP (Hyper Text Transfer Protocol) Protocol. The HTTP protocol is an object-oriented application layer transmission protocol, and a data request based on the HTTP protocol consists of a request line, a message header and a request body.
S506, the downloaded document attachment is used as an attachment of the voucher and uploaded to a file server.
The file server is a file storage device, and can be a file server of a financial system. The financial system is a software system for processing the financial data of the enterprise, is used for entering accounts, accounting or statement analysis and the like, and is a system isolated from the business system. The computer equipment generates corresponding vouchers aiming at each voucher, then downloads attachments of the vouchers through a voucher attachment list corresponding to the voucher, uploads the downloaded attachments to a file server of the financial system, and the uploaded attachments become attachments of the generated vouchers. For example, the computer device generates a document B according to document model data corresponding to the document a, downloads a document attachment from a document attachment storage platform through a document attachment address extracted from the document model data, and uploads the downloaded attachment as an attachment of the document B to a file server of the financial system. As shown in fig. 7, the computer device uploads document attachments downloaded from the document attachment server, the electronic invoice service platform, and the banking system to the file server.
In the above embodiment, the computer device extracts the document attachment address from the document model data, downloads the document attachment according to the document attachment address, uses the downloaded document attachment as an attachment of the document, and uploads the document attachment to the file server of the financial system. Therefore, automatic downloading of document attachments can be realized without manual participation, and the document attachments are added to the file server to serve as attachments of the certificates, so that the efficiency of adding the certificate attachments is improved.
In an embodiment, S504 specifically includes: judging whether the number of the documents to be processed is larger than a preset value or not; the documents to be processed comprise target documents and other documents of the current documents to be generated; if yes, downloading the document attachment according to the document attachment address in an asynchronous mode with the generated certificate; if not, downloading the document attachment according to the document attachment address in a mode synchronous with the generated certificate.
Wherein the preset value may be a value set according to the processing capability of the computer device, for example, 1000, 2000, etc. If the number of the documents to be processed is larger than the preset value, it is indicated that more documents need to be generated currently, and in order to save resources of the computer device, after the documents are generated, document attachments can be downloaded and uploaded to the file server when the computer device is idle, that is, the document attachments are downloaded according to the document attachment addresses in an asynchronous mode with the generated documents. If the number of the documents to be processed is smaller than or equal to the preset value, the documents which need to be generated at present are fewer, and the computer equipment can download the document attachments according to the document attachment addresses and upload the document attachments to the file server in a mode synchronous with the generation of the documents.
In the embodiment, if the number of the documents to be processed is larger than the preset value, the computer device downloads the document attachments according to the document attachment addresses in an asynchronous mode with the generated documents; and if the number of the documents to be processed is less than or equal to the preset value, the computer equipment downloads the document attachments according to the document attachment addresses in a manner synchronous with the generation of the documents. Therefore, when the number of documents to be processed is large, the computer equipment can preferentially execute the document generation task, and download and upload document attachments in idle, so that the document generation efficiency is improved.
In one embodiment, the number of document attachment addresses is at least two; after S504, the method further includes: caching the downloaded document attachment; s506 specifically includes: and when all document attachments corresponding to the document attachment addresses are downloaded, taking the cached document attachments as the attachments of the voucher and uploading the document attachments to a file server.
The computer device may cache the downloaded documents, for example, in memory of a financial system. And when the document attachments corresponding to the plurality of document attachment addresses are downloaded completely, taking the plurality of cached document attachments as the attachments of the voucher and uploading the attachments to a file server.
In one embodiment, during the downloading of a document attachment based on each document attachment address, the computer device may flag the document attachment address that has been downloaded. If the downloading is interrupted due to the error, the computer equipment can download the document attachment only according to the document attachment address without the mark after the error is repaired, and does not need to download all the document attachments again, thereby improving the downloading efficiency of the document attachments, avoiding repeated downloading and wasting network resources.
