CN114880681A - Data processing method and system under mode memory - Google Patents

Data processing method and system under mode memory Download PDF

Info

Publication number
CN114880681A
CN114880681A CN202210496962.5A CN202210496962A CN114880681A CN 114880681 A CN114880681 A CN 114880681A CN 202210496962 A CN202210496962 A CN 202210496962A CN 114880681 A CN114880681 A CN 114880681A
Authority
CN
China
Prior art keywords
data
operation request
data operation
request
approval
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210496962.5A
Other languages
Chinese (zh)
Inventor
胡峰
代振忠
李光辉
李业森
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shandong Zhixin Information Technology Co ltd
Original Assignee
Shandong Zhixin Information Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shandong Zhixin Information Technology Co ltd filed Critical Shandong Zhixin Information Technology Co ltd
Priority to CN202210496962.5A priority Critical patent/CN114880681A/en
Publication of CN114880681A publication Critical patent/CN114880681A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a data processing method and a system under mode memory, wherein the method comprises the following steps: receiving a data operation request, and judging whether an initiator of the data operation request, data of an operation requested by the data operation request and the operation meet a preset rule configured in advance or not; if the preset rule is met, allowing or rejecting the data operation request according to the preset rule; if the data operation request does not accord with the preset rule, acquiring an approval record of the historical data operation request; acquiring a first data operation request with the similarity meeting a preset condition with the data operation request from the historical examination and approval records; and according to the approval result of the first data operation request, approving the data operation request. The method and the device solve the problem caused by the fact that the data operation request needs to be approved by an administrator in the prior art, thereby improving the timeliness of response of the output operation request and improving the processing efficiency of the data operation request.

Description

Data processing method and system under mode memory
Technical Field
The present application relates to the field of data processing, and in particular, to a method and system for processing data in a mode memory.
Background
In a computing data storage, a situation of reading data is often encountered, and when data is read, it needs to be determined whether to allow an initiator to read or operate the data according to the initiator of a data operation request (for example, a data read request) and the content of the data to be read.
And if the corresponding processing mode is not found in the preconfigured rules, the data operation request needs to be sent to an administrator for approval, and the data operation request is allowed to be carried out after the administrator passes the approval.
The approval mode has a relatively large delay, which may cause the operation of the initiator of the data operation request to be overtime, thereby affecting the normal operation of the service.
Disclosure of Invention
The embodiment of the application provides a data processing method and system under mode memory, which are used for at least solving the problem caused by the fact that a data operation request needs to be approved by an administrator in the prior art.
According to an aspect of the present application, there is provided a data processing method under mode memory, including: receiving a data operation request, wherein the data operation request is used for requesting to operate on predetermined data; judging whether an initiator of the data operation request, data of the operation requested by the data operation request and the operation meet preset rules configured in advance or not; if the preset rule is met, allowing or rejecting the data operation request according to the preset rule; if the data operation request does not meet the preset rule, obtaining an approval record of the historical data operation request, wherein the historical approval record is approval processing of the administrator on the received data operation request before the data operation request is received; acquiring a first data operation request with the similarity meeting a preset condition with the data operation request from the historical examination and approval records; and according to the approval result of the first data operation request, approving the data operation request.
Further, the obtaining of the first data operation request with the similarity to the data operation request meeting the predetermined condition in the historical approval record includes: acquiring the first data operation request meeting the preset condition according to at least one of the following data operation requests: the initiator of the data operation request, the data of the operation requested by the data operation request, and the operation performed on the data by the data operation request.
Further, the obtaining of the first data operation request with the similarity to the data operation request meeting the predetermined condition in the historical approval record includes: and under the condition that at least two items of an initiator, data of the requested operation and operation performed on the data in the data operation request are the same as the first data operation request, determining that the similarity between the first data operation request and the data operation request meets the preset condition.
Further, the operation of the data operation request on the data comprises: read, add, modify, delete, or encrypt.
Further, still include: and if the operation of the data operation request on the data is deletion or encryption, and if the initiator of the data operation request, the data of the operation requested by the data operation request and the performed operation do not accord with preset rules, rejecting the data operation request.
According to another aspect of the present application, there is also provided a data processing system in mode memory, including: the device comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving a data operation request, and the data operation request is used for requesting to operate predetermined data; the judging module is used for judging whether an initiator of the data operation request, data of the operation requested by the data operation request and the operation meet preset rules configured in advance or not; the processing module is used for allowing or rejecting the data operation request according to the preset rule if the preset rule is met; the first obtaining module is used for obtaining an approval record of a historical data operation request if the first obtaining module does not accord with a preset rule, wherein the historical approval record is approval processing of an administrator on the received data operation request before the data operation request is received; the second acquisition module is used for acquiring a first data operation request with the similarity meeting a preset condition with the data operation request from the historical examination and approval records; and the approval module is used for approving the data operation request according to the approval result of the first data operation request.
Further, the second obtaining module is configured to: acquiring the first data operation request meeting the preset condition according to at least one of the following data operation requests: the initiator of the data operation request, the data of the operation requested by the data operation request, and the operation performed on the data by the data operation request.
Further, the second obtaining module is configured to: and under the condition that at least two items of an initiator, data of the requested operation and operation performed on the data in the data operation request are the same as the first data operation request, determining that the similarity between the first data operation request and the data operation request meets the preset condition.
Further, the operation of the data operation request on the data comprises: read, add, modify, delete, or encrypt.
Further, the approval module is further configured to: and if the operation of the data operation request on the data is deletion or encryption, and if the initiator of the data operation request, the data of the operation requested by the data operation request and the performed operation do not accord with preset rules, rejecting the data operation request.
In the embodiment of the application, a data operation request is received, wherein the data operation request is used for requesting to operate predetermined data; judging whether an initiator of the data operation request, data of the operation requested by the data operation request and the operation meet preset rules configured in advance or not; if the preset rule is met, allowing or rejecting the data operation request according to the preset rule; if the data operation request does not meet the preset rule, obtaining an approval record of the historical data operation request, wherein the historical approval record is approval processing of the administrator on the received data operation request before the data operation request is received; acquiring a first data operation request with the similarity meeting a preset condition with the data operation request from the historical examination and approval records; and according to the approval result of the first data operation request, approving the data operation request. The method and the device solve the problem caused by the fact that the data operation request needs to be approved by an administrator in the prior art, thereby improving the timeliness of response of the output operation request and improving the processing efficiency of the data operation request.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the application and, together with the description, serve to explain the application and are not intended to limit the application. In the drawings:
fig. 1 is a flowchart of a data processing method under pattern memorization according to an embodiment of the application.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
In this embodiment, a data processing method under mode memory is provided, and fig. 1 is a flowchart of a data processing method under mode memory according to an embodiment of the present application, as shown in fig. 1, the method includes the following steps:
step S102, receiving a data operation request, wherein the data operation request is used for requesting to operate predetermined data;
step S104, judging whether the initiator of the data operation request, the data of the operation requested by the data operation request and the operation meet preset rules configured in advance;
step S106, if the preset rule is met, allowing or rejecting the data operation request according to the preset rule;
step S108, if the data operation request does not conform to the preset rule, acquiring an approval record of a historical data operation request, wherein the historical approval record is approval processing of an administrator on the received data operation request before the data operation request is received;
step S110, a first data operation request with the similarity meeting a preset condition with the data operation request is obtained from the historical approval records;
for example, the first data operation request meeting the predetermined condition is acquired according to at least one of the following data operation requests: the initiator of the data operation request, the data of the operation requested by the data operation request, and the operation performed on the data by the data operation request. And under the condition that at least two items of an initiator, data of the requested operation and operation performed on the data in the data operation request are the same as the first data operation request, determining that the similarity between the first data operation request and the data operation request meets the preset condition.
As an optional implementation manner, if the first data operation request meeting the predetermined condition cannot be obtained in the historical approval record, obtaining data requested to be operated by the data operation request, determining the authority of a first sender of the data operation request for historically performing the same operation on the data, and if the authority of the sender of the data operation request is greater than the authority of the first sender, approving the data operation request; and if the authority of the sender of the data operation request party is less than or equal to the authority of the first sender, rejecting the data operation request.
Step S112, approve the data operation request according to the approval result of the first data operation request.
As an optional implementation manner, when the data requested to be read by the first data operation request is desensitized data, and when the data is read by the data operation request under approval, the desensitization rule corresponding to the first data operation request is obtained, the desensitization rule is deleted from a plurality of pre-configured desensitization rules, one desensitization rule is selected from the desensitization rules after the desensitization rule is deleted, and the selected desensitization rule is used to desensitize the data and return the desensitization rule to the sender of the data operation request.
The steps solve the problem caused by the fact that the data operation request needs to be approved by an administrator in the prior art, thereby improving the timeliness of the response of the output operation request and improving the processing efficiency of the data operation request.
There are a number of ways to desensitize the data.
For example, an authentication request message and a data request message are sent to a reverse proxy server through client equipment; the reverse proxy server forwards the authentication request message to the desensitization server and forwards the data request message to the database server; the desensitization server authenticates the legality of the client equipment based on the authentication request message acquired from the reverse proxy server and feeds back corresponding identity authentication information and desensitization rules to the reverse proxy server; the database server feeds back corresponding original data to the reverse proxy server based on the data request message acquired from the reverse proxy server; the reverse proxy server continuously analyzes the obtained original data and forwards the analyzed original data to the desensitization server; the desensitization server executes desensitization processing on the received original data by adopting a corresponding desensitization rule based on the authenticated identity information of the client equipment, so that desensitization data are continuously fed back to the reverse proxy server; and the reverse proxy server continuously feeds desensitization data back to the client device sending the data request message. Wherein the reverse proxy server is a kind of Nginx server.
Further comprising: the client device decodes desensitization data continuously fed back from the reverse proxy server for presentation to a user based on desensitization rules fed back from the reverse proxy server. And the desensitization server encrypts the identity authentication information and the desensitization rule and feeds the desensitization rule back to the reverse proxy server. The desensitization server carries out desensitization rule negotiation based on an authentication request of the client device through the reverse proxy server, and feeds back a negotiation result as a desensitization rule of the corresponding client device to the client device through the reverse proxy server.
For another example, the desensitization rule may be configured as follows: s1, sending a page access request; s2, acquiring a corresponding URL (Uniform resource locator) address based on the page access request, and setting a page level identifier of the page according to the URL address; s3, receiving service information returned by the server according to the page access request; s4, inquiring whether the page comprises a sensitive information field or not according to the service information; s5, if the sensitive information field is included, establishing a mapping relation among the page level identification, the sensitive information field and a corresponding shielding rule, and configuring the mapping relation into a desensitization rule table; s6, repeating the steps S1-S6 for the next page until the desensitization rule table is configured.
Preferably, the step S4 further includes: matching the service information with each key character or key character string in a preset key character set; and [0014] if the service information is matched to include the key characters or key character strings in the key character set, judging that the page includes sensitive information fields.
Preferably, the step S5 further includes: and storing the type of the field of the sensitive information field in the desensitization rule table. Preferably, the method further comprises the step of adding sensitive information fields and corresponding field shielding rules: reading the URL and the service information corresponding to each page from the storage area; and inquiring whether sensitive information fields to be added are included, if one or more pages include the sensitive information fields to be added, establishing a mapping relation among the page level identification of the one or more pages, the sensitive information fields to be added and corresponding shielding rules, and adding the mapping relation into a desensitization rule table.
The data desensitization method may include: sending access request information aiming at a target page to a server according to user input information; receiving data to be desensitized returned by the server based on the access request information; and converting the data to be desensitized into desensitization data according to a pre-configured desensitization rule table, wherein the desensitization rule table comprises a mapping relation of page level identifications, sensitive information fields and field shielding rules, the page level identifications are preset according to URL addresses of the target pages, and the mapping relation comprises sub-mapping relations among the page level identifications, the sensitive information fields and the field shielding rules which are respectively corresponding to all the pages which are pre-configured in the desensitization rule table: inquiring a sensitive information field corresponding to the target page and a corresponding field shielding rule from the desensitization rule table according to the page level identification of the target page; and performing desensitization operation on the desensitization data according to the sensitive information field and the field shielding rule.
Preferably, between the step of receiving the data to be desensitized returned by the server based on the access request information and the step of converting the data to be desensitized into desensitized data according to a pre-configured desensitization rule table, the method further includes: intercepting the data to be desensitized, wherein the data to be desensitized is intercepted and then stored in a cache region; and acquiring the data to be desensitized from the cache region.
Preferably, after the step of converting the data to be desensitized into desensitized data according to a preconfigured desensitization rule table, the method includes: and providing the desensitization data to a view layer for page display.
Optionally, the operation performed on the data by the data operation request includes: read, add, modify, delete, or encrypt. For data security, this embodiment may further include: and if the operation of the data operation request on the data is deletion or encryption, and if the initiator of the data operation request, the data of the operation requested by the data operation request and the performed operation do not accord with preset rules, rejecting the data operation request.
As an optional implementation manner, after the data operation request is approved according to the approval result of the first data operation request, the approval result, the approval basis, and the data operated by the data operation request are stored as a part of a log file, where the stored log file is used for requesting an administrator to confirm, and when the administrator confirms that the approval is correct, the approval is added to the approval rule.
As another optional implementation manner, when the data operation request is to modify or delete the data, in a case that it is determined according to the first data operation request that the data operation request is allowed to be operated, data backup is performed on the data before the data operation request is operated, the data before the operation is backed up in the memory cache, then the data is deleted or modified, after the data is deleted or modified, the deleted or modified data content is sent to an administrator for confirmation, if the administrator confirms the operation, the data in the memory cache is emptied, and if the administrator does not confirm the operation, the data in the memory cache is rolled back.
In this embodiment, an electronic device is provided, comprising a memory in which a computer program is stored and a processor configured to run the computer program to perform the method in the above embodiments.
The programs described above may be run on a processor or may also be stored in memory (or referred to as computer-readable media), which includes both non-transitory and non-transitory, removable and non-removable media, that implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
These computer programs may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks, and corresponding steps may be implemented by different modules.
Such an apparatus or system is provided in this embodiment. The system is called a data processing system under mode memory, and comprises: the device comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving a data operation request, and the data operation request is used for requesting to operate predetermined data; the judging module is used for judging whether an initiator of the data operation request, data of the operation requested by the data operation request and the operation meet preset rules configured in advance or not; the processing module is used for allowing or rejecting the data operation request according to the preset rule if the preset rule is met; the first obtaining module is used for obtaining an approval record of a historical data operation request if the first obtaining module does not accord with a preset rule, wherein the historical approval record is approval processing of an administrator on the received data operation request before the data operation request is received; the second acquisition module is used for acquiring a first data operation request with the similarity meeting a preset condition with the data operation request from the historical examination and approval records; and the approval module is used for approving the data operation request according to the approval result of the first data operation request.
The system or the apparatus is used for implementing the functions of the method in the foregoing embodiments, and each module in the system or the apparatus corresponds to each step in the method, which has been described in the method and is not described herein again.
For example, the second obtaining module is configured to: acquiring the first data operation request meeting the preset condition according to at least one of the following data operation requests: the initiator of the data operation request, the data of the operation requested by the data operation request, and the operation performed on the data by the data operation request. Optionally, the second obtaining module is configured to: and under the condition that at least two items of an initiator, data of the requested operation and operation performed on the data in the data operation request are the same as the first data operation request, determining that the similarity between the first data operation request and the data operation request meets the preset condition.
For another example, the operation performed on the data by the data operation request includes: read, add, modify, delete, or encrypt. Optionally, the approval module is further configured to: and if the operation of the data operation request on the data is deletion or encryption, and if the initiator of the data operation request, the data of the operation requested by the data operation request and the performed operation do not accord with preset rules, rejecting the data operation request.
The embodiment solves the problem caused by the fact that the data operation request needs to be approved by an administrator in the prior art, thereby improving the timeliness of the response of the output operation request and improving the processing efficiency of the data operation request.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A data processing method under mode memory is characterized by comprising the following steps:
receiving a data operation request, wherein the data operation request is used for requesting to operate on predetermined data;
judging whether an initiator of the data operation request, data of the operation requested by the data operation request and the operation meet preset rules configured in advance or not;
if the preset rule is met, allowing or rejecting the data operation request according to the preset rule;
if the data operation request does not meet the preset rule, obtaining an approval record of the historical data operation request, wherein the historical approval record is approval processing of the administrator on the received data operation request before the data operation request is received;
acquiring a first data operation request with the similarity meeting a preset condition with the data operation request from the historical examination and approval records;
and according to the approval result of the first data operation request, approving the data operation request.
2. The method of claim 1, wherein obtaining a first data operation request from the historical approval records, the first data operation request having a similarity with the data operation request meeting a predetermined condition comprises:
acquiring the first data operation request meeting the preset condition according to at least one of the following data operation requests: the initiator of the data operation request, the data of the operation requested by the data operation request, and the operation performed on the data by the data operation request.
3. The method of claim 2, wherein obtaining a first data operation request from the historical approval record that has a similarity to the data operation request that satisfies a predetermined condition comprises:
and under the condition that at least two items of an initiator, data of the requested operation and operation performed on the data in the data operation request are the same as the first data operation request, determining that the similarity between the first data operation request and the data operation request meets the preset condition.
4. The method of any of claims 2 to 3, wherein the data operation requesting an operation on the data comprises: read, add, modify, delete, or encrypt.
5. The method of claim 4, further comprising:
and if the operation of the data operation request on the data is deletion or encryption, and if the initiator of the data operation request, the data of the operation requested by the data operation request and the performed operation do not accord with preset rules, rejecting the data operation request.
6. A data processing system in mode memory, comprising:
the device comprises a receiving module, a processing module and a processing module, wherein the receiving module is used for receiving a data operation request, and the data operation request is used for requesting to operate predetermined data;
the judging module is used for judging whether an initiator of the data operation request, data of the operation requested by the data operation request and the operation meet preset rules configured in advance or not;
the processing module is used for allowing or rejecting the data operation request according to the preset rule if the preset rule is met;
the first obtaining module is used for obtaining an approval record of a historical data operation request if the first obtaining module does not accord with a preset rule, wherein the historical approval record is approval processing of an administrator on the received data operation request before the data operation request is received;
the second acquisition module is used for acquiring a first data operation request with the similarity meeting a preset condition with the data operation request from the historical examination and approval records;
and the approval module is used for approving the data operation request according to the approval result of the first data operation request.
7. The system of claim 6, wherein the second obtaining module is configured to:
acquiring the first data operation request meeting the preset condition according to at least one of the following data operation requests: the initiator of the data operation request, the data of the operation requested by the data operation request, and the operation performed on the data by the data operation request.
8. The system of claim 7, wherein the second obtaining module is configured to:
and under the condition that at least two items of an initiator, data of the requested operation and operation performed on the data in the data operation request are the same as the first data operation request, determining that the similarity between the first data operation request and the data operation request meets the preset condition.
9. The system of any of claims 7 to 8, wherein the data operation requesting an operation on the data comprises: read, add, modify, delete, or encrypt.
10. The system of claim 9, wherein the approval module is further configured to:
and if the operation of the data operation request on the data is deletion or encryption, and if the initiator of the data operation request, the data of the operation requested by the data operation request and the performed operation do not accord with preset rules, rejecting the data operation request.
CN202210496962.5A 2022-05-09 2022-05-09 Data processing method and system under mode memory Pending CN114880681A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210496962.5A CN114880681A (en) 2022-05-09 2022-05-09 Data processing method and system under mode memory

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210496962.5A CN114880681A (en) 2022-05-09 2022-05-09 Data processing method and system under mode memory

Publications (1)

Publication Number Publication Date
CN114880681A true CN114880681A (en) 2022-08-09

Family

ID=82673815

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210496962.5A Pending CN114880681A (en) 2022-05-09 2022-05-09 Data processing method and system under mode memory

Country Status (1)

Country Link
CN (1) CN114880681A (en)

Similar Documents

Publication Publication Date Title
US11003718B2 (en) Systems and methods for enabling a global aggregated search, while allowing configurable client anonymity
CN110569281A (en) Block chain transaction query method and system
US11663593B2 (en) Hierarchy-based blockchain
CN110597877A (en) Block chain transaction processing method and device
WO2023087760A1 (en) Data sharing method and apparatus, device, and storage medium
US10243957B1 (en) Preventing leakage of cookie data
CN113132363A (en) Front-end and back-end security verification method and equipment
US20230131640A1 (en) A data migration framework
CN114861201A (en) Data desensitization method, data desensitization server and data desensitization system
CN109739932A (en) Date storage method, device, computer equipment and computer readable storage medium
CN114697063A (en) Security authentication method and device, electronic equipment and storage medium
CN116860699A (en) File management method, system, computer device and computer readable storage medium
CN114880681A (en) Data processing method and system under mode memory
CN112835863A (en) Processing method and processing device of operation log
CN111818038B (en) Network data acquisition and identification method and device
WO2022001945A1 (en) Blockchain and application system combined non-intrusive method, server, and medium
CN109462868B (en) Method and equipment for inquiring target information by wireless access point
CN112367302A (en) Identity authentication method and system suitable for chrome browser
CN116232655B (en) Configuration application permission management method and system based on Internet of things cloud platform
CN111061885A (en) Electronic document making method and system
CN113486313B (en) Unified identity authentication method and system for school system personnel
CN116361331A (en) Data query method and device
US20050086513A1 (en) Concept based message security system
CN117931861A (en) Service processing method and device
CN115080621A (en) Data service processing method and device, processor and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 276800 No.16, Yantai North Road, Rizhao City, Shandong Province

Applicant after: Shandong Zhixin Information Technology Co.,Ltd.

Address before: 276800 No. 16, Yantai North Road, Yantai City, Shandong Province

Applicant before: Shandong Zhixin Information Technology Co.,Ltd.