CN116680277B - Information verification method, device, equipment and storage medium - Google Patents

Information verification method, device, equipment and storage medium Download PDF

Info

Publication number
CN116680277B
CN116680277B CN202310936160.6A CN202310936160A CN116680277B CN 116680277 B CN116680277 B CN 116680277B CN 202310936160 A CN202310936160 A CN 202310936160A CN 116680277 B CN116680277 B CN 116680277B
Authority
CN
China
Prior art keywords
data
transaction
processed
state
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310936160.6A
Other languages
Chinese (zh)
Other versions
CN116680277A (en
Inventor
王玮犀
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202310936160.6A priority Critical patent/CN116680277B/en
Publication of CN116680277A publication Critical patent/CN116680277A/en
Application granted granted Critical
Publication of CN116680277B publication Critical patent/CN116680277B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2282Tablespace storage structures; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2308Concurrency control
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computational Linguistics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The application discloses an information verification method, an information verification device, information verification equipment and a storage medium, and belongs to the technical field of Internet. The method comprises the following steps: acquiring a first slave transaction in transactions to be handled, wherein the transactions to be handled are used for indicating to edit transaction data corresponding to a first account, the first slave transaction and a master transaction respectively indicate to edit the transaction data in an asynchronous mode, and the master transaction is the master transaction corresponding to the first transaction in the transactions to be handled; searching first transaction data corresponding to the first transaction based on the first slave transaction; verifying to-be-processed data in the first transaction data, wherein the to-be-processed data belongs to the transaction data corresponding to the to-be-processed transaction, and the data storage state of the to-be-processed data is to-be-processed state which is used for indicating that the to-be-processed data has editing processing requirements; and editing the data to be processed based on the first slave transaction.

Description

Information verification method, device, equipment and storage medium
Technical Field
The present disclosure relates to the field of internet technologies, and in particular, to an information verification method, apparatus, device, and storage medium.
Background
With the development of internet technology, there is a need for management and approval at the time of delivering transaction data such as technical files.
In the related art, data processing is generally performed in an asynchronous manner; for example, the transaction data is fed back to the initiator of the transaction data in the handover state, and then the manager asynchronously executes the actual data handover of the transaction data.
However, when there are a plurality of managers, repeated data transfer between the plurality of managers to transaction data may cause a problem of confusion in transaction data management.
Disclosure of Invention
The application provides an information verification method, an information verification device, information verification equipment and a storage medium, wherein the technical scheme is as follows:
according to an aspect of the present application, there is provided an information verification method, the method being performed by a computer device, the method comprising:
acquiring a first slave transaction in transactions to be handled, wherein the transactions to be handled are used for indicating to edit transaction data corresponding to a first account, the first slave transaction and a master transaction respectively indicate to edit the transaction data in an asynchronous mode, and the master transaction is the master transaction corresponding to the first transaction in the transactions to be handled;
Searching first transaction data corresponding to the first transaction based on the first slave transaction;
verifying to-be-processed data in the first transaction data, wherein the to-be-processed data belongs to the transaction data corresponding to the to-be-processed transaction, and the data storage state of the to-be-processed data is to-be-processed state which is used for indicating that the to-be-processed data has editing processing requirements;
and editing the data to be processed based on the first slave transaction.
According to another aspect of the present application, there is provided an information verification apparatus, the apparatus including:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a first slave transaction in transactions to be handled, the transactions to be handled are used for indicating to edit transaction data corresponding to a first account, the first slave transaction and a master transaction respectively indicate to edit the transaction data in an asynchronous mode, and the master transaction is the master transaction corresponding to the first transaction in the transactions to be handled;
the processing module is used for searching first transaction data corresponding to the first transaction based on the first slave transaction;
the processing module is further configured to verify, in the first transaction data, to obtain to-be-processed data, where the to-be-processed data belongs to the transaction data corresponding to the to-be-processed transaction, and a data storage state of the to-be-processed data is a to-be-processed state, where the to-be-processed state is used to indicate that an editing processing requirement exists in the to-be-processed data;
The processing module is further configured to edit the data to be processed based on the first slave transaction.
In an alternative design of the present application, the processing module is further configured to:
constructing a first data set based on the transaction data corresponding to the transaction to be handled;
constructing a second data set based on candidate data of which the data storage state is the to-be-handled state in the first transaction data;
and determining an intersection part of the first data set and the second data set as the checked data to be processed.
In an alternative design of the present application, the processing module is further configured to:
screening the first transaction data to obtain candidate data, wherein the candidate data is transaction data based on the indication of the to-be-handled transaction that the data storage state is changed;
and constructing and obtaining the second data set based on the candidate data.
In an alternative design of the present application, the candidate data includes at least one of identification change data and attribution change data;
the processing module is also configured to at least one of:
screening the first transaction data to obtain the identification change data, wherein the identification change data comprises a state identification field; responding to the main transaction corresponding to the first transaction, wherein the state identification field is changed into a first field, and the first field is used for indicating that the data storage state of the identification change data is changed into the to-be-handled state;
Screening the first transaction data to obtain the attribution change data, wherein the attribution change data comprises a data attribution field; and responding to the main transaction corresponding to the first transaction, changing the data attribution field into a second account, wherein the data attribution field is changed to indicate that the data storage state of attribution change data is changed into the to-be-handled state.
In an alternative design of the present application, the processing module is further configured to:
and adding editing flow information corresponding to the first transaction, wherein the editing flow information is used for recording the editing condition of the computer equipment on the first transaction data corresponding to the first transaction.
In an alternative design of the present application, the processing module is further configured to at least one of:
determining the equipment identifier of the computer equipment as first flowing water information, wherein the first flowing water information is editing flowing water information corresponding to the data to be processed;
determining the equipment identifier and verification failure reason of the computer equipment as second stream information, wherein the second stream information is editing stream information corresponding to other data except the data to be processed in the first transaction data;
The verification failure reasons comprise at least one of authority verification failure and state verification failure, wherein the authority verification failure is used for indicating that other data does not belong to the transaction data corresponding to the transaction to be handled, and the state verification failure is used for indicating that the data storage state of the other data is different from the state to be handled.
In an alternative design of the present application, the first transaction indicates that there is a data characteristic of the first transaction data, and the processing module is further configured to:
searching a plurality of stored data for data features of a first transaction indication one by one in a concurrent manner, and determining the stored data satisfying the data features as the first transaction data.
In an alternative design of the present application, the first transaction carries a data identifier of the first transaction data, and the processing module is further configured to:
and searching in batches in a plurality of storage data by taking the data mark carried by the first transaction as an index to obtain the first transaction data.
In an alternative design of the present application, the apparatus further comprises a transmitting module;
the acquisition module is further used for acquiring the supplementary information of the data to be processed, wherein the supplementary information is information for introducing the data to be processed;
The sending module is used for sending the supplementary information to a display terminal, and the display terminal is used for displaying the supplementary information;
the display terminal is a login terminal of at least one account as follows: the first account, the second account indicated by the data attribution field in the data to be processed and the third account with editing processing authority of the data to be processed.
In an alternative design of the present application, the processing module is further configured to:
and editing at least two data items in the data to be processed in a coroutine concurrency mode based on the first slave transaction.
In an alternative design of the present application, the processing module is further configured to:
based on the first slave transaction, calling a first cooperative program and a second cooperative program to preempt mutual exclusion locks of a first data item and a second data item in the data to be processed in a concurrent mode;
calling the first coroutine to edit the first data item under the condition that the first coroutine successfully preempts the mutual exclusion lock of the first data item;
and calling the second cooperative program to edit the second data item under the condition that the second cooperative program successfully preempts the exclusive lock of the second data item.
According to another aspect of the present application, there is provided a computer device comprising a processor and a memory having stored therein at least one instruction, at least one program, a set of codes or a set of instructions, the at least one instruction, the at least one program, the set of codes or the set of instructions being loaded and executed by the processor to implement the information verification method as described in the above aspect.
According to another aspect of the present application, there is provided a computer readable storage medium having stored therein at least one instruction, at least one program, a set of codes or a set of instructions, the at least one instruction, the at least one program, the set of codes or the set of instructions being loaded and executed by a processor to implement the information verification method as described in the above aspect.
According to another aspect of the present application, there is provided a computer program product comprising computer instructions stored in a computer readable storage medium, from which a processor reads and executes the computer instructions to implement the information verification method as described in the above aspect.
The beneficial effects that this application provided technical scheme brought include at least:
the data to be processed is obtained through verification in the first transaction data, and the data to be processed which needs editing processing is effectively verified; by checking the attribution condition between the to-be-processed data and the transaction data corresponding to the to-be-processed transaction, the computer equipment is prevented from editing the transaction data corresponding to the to-be-processed transaction which is not authorized to be processed based on the first slave transaction under the condition that the master transaction and the first slave transaction process the transaction data in an asynchronous mode; by checking the data storage state of the data to be processed, repeated processing of the transaction data which is edited under the condition that a plurality of data processing parties exist is avoided; the transaction data is orderly processed.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of a computer system provided in an exemplary embodiment of the present application;
FIG. 2 is a schematic diagram of an information verification method provided in an exemplary embodiment of the present application;
FIG. 3 is a first flowchart of a method of information verification provided in one exemplary embodiment of the present application;
FIG. 4 is a second flowchart of an information verification method provided by an exemplary embodiment of the present application;
FIG. 5 is a third flowchart of a method of information verification provided in one exemplary embodiment of the present application;
FIG. 6 is a fourth flowchart of an information verification method provided by an exemplary embodiment of the present application;
FIG. 7 is a fifth flowchart of an information verification method provided by an exemplary embodiment of the present application;
FIG. 8 is a sixth flowchart of an information verification method provided by an exemplary embodiment of the present application;
FIG. 9 is a schematic diagram of stored template data provided by an exemplary embodiment of the present application;
FIG. 10 is a seventh flowchart of an information verification method provided by an exemplary embodiment of the present application;
FIG. 11 is a schematic illustration of storing document data provided in accordance with an exemplary embodiment of the present application;
FIG. 12 is an eighth flowchart of an information verification method provided by an exemplary embodiment of the present application;
FIG. 13 is a schematic illustration of supplemental information provided by an exemplary embodiment of the present application;
FIG. 14 is a ninth flowchart of an information verification method provided by an exemplary embodiment of the present application;
FIG. 15 is a schematic diagram of a data store provided by an exemplary embodiment of the present application;
FIG. 16 is a schematic diagram of pending data and mutex locks provided by one exemplary embodiment of the present application;
FIG. 17 is a tenth flowchart of an information verification method provided by an exemplary embodiment of the present application;
FIG. 18 is a schematic diagram of editing document data provided in an exemplary embodiment of the present application;
FIG. 19 is a block diagram of an information verification apparatus provided in an exemplary embodiment of the present application;
fig. 20 is a block diagram of a server according to an exemplary embodiment of the present application.
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the present application more apparent, the embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
Reference will now be made in detail to exemplary embodiments, examples of which are illustrated in the accompanying drawings. When the following description refers to the accompanying drawings, the same numbers in different drawings refer to the same or similar elements, unless otherwise indicated. The implementations described in the following exemplary examples are not representative of all implementations consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with some aspects of the present application as detailed in the accompanying claims.
The terminology used in the present disclosure is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used in this disclosure and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used herein refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be noted that, the user information (including, but not limited to, user equipment information, user personal information, etc.) and the data (including, but not limited to, data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party, and the collection, use and processing of the related data are required to comply with the related laws and regulations and standards of the related countries and regions. For example, transaction data and the like referred to in this application are all acquired with sufficient authorization.
It should be understood that, although the terms first, second, etc. may be used in this disclosure to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, a first parameter may also be referred to as a second parameter, and similarly, a second parameter may also be referred to as a first parameter, without departing from the scope of the present disclosure. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context.
First, some nouns in the present application are described.
The transaction to be handled is used for indicating the editing processing of the transaction data; the master transaction in the data to be handled corresponds to one or more slave transactions, also called one or more slave transactions belonging to the master transaction; the main transaction and the corresponding transaction respectively indicate the editing processing of the transaction data in an asynchronous mode.
The transaction data is data which is indicated by the transaction to be handled and needs editing processing; the transaction data includes, but is not limited to, at least one of document data, receipt data, template data, such as, for example, document data is a meeting summary document; the template data is a conference summary template file, and text or multimedia information is filled in the conference summary template file to construct and obtain a conference summary file; the bill data is a leave-on approval bill.
The data storage state of the transaction data is a to-be-handled state and is used for indicating that the corresponding transaction data has editing processing requirements; the editing processing requirement corresponds to a first slave transaction corresponding to the transaction to be processed, such as a master transaction, and editing processing is performed on the transaction data with the editing processing requirement based on the first slave transaction.
FIG. 1 illustrates a schematic diagram of a computer system provided in one embodiment of the present application. The computer system may be implemented as a system architecture that becomes a method of information verification. The computer system may include: the application terminal 110 and the computer device 200, the computer device 200 includes a processing terminal 210 and/or a processing server 220 having editing processing authority of transaction data.
The application terminal 110 may be an electronic device such as a cell phone, tablet computer, personal computer (Personal Computer, PC), palm top (Personal Digital Assistant, PDA), etc. The application terminal 110 initiates an edit processing request for the transaction data to the computer device 200 through a network connection, and the application terminal 110 may directly initiate a request to the computer device 200 or may initiate a request through a background server connected to the computer device 200.
In the information verification method provided in the embodiment of the present application, the execution subject of each step may be a computer device 200, where the computer device 200 refers to an electronic device with data computing, processing and storage capabilities. For performing the information verification, taking the implementation environment of the solution shown in fig. 1 as an example, the information verification method may be performed by the processing terminal 210 (for example, the client of the processing terminal 210 that installs the running target application program performs the information verification method), or the information verification method may be performed by the processing server 220, or the processing terminal 210 and the processing server 220 may be performed in an interactive and coordinated manner, which is not limited in this application.
The processing terminal 210 may be a client that may install a target application program in the processing terminal 210 of an electronic device, such as a mobile phone, a tablet computer, a personal computer, a palm computer, etc., where the target application program may be an information verification application program, or may be another application program provided with an information verification function. In addition, the Application is not limited to the form of the target Application, and may be a web page, including but not limited to an App (Application), an applet, etc. installed in the terminal 100.
The processing server 220 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing cloud computing services. The processing server 220 may be a background server of the target application installed by the processing terminal 210 for providing a background service to clients of the target application. The processing server 220 may be a server for independently checking information.
In addition, the technical scheme can be combined with the blockchain technology. For example, some of the data (e.g., transaction data, etc.) involved in the information verification methods disclosed herein may be stored on the blockchain. Communication between the application terminal 110 and the computer device 200 may be through a network, such as a wired or wireless network.
Fig. 2 provides a schematic diagram of an information verification method according to an exemplary embodiment of the present application.
In this embodiment, the first account 300a initiates a to-do transaction 310 requesting that transaction data be handed over to the second account, the transaction data including text data 302 and picture data 304. The transaction to be handled 310 includes a first slave transaction 312 and a second slave transaction 314, which respectively perform data handover based on format information of transaction data; specifically, the first slave transaction 312 is configured to hand over the text data 302 to the second account by performing editing processing on the text data 302; the second slave transaction 314 is used to transfer the picture data 304 to the second account number by performing editing processing on the picture data 304.
The first slave transaction 312 carries data characteristics 312a of the first transaction data 316, such as at least one of the creation account number, creation time, version number, revision number, last edit time, etc. characteristics of the first transaction data 316. Searching the plurality of storage data 315 one by one for the data features 312a indicated by the first slave transaction 312 in a concurrent manner by invoking a coroutine in the computer device; the stored data 315 that satisfies the data characteristic 312a is determined as the first transaction data 316.
Candidate data 317 is selected from the first transaction data 316, the candidate data 317 being transaction data based on an indication of the pending transaction 310 that a change in data storage status occurred. Specifically, the candidate data 317 includes a status identification field 314a or a data home field 314b.
Wherein, for the state identification field 314a, in response to the to-Do transaction 310, the state identification field 314a is changed to a first field, where the first field is used to indicate that the data storage state is changed to the to-Do state. For data home field 314b; in response to the to-Do transaction 310, the data home field 314b is changed to the second account number, and the change in the data home field indicates that the data storage state is changed to the to-Do state.
The second data set 320 is constructed based on candidate data 317 whose data storage state is to-Do state in the first transaction data 316. Based on the transaction data corresponding to the to-be-handled transaction 310, for example: text data 302 and picture data 304 are constructed to obtain a first data set 305.
The intersection portion of the first data set 305 and the second data set 320 is determined as verified pending data 317a, and based on the first slave transaction 312, the pending data 317a is edited to effect the handoff of the text data 302 to the second account. Further, the edit flow information 318 of the pending data 317a is added to record the editing situation of the pending data 317a corresponding to the first slave transaction 312, such as recording the identity of the computer device editing the pending data 317 a.
Fig. 3 shows a first flowchart of an information verification method provided in an exemplary embodiment of the present application. The method may be performed by a computer device. The method comprises the following steps.
Step 510: acquiring a first slave transaction in the transaction to be handled;
the to-be-handled transaction is used for indicating to edit transaction data corresponding to the first account, the transaction data includes, but is not limited to, at least one of file data, receipt data and template data, and the format of the transaction data is not limited in this embodiment.
Illustratively, the transaction to be handled includes a master transaction and a first slave transaction corresponding to the master transaction. The first slave transaction and the master transaction respectively indicate to edit transaction data in an asynchronous mode; a master transaction may correspond to one or more slave transactions, also referred to as one or more transactions belonging to the master transaction. In one example, a master transaction typically edits transaction data before a slave transaction, which edits transaction after the master transaction in an asynchronous manner.
Step 520: searching first transaction data corresponding to the first transaction based on the first slave transaction;
for example, the number of first transaction data corresponding to the first transaction may be one or more, and the first slave transaction may directly or indirectly indicate that there is first transaction data; in one example, the first transaction carries a data identifier of the first transaction data, and the first transaction data corresponding to the first transaction is directly indicated through the data identifier; in another example, the first transaction carries data characteristics of the first transaction data, such as: at least one of the characteristics of the creation account number, the creation time, the version number and the like of the first transaction data; the first transaction data corresponding to the first transaction is indirectly indicated by the data characteristic.
Step 530: verifying in the first transaction data to obtain data to be processed;
the data to be processed belongs to transaction data corresponding to the transaction to be processed, and the data storage state of the data to be processed is the state to be processed; illustratively, the to-Do status is used for indicating that the to-be-processed data has editing processing requirements; for example, the editing processing requirement indicated by the to-be-handled state corresponds to a first slave transaction, and editing processing is performed on the to-be-processed data with the editing processing requirement based on the first slave transaction. Illustratively, the data to be processed is obtained by checking in the first transaction data, and the data to be processed is part or all of the data in the first transaction data.
Step 540: editing the data to be processed based on the first slave transaction;
illustratively, the first transaction indicates that there is an edit processing manner of the data to be processed; illustratively, the editing process includes, but is not limited to, editing at least one of the data content, the data storage location, the data storage state of the transaction data.
In summary, according to the method provided by the embodiment, the data to be processed is obtained by verifying in the first transaction data, so that the data to be processed which needs to be edited is effectively verified; by checking the attribution condition between the to-be-processed data and the transaction data corresponding to the to-be-processed transaction, the computer equipment is prevented from editing the transaction data corresponding to the to-be-processed transaction which is not authorized to be processed based on the first slave transaction under the condition that the master transaction and the first slave transaction process the transaction data in an asynchronous mode; by checking the data storage state of the data to be processed, repeated processing of the transaction data which is edited under the condition that a plurality of data processing parties exist is avoided; the transaction data is orderly processed.
Fig. 4 shows a second flowchart of an information verification method provided in an exemplary embodiment of the present application. The method may be performed by a computer device. I.e. in the embodiment shown in fig. 3, step 530 may be implemented as steps 532, 534, 536.
Step 532: constructing and obtaining a first data set based on transaction data corresponding to the transaction to be handled;
illustratively, the first data set typically includes identification information for the transaction data, but this does not exclude the case where the first data set is constructed from the data content of the transaction data. For example, transaction data corresponding to a to-be-handled transaction is typically indicated by a master transaction in the to-be-handled transaction, but it is not excluded that the transaction data is indicated by one or more transactions corresponding to the master transaction. Similar to the first transaction, the present application does not limit the manner in which the master transaction indicates transaction data.
Illustratively, the steps of constructing the first data set and constructing the second data set in this embodiment are independent of each other, and the transaction data in the first data set is indicated by the first master transaction corresponding to the first slave transaction to the computer device having the editing processing authority.
Step 534: constructing and obtaining a second data set based on candidate data with the data storage state of the first transaction data as a to-be-handled state;
The data storage state is an to-do state and is used for indicating that the corresponding transaction data is stored in an editing processing requirement, and the editing processing request is used for describing that the corresponding candidate data is not subjected to editing processing corresponding to the first transaction. The candidate data is illustratively screened from the first transaction data by checking the data storage status of the first transaction data.
Illustratively, the second data set typically includes a data identification of the candidate data, but this does not exclude the case of constructing the second data set from the data content of the candidate data.
Step 536: determining intersection parts of the first data set and the second data set as data to be processed obtained through verification;
by way of example, an intersection part of the first data set and the second data set is obtained through set operation processing, and data corresponding to the intersection part is determined as data to be processed. It can be seen that the data to be processed is part or all of the data in the second data set.
It should be noted that, the data storage state of the data to be processed corresponding to the intersection part of the first data set and the second data set is the to-be-handled state, so that the data to be processed which is edited by the computer device is not processed by other computer devices with editing processing authority based on the first transaction, and the problem of repeated processing of the transaction data is avoided; furthermore, the to-be-processed equipment belongs to the transaction data corresponding to the to-be-processed transaction, so that the computer equipment is ensured to have editing processing permission of the to-be-processed data.
In summary, according to the method provided by the embodiment, the data to be processed is obtained by verifying in the first transaction data, so that the data to be processed which needs to be edited is effectively verified; the constructed first data set indicates transaction data of which the computer device has editing processing authority, and the constructed second data set is candidate data which is obtained based on the first transaction and has editing processing requirements; by checking the attribution condition between the to-be-processed data and the transaction data corresponding to the to-be-processed transaction, the computer equipment is prevented from editing the transaction data corresponding to the to-be-processed transaction which is not authorized to be processed based on the first slave transaction under the condition that the master transaction and the first slave transaction process the transaction data in an asynchronous mode; by checking the data storage state of the data to be processed, repeated processing of the transaction data which is edited under the condition that a plurality of data processing parties exist is avoided; the transaction data is orderly processed.
Next, the second data set above is further described.
In an alternative implementation, step 534 above may be implemented as two sub-steps as follows.
Substep 34a: screening candidate data from the first transaction data;
Illustratively, the candidate data is transaction data indicating that a change in data storage state occurred based on the transaction to be handled; illustratively, the data storage state is changed based on a master transaction corresponding to a first transaction of the transactions to be handled. In one example, a master transaction is used to indicate a change to the data storage state; further, the master transaction is used for indicating to send the changed data storage state to the terminal for display. Accordingly, the first transaction corresponding to the main transaction is used for editing the first transaction data, such as changing the storage location of the first transaction data.
Illustratively, the data storage state of the candidate data is a to-Do state; further, a field indicating the data storage state exists in the candidate data. Next, a description will be given of a manner of indicating the data storage state by two different fields.
In an alternative implementation, the candidate data includes at least one of identification change data and attribution change data; accordingly, sub-step 34a may be implemented as at least one of the following steps.
And screening the first transaction data to obtain the identification change data.
Illustratively, the identification change data includes a status identification field therein; and responding to the main transaction corresponding to the first transaction, changing the state identification field into a first field, wherein the first field is used for indicating that the data storage state of the identification change data is changed into the to-be-handled state.
In one example, the identification change data is document data, and the master transaction is configured to instruct to change a status identification field of the document data to a first field, and send the first field to an initiating terminal that creates the document data, and instruct the first terminal to display the changed status identification field. The to-do state is also referred to as an in-process state or an in-process state.
And screening the first transaction data to obtain the attribution change data.
Illustratively, the attribution change data includes a data attribution field; and responding to the main transaction corresponding to the first slave transaction, changing the data attribution field into the second account, wherein the data attribution field is changed to indicate that the data storage state of attribution change data is changed into the to-be-handled state.
In one example, the attribution change data is template data, and the master transaction is used for indicating that a data attribution field of the template data is changed to a second account; and indicating the initiating terminal initiating the template data attribution change request to display the change of the data storage state of attribution change data to be a to-be-handled state.
Substep 34b: constructing a second data set based on the candidate data;
illustratively, the second data set typically includes a data identification of the candidate data, but this does not exclude the case of constructing the second data set from the data content of the candidate data.
In summary, according to the method provided by the embodiment, the data to be processed is obtained by verifying in the first transaction data, so that the data to be processed which needs to be edited is effectively verified; candidate data in the second data set is transaction data obtained based on the first transaction and having a data storage state change; by checking the attribution condition between the to-be-processed data and the transaction data corresponding to the to-be-processed transaction, the computer equipment is prevented from editing the transaction data corresponding to the to-be-processed transaction which is not authorized to be processed based on the first slave transaction under the condition that the master transaction and the first slave transaction process the transaction data in an asynchronous mode; by checking the data storage state of the data to be processed, repeated processing of the transaction data which is edited under the condition that a plurality of data processing parties exist is avoided; the transaction data is orderly processed.
In the following, information verification of document data and template data is described by two embodiments.
Fig. 5 shows a third flowchart of an information verification method provided in an exemplary embodiment of the present application.
The embodiment is used for carrying out information verification on the template data; the embodiment is executed by a processing server, and node service, transaction service, coroutine service, data storage service and distribution service are operated in the processing server; this will be further described by the following steps.
Step 602: the node service calls a data handover interface to send the transaction to be handled to the transaction service;
the node service receives a processing request of transaction data sent by an application terminal; in this embodiment, the transaction data is template data, where the template data is a template file with management authority for the first account, and the service file, such as a conference summary template file and a expenditure flow template file, is constructed by filling text or multimedia information in the template file.
For example, the transaction to be handled is used to instruct editing processing on the template data, such as migrating the management authority of the template file from the first account to the second account.
Illustratively, the node service invokes a generic gateway interface (Common Gateway Interface, CGI) for data handover, sending the to-do transaction to the transaction service.
Step 604: the transaction service sends a main transaction to the coroutine service;
illustratively, the transaction service includes a logical layer for performing data transfers with the coroutine service. The transaction service sends the master transaction to the coroutine service through the pass-through service by the logical layer.
Step 606: the coroutine service updates a flow chart of the template data in the data storage service in a coroutine mode;
Illustratively, a master transaction of the to-be-handled transactions is used to instruct a flow table of updating template data in the data storage service; updating the flow chart of the template data comprises changing the data attribution field in the template data from the first account to the second account. Specifically, the process node in the process table is taken out, and the account corresponding to the process node is changed from the first account to the second account.
Step 608: the data storage service sends updated feedback information to the coroutine service;
illustratively, the update feedback information is used to indicate update information of the flow chart.
Step 610: the coroutine service sends updated feedback information to the business service;
illustratively, the update feedback information is used to indicate update information of the flow chart.
Step 612: the transaction service sends at least one slave transaction corresponding to the master transaction to the distribution service;
illustratively, the transactions employ an asynchronous approach to editing the template data after the primary transaction. Illustratively, a master transaction is used to indicate modification of the data storage state of the template data, and at least one slave transaction corresponding to the master transaction is used to indicate modification of the data storage location of the template data.
Step 614: the transaction service sends updated feedback information to the node service;
Illustratively, the node service receives updated feedback information, and the node service is configured to instruct a terminal initiating the transaction to be handled to display the updated feedback information.
Step 616: the distribution service sends callback information of a first slave transaction to the transaction service;
illustratively, the allocation service instructs execution of the first slave transaction by the processing server and sends callback information of the first slave transaction to a transaction service deployed in the processing server.
Step 618: the transaction service sends a first slave transaction to the coroutine service;
illustratively, the first transaction indicates an edit processing manner of the first transaction data corresponding to the first transaction.
Step 620: the coroutine service adopts a coroutine mode to search template data in the data storage service;
illustratively, the template data found by the coroutine service is first transaction data corresponding to the first transaction. Illustratively, the first transaction indicates that there is a data characteristic of the template data, and the template data is determined by comparing stored data in the data storage service to the data characteristic.
Step 622: the data storage service sends searching feedback information to the coroutine service;
illustratively, the search feedback information is used to indicate the template data that is found.
Step 624: the coroutine service sends searching feedback information to the business service;
illustratively, the coroutine service feeds back template data corresponding to the first transaction to the transaction service.
Step 626: transaction service checks the obtained data to be processed in the feedback information;
illustratively, the transaction service obtains the data to be processed through the data storage state of the template data and the main transaction; the flow chart of the data to be processed indicates a data storage state of the template data, for example, a data attribution field in the flow chart of the data to be processed is changed to indicate that the data storage state is a to-do state. The transaction to be processed belongs to template data corresponding to the main transaction.
Step 628: the transaction service acquires supplementary information of the data to be processed;
the supplementary information of the data to be processed includes the name of the template data, the account information corresponding to the changed data attribution field, and the supplementary information is used as detail information for editing the data to be processed and displayed on the terminal for initiating the transaction to be handled.
Step 630: the transaction service writes editing flow information of the data to be processed in the data storage service;
illustratively, the edit flow information is used to record the edit condition of the data to be processed by the processing server, and illustratively, the edit flow information includes at least one of the following setup identifier of the processing server, edit processing time, and supplemental information in step 628.
Step 632: the data storage service sends writing feedback information to the transaction service;
illustratively, the write feedback information is used to indicate that the data storage service successfully received the edit flow information written by the transaction service.
In summary, in the method provided in this embodiment, the to-be-processed data is obtained by verifying in the template data corresponding to the first transaction, so that the template data that needs to be edited is effectively verified; by verifying the attribution condition between the data to be processed and the template data corresponding to the transaction to be handled, the computer equipment is prevented from editing the template data corresponding to the transaction to be handled which is not authorized to be processed based on the first slave transaction under the condition that the master transaction and the first slave transaction adopt an asynchronous mode to process the template data; by checking the data storage state of the data to be processed, the repeated processing of the template data subjected to editing processing is avoided under the condition that a plurality of data processing parties exist; the transaction data is orderly processed.
Fig. 6 shows a fourth flowchart of an information verification method provided in an exemplary embodiment of the present application.
The embodiment is used for carrying out information verification on bill data; the embodiment is executed by a processing server, and node service, transaction service, coroutine service, data storage service and distribution service are operated in the processing server; this will be further described by the following steps.
Step 652: the node service calls a data handover interface to send the transaction to be handled to the transaction service;
the node service receives a processing request of transaction data sent by an application terminal; in this embodiment, the transaction data is document data, the document data is a document to be examined and approved initiated by the first account, the document data is to be examined and approved, and in the examination and approval process, the storage position of the document data and the information of the approver corresponding to the document data are changed. The transaction to be handled is used for indicating to edit the bill data, such as writing approval opinion information in the bill data, changing a storage position of the bill data, and modifying an approver of the bill data, so as to realize the transfer of the bill data among a plurality of approvers.
Illustratively, the node service invokes a generic gateway interface for data handoff, sending the to-do transaction to the transaction service.
Step 654: the transaction service changes the state information of the bill data into handover in the data storage service;
for example, in response to a master transaction in a transaction to be handled, state information of document data is changed into handover, and the state information is used for indicating that editing processing requirements exist for the document data in handover.
Step 656: the data storage service sends updated feedback information to the transaction service;
the update feedback information is used for indicating that the state information of the bill data is successfully changed in response to the main transaction in the transactions to be handled.
Step 658: the transaction service sends at least one slave transaction corresponding to the master transaction to the distribution service;
illustratively, the business uses an asynchronous manner to edit the document data after the main business. Illustratively, a master transaction is used to indicate modifying status information (also referred to as data storage status) of document data, and at least one slave transaction corresponding to the master transaction is used to indicate making changes to data storage locations of the document data.
Step 660: the transaction service sends updated feedback information to the node service;
illustratively, the node service receives updated feedback information, and the node service is configured to instruct a terminal initiating the transaction to be handled to display the updated feedback information.
Step 662: the distribution service sends callback information of a first slave transaction to the transaction service;
illustratively, the allocation service instructs execution of the first slave transaction by the processing server and sends callback information of the first slave transaction to a transaction service deployed in the processing server.
Step 664: the transaction service searches bill data in the data storage service based on the first transaction batch;
illustratively, the first transaction indicates a data identification of document data, and the document data corresponding to the first transaction is searched for in a plurality of stored data in a data storage service based on the data identification.
Step 666: the data storage service sends searching feedback information to the transaction service;
illustratively, the search feedback information is used to indicate the document data that is found.
Step 668: the transaction service verifies and confirms the data to be processed in the feedback information;
illustratively, the transaction service obtains the data to be processed through the data storage state of the receipt data and the main transaction; the data storage state of the data to be processed is template data corresponding to the main transaction in the processing process.
Step 670: the transaction service sends data to be processed to the coroutine service;
the data to be processed sent by the transaction service is a data identifier of the data to be processed, and is used for indicating the name of document data needing editing processing to the coroutine service.
Step 672: the coroutine service adopts a coroutine concurrency mode to edit the data to be processed in the data storage service;
Illustratively, the service to be processed is edited in the data storage service based on the indication of the transaction service, such as at least one of writing approval opinion information, changing a storage location of the document data, and modifying an approval party of the document data.
Step 674: the data storage service sends editing feedback information to the coroutine service;
the data storage service feeds back the editing processing condition aiming at the data to be processed to the coroutine service.
Step 676: the coroutine service sends editing feedback information to the business service;
illustratively, the coroutine service forwards edit feedback information to the transaction service, the feedback being based on a condition of the first slave transaction executing the edit process.
Step 678: the transaction service sends supplementary request information to the coroutine service;
illustratively, the supplemental request information is used to request the coroutine service to obtain supplemental information for the data to be processed.
Step 680: the coroutine service adopts a coroutine concurrency mode to search the supplementary information of the data to be processed in the data storage service;
the supplementary information of the data to be processed comprises at least one of the name of the bill data, the editing processing time, the account name of the transaction to be processed, and the like, and the supplementary information is used as detail information for editing processing of the data to be processed and is displayed on the terminal for initiating the transaction to be processed.
Step 682: the data storage service sends supplementary information to the coroutine service;
the data storage service feeds back to the coroutine service the search situation for the supplementary information of the data to be processed.
Step 684: the coroutine service sends supplementary information to the business service;
illustratively, the coroutine service forwards the supplementary information to the transaction service and feeds back the request result of the supplementary request information.
Step 686: the transaction service writes editing flow information of the data to be processed in the data storage service;
illustratively, the editing pipeline information is used for recording the editing situation of the processing server to be processed data, and illustratively, the editing pipeline information includes at least one of the following setting identification of the processing server, editing processing time and supplementary information in step 680.
Step 688: the data storage service sends writing feedback information to the transaction service;
illustratively, the write feedback information is used to indicate that the data storage service successfully received the edit flow information written by the transaction service.
In summary, according to the method provided by the embodiment, the to-be-processed data is obtained by verifying the bill data corresponding to the first transaction, so that the bill data needing to be edited is effectively verified; by verifying the attribution condition between the data to be processed and the bill data corresponding to the transaction to be handled, the computer equipment is prevented from editing the bill data corresponding to the transaction to be handled which is not authorized to be processed based on the first slave transaction under the condition that the bill data is processed by adopting an asynchronous mode by the master transaction and the first slave transaction; by checking the data storage state of the data to be processed, repeated processing of document data subjected to editing processing is avoided under the condition that a plurality of data processing parties exist; the transaction data is orderly processed.
Fig. 7 shows a fifth flowchart of an information verification method according to an exemplary embodiment of the present application. The method may be performed by a computer device. I.e. on the basis of the embodiment shown in fig. 3, a step 552 is also included.
Step 552: adding editing pipeline information corresponding to the first transaction;
illustratively, the editing pipeline information is used for recording editing situations of the computer device on the first transaction data corresponding to the first transaction. It will be appreciated that the edit pipeline information may be used to indicate the edit status of at least one of the following data: and executing the data to be processed of the editing processing and removing other data which are not checked and pass the verification from the first transaction data.
In an alternative implementation, step 552 in this embodiment may be implemented as at least one of the following.
Determining a device identification of the computer device as first flow information;
the first flow information is editing flow information corresponding to data to be processed; editing the data to be processed is performed based on the instruction of the first slave transaction; the device identification of the computer device is determined as first flow information for indicating an editing processing device of the data to be processed.
Determining the device identification and verification failure reason of the computer device as second flow information;
the second stream information is editing stream information corresponding to other data except the data to be processed in the first transaction data; for example, the other data is data that fails verification, and the device identification of the computer device is used to indicate verification devices that verify the other data, and the verification failure cause is used to indicate a cause that the computer device fails the verification, resulting in the computer device not performing editing processing.
Illustratively, the verification failure cause includes at least one of a right verification failure and a status verification failure.
Specifically, the permission verification failure is used for indicating that other data does not belong to the transaction data corresponding to the transaction to be handled, and the computer equipment does not have editing processing permission of the other data. In one example, the permission verification failure is caused by the computer device receiving the first transaction in error, and the computer device does not have editing processing permission of the data according to the indication of the transaction to be handled to which the first transaction belongs.
For example, the status verification failure is used to indicate that the data storage status of other data is different from the to-do status, and the other data does not have editing processing requirements. In one example, the reason for the failure of the state verification is that other computer devices have previously completed editing processing of other data and have changed the data storage state from the to-do state to the complete state after the editing processing is completed. Similarly, in various embodiments of the present application, performing editing processing on the data to be processed may further include changing a data storage state of the data to be processed from a to-Do state to a complete state. In another example, the reason for the failure of the state verification is that the master transaction does not complete the editing process of other data, is affected by network fluctuations, or is affected by the occurrence of an abnormality in the storage of other data, and the data storage state of other data is not successfully changed.
It should be noted that, step 552 in this embodiment may be performed before, after, or simultaneously with step 540, and the timing relationship between step 552 and step 540 is not limited in this application.
In summary, by adding the editing pipeline information, the method provided by the embodiment realizes recording the editing processing condition of the computer device on the first transaction data, and records the editing processing condition of the data to be processed and the reason that other data is not edited; the data to be processed is obtained through verification in the first transaction data, and the data to be processed which needs editing processing is effectively verified; under the condition that the master transaction and the first transaction adopt an asynchronous mode to process transaction data, the computer equipment edits transaction data corresponding to the unauthorized transaction to be processed based on the first slave transaction; the repeated processing of the transaction data which is edited is avoided under the condition that a plurality of data processing parties exist; the transaction data is orderly processed.
Next, the first transaction data corresponding to the first transaction is searched for.
Fig. 8 shows a sixth flowchart of an information verification method provided in an exemplary embodiment of the present application. The method may be performed by a computer device. I.e. in the embodiment shown in fig. 3, step 520 may be implemented as step 522.
Step 522: searching the data features of the first transaction indication one by one in a concurrent mode of the coroutines in a plurality of stored data, and determining the stored data meeting the data features as first transaction data;
illustratively, the first transaction carried data characteristics indirectly indicate the first transaction data, the data characteristics including, but not limited to, at least one of a creation account number, creation time, version number, revision number, last edit time, etc. of the first transaction data. In an exemplary embodiment, at least two coroutines are configured in the computer device, and the at least two coroutines search the plurality of storage data one by one in a concurrent manner, so as to find whether the storage data meets the data characteristic of the first transaction indication. By way of example, when the stored data is searched in a concurrent mode, the searching of the second stored data can be executed concurrently under the condition that the first stored data is searched and blocked and waiting occurs, so that the influence of the blocking and waiting on the characteristic of the searched data is reduced.
In one implementation, the searching of the data features of the first transaction indication one by one in a co-program concurrency manner is performed by a co-program service running in the computer device, which is also called a co-program pool, and is used for performing management control on at least two co-programs configured in the computer device.
In one implementation manner, the first transaction data found in this embodiment is template data, and fig. 9 shows a schematic diagram of storing the template data provided in an exemplary embodiment of the present application. The template data store 410 provides a storage space for template data, wherein the template data store 410 includes information of a template name (template_id), an creator_id (creator_vid), an update time (update time), a template approval condition (template_applications_controls/template_applications_multi_controls), a field id (field_n), and the like for describing the corresponding template data. In one implementation, a lookup is performed in the template data store 410 of the template data based on the data characteristics of the first transaction indication.
In summary, in the method provided in this embodiment, the data features indicated by the first transaction are searched one by one in a cooperative concurrency manner, so as to determine the first transaction data corresponding to the first transaction, reduce the influence of blocking waiting on searching the data features, and improve the efficiency of determining the first transaction data based on the data features; the data to be processed is obtained through verification in the first transaction data, and the data to be processed which needs editing processing is effectively verified; under the condition that the master transaction and the first transaction adopt an asynchronous mode to process transaction data, the computer equipment edits transaction data corresponding to the unauthorized transaction to be processed based on the first slave transaction; the repeated processing of the transaction data which is edited is avoided under the condition that a plurality of data processing parties exist; the transaction data is orderly processed.
Fig. 10 shows a seventh flowchart of an information verification method provided in an exemplary embodiment of the present application. The method may be performed by a computer device. I.e. in the embodiment shown in fig. 3, step 520 may be implemented as step 524.
Step 524: the data mark carried by the first transaction is taken as an index, and the first transaction data is obtained by batch searching in a plurality of storage data;
illustratively, the data identifier carried by the first transaction directly indicates the first transaction data, the data identifier is an index, a search is performed among a plurality of stored data, and the stored data with the same data identifier is determined as the first transaction data. Illustratively, the data identification includes, but is not limited to, at least one of a storage location, a data name, a hash value.
By way of example, when the data identifier of the stored data is required to be obtained when the first transaction data is searched, batch searching of the first transaction data realizes that the data identifier carried by the first transaction is searched for multiple times under the condition that the data identifier of the stored data is obtained at one time, and the time for data transmission when the data identifier of the stored data is obtained multiple times is saved.
In one implementation manner, the first transaction data found in this embodiment is document data, and fig. 11 is a schematic diagram illustrating storing document data provided in an exemplary embodiment of the present application. The account data store 420 provides storage space for document data initiated by the first account; in particular, account data store 420 is provided with first record 422 through nth record 424. The total of N records is stored in a one-to-one correspondence with the records in the document data and account data store 420. Taking the first record 422 as an example, the first record 422 includes information such as a corporation identifier (corporation), an creator identifier (creator_vid), a data name (id), an event type (event_type), status information (status), and a field identifier (field_n) for describing corresponding document data. In one implementation, based on a centralized storage mode of bill data, the first transaction data is obtained by searching in batches in a plurality of storage data by taking the data identifier carried by the first transaction as an index, so that the efficiency of determining the first transaction data based on the data identifier is improved.
In summary, according to the method provided by the embodiment, the data identifier of the first transaction indication is searched in batch to determine the first transaction data corresponding to the first transaction, so that the time for data transmission when the data identifier of the stored data is acquired for many times is saved, and the efficiency of determining the first transaction data based on the data identifier is improved; the data to be processed is obtained through verification in the first transaction data, and the data to be processed which needs editing processing is effectively verified; under the condition that the master transaction and the first transaction adopt an asynchronous mode to process transaction data, the computer equipment edits transaction data corresponding to the unauthorized transaction to be processed based on the first slave transaction; the repeated processing of the transaction data which is edited is avoided under the condition that a plurality of data processing parties exist; the transaction data is orderly processed.
Fig. 12 shows an eighth flowchart of an information verification method provided in an exemplary embodiment of the present application. The method may be performed by a computer device. I.e. further comprising steps 554, 556 on the basis of the embodiment shown in fig. 3.
Step 554: acquiring supplementary information of data to be processed;
Illustratively, the supplemental information is information for introducing data to be processed; the supplemental information is typically determined based on one or more data items in the data to be processed, and may also be determined based on the transaction to be handled. Illustratively, the supplemental information includes, but is not limited to, at least one of a data name of the data to be processed, a time of the editing process, an account name of the transaction to be initiated, an account name having editing process rights of the data to be processed, an account name indicated by a data attribution field in the data to be processed.
Step 556: sending supplementary information to the display terminal;
the display terminal is used for displaying the supplementary information; it will be appreciated that the presentation terminal may be an application terminal and/or a processing terminal in the computer system shown in the present application, or may be other terminals than the two terminals. Specifically, the display terminal is a login terminal of at least one account as follows: the system comprises a first account, a second account indicated by a data attribution field in data to be processed, and a third account with editing processing authority of the data to be processed.
In one example, the transaction to be handled may be initiated by the first account number; transaction data belonging to the first account may also be processed, initiated by other accounts. The first account is used as an initiator of the transaction to be handled or a historical attribution party of the transaction data, and the editing processing condition of the fed back first slave transaction and introduction information of the data to be processed are obtained. In another example, the second account is taken as a attribution party of the data to be processed after editing processing is performed based on the first transaction, and the introduction information of the fed back data to be processed is obtained. In another example, the third account, as a manager performing the editing process of the first transaction indication, obtains introduction information of the fed-back data to be processed.
It should be noted that, step 540 in this embodiment may be performed before, after, or any step in the step group consisting of step 554 and step 556, and the timing relationship between step 540 and the step group is not limited in this application.
In one example, fig. 13 shows a schematic diagram of supplemental information provided by an exemplary embodiment of the present application. The first interface 430 is a display interface of the supplemental information, and the first interface 430 includes a data name 432 of the data to be processed, a processing identifier 434, and an account name 436 having editing processing authority of the data to be processed. Taking template data as an example, the data name 432 is used to indicate the name of the template data, and the account name 436 with the editing processing authority of the data to be processed is used to indicate the approver or the copying party of the template data. Taking the example that the data to be processed is bill data, the data name 432 is used to indicate the name of the bill data, and the processing identifier 434 indicates the serial number identifier of the bill data.
In summary, according to the method provided by the embodiment, the feedback of the completion condition of the transaction is realized by acquiring and indicating the display terminal to display the supplementary information; the data to be processed is obtained through verification in the first transaction data, and the data to be processed which needs editing processing is effectively verified; under the condition that the master transaction and the first transaction adopt an asynchronous mode to process transaction data, the computer equipment edits transaction data corresponding to the unauthorized transaction to be processed based on the first slave transaction; the repeated processing of the transaction data which is edited is avoided under the condition that a plurality of data processing parties exist; the transaction data is orderly processed.
Next, the editing process of finding the first transaction indication will be further described.
Fig. 14 shows a ninth flowchart of an information verification method provided in an exemplary embodiment of the present application. The method may be performed by a computer device. I.e. in the embodiment shown in fig. 3, step 540 may be implemented as step 542.
Step 542: editing at least two data items in the data to be processed in a concurrent mode based on the first slave transaction;
the computer equipment is provided with at least two coprocessors, the at least two coprocessors edit at least two data items in the data to be processed in a concurrent mode, and when the at least two data items in the data to be processed are edited in the concurrent mode, the editing processing of a second data item can be executed concurrently under the condition that a first data item is blocked and waited in the editing processing, so that the influence of the blocking wait on the editing processing is reduced. By way of example, the blocking wait may be a data transfer wait when acquiring data to be processed.
By way of example, FIG. 15 illustrates a schematic diagram of a data store provided by an exemplary embodiment of the present application. In one example, where the data storage space 440 includes a first record 441 through an nth record 442, the data storage space 440 may provide storage space for template data and/or document data, and reference may be made to fig. 9 and 11 above with respect to the module data and document data; the data recorded in the data storage space 440 is stored in the serialized character stream 445, and the editing process includes performing a deserialization process after retrieving the content (content) to obtain an information structure 446 of the data to be processed.
In an alternative implementation, step 542 may be implemented as a sub-step as follows.
Based on the first slave transaction, the first coroutine and the second coroutine are called to preempt mutual exclusion locks of the first data item and the second data item in the data to be processed in a concurrent mode.
In the case that the first coordinator Cheng Chenggong preempts the exclusive lock of the first data item, the first coordinator is called to perform editing processing on the first data item.
And calling the second coroutine to edit the second data item under the condition that the second corollary Cheng Chenggong preempts the exclusive lock of the second data item.
The first cooperative program and the second cooperative program occupy the mutual exclusion lock in a concurrent mode, so that the simultaneous editing processing of one data item by different cooperative programs can be avoided; under the condition that the current data item of the coroutine processing is blocked and waiting, the exclusive lock of other data items is preempted, the other data items are processed, and the influence of the blocking and waiting on the editing processing is reduced.
Illustratively, in the case where the first coordinator Cheng Chenggong preempts the exclusive lock of the first data item, the first data item is only edited by the first coordinator to avoid other coordinators and the first coordinator processing the editing process of the first data item at the same time. Similarly, in the event that the second coordinator Cheng Chenggong preempts the exclusive lock of the second data item, the second data item is only edited by the second coordinator. Further, after the editing processing of the data item is completed, the mutual exclusion lock corresponding to the data item is released.
By way of example, FIG. 16 illustrates a schematic diagram of pending data and mutex locks provided by an exemplary embodiment of the present application. The to-be-processed processing comprises x data items, and the identification information of the x data items is id_1, id_2 and id_3 to id_x; the first slave transaction includes an editing task (task) corresponding to the data item one by one, a coroutine configured in the computer device runs the editing task, and the corresponding data item is edited in the database 454 under the condition that the exclusive lock corresponding to the data item is successfully preempted by preempting the exclusive lock 452 in the distributed deployment.
In summary, according to the method provided by the embodiment, at least two data items in the data to be processed are edited in a cooperative concurrent manner, so that the influence caused by blocking waiting for editing the data items is reduced, and the efficiency of editing the data items in the data to be processed based on a plurality of cooperative deployed programs of the computer equipment is improved; the data to be processed is obtained through verification in the first transaction data, and the data to be processed which needs editing processing is effectively verified; under the condition that the master transaction and the first transaction adopt an asynchronous mode to process transaction data, the computer equipment edits transaction data corresponding to the unauthorized transaction to be processed based on the first slave transaction; the repeated processing of the transaction data which is edited is avoided under the condition that a plurality of data processing parties exist; the transaction data is orderly processed.
Fig. 17 shows a tenth flowchart of an information verification method provided in an exemplary embodiment of the present application.
The embodiment is executed by a processing server, and transaction service, coroutine service, data storage service, distribution service and mutual exclusion lock service are operated in the processing server; the following steps will be further described: in this embodiment, the document data is document data in an office collaboration scenario, for example, the transaction data is a holiday application document initiated by the first account. It should be noted that the above is only an exemplary description, and does not exclude the case of applying the embodiment to other scenarios, such as an instant messaging scenario, where the document data is a request document added to group chat; in a game scene of the virtual environment, bill data is a request bill added into a virtual warfare; in the resource transfer scenario, the bill data is a request bill that the requesting party requests to perform resource transfer, and the requesting party and the managing party may be a guardian relationship or a job management relationship. The application does not limit the application scene of the information verification method.
Step 702: the transaction service changes the state information of the holiday application bill into handover in the data storage service;
Exemplary, in response to a master transaction in the transaction to be handled, state information of the holiday application document is changed to be in handover, where the state information is used for indicating that the holiday application document has an editing processing requirement in handover.
Step 704: the data storage service sends updated feedback information to the transaction service;
the update feedback information is used for indicating that the state information of the holiday application bill is successfully changed in response to the main transaction in the transaction to be handled.
Step 706: the transaction service sends at least one slave transaction corresponding to the master transaction to the distribution service;
illustratively, the transaction uses an asynchronous manner to edit the holiday application form after the main transaction. Illustratively, the master transaction is used for indicating to modify the state information of the holiday application document, and at least one transaction corresponding to the master transaction is used for indicating to change the data storage position of the holiday application document.
Step 708: the distribution service sends callback information of a first slave transaction to the transaction service;
illustratively, the allocation service instructs execution of the first slave transaction by the processing server and sends callback information of the first slave transaction to a transaction service deployed in the processing server.
Step 710: the transaction service searches a holiday application bill based on a first transaction in the data storage service;
in an exemplary embodiment, the first transaction indicates that there is a data identifier of a holiday application document, and the holiday application document corresponding to the first transaction is searched for in a plurality of stored data in a data storage service based on the data identifier.
Step 712: the data storage service sends searching feedback information to the transaction service;
illustratively, the search feedback information is used to indicate the found holiday application document.
Step 714: the transaction service verifies and confirms the data to be processed in the feedback information;
the transaction service obtains the data to be processed through checking the data storage state of the holiday application bill and the main transaction; the data storage state of the data to be processed is that the transaction to be processed belongs to a holiday application bill corresponding to the main transaction in the processing.
Step 716: the transaction service sends data to be processed to the coroutine service;
the data to be processed sent by the transaction service is a data identifier of the data to be processed, and is used for indicating the name of a holiday application document needing editing processing to the coroutine service.
Step 718: the coroutine service preemptively mutex locks the first data item in the mutex lock service based on the first coroutine;
Illustratively, the coroutine service manages and controls at least two coroutines configured in the processing server. The first cooperative process is described herein as taking the example of the first cooperative process preempting the exclusive lock of the first data item in a concurrent manner. The first data item is one data item in the data to be processed, and under the condition that the first cooperative Cheng Chenggong preempts the mutual exclusion lock of the first data item, the first cooperative is only used for editing the first data item, so that other cooperative and the first cooperative are prevented from simultaneously processing the editing processing of the first data item.
Step 720: the transaction service edits a first data item in the data to be processed in the data storage service;
the first coroutine adopts a concurrent mode to edit the first data item, and under the condition that the first data item is blocked and waiting, the first coroutine preempts the mutual exclusion lock of other data items, processes the other data items, and reduces the influence of blocking and waiting on the editing process.
Taking the document data as the data to be processed as an example, fig. 18 shows a schematic diagram of editing the document data according to an exemplary embodiment of the present application. The bill data has four nodes (Node) Node 0 indicating an initiator of the bill data, node 1 indicating a primary approver of the bill data, node 2 indicating a secondary approver of the bill data, and Node 3 indicating a data copying party of the bill data. Each node includes a child node (Subnode); the node belongs to an account corresponding to the identity information in the child node; illustratively, the child node in node 1 includes two identity information, and the editing process includes altering the identity information in the child node.
Step 722: the data storage service sends editing feedback information to the business service;
the data storage service feeds back the editing processing condition aiming at the data to be processed to the coroutine service.
Step 724: the coroutine service unlocks the mutual exclusion lock of the first data item in the mutual exclusion lock service based on the first coroutine;
illustratively, after the first coroutine completes the editing process of the first data item, the exclusive lock of the first data item is released.
Step 726: the mutual exclusion lock service sends unlocking feedback information to the coroutine service;
illustratively, the mutex service feeds back the release condition of the mutex to the coroutine service.
Step 728: the coroutine service sends editing feedback information to the business service;
illustratively, the coroutine service forwards edit feedback information to the transaction service, the feedback being based on a condition of the first slave transaction executing the edit process.
In summary, according to the method provided by the embodiment, the data to be processed is obtained through verification in the first holiday application document, so that the data to be processed which needs editing processing is effectively verified; by verifying the attribution condition between the data to be processed and the holiday application bill corresponding to the transaction to be handled, the computer equipment is prevented from editing the holiday application bill corresponding to the transaction to be handled which is not authorized to be handled based on the first slave transaction under the condition that the vacation application bill is processed by adopting an asynchronous mode by the master transaction and the first slave transaction; by checking the data storage state of the data to be processed, the repeated processing of the holiday application bill which is edited and processed is avoided under the condition that a plurality of data processing parties exist; the method realizes orderly processing of the holiday application bill.
It will be appreciated by those skilled in the art that the foregoing embodiments may be implemented independently, or may be combined freely to form new embodiments for implementing the information verification method of the present application.
Fig. 19 is a block diagram showing the structure of an information verification apparatus according to an exemplary embodiment of the present application. The device comprises:
the obtaining module 810 is configured to obtain a first slave transaction in a transaction to be handled, where the transaction to be handled is configured to instruct editing processing to transaction data corresponding to a first account, the first slave transaction and a master transaction respectively instruct editing processing to the transaction data in an asynchronous manner, and the master transaction is a master transaction corresponding to the first transaction in the transaction to be handled;
a processing module 820, configured to search, based on the first slave transaction, first transaction data corresponding to the first transaction;
the processing module 820 is further configured to verify, in the first transaction data, to obtain to-be-processed data, where the to-be-processed data belongs to the transaction data corresponding to the to-be-handled transaction, and a data storage state of the to-be-processed data is a to-be-handled state, where the to-be-handled state is used to indicate that an editing processing requirement exists in the to-be-processed data;
The processing module 820 is further configured to perform editing processing on the data to be processed based on the first slave transaction.
In an alternative implementation of this embodiment, the processing module 820 is further configured to:
constructing a first data set based on the transaction data corresponding to the transaction to be handled;
constructing a second data set based on candidate data of which the data storage state is the to-be-handled state in the first transaction data;
and determining an intersection part of the first data set and the second data set as the checked data to be processed.
In an alternative implementation of this embodiment, the processing module 820 is further configured to:
screening the first transaction data to obtain candidate data, wherein the candidate data is transaction data based on the indication of the to-be-handled transaction that the data storage state is changed;
and constructing and obtaining the second data set based on the candidate data.
In an alternative implementation of this embodiment, the candidate data includes at least one of identification change data and attribution change data;
the processing module 820 is further configured to at least one of:
Screening the first transaction data to obtain the identification change data, wherein the identification change data comprises a state identification field; responding to the main transaction corresponding to the first transaction, wherein the state identification field is changed into a first field, and the first field is used for indicating that the data storage state of the identification change data is changed into the to-be-handled state;
screening the first transaction data to obtain the attribution change data, wherein the attribution change data comprises a data attribution field; and responding to the main transaction corresponding to the first transaction, changing the data attribution field into a second account, wherein the data attribution field is changed to indicate that the data storage state of attribution change data is changed into the to-be-handled state.
In an alternative implementation of this embodiment, the processing module 820 is further configured to:
and adding editing flow information corresponding to the first transaction, wherein the editing flow information is used for recording the editing condition of the computer equipment on the first transaction data corresponding to the first transaction.
In an alternative implementation of this embodiment, the processing module 820 is further configured to at least one of:
Determining the equipment identifier of the computer equipment as first flowing water information, wherein the first flowing water information is editing flowing water information corresponding to the data to be processed;
determining the equipment identifier and verification failure reason of the computer equipment as second stream information, wherein the second stream information is editing stream information corresponding to other data except the data to be processed in the first transaction data;
the verification failure reasons comprise at least one of authority verification failure and state verification failure, wherein the authority verification failure is used for indicating that other data does not belong to the transaction data corresponding to the transaction to be handled, and the state verification failure is used for indicating that the data storage state of the other data is different from the state to be handled.
In an alternative implementation of this embodiment, the first transaction indicates that there is a data feature of the first transaction data, and the processing module 820 is further configured to:
searching a plurality of stored data for data features of a first transaction indication one by one in a concurrent manner, and determining the stored data satisfying the data features as the first transaction data.
In an alternative implementation of this embodiment, the first transaction carries a data identifier of the first transaction data, and the processing module 820 is further configured to:
And searching in batches in a plurality of storage data by taking the data mark carried by the first transaction as an index to obtain the first transaction data.
In an alternative implementation of this embodiment, the apparatus further includes a sending module 830;
the obtaining module 810 is further configured to obtain supplemental information of the data to be processed, where the supplemental information is information for introducing the data to be processed;
the sending module 830 is configured to send the supplemental information to a display terminal, where the display terminal is configured to display the supplemental information;
the display terminal is a login terminal of at least one account as follows: the first account, the second account indicated by the data attribution field in the data to be processed and the third account with editing processing authority of the data to be processed.
In an alternative implementation of this embodiment, the processing module 820 is further configured to:
and editing at least two data items in the data to be processed in a coroutine concurrency mode based on the first slave transaction.
In an alternative implementation of this embodiment, the processing module 820 is further configured to:
based on the first slave transaction, calling a first cooperative program and a second cooperative program to preempt mutual exclusion locks of a first data item and a second data item in the data to be processed in a concurrent mode;
Calling the first coroutine to edit the first data item under the condition that the first coroutine successfully preempts the mutual exclusion lock of the first data item;
and calling the second cooperative program to edit the second data item under the condition that the second cooperative program successfully preempts the exclusive lock of the second data item.
It should be noted that, when the apparatus provided in the foregoing embodiment performs the functions thereof, only the division of the respective functional modules is used as an example, in practical application, the foregoing functional allocation may be performed by different functional modules according to actual needs, that is, the content structure of the device is divided into different functional modules, so as to perform all or part of the functions described above.
With respect to the apparatus in the above embodiments, the specific manner in which the respective modules perform the operations has been described in detail in the embodiments regarding the method; the technical effects achieved by the execution of the operations by the respective modules are the same as those in the embodiments related to the method, and will not be described in detail herein.
The embodiment of the application also provides a computer device, which comprises: a processor and a memory, the memory storing a computer program; the processor is configured to execute the computer program in the memory to implement the information verification method provided in the foregoing method embodiments.
Optionally, the computer device is a server. Illustratively, fig. 20 is a block diagram of a server provided in an exemplary embodiment of the present application.
In general, the server 2300 includes: a processor 2301 and a memory 2302.
The processor 2301 may include one or more processing cores, such as a 4-core processor, an 8-core processor, or the like. The processor 2301 may be implemented in hardware in at least one of digital signal processing (Digital Signal Processing, DSP), field programmable gate array (Field-Programmable Gate Array, FPGA), programmable logic array (Programmable Logic Array, PLA). The processor 2301 may also include a main processor, which is a processor for processing data in an awake state, also referred to as a central processor (Central Processing Unit, CPU), and a coprocessor; a coprocessor is a low-power processor for processing data in a standby state. In some embodiments, the processor 2301 may be integrated with an image processor (Graphics Processing Unit, GPU) for use in connection with rendering and rendering of content to be displayed by the display screen. In some embodiments, the processor 2301 may also include an artificial intelligence (Artificial Intelligence, AI) processor for processing computing operations related to machine learning.
Memory 2302 may include one or more computer-readable storage media, which may be non-transitory. Memory 2302 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In some embodiments, a non-transitory computer readable storage medium in memory 2302 is used to store at least one instruction for execution by processor 2301 to implement the information verification method provided by the method embodiments herein.
In some embodiments, server 2300 may further optionally include: an input interface 2303 and an output interface 2304. The processor 2301 and the memory 2302 may be connected to the input interface 2303 and the output interface 2304 through buses or signal lines. The respective peripheral devices may be connected to the input interface 2303 and the output interface 2304 through buses, signal lines, or a circuit board. Input interface 2303, output interface 2304 may be used to connect at least one Input/Output (I/O) related peripheral device to processor 2301 and memory 2302. In some embodiments, the processor 2301, memory 2302, and input interface 2303, output interface 2304 are integrated on the same chip or circuit board; in some other embodiments, the processor 2301, the memory 2302, and either or both of the input interface 2303 and the output interface 2304 may be implemented on separate chips or circuit boards, which are not limited in this application.
Those skilled in the art will appreciate that the structures shown above are not limiting of server 2300 and may include more or fewer components than shown, or may combine certain components, or may employ a different arrangement of components.
In an exemplary embodiment, a chip is also provided, the chip comprising programmable logic circuits and/or program instructions for implementing the information verification method of the above aspect when the chip is run on a computer device.
In an exemplary embodiment, a computer program product is also provided, the computer program product comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor reads and executes the computer instructions from the computer-readable storage medium to implement the information verification method provided by the above-mentioned method embodiments.
In an exemplary embodiment, there is also provided a computer-readable storage medium having stored therein a computer program that is loaded and executed by a processor to implement the information verification method provided by the above-described method embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program for instructing relevant hardware, where the program may be stored in a computer readable storage medium, and the storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
Those skilled in the art will appreciate that in one or more of the examples described above, the functions described in the embodiments of the present application may be implemented in hardware, software, firmware, or any combination thereof. When implemented in software, these functions may be stored on or transmitted over as one or more instructions or code on a computer-readable medium. Computer-readable media includes both computer storage media and communication media including any medium that facilitates transfer of a computer program from one place to another. A storage media may be any available media that can be accessed by a general purpose or special purpose computer.
The foregoing description of the preferred embodiments is merely exemplary in nature and is in no way intended to limit the invention, since it is intended that all modifications, equivalents, improvements, etc. that fall within the spirit and scope of the invention.

Claims (9)

1. A method of information verification, the method performed by a computer device, the method comprising:
acquiring a first slave transaction in transactions to be handled, wherein the transactions to be handled are used for indicating to edit transaction data corresponding to a first account, the first slave transaction and a master transaction respectively indicate to edit the transaction data in an asynchronous mode, and the master transaction is the master transaction corresponding to the first transaction in the transactions to be handled;
searching first transaction data corresponding to the first transaction based on the first slave transaction;
constructing a first data set based on the transaction data corresponding to the transaction to be handled, wherein the transaction data is data indicated to the computer equipment with editing processing permission in response to the main transaction;
screening the first transaction data to obtain identification change data, and/or screening the first transaction data to obtain attribution change data; the identification change data comprises a state identification field; responding to the main transaction corresponding to the first transaction, wherein the state identification field is changed into a first field, and the first field is used for indicating that the data storage state of the identification change data is changed into a to-do state; the attribution change data comprises a data attribution field; responding to the main transaction corresponding to the first transaction, changing the data attribution field into a second account, wherein the data attribution field is changed to indicate that the data storage state of attribution change data is changed into the to-be-handled state; the main transaction is used for indicating to change the data storage state, and the data storage state of at least one of the identification change data and the attribution change data is a to-do state;
Constructing and obtaining a second data set based on at least one of the identification change data and the attribution change data;
determining an intersection part of the first data set and the second data set as to-be-processed data obtained through verification, wherein the to-be-processed data belongs to the transaction data corresponding to the to-be-processed transaction, and the data storage state of the to-be-processed data is the to-be-processed state which is used for indicating that the to-be-processed data has editing processing requirements;
editing the data to be processed based on the first slave transaction, wherein the editing process comprises changing the data storage state of the data to be processed into a completion state;
determining the equipment identification of the computer equipment as first flow information, and/or determining the equipment identification of the computer equipment and the verification failure cause as second flow information; the first stream information is editing stream information corresponding to the data to be processed, and the second stream information is editing stream information corresponding to other data except the data to be processed in the first transaction data;
the verification failure reasons comprise at least one of authority verification failure and state verification failure, wherein the authority verification failure is used for indicating that other data does not belong to the transaction data corresponding to the transaction to be handled, and the state verification failure is used for indicating that the data storage state of the other data is different from the state to be handled.
2. The method of claim 1, wherein the first transaction indicates that there is a data characteristic of first transaction data, and wherein the looking up the first transaction data corresponding to the first transaction based on the first slave transaction comprises:
searching a plurality of stored data for data features of a first transaction indication one by one in a concurrent manner, and determining the stored data satisfying the data features as the first transaction data.
3. The method of claim 1, wherein the first transaction carries a data identification of first transaction data, wherein the looking up the first transaction data corresponding to the first transaction based on the first slave transaction comprises:
and searching in batches in a plurality of storage data by taking the data mark carried by the first transaction as an index to obtain the first transaction data.
4. The method according to claim 1, wherein the method further comprises:
acquiring supplementary information of the data to be processed, wherein the supplementary information is information for introducing the data to be processed;
the supplementary information is sent to a display terminal, and the display terminal is used for displaying the supplementary information;
The display terminal is a login terminal of at least one account as follows: the first account, the second account indicated by the data attribution field in the data to be processed and the third account with editing processing authority of the data to be processed.
5. The method of claim 1, wherein the editing the data to be processed based on the first slave transaction comprises:
and editing at least two data items in the data to be processed in a coroutine concurrency mode based on the first slave transaction.
6. The method of claim 5, wherein editing at least two data items in the data to be processed in a coroutine concurrency manner based on the first slave transaction, comprises:
based on the first slave transaction, calling a first cooperative program and a second cooperative program to preempt mutual exclusion locks of a first data item and a second data item in the data to be processed in a concurrent mode;
calling the first coroutine to edit the first data item under the condition that the first coroutine successfully preempts the mutual exclusion lock of the first data item;
and calling the second cooperative program to edit the second data item under the condition that the second cooperative program successfully preempts the exclusive lock of the second data item.
7. An information verification apparatus, characterized in that the apparatus comprises:
the system comprises an acquisition module, a processing module and a processing module, wherein the acquisition module is used for acquiring a first slave transaction in transactions to be handled, the transactions to be handled are used for indicating to edit transaction data corresponding to a first account, the first slave transaction and a master transaction respectively indicate to edit the transaction data in an asynchronous mode, and the master transaction is the master transaction corresponding to the first transaction in the transactions to be handled;
the processing module is used for searching first transaction data corresponding to the first transaction based on the first slave transaction;
the processing module is further configured to construct a first data set based on the transaction data corresponding to the transaction to be handled, where the transaction data is data indicated to the computer device with editing processing permission in response to the master transaction;
the processing module is further configured to screen the first transaction data for identification change data, and/or screen the first transaction data for attribution change data; the identification change data comprises a state identification field; responding to the main transaction corresponding to the first transaction, wherein the state identification field is changed into a first field, and the first field is used for indicating that the data storage state of the identification change data is changed into a to-do state; the attribution change data comprises a data attribution field; responding to the main transaction corresponding to the first transaction, changing the data attribution field into a second account, wherein the data attribution field is changed to indicate that the data storage state of attribution change data is changed into the to-be-handled state; the main transaction is used for indicating to change the data storage state, and the data storage state of at least one of the identification change data and the attribution change data is a to-do state;
The processing module is further configured to construct a second data set based on at least one of the identification change data and the attribution change data;
the processing module is further configured to determine an intersection part of the first data set and the second data set as to-be-processed data obtained through verification, where the to-be-processed data belongs to the transaction data corresponding to the to-be-handled transaction, and a data storage state of the to-be-processed data is the to-be-handled state, where the to-be-handled state is used to indicate that the to-be-processed data has an editing processing requirement;
the processing module is further configured to perform editing processing on the data to be processed based on the first slave transaction, where the editing processing includes changing the data storage state of the data to be processed to a completion state;
the processing module is further configured to determine a device identifier of the computer device as first flow information, and/or determine a device identifier of the computer device and a verification failure cause as second flow information; the first stream information is editing stream information corresponding to the data to be processed, and the second stream information is editing stream information corresponding to other data except the data to be processed in the first transaction data;
The verification failure reasons comprise at least one of authority verification failure and state verification failure, wherein the authority verification failure is used for indicating that other data does not belong to the transaction data corresponding to the transaction to be handled, and the state verification failure is used for indicating that the data storage state of the other data is different from the state to be handled.
8. A computer device, the computer device comprising: a processor and a memory, wherein at least one section of program is stored in the memory; the processor is configured to execute the at least one program in the memory to implement the information verification method according to any one of claims 1 to 6.
9. A computer readable storage medium having stored therein executable instructions that are loaded and executed by a processor to implement the information verification method of any one of the preceding claims 1 to 6.
CN202310936160.6A 2023-07-28 2023-07-28 Information verification method, device, equipment and storage medium Active CN116680277B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310936160.6A CN116680277B (en) 2023-07-28 2023-07-28 Information verification method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310936160.6A CN116680277B (en) 2023-07-28 2023-07-28 Information verification method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN116680277A CN116680277A (en) 2023-09-01
CN116680277B true CN116680277B (en) 2024-02-02

Family

ID=87785817

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310936160.6A Active CN116680277B (en) 2023-07-28 2023-07-28 Information verification method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116680277B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1981002477A1 (en) * 1980-02-28 1981-09-03 Intel Corp Data processing system
CN112395333A (en) * 2020-11-20 2021-02-23 北京百度网讯科技有限公司 Method and device for checking data exception, electronic equipment and storage medium
CN113919757A (en) * 2021-11-22 2022-01-11 重庆允成互联网科技有限公司 Workflow-based backlog handler matching method and system
CN115827265A (en) * 2022-11-04 2023-03-21 北京百度网讯科技有限公司 Transaction processing method, device, equipment and storage medium
CN116128268A (en) * 2022-12-12 2023-05-16 深圳市润丰智慧科技有限公司 On-site digital management system applied to general industry
CN116303510A (en) * 2023-03-24 2023-06-23 中国工商银行股份有限公司 Resource transfer transaction processing method, device, computer equipment and storage medium

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140081685A1 (en) * 2012-09-17 2014-03-20 Salesforce.com. inc. Computer implemented methods and apparatus for universal task management
US11157643B2 (en) * 2018-09-27 2021-10-26 The Toronto-Dominion Bank Systems and methods for delegating access to a protected resource
US11665172B2 (en) * 2019-05-10 2023-05-30 Live Nation Entertainment, Inc. Systems and methods for processing optimizations and templating using metadata-driven blockchain techniques

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO1981002477A1 (en) * 1980-02-28 1981-09-03 Intel Corp Data processing system
CN112395333A (en) * 2020-11-20 2021-02-23 北京百度网讯科技有限公司 Method and device for checking data exception, electronic equipment and storage medium
CN113919757A (en) * 2021-11-22 2022-01-11 重庆允成互联网科技有限公司 Workflow-based backlog handler matching method and system
CN115827265A (en) * 2022-11-04 2023-03-21 北京百度网讯科技有限公司 Transaction processing method, device, equipment and storage medium
CN116128268A (en) * 2022-12-12 2023-05-16 深圳市润丰智慧科技有限公司 On-site digital management system applied to general industry
CN116303510A (en) * 2023-03-24 2023-06-23 中国工商银行股份有限公司 Resource transfer transaction processing method, device, computer equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
GPU通用计算及其在计算智能领域的应用;丁科;谭营;;智能系统学报(01);全文 *

Also Published As

Publication number Publication date
CN116680277A (en) 2023-09-01

Similar Documents

Publication Publication Date Title
US6826604B2 (en) Input/output device information management system for multi-computer system
JP5162094B2 (en) Method and apparatus for metadata-driven business logic processing
CN102112990B (en) Granting least privilege access for computing processes
CN109766330B (en) Data slicing method and device, electronic equipment and storage medium
CN101772764A (en) Multi-threaded business programming library
CN103019718A (en) Use of distributed source control in centralized source control environment
US11995453B2 (en) Method and apparatus for generating image file and computer-readable storage medium
CN112364049B (en) Data synchronization script generation method, system, terminal and storage medium
CN111858615A (en) Database table generation method, system, computer system and readable storage medium
CN114021531A (en) Document collaborative editing method and device, electronic equipment and storage medium
US8903889B2 (en) Method, system and article for mobile metadata software agent in a data-centric computing environment
CN111144837A (en) Flow arrangement method and device, storage medium and electronic equipment
CN116680277B (en) Information verification method, device, equipment and storage medium
US20110191549A1 (en) Data Array Manipulation
US11625497B2 (en) File management system and non-transitory computer readable medium
CN110960858B (en) Game resource processing method, device, equipment and storage medium
CN111324368B (en) Data sharing method and server
CN114997805A (en) Configuration method and device of approval business, electronic equipment and storage medium
US11010346B2 (en) Methods and apparatus for managing access to file content
CN113761075A (en) Method, device, equipment and computer readable medium for switching databases
CN113806327A (en) Database design method and device and related equipment
CN113138722B (en) Replication snapshot method, system and medium for distributed block storage system
JPH09212530A (en) Drawing managing device
CN115270110B (en) Account inspection method and device, electronic equipment and storage medium
EP3449601B1 (en) Configuration data as code

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant