CN115695415A - File processing method, system, device and readable storage medium - Google Patents

File processing method, system, device and readable storage medium Download PDF

Info

Publication number
CN115695415A
CN115695415A CN202211338227.8A CN202211338227A CN115695415A CN 115695415 A CN115695415 A CN 115695415A CN 202211338227 A CN202211338227 A CN 202211338227A CN 115695415 A CN115695415 A CN 115695415A
Authority
CN
China
Prior art keywords
algorithm
file
user
equipment
file processing
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211338227.8A
Other languages
Chinese (zh)
Inventor
邵振军
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
BOE Technology Group Co Ltd
Original Assignee
BOE Technology Group Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by BOE Technology Group Co Ltd filed Critical BOE Technology Group Co Ltd
Priority to CN202211338227.8A priority Critical patent/CN115695415A/en
Publication of CN115695415A publication Critical patent/CN115695415A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the application provides a file processing method, a file processing system, file processing equipment and a readable storage medium, and relates to the technical field of computers. The method comprises the following steps: responding to a first operation of a first user on a first preset area of a file processing system interface, and acquiring an algorithm to be issued and a corresponding algorithm type; according to the algorithm type, packaging the algorithm to be issued into an algorithm file; and testing and checking the algorithm file, and issuing the algorithm file after the algorithm file passes the testing and checking. The embodiment of the application provides a unified solution for algorithm production, realizes automatic packaging, testing, auditing and issuing of the algorithm, improves the efficiency of algorithm packaging, improves the accuracy of algorithm issuing, effectively shortens the online period of the algorithm, saves the time cost, and can issue the algorithm quickly for users to call so as to meet the requirements of the users.

Description

File processing method, system, device and readable storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a file processing method, system, device, and readable storage medium.
Background
The existing algorithm is developed to have a long path used by an end user, and developers of different technical stacks are required to participate, so that the online period is long. After the algorithm development is completed, a uniform and standard packaging mode is lacked to realize the packaging of different types of algorithms, so that the packaging efficiency is low. Moreover, after the algorithm development is completed, a developer or a tester needs to manually test and verify, so that the algorithm testing efficiency is low. By combining the reasons, the existing algorithm is slow in issuing speed and cannot meet the calling requirements of users.
Disclosure of Invention
The application provides a file processing method, a file processing system, file processing equipment and a readable storage medium, which are used for solving the technical problems of long production period, low packaging and testing efficiency and the like of the existing algorithm.
In a first aspect, a file processing method is provided, and the method includes:
responding to a first operation of a first user on a first preset area of a file processing system interface, and acquiring an algorithm to be issued and a corresponding algorithm type;
according to the algorithm type, packaging the algorithm to be issued into an algorithm file;
and testing and checking the algorithm file, and issuing the algorithm file after the algorithm file passes the testing and checking.
In one possible implementation manner, the issuing process of the algorithm file includes:
displaying a second preset area of the file processing system interface through the algorithm type corresponding to the algorithm file, wherein the second preset area is different from the first preset area, and different algorithm types correspond to different algorithm calling modes.
In another possible implementation, the method further includes:
responding to a second operation of a second user on the second preset area, verifying the second user and a target algorithm file pre-called by the second user, and calling the target algorithm file after the verification is passed;
wherein the verification of the second user comprises: and checking the validity of the user identity and the validity of the user IP address.
In another possible implementation manner, if the target algorithm file is of an API type, the process of calling the target algorithm file specifically includes:
and determining whether to call an interface corresponding to the target algorithm file or not according to the signature of the second operation, wherein the second operation carries out signature based on a signature algorithm issued by a file processing system.
In yet another possible implementation, the method further includes:
and if the algorithm file does not pass the test audit, sending a notification message to the equipment of the first user to notify the first user that the algorithm to be issued corresponding to the algorithm file is wrong.
In yet another possible implementation, the method further comprises at least one of:
responding to a third operation of a third user, inquiring the acquired information, and filtering the content which does not meet the preset condition in the information;
responding to any operation of a user, encrypting and transmitting the acquired information;
the file processing system is in a stable state by adopting at least one mode of flow control, distributed storage, distributed service, load balancing, fault transfer and system monitoring.
In yet another possible implementation, the method further includes:
responding to a fourth operation of a fourth user on a third preset area of the file processing system interface, and acquiring an upgrade package, wherein the third preset area is different from the first preset area;
according to the upgrade package and the upgrade related information, at least one of the following information is determined for the upgrade package: the matched equipment type, the supported system platform, the distribution mode and the upgrading time;
and generating a download address of the upgrade package and pushing the download address to corresponding equipment to be upgraded.
In yet another possible implementation manner, before generating the download address of the upgrade package, the method further includes at least one of:
according to the prestored equipment version number, filtering the upgraded equipment to obtain at least one equipment to be upgraded;
compressing the upgrade package with the capacity larger than the threshold value, and storing the compressed upgrade package into an object storage system;
and for each device to be upgraded, acquiring the operator information of the device according to the IP address of the device when the device is registered, and storing the upgrade package in the corresponding Content Delivery Network (CDN).
In yet another possible implementation, the method further includes:
responding to a downloading request of the equipment to be upgraded, and issuing the upgrading packet to the equipment to be upgraded;
if the equipment to be upgraded is interrupted when the upgrading package is downloaded, the downloading position of the equipment to be upgraded is saved, and the upgrading package is continuously transmitted from the downloading position after the network of the equipment to be upgraded is recovered to be normal.
In a second aspect, there is provided a document processing system, the system comprising:
the operation response module is configured to respond to a first operation of a first user on a file processing system interface, and obtain an algorithm to be issued and a corresponding algorithm type;
and the file processing module is configured to package the algorithm to be issued into an algorithm file according to the algorithm type, test and check the algorithm file, and issue the algorithm file after the algorithm file passes the test and check.
In a third aspect, an electronic device is provided, which includes:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: the file processing method described in any of the embodiments of the first aspect is performed.
For example, in a third aspect of the present application, there is provided a computer device comprising: the processor, the memory and the communication interface complete mutual communication through the communication bus;
the memory is used for storing at least one executable instruction, and the executable instruction enables the processor to execute the operation corresponding to the file processing method as shown in the first aspect of the application.
In a fourth aspect, a computer-readable storage medium is provided, where the processor-readable storage medium stores a computer program for causing a processor to execute the file processing method described in any one of the embodiments of the first aspect.
For example, in a fourth aspect of the embodiments of the present application, a computer-readable storage medium is provided, on which a computer program is stored, and the computer program, when executed by a processor, implements the file processing method shown in the first aspect of the present application.
The technical scheme provided by the application brings the beneficial effects that:
the unified solution for algorithm production is provided, automatic packaging, testing, auditing and issuing of the algorithm are realized, algorithm packaging efficiency is improved, algorithm issuing accuracy is improved, the online period of the algorithm is effectively shortened, time cost is saved, the algorithm can be issued quickly for users to call, and the requirements of the users are met.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 is a schematic flowchart of a file processing method according to an embodiment of the present application;
FIG. 2 is a first schematic diagram illustrating algorithm authorization in a document processing method according to an embodiment of the present application;
fig. 3 is a schematic diagram illustrating algorithm authorization in a document processing method according to an embodiment of the present application;
fig. 4 is a first interaction diagram of an application scenario of a file processing method according to an embodiment of the present application;
fig. 5 is a second interaction diagram of an application scenario of a file processing method according to an embodiment of the present application;
FIG. 6 is a schematic diagram of a document processing system that implements a document processing method provided in an embodiment of the present application;
FIG. 7 is a schematic structural diagram of a document processing system according to an embodiment of the present application;
fig. 8 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to the embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like reference numerals refer to the same or similar elements or elements having the same or similar functions throughout. The embodiments described below with reference to the accompanying drawings are illustrative and are only for the purpose of explaining the present application and are not to be construed as limiting the present invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. It will be understood that when an element is referred to as being "connected" or "coupled" to another element, it can be directly connected or coupled to the other element or intervening elements may also be present. Further, "connected" or "coupled" as used herein may include wirelessly connected or wirelessly coupled. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
At least part of contents in the file processing method provided by the embodiment of the application relate to the field of artificial intelligence. Artificial Intelligence (AI) is a theory, method, technique and application system that uses a digital computer or a machine controlled by a digital computer to simulate, extend and expand human Intelligence, perceive the environment, acquire knowledge and use the knowledge to obtain the best results. In other words, artificial intelligence is a comprehensive technique of computer science that attempts to understand the essence of intelligence and produce a new intelligent machine that can react in a manner similar to human intelligence. Artificial intelligence is the research of the design principle and the realization method of various intelligent machines, so that the machines have the functions of perception, reasoning and decision making.
The artificial intelligence technology is a comprehensive subject and relates to the field of extensive technology, namely the technology of a hardware level and the technology of a software level. The artificial intelligence infrastructure generally includes technologies such as sensors, dedicated artificial intelligence chips, cloud computing, distributed storage, big data processing technologies, operation/interaction systems, mechatronics, and the like. The artificial intelligence software technology mainly comprises a computer vision technology, a voice processing technology, a natural language processing technology, machine learning/deep learning and the like.
Machine Learning (ML for short) is a multi-domain cross subject, and relates to multiple subjects such as probability theory, statistics, approximation theory, convex analysis, algorithm complexity theory and the like. The special research on how a computer simulates or realizes the learning behavior of human beings so as to acquire new knowledge or skills and reorganize the existing knowledge structure to continuously improve the performance of the computer. Machine learning is the core of artificial intelligence, is the fundamental approach for computers to have intelligence, and is applied to all fields of artificial intelligence. Machine learning and deep learning generally include techniques such as artificial neural networks, belief networks, reinforcement learning, transfer learning, inductive learning, and formal education learning.
The file processing method of the embodiment of the application can be executed by computer equipment, and the computer equipment comprises but is not limited to a server. The server may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing basic cloud computing services such as cloud service, a cloud database, cloud computing, a cloud function, cloud storage, network service, cloud communication, middleware service, domain name service, security service, CDN, and a big data and artificial intelligence platform.
Hereinafter, the user device is also referred to as a terminal, and may be, but is not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart speaker, a smart watch, and the like. The user equipment and the server may be directly or indirectly connected through wired or wireless communication, and the application is not limited herein.
To further illustrate the technical solutions provided by the embodiments of the present application, the following detailed description is made with reference to the accompanying drawings and the detailed description. Although the embodiments of the present application provide method steps as shown in the following embodiments or figures, more or fewer steps may be included in the method based on conventional or non-inventive efforts. In steps where no necessary causal relationship exists logically, the order of execution of the steps is not limited to that provided by the embodiments of the present application.
An embodiment of the present application provides a file processing method, and as shown in fig. 1, the method includes:
s101, responding to a first operation of a first user on a first preset area of a file processing system interface, and acquiring an algorithm to be issued and a corresponding algorithm type;
s102, packaging the algorithm to be issued into an algorithm file according to the algorithm type;
and S102, testing and auditing the algorithm file, and issuing the algorithm file after the algorithm file passes the testing and auditing.
Specifically, in this embodiment, when a user (hereinafter, the first user) pre-issues an algorithm, it is possible to request to upload the algorithm to the file processing system by inputting a first operation on a first predetermined area of the file processing system interface, and select an algorithm type of the algorithm, for example: selecting an Application Programming Interface (API) or a Software Development Kit (SDK), in response to the first operation, the file processing system obtains an algorithm to be published and a corresponding algorithm type, and automatically packages the algorithm to be published according to the algorithm type, for example: packaging the API type algorithm into an http service, and generating a call address of the http service by using a service call mode POST (POST position transfer); and encapsulating the SDK type algorithm into an SDK packet which can be called by the user equipment. The algorithm may also be marked as completed after it is completed. The packaged algorithm may then be automatically tested, for example: and for the API type algorithm, loading an address of the http service, simulating and calling an input parameter of the algorithm, returning a calling result, marking the calling result as a state to be put on shelf if the calling result is successful, marking the calling result as the state to be put on shelf after secondary verification, and issuing the state to be called and downloaded by other users.
The process of acquiring the algorithm to be issued by the file processing system may include:
(1) an algorithm uploading module defines an uploading data structure as follows, receives data and stores the data on a disk;
{
zip, file, algorithm file package
"name": csvAnalyse "// Algorithm name
}
(2) Decompressing the uploaded file to obtain an algorithm code;
(3) the input and output of the labeling algorithm are JSON with the following format:
inputting a JSON format: { "inputParamList [ {" param1": value1" }, "" param2": value2" ], inputFileList [ { "file1": file 1"}, {" file2": file2" } the
Outputting JSON format { "result": JSON character string "," outputFileList "[ {" outpile 1": outpilename 1" }, { "outpile 2": outpilename 2"}, wherein inputParamList and outputFileList are fixed parameters, and the rest are input and output by developers according to the algorithm for self-defining;
(4) and storing the input and output parameters into a database to store data after receiving the input and output parameters.
The method in the embodiment realizes automatic packaging, testing, auditing and issuing of the algorithm, improves the efficiency of algorithm packaging, improves the accuracy of algorithm issuing, effectively shortens the online period of the algorithm, saves the time cost, and can quickly issue the algorithm for users to call so as to meet the requirements of the users.
It should be noted that, if the algorithm marked as the on-shelf state is updated by the user and the updated algorithm is uploaded, the original algorithm can be covered after the algorithm is automatically packaged and tested and checked.
The embodiment of the present application provides a possible implementation manner, and on the basis of the above embodiment, the implementation manner may further include:
and if the algorithm file does not pass the test audit, sending a notification message to the equipment of the first user to notify the first user that the algorithm to be issued corresponding to the algorithm file is wrong.
Specifically, in the embodiment, the packaged algorithm is automatically tested, if the test result is failure, the log storage can be called, and the test failure result and the log link are notified to the first user through the website mail or the mail, so that the first user can correct and optimize the wrong algorithm, and the first user can upload the algorithm again after local debugging, and the accuracy of algorithm release is improved.
In a possible implementation manner provided in the embodiment of the present application, the issuing process of the algorithm file includes: displaying a second preset area of the file processing system interface through the algorithm type corresponding to the algorithm file, wherein the second preset area is different from the first preset area, and different algorithm types correspond to different algorithm calling modes.
Specifically, in this embodiment, the algorithm may be displayed in an algorithm type manner in a fixed area of the document processing system interface after being automatically packaged, tested, and audited. For example: the method comprises the steps of displaying by means of classification of forms of an API and an SDK, wherein the API provides an http interface to call a user, the SDK provides a download path, and the user can use the terminal in an integrated mode after downloading.
The embodiment of the present application further provides a possible implementation manner, and on the basis of the above embodiment, the implementation manner may further include:
responding to a second operation of a second user on the second preset area, verifying the second user and a target algorithm file pre-called by the second user, and calling the target algorithm file after the verification is passed;
wherein the verifying of the second user comprises: and checking the validity of the user identity and the validity of the user IP address.
Specifically, in this embodiment, when a user (hereinafter, a second user) uses a certain algorithm for pre-download, the file processing system can be logged in to request download of the algorithm by inputting a second operation on a second predetermined area (different from the first predetermined area) of the file processing system interface. The file processing system responds to the second operation, needs to verify the second user and the pre-downloaded algorithm of the second user, and calls the algorithm after the verification is passed, so that the algorithm can be safely and effectively called.
If the algorithm requesting downloading is of the API type, the specific process may refer to the contents shown in fig. 2. As shown in fig. 3, includes:
s201, after the second user logs in the file processing system, the file processing system needs to verify the validity of the second user identity, which specifically includes: whether the second user is a registered user of the file processing system or not can be verified through means of short message verification codes, two-dimension codes and the like, the user passing the verification can be called an authorized user, and the unauthorized user range algorithm calling interface is refused.
S202, for the user who passes the verification, further verifying the validity of the IP address of the user, for example: and by setting a white list mechanism, acquiring the IP address of the user equipment according to the request of the user, comparing the IP address of the user with a white list, and if the IP address of the user is in the list, calling the user equipment, otherwise, calling the user equipment.