In one embodiment, during the downloading of a document attachment based on the respective document attachment address, if the download fails due to an error, the computer device may attempt a re-download. If the number of times of trying to download again reaches the threshold value of the number of times, the computer device still does not download successfully, the computer device suspends downloading and prompts error information, and congestion caused by continuous trying of the computer device is avoided.
In one embodiment, after S506, further comprising: distributing certificate attachment identifications to accessories of the certificates; storing the storage address of the attachment of the certificate in the file server and the certificate attachment mark corresponding to the attachment of the certificate into a certificate attachment list corresponding to the certificate; in response to the credential presentation instruction, the credential is presented along with a list of credential attachments.
The certificate attachment identification is a mark of the certificate attachment and can be composed of numbers, characters, letters, special symbols and the like. The storage address may be a URL network address, for example, the storage address may be "https:/www.xxxxx.pdf". The credential attachment list is a data table that stores the credential attachment identification and the storage address. Each credential may correspond to a list of credential attachments in which the storage addresses of all attachments corresponding to the credential may be stored.
In the above embodiment, the computer device allocates the certificate attachment identifier to each attachment of the certificate, stores the storage address of the attachment of the certificate in the file server and the certificate attachment identifier corresponding to the attachment of the certificate in the certificate attachment list corresponding to the certificate, and can display the certificate attachment list corresponding to the certificate when displaying the certificate, thereby visually displaying the certificate and the attachment corresponding to the certificate.
In one embodiment, S204 further includes before: acquiring a document data table corresponding to a target document from a business system through an application program interface; generating document model data in a target format according to the document data table; s204 specifically comprises: and searching second field data matched with the first field data in the bill model data in the target format aiming at each first key value pair in the certificate template.
Among them, an Application Programming Interface (API) is a predefined program Interface. The business system is a system which is different from the financial system and is used for processing various businesses, including a banking system, a financial service system and the like. The document data table is a relational data table for recording contents in a document, and may include a plurality of fields. The target format may be a JSON format, or may be other data formats. And the computer equipment converts the bill data table into bill model data in a target format, and searches second field data matched with the first field data in the bill model data in the target format aiming at each first key value pair in the bill template.
In the embodiment, the computer device can download the bill data table from the heterogeneous business system through the application program interface, convert the bill data table into the bill model data in the target format, search the second field data matched with the first field data in the bill model data in the target format, form the second key value pair by the second field data and the first field identifier, and generate the voucher according to the second key value pair, so that automatic generation of the voucher can be realized without manual participation, and the generation efficiency of the voucher is improved.
In an embodiment, as shown in fig. 8, the computer device obtains a document data table corresponding to the target document from the business system through the application program interface, generates a voucher according to the document data table, then downloads an attachment of the target document through the document attachment processing sub-process, takes the attachment of the target document as an attachment of the voucher, and stores an address of the attachment of the voucher in the file server into voucher model data. For example, as shown in FIG. 9, a computer device obtains a document from a business system, generates credentials from the document, and uploads the credentials to a financial system. As shown in fig. 10, the document attachment processing sub-process includes determining whether an attachment exists in the target document, downloading the document attachment if the attachment exists, storing the downloaded document attachment in the cache area, and uploading the attachment in the cache area to the file server of the financial system when all attachments of the document are downloaded.
Specifically, the computer device generates document model data in a target format according to the document data table, for example, the document model data is { "invoiceno": "0123456", "billdate": "2021-12-10", "url": "https:/xxxxx. png", "materials": [ { "materialname": "computer", "amount": "99.0"}]}. The computer device obtains a credential template, assuming that the obtained credential template is { "date": "billdate", "groupname": "records", "entries" [ { "extension": "materialname", "accountid": "1", "deboramount": "amount", "dc": "1" }, { "extension": "," accountid ": "1", "deboramount": "amount", "dc": -1}]}. And the computer equipment takes the value of the first key value pair in the voucher template as a key, reads second field data corresponding to the value of the first key value pair from the document model data, and combines the read second field data and the key of the first key value pair into a second key value pair. Generating credential model data from the second key-value pair, the resulting credential model data being { "date": "2021-12-10", "groupname": "records", "entries" [ { "extension": "computer", "accoustid": "1", "deboramount": "99", "" "dc: 1}, {" extension ": "," accountid ": "1", "deboramount": "99", "% dc: -1} ]. And the computer equipment generates a certificate data table according to the certificate model data and generates a certificate according to the certificate data table.
In practical application, because the business system and the financial system are two sets of systems which are independent from each other, the data stored in the two systems are isolated from each other. For example, the picture of the paper invoice or the electronic invoice is stored in the electronic invoice service platform, and the electronic receipt of the banking business is stored in the banking system. When the voucher in the financial system is generated according to the data stored in the business system, because the business system and the financial system are isolated from each other, the traditional method often cannot directly upload the document attachment to the financial system as the attachment of the generated voucher, but needs to download the document manually and then upload the downloaded attachment to the financial system as the attachment of the voucher, so that the manual processing efficiency is low, and errors are easy to generate. In the embodiment, when the computer equipment generates the voucher according to the target document, the accessory of the target document can be automatically downloaded and uploaded to the financial system, so that the automation of downloading and uploading of the accessory is realized, the workload of financial staff is reduced, and the efficiency of downloading and uploading the document accessory is improved.
In one embodiment, as shown in fig. 11, the credential generation method comprises the following steps:
s1102, in response to the credential generation instruction, obtaining a credential template including at least two first key-value pairs.
And S1104, acquiring a document data table corresponding to the target document from the business system through the application program interface, and generating document model data in a target format according to the document data table.
S1106, aiming at each first key value pair in the voucher template, searching the target field identification consistent with the first field data in the bill model data in the target format.
S1108, extracting target field data with the target field identification as a key from the bill model data in the target format; and taking the target field data as second field data matched with the first field data, taking the second field data as a value, and taking the first field identifier as a key to form a second key value pair.
S1110, generating the voucher based on the second key-value pair.
S1112, extracting the document attachment address from the document model data.
S1114, writing the address of the document attachment into the document attachment list, and downloading the document attachment from each document attachment storage platform according to the address of the document attachment in the document attachment list in sequence.
And S1116, uploading the downloaded document attachment serving as the attachment of the certificate to a file server of the financial system.
S1118, a certificate attachment identifier is assigned to each attachment of the certificate.
S1120, storing the storage address of the attachment of the credential in the file server and the credential attachment identifier corresponding to the attachment of the credential in the credential attachment list corresponding to the credential.
And S1122, responding to the certificate display instruction, and displaying the certificate and the certificate attachment list.
The specific contents of S1102 to S1122 described above may refer to the specific implementation process described above.
It should be understood that, although the steps in the flowcharts related to the embodiments as described above are sequentially displayed as indicated by arrows, the steps are not necessarily performed sequentially as indicated by the arrows. The steps are not limited to being performed in the exact order illustrated and, unless explicitly stated herein, may be performed in other orders. Moreover, at least a part of the steps in the flowcharts related to the embodiments described above may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the execution order of the steps or stages is not necessarily sequential, but may be rotated or alternated with other steps or at least a part of the steps or stages in other steps.
Based on the same inventive concept, the embodiment of the present application further provides a credential generating device for implementing the credential generating method. The implementation scheme for solving the problem provided by the device is similar to the implementation scheme described in the above method, so specific limitations in one or more embodiments of the credential generating device provided below may refer to the limitations on the credential generating method in the foregoing, and details are not described here.
In one embodiment, as shown in fig. 12, there is provided a credential generating apparatus comprising: an obtaining module 1202, a searching module 1204, and a generating module 1206, wherein:
an obtaining module 1202, configured to obtain, in response to a credential generation instruction, a credential template including at least two first key-value pairs; the first key-value pair takes the first field identification as a key and takes the first field data as a value;
the searching module 1204 is configured to search, for each first key value pair in the voucher template, second field data matched with the first field data in the document model data corresponding to the target document, and form a second key value pair by using the second field data as a value and the first field identifier as a key;
a generating module 1206 is configured to generate the credential based on the second key-value pair.
In the above embodiment, in response to the credential generation instruction, the credential template including at least two first key-value pairs is obtained, where the first field identifier is used as a key and the first field data is used as a value. And searching second field data matched with the first field data in the bill model data corresponding to the target bill aiming at each first key value pair in the bill template, so that the second field data required for generating the bill can be searched in the bill model data corresponding to the target bill according to the bill template. And then, forming a second key-value pair by taking the second field data as a value and the first field identifier as a key, and generating the certificate based on the second key-value pair. Therefore, data of the target document can be automatically input according to the document template to generate the document, and the document generating efficiency is improved.
In one embodiment, as shown in fig. 13, the apparatus further comprises:
an extracting module 1208, configured to extract a document attachment address from the document model data;
a download module 1210 for downloading the document attachment according to the document attachment address;
and the uploading module 1212 is configured to take the downloaded document attachment as an attachment of the credential, and upload the document attachment to the file server.
In one embodiment, the download module 1210 is further configured to:
judging whether the number of the documents to be processed is larger than a preset value or not; the documents to be processed comprise target documents and other documents of the current documents to be generated;
if yes, downloading the document attachment according to the document attachment address in an asynchronous mode with the generated voucher;
if not, downloading the document attachment according to the document attachment address in a mode synchronous with the generated certificate.
In one embodiment, the number of document attachment addresses is at least two; the device still includes:
a caching module 1214, configured to cache the downloaded document attachment;
an upload module 1212, further configured to:
and when the document attachments corresponding to all the document attachment addresses are downloaded, taking the cached document attachments as the attachments of the voucher and uploading the document attachments to the file server.
In one embodiment, the apparatus further comprises:
a write module 1216, configured to write the address of the document attachment into the list of document attachments;
the downloading module 1210 is further configured to download the document attachments from the document attachment storage platforms according to the document attachment addresses in the document attachment list in sequence.
In one embodiment, the apparatus further comprises:
an assigning module 1218, configured to assign credential attachment identifiers to attachments of the credential;
the storage module 1220 is configured to store a storage address of the attachment of the credential in the file server and a credential attachment identifier corresponding to the attachment of the credential into a credential attachment list corresponding to the credential;
a display module 1222, configured to display the credential and the list of credential attachments in response to the credential display instruction.
In one embodiment, the lookup module 1204 is further configured to:
searching a target field identifier consistent with the first field data in the bill model data corresponding to the target bill aiming at each first key value pair in the certificate template;
extracting target field data with a target field identifier as a key from the document model data; in the document model data, the target field identification is used as a key, and the target field data is used as a value;
and taking the target field data as second field data matched with the first field data.
In one embodiment, the apparatus further comprises:
an obtaining module 1202, configured to obtain a document data table corresponding to a target document from a business system through an application program interface;
the generating module 1206 is used for generating document model data in a target format according to the document data table;
the searching module 1204 is further configured to search, for each first key-value pair in the voucher template, second field data matched with the first field data in the document model data in the target format.
In one embodiment, the generating module 1206 is further configured to:
generating credential model data in a target format based on the second key-value pair;
creating a certificate data table according to the certificate model data;
the credentials are generated based on the credential data table.
The modules in the credential generating device may be implemented in whole or in part by software, hardware, and a combination thereof. The modules can be embedded in a hardware form or independent of a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 14. The computer device comprises a processor, a memory, an Input/Output (I/O) interface and a communication interface. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface is connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is for storing credential generation data. The input/output interface of the computer device is used for exchanging information between the processor and an external device. The communication interface of the computer device is used for connecting and communicating with an external terminal through a network. The computer program is executed by a processor to implement a credential generation method.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 15. The computer apparatus includes a processor, a memory, an input/output interface, a communication interface, a display unit, and an input device. The processor, the memory and the input/output interface are connected by a system bus, and the communication interface, the display unit and the input device are connected by the input/output interface to the system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The input/output interface of the computer device is used for exchanging information between the processor and an external device. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless communication can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement a credential generation method. The display unit of the computer equipment is used for forming a visual and visible picture, and can be a display screen, a projection device or a virtual reality imaging device, the display screen can be a liquid crystal display screen or an electronic ink display screen, the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the configurations shown in fig. 14 and 15 are block diagrams of only some of the configurations relevant to the present disclosure, and do not constitute a limitation on the computing devices to which the present disclosure may be applied, and a particular computing device may include more or less components than those shown, or some of the components may be combined, or have a different arrangement of components.
In one embodiment, a computer device is provided, comprising a memory and a processor, the memory having a computer program stored therein, the processor implementing the following steps when executing the computer program: in response to a credential generation instruction, obtaining a credential template comprising at least two first key-value pairs; the first key-value pair takes the first field identification as a key and takes the first field data as a value; aiming at each first key value pair in the voucher template, searching second field data matched with the first field data in the bill model data corresponding to the target bill, and forming a second key value pair by taking the second field data as a value and the first field identifier as a key; generating a credential based on the second key-value pair.
In one embodiment, the processor, when executing the computer program, further performs the steps of: extracting a document attachment address from the document model data; downloading the document attachment according to the document attachment address; and taking the downloaded document attachment as an attachment of the voucher, and uploading the attachment to a file server.
In one embodiment, the processor, when executing the computer program, further performs the steps of: judging whether the number of the documents to be processed is larger than a preset value or not; the document to be processed comprises a target document and other documents of the current document to be generated; if yes, downloading the document attachment according to the document attachment address in an asynchronous mode with the generated certificate; if not, downloading the document attachment according to the document attachment address in a mode synchronous with the generated voucher.
In one embodiment, the number of document attachment addresses is at least two; the processor, when executing the computer program, further performs the steps of: caching the downloaded document attachment; taking the downloaded document attachment as an attachment of the voucher and uploading the document attachment to a file server comprises the following steps: and when the document attachments corresponding to all the document attachment addresses are downloaded, taking the cached document attachments as the attachments of the certificates and uploading the documents to the file server.
In one embodiment, the processor when executing the computer program further performs the steps of: writing the address of the document attachment into a document attachment list; and downloading the document attachments from the document attachment storage platforms according to the document attachment addresses in the document attachment list in sequence.
In one embodiment, the processor, when executing the computer program, further performs the steps of: distributing certificate attachment identifications to accessories of the certificates; storing the storage address of the attachment of the certificate in the file server and the certificate attachment mark corresponding to the attachment of the certificate into a certificate attachment list corresponding to the certificate; and in response to the certificate display instruction, displaying the certificate and the certificate attachment list.
In one embodiment, the processor, when executing the computer program, further performs the steps of: searching a target field identifier consistent with the first field data in the bill model data corresponding to the target bill aiming at each first key value pair in the certificate template; extracting target field data with a target field identifier as a key from the document model data; and taking the target field data as second field data matched with the first field data.
In one embodiment, the processor when executing the computer program further performs the steps of: acquiring a document data table corresponding to a target document from a business system through an application program interface; generating document model data in a target format according to the document data table; and searching second field data matched with the first field data in the bill model data in the target format aiming at each first key value pair in the certificate template.
In one embodiment, the processor, when executing the computer program, further performs the steps of: generating credential model data in a target format based on the second key-value pair; creating a voucher data table according to the voucher model data; the credentials are generated based on the credential data table.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: responding to a voucher generation instruction, and acquiring a voucher template comprising at least two first key-value pairs; the first key-value pair takes the first field identification as a key and takes the first field data as a value; aiming at each first key value pair in the voucher template, searching second field data matched with the first field data in the bill model data corresponding to the target bill, and forming a second key value pair by taking the second field data as a value and the first field identifier as a key; generating a credential based on the second key-value pair.
In one embodiment, the computer program when executed by the processor further performs the steps of: extracting a document attachment address from the document model data; downloading the document attachment according to the document attachment address; and taking the downloaded document attachment as an attachment of the voucher, and uploading the attachment to a file server.
In one embodiment, the computer program when executed by the processor further performs the steps of: writing the address of the document attachment into a document attachment list; and downloading the document attachments from each document attachment storage platform according to the document attachment addresses in the document attachment list in sequence.
In one embodiment, the computer program when executed by the processor further performs the steps of: distributing certificate attachment identifications to accessories of the certificates; storing the storage address of the attachment of the certificate in the file server and the certificate attachment mark corresponding to the attachment of the certificate into a certificate attachment list corresponding to the certificate; in response to the credential presentation instruction, the credential is presented along with a list of credential attachments.
In one embodiment, the computer program when executed by the processor further performs the steps of: judging whether the number of the documents to be processed is larger than a preset value or not; the document to be processed comprises a target document and other documents of the current document to be generated; if yes, downloading the document attachment according to the document attachment address in an asynchronous mode with the generated voucher; if not, downloading the document attachment according to the document attachment address in a mode synchronous with the generated certificate.
In one embodiment, the number of document attachment addresses is at least two; the computer program when executed by the processor further realizes the steps of: caching the downloaded document attachment; taking the downloaded document attachment as an attachment of the voucher and uploading the document attachment to a file server comprises the following steps: and when the document attachments corresponding to all the document attachment addresses are downloaded, taking the cached document attachments as the attachments of the voucher and uploading the document attachments to the file server.
In one embodiment, the computer program when executed by the processor further performs the steps of: aiming at each first key value pair in the voucher template, searching a target field identifier consistent with first field data in bill model data corresponding to a target bill; extracting target field data with a target field identifier as a key from the document model data; and taking the target field data as second field data matched with the first field data.
In one embodiment, the computer program when executed by the processor further performs the steps of: acquiring a document data table corresponding to a target document from a business system through an application program interface; generating document model data in a target format according to the document data table; and searching second field data matched with the first field data in the bill model data in the target format aiming at each first key value pair in the certificate template.
In one embodiment, the computer program when executed by the processor further performs the steps of: generating credential model data in a target format based on the second key-value pair; creating a certificate data table according to the certificate model data; the credentials are generated based on the credential data table.
In one embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, performs the steps of:
in response to a credential generation instruction, obtaining a credential template comprising at least two first key-value pairs; the first key-value pair takes the first field identification as a key and takes the first field data as a value; aiming at each first key value pair in the voucher template, searching second field data matched with the first field data in the bill model data corresponding to the target bill, and forming a second key value pair by taking the second field data as a value and the first field identifier as a key; generating a credential based on the second key-value pair.
In one embodiment, the computer program when executed by the processor further performs the steps of: extracting a document attachment address from the document model data; downloading the document attachment according to the document attachment address; and taking the downloaded document attachment as an attachment of the voucher, and uploading the attachment to a file server.
In one embodiment, the computer program when executed by the processor further performs the steps of: judging whether the number of the documents to be processed is larger than a preset value or not; the documents to be processed comprise target documents and other documents of the current documents to be generated; if yes, downloading the document attachment according to the document attachment address in an asynchronous mode with the generated certificate; if not, downloading the document attachment according to the document attachment address in a mode synchronous with the generated certificate.
In one embodiment, the number of document attachment addresses is at least two; the computer program when executed by the processor further realizes the steps of: caching the downloaded document attachment; taking the downloaded document attachment as an attachment of the voucher and uploading the document attachment to a file server comprises the following steps: and when the document attachments corresponding to all the document attachment addresses are downloaded, taking the cached document attachments as the attachments of the voucher and uploading the document attachments to the file server.
In one embodiment, the computer program when executed by the processor further performs the steps of: writing the address of the document attachment into a document attachment list; and downloading the document attachments from each document attachment storage platform according to the document attachment addresses in the document attachment list in sequence.
In one embodiment, the computer program when executed by the processor further performs the steps of: distributing certificate attachment identifications to accessories of the certificates; storing the storage address of the attachment of the certificate in the file server and the certificate attachment mark corresponding to the attachment of the certificate into a certificate attachment list corresponding to the certificate; and in response to the certificate display instruction, displaying the certificate and the certificate attachment list.
In one embodiment, the computer program when executed by the processor further performs the steps of: searching a target field identifier consistent with the first field data in the bill model data corresponding to the target bill aiming at each first key value pair in the certificate template; extracting target field data with a target field identifier as a key from the document model data; and taking the target field data as second field data matched with the first field data.
In one embodiment, the computer program when executed by the processor further performs the steps of: acquiring a document data table corresponding to a target document from a business system through an application program interface; generating document model data in a target format according to the document data table; and searching second field data matched with the first field data in the bill model data in the target format aiming at each first key value pair in the certificate template.
In one embodiment, the computer program when executed by the processor further performs the steps of: generating credential model data in a target format based on the second key-value pair; creating a certificate data table according to the certificate model data; the credentials are generated based on the credential data table.
It should be noted that, the user information (including but not limited to user equipment information, user personal information, etc.) and data (including but not limited to data for analysis, stored data, displayed data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use and processing of the related data need to comply with the relevant laws and regulations and standards of the relevant country and region.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high-density embedded nonvolatile Memory, resistive Random Access Memory (ReRAM), Magnetic Random Access Memory (MRAM), Ferroelectric Random Access Memory (FRAM), Phase Change Memory (PCM), graphene Memory, and the like. Volatile Memory can include Random Access Memory (RAM), external cache Memory, and the like. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others. The databases involved in the embodiments provided herein may include at least one of relational and non-relational databases. The non-relational database may include, but is not limited to, a block chain based distributed database, and the like. The processors referred to in the various embodiments provided herein may be, without limitation, general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic devices, quantum computing-based data processing logic devices, or the like.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the present application. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present application shall be subject to the appended claims.

Claims (10)

1. A method of credential generation, the method comprising:
in response to a credential generation instruction, obtaining a credential template comprising at least two first key-value pairs; the first key value pair takes a first field identifier as a key and takes first field data as a value;
for each first key value pair in the voucher template, searching second field data matched with the first field data in bill model data corresponding to a target bill, and forming a second key value pair by taking the second field data as a value and the first field identifier as a key;
generating a credential based on the second key-value pair.
2. The method of claim 1, further comprising:
extracting a document attachment address from the document model data;
downloading the document attachment according to the document attachment address;
and taking the downloaded document attachment as an attachment of the voucher, and uploading the document attachment to a file server.
3. The method of claim 2, wherein downloading the document attachment based on the document attachment address comprises:
judging whether the number of the documents to be processed is larger than a preset value or not; the to-be-processed bill comprises the target bill and other bills of the current to-be-generated voucher;
if yes, downloading the document attachment according to the document attachment address in an asynchronous mode with the generated voucher;
and if not, downloading the document attachment according to the address of the document attachment in a mode synchronous with the generated certificate.
4. The method of claim 2, wherein the number of document attachment addresses is at least two; after downloading the document attachment according to the document attachment address, the method further comprises the following steps:
caching the downloaded document attachment;
the step of taking the downloaded document attachment as the attachment of the voucher and uploading the document attachment to a file server comprises the following steps:
and when all document attachments corresponding to the document attachment addresses are downloaded, taking the cached document attachments as attachments of the voucher and uploading the attachments to the file server.
5. The method of claim 2, further comprising:
assigning a credential attachment identification to each attachment of the credential;
storing the storage address of the attachment of the certificate in the file server and the certificate attachment identification corresponding to the attachment of the certificate into a certificate attachment list corresponding to the certificate;
and responding to a certificate display instruction, and displaying the certificate and the certificate attachment list.
6. The method of claim 1, wherein the finding, for each first key-value pair in the credential template, second field data in the document model data corresponding to the target document that matches the first field data comprises:
searching a target field identifier consistent with the first field data in the bill model data corresponding to the target bill aiming at each first key value pair in the voucher template;
extracting target field data with the target field identification as a key from the bill model data; the document model data takes the target field identification as a key and takes the target field data as a value;
and taking the target field data as second field data matched with the first field data.
7. The method of claim 1, further comprising:
acquiring a document data table corresponding to the target document from a business system through an application program interface;
generating bill model data in a target format according to the bill data table;
the searching for the second field data matched with the first field data in the bill model data corresponding to the target bill aiming at each first key value pair in the voucher template comprises the following steps:
and searching second field data matched with the first field data in the bill model data in the target format aiming at each first key value pair in the voucher template.
8. An apparatus for credential generation, the apparatus comprising:
the acquisition module is used for responding to the certificate generation instruction and acquiring a certificate template comprising at least two first key value pairs; the first key value pair takes a first field identifier as a key and takes first field data as a value;
the searching module is used for searching second field data matched with the first field data in the bill model data corresponding to the target bill aiming at each first key value pair in the bill template, and forming a second key value pair by taking the second field data as a value and the first field identifier as a key;
a generating module for generating a credential based on the second key-value pair.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202210299532.4A 2022-03-25 2022-03-25 Voucher generation method and device, computer equipment and storage medium Pending CN114648398A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210299532.4A CN114648398A (en) 2022-03-25 2022-03-25 Voucher generation method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210299532.4A CN114648398A (en) 2022-03-25 2022-03-25 Voucher generation method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114648398A true CN114648398A (en) 2022-06-21

Family

ID=81995403

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210299532.4A Pending CN114648398A (en) 2022-03-25 2022-03-25 Voucher generation method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114648398A (en)

Similar Documents

Publication Publication Date Title
US11550534B2 (en) Computerized system and method for generating and dynamically updating a dashboard of multiple processes and operations across platforms
US10572685B1 (en) Protecting sensitive data
US10521834B2 (en) Mobile solution for purchase orders
JP6775510B2 (en) Terminals, terminal control methods, and programs
US11620444B2 (en) Providing action associated with event detected within communication
KR20130126930A (en) Using text messages to interact with spreadsheets
WO2016101811A1 (en) Information arrangement method and apparatus
WO2014184745A1 (en) Automatic website generation
CN105162697A (en) Microblog system and data control method thereof
CN114611481A (en) Template configuration method and device, computer equipment and storage medium
CN112835904A (en) Data processing method and data processing device
US10880261B2 (en) Personal web address management system
US10725618B2 (en) Populating contact information
CN111444448B (en) Data processing method, server and system
US11308479B2 (en) Automatically specifying alternative services for settling electronic payments
JP2014010485A (en) Related content search device and related content search method
US20150254366A1 (en) Application software, electronic forms, and associated methods
CN116127219A (en) Method and device for displaying pages in applet and computer equipment
US10171687B2 (en) Providing content and attachment printing for communication
CN114648398A (en) Voucher generation method and device, computer equipment and storage medium
JP2016040658A (en) Inventory support device, inventory support method, and program
CN106970780B (en) Data interaction method and device
KR102446680B1 (en) Apparatus and method for sending proposal
KR102200024B1 (en) Method and apparatus for providing smart print service
CN109104501B (en) Data synchronization method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination