Business data processing method, identity management method and business audit method
A processing method and technology of business data, applied in the field of information, which can solve problems such as hidden dangers of business documents
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0077] The technical solutions in the examples of the application will be clearly and completely described below in conjunction with the accompanying drawings in the examples of the application. Obviously, the described examples are only some examples of the application, not all examples. Based on the examples in this application, all other examples obtained by persons of ordinary skill in the art without making creative efforts belong to the scope of protection of this application.
[0078] figure 1 A schematic diagram showing application scenarios according to some embodiments of the present application. Such as figure 1 As shown, the application scenario 100 includes service processing devices 101 and 102 , an identity management device 103 , service participant devices 104 and 105 , and a service audit device 106 .
[0079] The business processing devices 101 and 102 can be applied in fields such as finance, and can manage the processing flow of business documents. Busi...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com