S203, after the interface can be called by the user, whether the purchased service is in the valid period or not is checked according to the purchase information of the second user, and if the service is in the valid period, the algorithm interface can be called and the algorithm service is called.
For example: the validity period of the service purchased by the second user is 1 year, the usage right is that the upper limit of the concurrency amount is 20, namely, the algorithm can be downloaded and called by the file processing system within the validity period of 1 year, and the download concurrency amount cannot exceed 20.
If the downloading request algorithm is of SDK type, the device in the networking state may perform online authorization with reference to the content shown in fig. 2 (i.e., adopt an online authorization mode), and for the device with network limitation, may use an offline authorization mode, and the specific process is shown in fig. 3, and includes:
s301, the file processing system obtains identification information of the user equipment, for example: device fingerprint, identification ID, etc.
S302, license files are generated according to the acquired identification information, namely: a software authorization file.
S303, the license file is issued to the user equipment.
S304, when the SDK is started, the user equipment verifies whether the purchased service is in the valid period according to the purchase information of the second user, if so, the SDK algorithm can be called, and the SDK algorithm is called.
That is, to ensure the security of the algorithm invocation, a variety of security policies may be employed to verify prior to invocation.
In a possible implementation manner provided in the embodiment of the present application, if the target algorithm file is of an API type, the process of calling the target algorithm file specifically includes:
and determining whether to call an interface corresponding to the target algorithm file or not according to the signature of the second operation, wherein the second operation carries out signature based on a signature algorithm issued by a file processing system.
Specifically, in this embodiment, to avoid data being tampered during transmission, an interface signature is used. Before calling the API, the file processing system distributes the signing algorithm (appid, appsecret) to the algorithm caller (e.g., the second user above), which uses both values to sign the request. When API calling is carried out, a caller transmits a signature field sign generated according to an algorithm provided by a file processing system to an interface, the interface signs according to the same algorithm after receiving the signature, the values of the signature and the signature are compared, if the values are the same, the interface can be called, otherwise, the calling is forbidden, and therefore the safe calling of the algorithm interface can be ensured.
The embodiment of the present application further provides a possible implementation manner, and on the basis of the foregoing embodiments, the implementation manner may further include at least one of the following operations:
responding to a third operation of a third user, inquiring the acquired information, and filtering the content which does not meet the preset condition in the information;
responding to any operation of a user, encrypting and transmitting the acquired information;
the file processing system is in a stable state by adopting at least one mode of flow control, distributed storage, distributed service, load balancing, fault transfer and system monitoring.
Specifically, in this embodiment, if the file processing system receives a click operation (the third operation in the foregoing) of a hacker (the third user in the foregoing), the file processing system may query the acquired information corresponding to the click operation, for example: the URL, the accompanying HTTP header, POST data, and the like are queried, and the contents having a predetermined format and a predetermined length are filtered. Confirming that the received content is properly normalized and only contains the minimum and safe Tag, and removing any cookie using HTTP only for referencing the remote content, thereby achieving the purpose of preventing XSS attack. The cross-site scripting attack XSS is a computer security hole in Web application and allows a malicious Web user to implant codes into pages provided for other users to use.
In addition, data transmitted using the http protocol is easily sniffed to listen to the transmitted content if sensitive information is present in the data. Therefore, the file processing system uses an encryption transmission mode for the user request, and sensitive information is prevented from being lost. The file processing system is suitable for https transmission data, and encryption is performed through a CA certificate to ensure encryption in the transmission process.
In addition, the stability of the file processing system can be ensured in at least one of the following ways.
(1) Flow control:
the system has certain access capacity, and if large-scale flow accesses the system, the system access is likely to be slow, and even the server resources are exhausted, so that the system is down. The system can realize the flow limitation aiming at the service and interface levels by using the flow control.
1) Setting a threshold value T on the file processing system level, wherein the threshold value T represents the maximum request quantity which can be borne by the system;
2) The system records the number R of requests of a user to the system, R +1 is used for comparing R with T when one request is added, if R < T, the request is executed, and when R > T, the request is put into a request Queue to be executed when the request Queue is free;
3) When the request is finished, R-1;
4) If Queue is not empty, the earliest request is fetched in chronological order for execution.
(2) Distributed storage:
a large number of SDKs exist in the file processing system, and in order to ensure that the SDKs cannot be lost, the distributed file system is used for storing the SDKs, so that single-point fault data loss is prevented.
1) At least 3 storage servers (6 storage servers are suggested), file fragments are stored in different servers, and redundancy is set;
2) When the server fails to work in 1 station (3 modes)/3 stations (6 modes), all data can still be acquired, so that the redundancy of storage is improved.
(3) Distributed service:
the service is deployed on different servers, and when the service is abnormal, the service can be timely transferred to the normal service, so that the call can be completed.
(4) Load balancing:
the system provides load balancing, so that the requests are distributed on different servers, the pressure of a single server is reduced, and the response efficiency of the system is improved.
(5) And (3) fault transfer:
when one service fails, other services can be adopted to recover quickly, and user experience is improved.
(6) And (3) system monitoring:
and when the server or the service is abnormal, early warning information is timely sent to related personnel in a mail, short message and other modes so as to be processed in time.
Fig. 4 is a first interaction diagram of an application scenario of a file processing method according to an embodiment of the present application. The file processing system shown in fig. 4 includes a distribution system and an algorithm repository, wherein the distribution system includes an algorithm uploading module, an algorithm packaging module, an algorithm testing module, and an algorithm distribution module, and the algorithm repository includes: API, SDK and security module, wherein, the security module possesses function submodule such as mandate, current-limiting, attack prevention, encryption transmission.
The user can upload the AI algorithm to a publishing system in the file processing system, the publishing system uploads, packages, tests and audits the AI algorithm after receiving the AI algorithm uploaded by the user, and publishes the AI algorithm passing the test and audit to an algorithm warehouse, and displays the AI algorithm passing the test and audits to the algorithm warehouse through the API or the SDK, when another user or application needs to call a certain algorithm in the algorithm warehouse, the safety module verifies the AI algorithm, and the AIP algorithm interface or the SDK algorithm is called after the verification is passed.
Of course, the method provided in the embodiment of the present application is not limited to the application scenario shown in fig. 4, and may also be used in other possible application scenarios, and the embodiment of the present application is not limited. The functions that can be implemented by each device of the application scenario shown in fig. 4 have been described in the above method embodiment, and are not described again here.
In summary, the method in the embodiment of the present application has the following advantages:
1. the unified solution for algorithm production is provided, repeated packaging and online work of developers are reduced, and the developers are concentrated in algorithm development.
2. The algorithm is automatically packaged, and after the algorithm is uploaded to a file processing system through a visual interface, the algorithm is automatically packaged into http service or SDK, so that the system efficiency of algorithm packaging is improved.
3. The algorithm automatic test is realized through configuration, after the algorithm input and output template is configured, the system can automatically execute the algorithm, if an error occurs, an alarm can be prompted, and an algorithm developer can optimize the algorithm according to alarm information, so that the issuing accuracy is improved, and the time is saved.
4. And (4) safe calling, wherein when a user calls an algorithm, a safety module of the file processing system analyzes the request address and the parameters, and if an attack suspicion is found, the calling is stopped in time.
5. The system stability is high, when a large number of requests are concurrently called, the file processing system can analyze the factors such as the load and concurrency of the current system, and if the request number system can not bear the load, the file processing system can queue or refuse the requests according to the strategy so as to ensure the stability of the system.
The embodiment of the present application further provides an optional implementation, and the method may further include:
responding to a fourth operation of a fourth user on a third preset area of the file processing system interface, and acquiring an upgrade package, wherein the third preset area is different from the first preset area;
according to the upgrade package and the upgrade related information, determining at least one of the following information for the upgrade package: the matched equipment type, the supported system platform, the distribution mode and the upgrading time;
and generating a download address of the upgrade package and pushing the download address to corresponding equipment to be upgraded.
Specifically, in this embodiment, if a certain user (hereinafter, a fourth user) uploads an upgrade package in advance, the upgrade package may be requested to be uploaded to the file processing system by inputting a fourth operation on a third predetermined area of the file processing system interface, and the file processing system acquires the upgrade package in response to the fourth operation. It should be noted that the third predetermined area is different from both the first predetermined area and the second predetermined area in the above embodiment.
The file processing system determines from the upgrade package and upgrade related information (e.g., devices requiring upgrades, time periods during which upgrades, etc.) for the upgrade package at least one of the following: the matched device types (such as a smart phone, a smart box, a television and the like), the supported system platforms (such as android, linux and the like), the distribution mode and the upgrading time, and then the download address of the upgrading package is generated and pushed to the corresponding device to be upgraded.
The method in the embodiment generally uses an intelligent technical means, so that the terminal equipment can accurately and efficiently acquire the latest application for upgrading operation.
In some optional embodiments, before generating the download address of the upgrade package, the method may further include at least one of:
according to the pre-stored equipment version number, filtering the upgraded equipment to obtain at least one equipment to be upgraded;
compressing the upgrade package with the capacity larger than the threshold value, and storing the compressed upgrade package into an object storage system;
for each device to be upgraded, acquiring the operator information of the device according to the IP address of the device when the device is registered, and storing the upgrade package in a corresponding Content Delivery Network (CDN).
Specifically, in this embodiment, it may be determined whether the device list in the upgrade task meets the upgrade requirement according to the device version number recorded in the system, and the upgraded devices are filtered out to obtain the device list to be upgraded, and the batches may be divided according to the number of the devices in the device list to be upgraded, where a batch = the total number of devices in the list/the number of devices in each batch.
Because the capacity of some upgrading packets is larger, the network transmission occupies a larger bandwidth and takes a longer transmission time, and the software upgrading packets can be compressed through a compression algorithm, so that the capacity is reduced, and the software upgrading packets are stored in an object storage system.
In addition, the upgrade package may also be stored in the CDN of the corresponding network according to the operator information of the IP address storage device when the device is registered, so as to obtain better network transmission performance.
In other alternative embodiments, the above method may further comprise:
responding to a downloading request of the equipment to be upgraded, and issuing the upgrading packet to the equipment to be upgraded;
if the equipment to be upgraded is interrupted when the upgrade package is downloaded, the downloading position of the equipment to be upgraded is stored, and the upgrade package is continuously transmitted from the downloading position after the network of the equipment to be upgraded is recovered to be normal.
Specifically, in this embodiment, the file processing system can provide a breakpoint resume service, save the location of the terminal download under an interruption condition such as an unstable terminal network or a network interruption, and continue to download the compressed packet after the network is normal.
Fig. 5 is a second interaction diagram of an application scenario of a file processing method according to an embodiment of the present application. The user makes a difference package, a firmware package and a terminal application package (APK package) on line, and then uploads the made packages to the OTA platform (which may be the file processing system in the above) in the cloud. And analyzing and decision-making management is carried out on the upgrade package on the OTA platform through an intelligent distribution bus, then the link address of the upgrade package is pushed to a corresponding terminal (registered on the OTA platform), the terminal downloads the upgrade package and carries out local upgrade, and the upgrade progress is reported after the upgrade is finished.
The method provided by the embodiment of the present application is not limited to the application scenario shown in fig. 5, and may also be used in other possible application scenarios, and the embodiment of the present application is not limited. The functions that can be implemented by each device of the application scenario shown in fig. 5 have been described in the above method embodiment, and are not described again here.
It should be noted that, in this embodiment, the OTA platform further includes functional modules such as device access (for registering, authorizing, and the like a terminal device accessing the platform), version management (for managing the version of the upgrade package), APK management (for managing the APK installation package), firmware package management (for managing the firmware package), task scheduling (for scheduling the upgrade task), and upgrade result management (for managing the upgrade result of the upgrade package). The specific implementation process of the functional modules may refer to related technologies, and for brevity of description, details are not repeated here. The following describes a specific implementation process of the intelligent distribution bus with reference to fig. 6.
Fig. 6 is a schematic diagram of a document processing system for implementing a document processing method according to an embodiment of the present application. The file processing system shown in fig. 6 includes an upgrade package making module and an intelligent distribution bus, where the intelligent distribution bus includes an analysis module and a decision maker, as well as a push module and a file service, where the analysis module classifies, tags, and the like according to the type of the upgrade package; and the decision maker performs operations such as equipment selection, compression and the like according to the result of the analysis module. The specific implementation process is as follows:
1. uploading upgrade package on OTA platform
(1) Establishing an upgrading task on a platform, wherein the upgrading task mainly comprises equipment needing upgrading and time period during which upgrading is carried out, and intelligent upgrading can be selected;
(2) Creating the version needing to be upgraded in the task for releasing to the equipment;
(3) Making an upgrade package and binding a version number;
(4) And uploading the upgrade package to the platform.
2. Analysis module
(1) Device type matching
According to the uploaded upgrade package and the related information, the types of the equipment are matched as follows: the method comprises the following steps of marking corresponding labels for installation packages by using a smart phone, a smart box, a television and the like;
(2) Platform matching
Determining platforms supported by application or firmware according to the model, type and other information of the equipment, such as: android, linux and the like, and meanwhile, marking corresponding labels for the installation packages;
(3) And recommending a distribution mode, upgrading time and the like for the upgrading packet of the task through an artificial intelligence learning AI system.
All data from the above steps can also be recorded as input to the AI system in order to improve accuracy.
3. Decision-making device
(1) Device selection
Determining whether an equipment list in an upgrading task meets the upgrading requirement or not according to the equipment version number recorded in the system, filtering upgraded equipment, and acquiring an equipment list to be upgraded; the batches are divided according to the number of devices in the list of devices to be upgraded, batch = total number of devices listed/number of devices in each batch.
(2) Smart compression
Some upgrade packages have larger capacity, network transmission occupies larger bandwidth and takes longer time, and the software packages are compressed through a compression algorithm, so that the capacity is reduced and the software packages are stored in an object storage system.
(3) Network selection
And storing the upgrade package in the CDN of the corresponding network according to the operator information of the IP address storage device during device registration so as to obtain better network transmission performance and generate an upgrade package download address at the same time.
(4) Breakpoint resume
And the downloading position of the terminal is saved under the interrupt conditions of unstable or disconnected network of the terminal network and the like, and the compressed packet can be continuously downloaded after the network is normal.
4. Push module
(1) And pushing the download address of the upgrade package generated in the decision maker to the corresponding equipment.
5. Terminal equipment upgrade
(1) After the terminal equipment acquires the upgrading message, connecting an OTA cloud platform to download an upgrading packet;
(2) After the upgrade package is downloaded, performing upgrade operation on the terminal equipment;
(3) And the terminal equipment reports the upgrading progress to the cloud platform.
In summary, the method in the embodiment of the present application has the following advantages:
1. and artificial intelligence learning technology is introduced to give efficient suggestions for different types of equipment.
2. Compression techniques are used to reduce the size of the packets, thereby making network transmission faster.
3. The network speed is intelligently tested, and the fastest network distribution is adopted.
4. And the endpoint continues to transmit, so that the transmission can be successfully carried out in the low-speed network.
Based on the same inventive concept, the embodiment of the present application further provides a document processing system, as shown in fig. 7, the document processing system 40 may include: an operation response module 401 and a file processing module 402, wherein,
the operation response module 401 is configured to respond to a first operation of a first user on the file processing system interface, and acquire an algorithm to be issued and a corresponding algorithm type;
the file processing module 402 is configured to encapsulate the algorithm to be issued into an algorithm file according to the algorithm type, perform test audit on the algorithm file, and issue the algorithm file after the algorithm file passes the test audit.
In some embodiments, the process of issuing the algorithm file includes:
and displaying a second preset area of the file processing system interface through the algorithm type corresponding to the algorithm file, wherein the second preset area is different from the first preset area, and different algorithm types correspond to different algorithm calling modes.
In other embodiments, the operation response module 401 is further configured to:
responding to a second operation of a second user on the second preset area, verifying the second user and a target algorithm file pre-called by the second user, and calling the target algorithm file after the verification is passed; wherein the verification of the second user comprises: and checking the validity of the user identity and the validity of the user IP address.
In other embodiments, if the target algorithm file is of the API type, the process of calling the target algorithm file specifically includes:
and determining whether to call an interface corresponding to the target algorithm file or not according to the signature of the second operation, wherein the second operation carries out signature based on a signature algorithm issued by a file processing system.
In other embodiments, the document processing module 402 is further configured to:
and if the algorithm file does not pass the test audit, sending a notification message to the equipment of the first user to notify the first user that the algorithm to be issued corresponding to the algorithm file is wrong.
In other embodiments, the operation response module 401 is further configured to:
responding to a third operation of a third user, inquiring the acquired information, and filtering the content which does not meet the preset condition in the information; and/or, in response to any operation of a user, encrypting and transmitting the acquired information;
the file processing module 402 is further configured to: the file processing system is in a stable state by adopting at least one mode of flow control, distributed storage, distributed service, load balancing, fault transfer and system monitoring.
In other embodiments, the operation response module 401 is further configured to: responding to a fourth operation of a fourth user on a third preset area of the file processing system interface, and acquiring an upgrade package, wherein the third preset area is different from the first preset area;
the file processing module 402 is further configured to: according to the upgrade package and the upgrade related information, determining at least one of the following information for the upgrade package: the matched equipment type, the supported system platform, the distribution mode and the upgrading time; and generating a download address of the upgrade package and pushing the download address to corresponding equipment to be upgraded.
In other embodiments, before generating the download address of the upgrade package, the file processing module 402 is further configured to perform at least one of the following operations:
according to the prestored equipment version number, filtering the upgraded equipment to obtain at least one equipment to be upgraded;
compressing the upgrade package with the capacity larger than the threshold value, and storing the compressed upgrade package into an object storage system;
and for each device to be upgraded, acquiring the operator information of the device according to the IP address of the device when the device is registered, and storing the upgrade package in the corresponding Content Delivery Network (CDN).
In other embodiments, the operation response module 401 is further configured to: responding to a downloading request of the equipment to be upgraded, and issuing the upgrading packet to the equipment to be upgraded;
the file processing module 402 is further configured to: if the equipment to be upgraded is interrupted when the upgrade package is downloaded, the downloading position of the equipment to be upgraded is stored, and the upgrade package is continuously transmitted from the downloading position after the network of the equipment to be upgraded is recovered to be normal.
The file processing system of this embodiment can execute the file processing method shown in the foregoing embodiments of this application, which achieves similar principles and can achieve the same beneficial effects as the file processing method shown in the foregoing embodiments, and thus, details are not repeated here.
An embodiment of the present application provides an electronic device, which includes: a memory and a processor; at least one program stored in the memory for execution by the processor, which when executed by the processor, implements: the algorithm is automatically packaged, tested, audited and issued, so that the algorithm packaging efficiency is improved, the algorithm issuing accuracy is improved, the online period of the algorithm is effectively shortened, the time cost is saved, the algorithm can be quickly issued for users to call, and the requirements of the users are met.
The electronic device 50 shown in fig. 8 includes: a processor 501 and a memory 503. Wherein the processor 501 is coupled to the memory 503, such as via the bus 502. Optionally, the electronic device 50 may further include a transceiver 504, and the transceiver 504 may be used for data interaction between the electronic device and other electronic devices, such as transmission of data and/or reception of data. It should be noted that the transceiver 504 is not limited to one in practical application, and the structure of the electronic device 50 is not limited to the embodiment of the present application.
The Processor 501 may be a CPU (Central Processing Unit), a general-purpose Processor, a DSP (Digital Signal Processor), an ASIC (Application Specific Integrated Circuit), an FPGA (Field Programmable Gate Array) or other Programmable logic device, a transistor logic device, a hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 501 may also be a combination of implementing computing functionality, e.g., comprising one or more microprocessors, a combination of DSPs and microprocessors, and the like.
Bus 502 may include a path that transfers information between the above components. The bus 502 may be a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus 502 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 8, but that does not indicate only one bus or one type of bus.
The Memory 503 may be a ROM (Read Only Memory) or other type of static storage device that can store static information and instructions, a RAM (Random Access Memory) or other type of dynamic storage device that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory), a CD-ROM (Compact Disc Read Only Memory) or other optical Disc storage, optical Disc storage (including Compact Disc, laser Disc, optical Disc, digital versatile Disc, blu-ray Disc, etc.), a magnetic disk storage medium or other magnetic storage device, or any other medium that can be used to carry or store desired program code in the form of instructions or data structures and that can be accessed by a computer, but is not limited to these.
The memory 503 is used for storing application program codes for executing the scheme of the application, and the processor 501 controls the execution. The processor 501 is configured to execute application program code stored in the memory 503 to implement the content shown in the foregoing method embodiments.
The embodiment of the present application provides a computer readable storage medium, on which a computer program is stored, and when the computer program runs on a computer, the computer is enabled to execute the corresponding content in the foregoing method embodiment. Compared with the prior art, the unified solution for algorithm production is provided, automatic packaging, testing, auditing and issuing of the algorithm are realized, algorithm packaging efficiency is improved, algorithm issuing accuracy is improved, the online period of the algorithm is effectively shortened, time cost is saved, the algorithm can be issued quickly for users to call, and the requirements of the users are met.
The terms "first," "second," "third," "fourth," "1," "2," and the like in the description and claims of this application and in the preceding drawings, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used are interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in other sequences than illustrated or otherwise described herein.
It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation. In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented as a software functional unit and sold or used as a stand-alone product, may be stored in a processor readable storage medium. Based on such understanding, the technical solutions of the present application, which are essential or contributing to the prior art, or all or part of the technical solutions may be embodied in the form of a software product, which is stored in a storage medium and includes several instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-executable instructions. These computer-executable instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These processor-executable instructions may also be stored in a processor-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the processor-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These processor-executable instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of execution is not necessarily sequential, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The foregoing is only a partial embodiment of the present invention, and it should be noted that, for those skilled in the art, various modifications and decorations can be made without departing from the principle of the present invention, and these modifications and decorations should also be regarded as the protection scope of the present invention.

Claims (12)

1. A method of processing a file, comprising:
responding to a first operation of a first user on a first preset area of a file processing system interface, and acquiring an algorithm to be issued and a corresponding algorithm type;
according to the algorithm type, packaging the algorithm to be issued into an algorithm file;
and testing and checking the algorithm file, and issuing the algorithm file after the algorithm file passes the testing and checking.
2. The method of claim 1, wherein the issuing process of the algorithm file comprises:
and displaying a second preset area of the file processing system interface through the algorithm type corresponding to the algorithm file, wherein the second preset area is different from the first preset area, and different algorithm types correspond to different algorithm calling modes.
3. The method of claim 2, further comprising:
responding to a second operation of a second user on the second preset area, verifying the second user and a target algorithm file pre-called by the second user, and calling the target algorithm file after the verification is passed;
wherein the verification of the second user comprises: and checking the validity of the user identity and the validity of the user IP address.
4. The method of claim 3, wherein if the target algorithm file is an Application Program Interface (API) type, the process of calling the target algorithm file specifically comprises:
and determining whether to call an interface corresponding to the target algorithm file or not according to the signature of the second operation, wherein the second operation carries out signature based on a signature algorithm issued by a file processing system.
5. The method of claim 1, further comprising:
and if the algorithm file does not pass the test audit, sending a notification message to the equipment of the first user to notify the first user that the algorithm to be issued corresponding to the algorithm file is wrong.
6. The method according to any of claims 1-5, characterized in that the method further comprises at least one of the following operations:
responding to a third operation of a third user, inquiring the acquired information, and filtering the content which does not meet the preset condition in the information;
responding to any operation of a user, encrypting and transmitting the acquired information;
the file processing system is in a stable state by adopting at least one mode of flow control, distributed storage, distributed service, load balancing, fault transfer and system monitoring.
7. The method of claim 1, further comprising:
responding to a fourth operation of a fourth user on a third preset area of the file processing system interface, and acquiring an upgrade package, wherein the third preset area is different from the first preset area;
according to the upgrade package and the upgrade related information, at least one of the following information is determined for the upgrade package: the matched equipment type, the supported system platform, the distribution mode and the upgrading time;
and generating a download address of the upgrade package and pushing the download address to corresponding equipment to be upgraded.
8. The method of claim 7, wherein prior to generating the download address for the upgrade package, the method further comprises at least one of:
according to the prestored equipment version number, filtering the upgraded equipment to obtain at least one equipment to be upgraded;
compressing the upgrade package with the capacity larger than the threshold value, and storing the compressed upgrade package into an object storage system;
and for each device to be upgraded, acquiring the operator information of the device according to the IP address of the device when the device is registered, and storing the upgrade package in the corresponding Content Delivery Network (CDN).
9. The method according to claim 7 or 8, characterized in that the method further comprises:
responding to a downloading request of the equipment to be upgraded, and issuing the upgrading packet to the equipment to be upgraded;
if the equipment to be upgraded is interrupted when the upgrade package is downloaded, the downloading position of the equipment to be upgraded is stored, and the upgrade package is continuously transmitted from the downloading position after the network of the equipment to be upgraded is recovered to be normal.
10. A document processing system, comprising:
the operation response module is configured to respond to a first operation of a first user on a file processing system interface, and obtain an algorithm to be issued and a corresponding algorithm type;
and the file processing module is configured to package the algorithm to be issued into an algorithm file according to the algorithm type, test and check the algorithm file, and issue the algorithm file after the algorithm file passes the test and check.
11. An electronic device, characterized in that the electronic device comprises:
one or more processors;
a memory;
one or more applications, wherein the one or more applications are stored in the memory and configured to be executed by the one or more processors, the one or more programs configured to: -executing the file processing method according to any of claims 1 to 9.
12. A processor-readable storage medium, characterized in that the processor-readable storage medium stores a computer program for causing a processor to execute the file processing method of any one of claims 1 to 9.
CN202211338227.8A 2022-10-28 2022-10-28 File processing method, system, device and readable storage medium Pending CN115695415A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211338227.8A CN115695415A (en) 2022-10-28 2022-10-28 File processing method, system, device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211338227.8A CN115695415A (en) 2022-10-28 2022-10-28 File processing method, system, device and readable storage medium

Publications (1)

Publication Number Publication Date
CN115695415A true CN115695415A (en) 2023-02-03

Family

ID=85046508

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211338227.8A Pending CN115695415A (en) 2022-10-28 2022-10-28 File processing method, system, device and readable storage medium

Country Status (1)

Country Link
CN (1) CN115695415A (en)

Similar Documents

Publication Publication Date Title
CN110427785B (en) Equipment fingerprint acquisition method and device, storage medium and electronic device
CN106484453B (en) Method and device for realizing system upgrading
US11907700B2 (en) Upgrading method and system, server, and terminal device
CN105303112B (en) The detection method and device of component call loophole
CN112988485B (en) Simulation test method and device for electric power Internet of things equipment
CN108134708B (en) Method and device for monitoring third-party interface
CN110120970B (en) Data processing method and device based on Internet of vehicles and gateway system
CN104199654A (en) Open platform calling method and device
CN110601896B (en) Data processing method and equipment based on block chain nodes
CN109391673A (en) A kind of method, system and the terminal device of management update file
CN112615753B (en) Link abnormity tracking method, first node, second node and link
CN112528296B (en) Vulnerability detection method and device, storage medium and electronic equipment
CN111708990A (en) Applet starting method, signature method, device, server and medium
CN112994955A (en) Upgrade package sending management method, incremental upgrade package preparation method and related device
CN116155771A (en) Network anomaly test method, device, equipment, storage medium and program
CN110045969B (en) Application program installation method, server, system, device and storage medium
CN107145342B (en) Method and device for processing channel information of application
CN115730935A (en) Data processing method, device and equipment based on block chain and readable storage medium
CN116560691A (en) Data processing method, device, computer equipment and readable storage medium
CN115695415A (en) File processing method, system, device and readable storage medium
CN111835504A (en) Identification code generation method and server
CN112965735B (en) Model updating method, device, equipment and computer readable medium
CN111107143B (en) Network file transmission detection method, device and system
CN112751807B (en) Secure communication method, device, system and storage medium
CN110213341B (en) Method and device for detecting downloading of application program

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination