CN113094270B - Project automatic verification method and device - Google Patents

Project automatic verification method and device Download PDF

Info

Publication number
CN113094270B
CN113094270B CN202110392865.7A CN202110392865A CN113094270B CN 113094270 B CN113094270 B CN 113094270B CN 202110392865 A CN202110392865 A CN 202110392865A CN 113094270 B CN113094270 B CN 113094270B
Authority
CN
China
Prior art keywords
project
verification
risk
preset
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110392865.7A
Other languages
Chinese (zh)
Other versions
CN113094270A (en
Inventor
梁广会
王培君
许淑容
袁甲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202110392865.7A priority Critical patent/CN113094270B/en
Publication of CN113094270A publication Critical patent/CN113094270A/en
Application granted granted Critical
Publication of CN113094270B publication Critical patent/CN113094270B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3664Environments for testing or debugging software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • G06F16/2433Query languages
    • G06F16/2445Data retrieval commands; View definitions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Accounting & Taxation (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Computational Linguistics (AREA)
  • Mathematical Physics (AREA)
  • Software Systems (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application provides a method and a device for automatically verifying an item, which can also be used in the financial field, and the method comprises the following steps: receiving a project risk verification trigger instruction, and analyzing a corresponding project according to the project risk verification trigger instruction; performing risk verification operation on the analyzed item according to a preset fixed risk point verification rule and a preset risk point verification rule to obtain a risk verification result of the item; the method and the device can effectively process multiple types of technical verification in risk point verification after the project is online, can realize a customizable verification method except a fixed type, improve efficiency and reduce operation and maintenance cost.

Description

Project automatic verification method and device
Technical Field
The application relates to the field of data processing and also can be used in the field of finance, in particular to an automatic project verification method and device.
Background
The existing verification of the project version on-line business and technology is mostly performed through manual intervention, risk verification content is prepared in advance through a verification type set by a fixed rule, and then manual execution and result verification are performed after the project is on-line. The project is manually verified for risk points, and the business and technology after the project is online can be verified, but when the project body quantity is large and the risk points required to be verified for the online are more, the manual verification efficiency is not very high, and the problem of accuracy exists.
The inventor finds that the manual verification in the prior art depends on a technical template, has poor compatibility, has insufficient application range, needs clear environment configuration and has insufficient automation rate. And the operation and maintenance labor is wasted, and the cost of risk point verification is increased while the effectiveness and accuracy of automatic verification are lost.
Disclosure of Invention
Aiming at the problems in the prior art, the application provides an automatic project verification method and device, which can effectively process multiple types of technical verification in risk point verification after the project is on line, realize a customizable verification method except a fixed type, improve efficiency and reduce operation and maintenance cost.
In order to solve at least one of the above problems, the present application provides the following technical solutions:
in a first aspect, the present application provides an automatic project certification method, comprising:
receiving a project risk verification trigger instruction, and analyzing a corresponding project according to the project risk verification trigger instruction;
and performing risk verification operation on the analyzed item according to a preset fixed risk point verification rule and a preset risk point verification rule to obtain a risk verification result of the item.
Further, performing risk verification operation on the parsed item according to a preset fixed risk point verification rule to obtain a risk verification result of the item, including:
judging whether the project file characteristic information obtained after analyzing the project is consistent with a preset file characteristic expected value, if so, judging that the project file characteristic information of the project passes verification, wherein the project file characteristic information comprises directory attributes, file variable values and file contents;
judging whether project operation result information obtained after analyzing the project is consistent with a preset operation result expected value, if so, judging that the project operation result information of the project passes verification, wherein the project operation result information comprises result data which is output to a specified database after the project is operated;
judging whether the project operation process information obtained after analyzing the project is consistent with a preset operation process expected value, if so, judging that the project operation process information of the project passes verification, wherein the project operation process information comprises log data and context node data generated during the project operation.
Further, performing risk verification operation on the parsed item according to a preset risk point verification rule to obtain a risk verification result of the item, including:
reading a preset customized risk point verification module file and carrying out file serialization processing to obtain a risk point verification rule of the project operation environment;
acquiring the project operation environment data at the corresponding inspection source of the project according to the project operation environment risk point verification rule, judging whether the project operation environment data is in the range of a preset operation environment expected value, and if so, judging that the project operation environment data verification of the project is passed.
Further, before the receiving the project risk verification trigger instruction, the method includes:
and generating a project risk verification trigger instruction after the project online deployment is monitored, or generating the project risk verification trigger instruction when a preset timer reaches a set time.
In a second aspect, the present application provides an item automation verification device, comprising:
the project analysis module is used for receiving the project risk verification trigger instruction and analyzing the corresponding project according to the project risk verification trigger instruction;
and the risk verification module is used for performing risk verification operation on the analyzed item according to a preset fixed risk point verification rule and a preset customized risk point verification rule to obtain a risk verification result of the item.
Further, the risk verification module includes:
the project file feature information verification unit is used for judging whether project file feature information obtained after analyzing the project is consistent with a preset file feature expected value, if so, judging that the project file feature information of the project passes verification, wherein the project file feature information comprises directory attributes, file variable values and file contents;
the project operation result information verification unit is used for judging whether project operation result information obtained after analyzing the project is consistent with a preset operation result expected value or not, if so, judging that the project operation result information of the project passes verification, wherein the project operation result information comprises result data which is output to a specified database after the project is operated;
the project operation process information verification unit is used for judging whether project operation process information obtained after analyzing the project is consistent with a preset operation process expected value, if so, judging that the project operation process information verification of the project is passed, wherein the project operation process information comprises log data and context node data generated during the project operation.
Further, the risk verification module includes:
the customized template serialization unit is used for reading a preset customized risk point verification module file and carrying out file serialization processing to obtain a project operation environment risk point verification rule;
the project operation environment data verification unit is used for acquiring project operation environment data at the corresponding inspection source of the project according to the project operation environment risk point verification rule, judging whether the project operation environment data is in a preset operation environment expected value range, and if so, judging that the project operation environment data verification of the project is passed.
Further, the method further comprises the following steps:
the verification triggering unit is used for generating a project risk verification triggering instruction after the project online deployment is monitored or generating the project risk verification triggering instruction when a preset timer reaches a set time.
In a third aspect, the present application provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method for automatically verifying items when the program is executed.
In a fourth aspect, the present application provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the method for automatic verification of items.
According to the technical scheme, the project automatic verification method and device are provided, the project automatic verification operation is automatically executed through embedding the project automatic verification method into the project, the project online manual participation degree is reduced, the risk point verification time is shortened, the verification efficiency is improved, and meanwhile, the project can be comprehensively and flexibly verified by adopting the fixed risk point verification rule and the customized risk point verification rule, so that the operation and maintenance cost is effectively reduced.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic flow chart of an automatic project verification method according to an embodiment of the present application;
FIG. 2 is a second flow chart of the method for automatically verifying an item according to the embodiment of the present application;
FIG. 3 is a third flow chart of the method for automatically verifying an item according to the embodiment of the present application;
FIG. 4 is one of the block diagrams of the project automation verification device in the embodiment of the present application;
FIG. 5 is a second block diagram of an automated project verification apparatus in an embodiment of the present application;
FIG. 6 is a third block diagram of an automated verification device for items in an embodiment of the present application;
FIG. 7 is a flow chart of an automatic project verification method in an embodiment of the present application;
fig. 8 is a schematic structural diagram of an electronic device in an embodiment of the present application.
Detailed Description
For the purposes of making the objects, technical solutions and advantages of the embodiments of the present application more clear, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is apparent that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application.
In consideration of the problems that the compatibility of a technical template relied on by manual verification in the prior art is poor, the application range is not enough, and the environment configuration is required to be clarified, and the automation rate is not enough, the application provides an automatic project verification method and device.
In order to effectively process multiple types of technical verification in risk point verification after online of a project and realize a customizable verification method except a fixed type, improve efficiency and reduce operation and maintenance costs, the application provides an embodiment of an automatic project verification method, referring to fig. 1 and 7, wherein the automatic project verification method specifically comprises the following contents:
step S101: and receiving an item risk verification trigger instruction, and analyzing the corresponding item according to the item risk verification trigger instruction.
Alternatively, the program/system/virtual module for executing the method of the present application may be embedded in the target item, or may be set independently of the target item.
Optionally, after receiving the project risk verification trigger instruction, the application may firstly analyze the corresponding project according to the project risk verification trigger instruction, so as to obtain data in the project for performing risk verification operation, where the data for risk verification operation in the project may be analysis of the project program, obtain its own code, or obtain data in a database corresponding to the project, that is, data output by the project in the running process or after the running is completed.
Step S102: and performing risk verification operation on the analyzed item according to a preset fixed risk point verification rule and a preset risk point verification rule to obtain a risk verification result of the item.
Optionally, after the automatic triggering of the risk verification operation on the item, the risk verification operation on the item after the analysis can be performed according to a preset fixed risk point verification rule and a preset risk point verification rule, wherein the preset fixed risk point verification rule and the preset risk point verification rule are used for performing risk verification on the item from different dimensions, specifically, the fixed risk point verification rule is used for performing risk verification according to internal information of the item, and the preset risk point verification rule is used for performing risk verification according to external information of the item.
Optionally, the preset fixed risk point verification rule and the preset customized risk point verification rule may be predefined for an administrator, where the predefined fixed risk point verification rule includes an inspection source, a specific judgment rule, and a judgment standard value (i.e., an expected value) that need to be obtained from the project.
In other embodiments of the present application, the preset and customized risk point verification rule may flexibly determine the inspection source in the project according to the determination rule actually included therein.
According to the method for automatically verifying the project, provided by the embodiment of the application, the project risk verification operation can be automatically executed by embedding the method into the project, so that the project on-line manual participation degree is reduced, the risk point verification time is shortened, the verification efficiency is improved, and meanwhile, the project can be comprehensively and flexibly verified by adopting the fixed risk point verification rule and the customized risk point verification rule, and the operation and maintenance cost is effectively reduced.
In order to enable risk verification inside the project, in an embodiment of the project automatic verification method of the present application, referring to fig. 2, the step S102 may further specifically include the following:
step S201: judging whether the project file characteristic information obtained after analyzing the project is consistent with a preset file characteristic expected value, if so, judging that the project file characteristic information of the project passes verification, wherein the project file characteristic information comprises directory attributes, file variable values and file contents.
Specifically, the method and the device can verify the characteristic information of the project file on the directory attribute obtained after the project is analyzed, for example, the expected value is yes or no, and whether the configured directory exists or not and whether the user authority exists is verified. And executing the system command, checking whether the content exists and is a directory, judging the directory authority, returning an actual value of 'yes' if all the content is met, and otherwise, checking that the content does not pass through the return of 'no', and recording and outputting a result description.
Meanwhile, the method and the device can also verify the characteristic information of the project file on the file attribute obtained after the project is analyzed, for example, the expected value is yes or no, whether the configured file exists or not is verified, and the authority is given. And executing the system command, checking whether the content exists and is a file, judging the authority of the file, returning an actual value of 'yes' if all the content is met, and otherwise, checking that the content does not pass through the return of 'no', and recording and outputting a result description.
In addition, the method and the device can verify the characteristic information of the project file according to the file variable value obtained after the project is analyzed, for example, the expected value is configured according to the actual situation. Verifying whether the actual value of the variable in the configured file is consistent with the expected value, which type of verification is not suitable for xml text verification. The verification content in the rule template is configured as a file variable name, and the system command directly matches the variable name to acquire the variable value of the file and returns the variable value as an actual value.
Then, the application may further verify the characteristic information of the file of the item, for example, the expected value is "yes" or "no" on the file content obtained after the analysis of the item. To check whether a certain content exists in the file. The system commands inquire whether verification content exists in the file, if yes, the system commands return to yes, otherwise, the system commands return to no. Can be used as a means for verifying the production log.
Step S202: judging whether the project operation result information obtained after analyzing the project is consistent with a preset operation result expected value, if so, judging that the project operation result information of the project passes verification, wherein the project operation result information comprises result data which is output to a specified database after the project is operated.
Specifically, the present application may verify the project file feature information of the project operation result information obtained after the analysis of the project, and it may be understood that the project operation result information is typically stored in a specified database, for example, its expected value is configured in an actual situation. Verifying whether the query result of the configured sql query statement is consistent with the expected query result, and verifying that the environment does not allow other modification commands is only applicable to the select statement. And reading the database environment configuration in the system, then executing the sql command, and returning an execution result as an actual value.
Step S203: judging whether the project operation process information obtained after analyzing the project is consistent with a preset operation process expected value, if so, judging that the project operation process information of the project passes verification, wherein the project operation process information comprises log data and context node data generated during the project operation.
Specifically, the present application may verify project file feature information of project operation process information obtained after the project is parsed, and it may be understood that the project operation process information may be log data (stored in a setting database) and context node data (such as xml and json node content) generated during the project operation, for example, the expected value of the log data configures the node value in a practical situation. The function can verify that a node value is a customized function in the case of a multi-layer node. It is necessary to write in the authentication content which child node under which parent node needs to be authenticated. Returned is the node value of the specified node.
In order to enable risk verification on the outside of the project, in an embodiment of the project automatic verification method of the present application, referring to fig. 3, the step S102 may further specifically include the following:
step S301: and reading a preset customized risk point verification module file, and carrying out file serialization processing to obtain a risk point verification rule of the project operating environment.
Step S302: acquiring the project operation environment data at the corresponding inspection source of the project according to the project operation environment risk point verification rule, judging whether the project operation environment data is in the range of a preset operation environment expected value, and if so, judging that the project operation environment data verification of the project is passed.
It is understood that the project execution environment data such as resource occupancy, etc.
Specifically, at the time point when the occupancy of the running environment resource needs to be checked, an automatic task is set, and automatic verification is executed. And displaying the real-time use condition of the system resources through the top command. Firstly, the resource occupation conditions of all running tasks at present, including the current time, the running time of the system, the current login user, the system load condition (comprising average value in 1 minute, 5 minutes and 15 minutes), the process running condition, the space occupation rate, the cache use condition and the like, are output after being processed according to the content verified as required; secondly, the occupation condition of a certain running task can be used for fuzzily inquiring the command name of the task, inquiring to obtain the process id, the father process id, the owner, the priority, the cpu occupation rate, the memory occupation rate, the command name, the state and the like, and outputting the processed contents according to the content needing verification. Both of the above cases can be controlled by the top command parameter. In the processing process, system resource occupancy data is output to a log, and the log file is checked under the condition to be verified.
In order to enable timely risk verification, in an embodiment of the automatic project verification method of the present application, the following may be further specifically included:
and generating a project risk verification trigger instruction after the project online deployment is monitored, or generating the project risk verification trigger instruction when a preset timer reaches a set time.
In order to effectively process multiple types of technical verification in risk point verification after online of a project and realize a customizable verification method except a fixed type, improve efficiency and reduce operation and maintenance costs, the application provides an embodiment of a project automation verification device for realizing all or part of the contents of the project automation verification method, referring to fig. 4, the project automation verification device specifically comprises the following contents:
the project analysis module 10 is configured to receive a project risk verification trigger instruction, and analyze a corresponding project according to the project risk verification trigger instruction.
And the risk verification module 20 is configured to perform risk verification operation on the parsed item according to a preset fixed risk point verification rule and a preset custom risk point verification rule, so as to obtain a risk verification result of the item.
According to the project automatic verification device provided by the embodiment of the application, the project automatic verification operation can be automatically executed by embedding the method in the project, the project on-line manual participation degree is reduced, the risk point verification time is shortened, the verification efficiency is improved, and meanwhile, the project can be comprehensively and flexibly verified by adopting the fixed risk point verification rule and the customized risk point verification rule, so that the operation and maintenance cost is effectively reduced.
In order to enable risk verification of the inside of an item, in an embodiment of the item automation verification device of the present application, referring to fig. 5, the risk verification module 20 includes:
and a project file feature information verification unit 21, configured to determine whether project file feature information obtained by analyzing the project is consistent with a preset file feature expected value, and if yes, determine that project file feature information of the project passes verification, where the project file feature information includes a directory attribute, a file variable value, and a file content.
And the item operation result information verification unit 22 is configured to determine whether item operation result information obtained after the analysis of the item is consistent with a preset operation result expected value, and if yes, determine that the item operation result information of the item passes verification, where the item operation result information includes result data output to a specified database after the operation of the item.
And the project operation process information verification unit 23 is configured to determine whether project operation process information obtained after the project is parsed is consistent with a preset operation process expected value, and if yes, determine that project operation process information of the project passes verification, where the project operation process information includes log data and context node data generated during the project operation.
In order to enable risk verification outside the project, in an embodiment of the project automation verification device of the present application, referring to fig. 6, the risk verification module 20 includes:
the customized template serialization unit 24 is configured to read a preset customized risk point verification module file and perform file serialization processing to obtain a risk point verification rule of the project operation environment.
And the project operation environment data verification unit 25 is configured to obtain project operation environment data at a corresponding inspection source of the project according to the project operation environment risk point verification rule, determine whether the project operation environment data is within a preset operation environment expected value range, and if so, determine that the project operation environment data verification of the project is passed.
In order to enable timely risk verification, in an embodiment of the project automation verification device of the present application, the method further specifically includes the following:
the verification triggering unit is used for generating a project risk verification triggering instruction after the project online deployment is monitored or generating the project risk verification triggering instruction when a preset timer reaches a set time.
In order to effectively process multiple types of technical verification in risk point verification after the project is online in terms of hardware level, and realize a customizable verification method except a fixed type, improve efficiency and reduce operation and maintenance costs, the application provides an embodiment of an electronic device for realizing all or part of contents in the project automatic verification method, wherein the electronic device specifically comprises the following contents:
a processor (processor), a memory (memory), a communication interface (Communications Interface), and a bus; the processor, the memory and the communication interface complete communication with each other through the bus; the communication interface is used for realizing information transmission between the project automatic verification device and related equipment such as a core service system, a user terminal, a related database and the like; the logic controller may be a desktop computer, a tablet computer, a mobile terminal, etc., and the embodiment is not limited thereto. In this embodiment, the logic controller may refer to an embodiment of the project automation verification method and an embodiment of the project automation verification device in the embodiments, and the contents thereof are incorporated herein, and the repetition is omitted.
It is understood that the user terminal may include a smart phone, a tablet electronic device, a network set top box, a portable computer, a desktop computer, a Personal Digital Assistant (PDA), a vehicle-mounted device, a smart wearable device, etc. Wherein, intelligent wearing equipment can include intelligent glasses, intelligent wrist-watch, intelligent bracelet etc..
In practical applications, part of the method for automatically verifying the project may be performed on the electronic device side as described above, or all operations may be performed in the client device. Specifically, the selection may be made according to the processing capability of the client device, and restrictions of the use scenario of the user. The present application is not limited in this regard. If all operations are performed in the client device, the client device may further include a processor.
The client device may have a communication module (i.e. a communication unit) and may be connected to a remote server in a communication manner, so as to implement data transmission with the server. The server may include a server on the side of the task scheduling center, and in other implementations may include a server of an intermediate platform, such as a server of a third party server platform having a communication link with the task scheduling center server. The server may include a single computer device, a server cluster formed by a plurality of servers, or a server structure of a distributed device.
Fig. 8 is a schematic block diagram of a system configuration of an electronic device 9600 of an embodiment of the present application. As shown in fig. 8, the electronic device 9600 may include a central processor 9100 and a memory 9140; the memory 9140 is coupled to the central processor 9100. Notably, this fig. 8 is exemplary; other types of structures may also be used in addition to or in place of the structures to implement telecommunications functions or other functions.
In one embodiment, the project auto-certification method functions may be integrated into the central processor 9100. The central processor 9100 may be configured to perform the following control:
step S101: and receiving an item risk verification trigger instruction, and analyzing the corresponding item according to the item risk verification trigger instruction.
Step S102: and performing risk verification operation on the analyzed item according to a preset fixed risk point verification rule and a preset risk point verification rule to obtain a risk verification result of the item.
According to the electronic equipment provided by the embodiment of the application, through embedding the method in the project, the risk verification operation of the project is automatically executed, the on-line manual participation degree of the project is reduced, the risk point verification time is shortened, the verification efficiency is improved, and meanwhile, the risk verification can be comprehensively and flexibly carried out on the project by adopting the fixed risk point verification rule and the customized risk point verification rule of the application, so that the operation and maintenance cost is effectively reduced.
In another embodiment, the project automatic verification device may be configured separately from the central processor 9100, for example, the project automatic verification device may be configured as a chip connected to the central processor 9100, and the project automatic verification method functions are implemented under the control of the central processor.
As shown in fig. 8, the electronic device 9600 may further include: a communication module 9110, an input unit 9120, an audio processor 9130, a display 9160, and a power supply 9170. It is noted that the electronic device 9600 need not include all of the components shown in fig. 8; in addition, the electronic device 9600 may further include components not shown in fig. 8, and reference may be made to the related art.
As shown in fig. 8, the central processor 9100, sometimes referred to as a controller or operational control, may include a microprocessor or other processor device and/or logic device, which central processor 9100 receives inputs and controls the operation of the various components of the electronic device 9600.
The memory 9140 may be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information about failure may be stored, and a program for executing the information may be stored. And the central processor 9100 can execute the program stored in the memory 9140 to realize information storage or processing, and the like.
The input unit 9120 provides input to the central processor 9100. The input unit 9120 is, for example, a key or a touch input device. The power supply 9170 is used to provide power to the electronic device 9600. The display 9160 is used for displaying display objects such as images and characters. The display may be, for example, but not limited to, an LCD display.
The memory 9140 may be a solid state memory such as Read Only Memory (ROM), random Access Memory (RAM), SIM card, etc. But also a memory which holds information even when powered down, can be selectively erased and provided with further data, an example of which is sometimes referred to as EPROM or the like. The memory 9140 may also be some other type of device. The memory 9140 includes a buffer memory 9141 (sometimes referred to as a buffer). The memory 9140 may include an application/function storage portion 9142, the application/function storage portion 9142 storing application programs and function programs or a flow for executing operations of the electronic device 9600 by the central processor 9100.
The memory 9140 may also include a data store 9143, the data store 9143 for storing data, such as contacts, digital data, pictures, sounds, and/or any other data used by an electronic device. The driver storage portion 9144 of the memory 9140 may include various drivers of the electronic device for communication functions and/or for performing other functions of the electronic device (e.g., messaging applications, address book applications, etc.).
The communication module 9110 is a transmitter/receiver 9110 that transmits and receives signals via an antenna 9111. A communication module (transmitter/receiver) 9110 is coupled to the central processor 9100 to provide input signals and receive output signals, as in the case of conventional mobile communication terminals.
Based on different communication technologies, a plurality of communication modules 9110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, etc., may be provided in the same electronic device. The communication module (transmitter/receiver) 9110 is also coupled to a speaker 9131 and a microphone 9132 via an audio processor 9130 to provide audio output via the speaker 9131 and to receive audio input from the microphone 9132 to implement usual telecommunications functions. The audio processor 9130 can include any suitable buffers, decoders, amplifiers and so forth. In addition, the audio processor 9130 is also coupled to the central processor 9100 so that sound can be recorded locally through the microphone 9132 and sound stored locally can be played through the speaker 9131.
The embodiments of the present application further provide a computer readable storage medium capable of implementing all the steps in the method for automatically verifying an item in which the execution subject is a server or a client in the above embodiments, where the computer readable storage medium stores a computer program, and when the computer program is executed by a processor, the computer program implements all the steps in the method for automatically verifying an item in which the execution subject is a server or a client in the above embodiments, for example, the processor implements the following steps when executing the computer program:
step S101: and receiving an item risk verification trigger instruction, and analyzing the corresponding item according to the item risk verification trigger instruction.
Step S102: and performing risk verification operation on the analyzed item according to a preset fixed risk point verification rule and a preset risk point verification rule to obtain a risk verification result of the item.
As can be seen from the above description, by embedding the method in the project, the computer readable storage medium provided in the embodiments of the present application automatically performs risk verification operation of the project, reduces the on-line manual participation of the project, shortens the risk point verification time, improves the verification efficiency, and simultaneously adopts the fixed risk point verification rule and the customized risk point verification rule of the present application to comprehensively and flexibly perform risk verification on the project, thereby effectively reducing the operation and maintenance cost.
It will be apparent to those skilled in the art that embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principles and embodiments of the present invention have been described in detail with reference to specific examples, which are provided to facilitate understanding of the method and core ideas of the present invention; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present invention, the present description should not be construed as limiting the present invention in view of the above.

Claims (6)

1. A method for automatically verifying an item, the method comprising:
receiving a project risk verification trigger instruction, and analyzing a corresponding project according to the project risk verification trigger instruction;
performing risk verification operation on the analyzed item according to a preset fixed risk point verification rule and a preset risk point verification rule to obtain a risk verification result of the item;
performing risk verification operation on the parsed item according to a preset fixed risk point verification rule to obtain a risk verification result of the item, wherein the risk verification operation comprises the following steps:
judging whether the project file characteristic information obtained after analyzing the project is consistent with a preset file characteristic expected value, if so, judging that the project file characteristic information of the project passes verification, wherein the project file characteristic information comprises directory attributes, file variable values and file contents;
judging whether project operation result information obtained after analyzing the project is consistent with a preset operation result expected value, if so, judging that the project operation result information of the project passes verification, wherein the project operation result information comprises result data which is output to a specified database after the project is operated;
judging whether the project operation process information obtained after analyzing the project is consistent with a preset operation process expected value, if so, judging that the project operation process information of the project passes verification, wherein the project operation process information comprises log data and context node data generated during the project operation;
performing risk verification operation on the parsed item according to a preset risk point verification rule to obtain a risk verification result of the item, wherein the risk verification result comprises the following steps:
reading a preset customized risk point verification module file and carrying out file serialization processing to obtain a risk point verification rule of the project operation environment;
acquiring the project operation environment data at the corresponding inspection source of the project according to the project operation environment risk point verification rule, judging whether the project operation environment data is in the range of a preset operation environment expected value, and if so, judging that the project operation environment data verification of the project is passed.
2. The method of claim 1, comprising, prior to said receiving an item risk verification trigger instruction:
and generating a project risk verification trigger instruction after the project online deployment is monitored, or generating the project risk verification trigger instruction when a preset timer reaches a set time.
3. An item automation verification device, comprising:
the project analysis module is used for receiving the project risk verification trigger instruction and analyzing the corresponding project according to the project risk verification trigger instruction;
the risk verification module is used for performing risk verification operation on the analyzed item according to a preset fixed risk point verification rule and a preset customized risk point verification rule to obtain a risk verification result of the item;
the risk verification module includes:
the project file feature information verification unit is used for judging whether project file feature information obtained after analyzing the project is consistent with a preset file feature expected value, if so, judging that the project file feature information of the project passes verification, wherein the project file feature information comprises directory attributes, file variable values and file contents;
the project operation result information verification unit is used for judging whether project operation result information obtained after analyzing the project is consistent with a preset operation result expected value or not, if so, judging that the project operation result information of the project passes verification, wherein the project operation result information comprises result data which is output to a specified database after the project is operated;
the project operation process information verification unit is used for judging whether project operation process information obtained after analyzing the project is consistent with a preset operation process expected value, if so, judging that the project operation process information verification of the project is passed, wherein the project operation process information comprises log data and context node data generated during the project operation;
the risk verification module includes:
the customized template serialization unit is used for reading a preset customized risk point verification module file and carrying out file serialization processing to obtain a project operation environment risk point verification rule;
the project operation environment data verification unit is used for acquiring project operation environment data at the corresponding inspection source of the project according to the project operation environment risk point verification rule, judging whether the project operation environment data is in a preset operation environment expected value range, and if so, judging that the project operation environment data verification of the project is passed.
4. The item automation verification device of claim 3, further comprising:
the verification triggering unit is used for generating a project risk verification triggering instruction after the project online deployment is monitored or generating the project risk verification triggering instruction when a preset timer reaches a set time.
5. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the processor implements the steps of the method for automatic verification of items according to any one of claims 1 to 2 when said program is executed by said processor.
6. A computer readable storage medium having stored thereon a computer program, characterized in that the computer program when executed by a processor realizes the steps of the method for automatic verification of items according to any of claims 1 to 2.
CN202110392865.7A 2021-04-13 2021-04-13 Project automatic verification method and device Active CN113094270B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110392865.7A CN113094270B (en) 2021-04-13 2021-04-13 Project automatic verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110392865.7A CN113094270B (en) 2021-04-13 2021-04-13 Project automatic verification method and device

Publications (2)

Publication Number Publication Date
CN113094270A CN113094270A (en) 2021-07-09
CN113094270B true CN113094270B (en) 2024-03-26

Family

ID=76676548

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110392865.7A Active CN113094270B (en) 2021-04-13 2021-04-13 Project automatic verification method and device

Country Status (1)

Country Link
CN (1) CN113094270B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109273061A (en) * 2018-09-04 2019-01-25 广西金域医学检验实验室有限公司 Regular correctness verification method and device, the computer readable storage medium of medical inspection project
CN109615211A (en) * 2018-12-05 2019-04-12 南方电网科学研究院有限责任公司 A kind of Project Risk Assessment system, method and a kind of storage medium
CN109816221A (en) * 2019-01-07 2019-05-28 平安科技(深圳)有限公司 Decision of Project Risk method, apparatus, computer equipment and storage medium
CN110119882A (en) * 2019-04-12 2019-08-13 国家计算机网络与信息安全管理中心 A kind of platform risk monitoring and control method, apparatus, equipment and storage medium
CN111105150A (en) * 2019-12-10 2020-05-05 广州电力工程监理有限公司 Project risk analysis system
CN111680855A (en) * 2019-07-01 2020-09-18 国网信息通信产业集团有限公司 Automatic risk detection and early warning method and system for whole process of project

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7669180B2 (en) * 2004-06-18 2010-02-23 International Business Machines Corporation Method and apparatus for automated risk assessment in software projects

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109273061A (en) * 2018-09-04 2019-01-25 广西金域医学检验实验室有限公司 Regular correctness verification method and device, the computer readable storage medium of medical inspection project
CN109615211A (en) * 2018-12-05 2019-04-12 南方电网科学研究院有限责任公司 A kind of Project Risk Assessment system, method and a kind of storage medium
CN109816221A (en) * 2019-01-07 2019-05-28 平安科技(深圳)有限公司 Decision of Project Risk method, apparatus, computer equipment and storage medium
CN110119882A (en) * 2019-04-12 2019-08-13 国家计算机网络与信息安全管理中心 A kind of platform risk monitoring and control method, apparatus, equipment and storage medium
CN111680855A (en) * 2019-07-01 2020-09-18 国网信息通信产业集团有限公司 Automatic risk detection and early warning method and system for whole process of project
CN111105150A (en) * 2019-12-10 2020-05-05 广州电力工程监理有限公司 Project risk analysis system

Also Published As

Publication number Publication date
CN113094270A (en) 2021-07-09

Similar Documents

Publication Publication Date Title
CN110908875B (en) Inspection method and device based on operation terminal
CN111782470B (en) Distributed container log data processing method and device
CN112394932A (en) Automatic browser webpage skin changing method and device
CN111767558B (en) Data access monitoring method, device and system
CN111367561B (en) Remote development method and device for software program
CN111262747B (en) Internet of things-based equipment network access control method and Internet of things platform
CN113838231A (en) Intelligent lock fault processing method and device based on intelligent sound box and readable medium
CN113094270B (en) Project automatic verification method and device
CN113515447B (en) Automatic testing method and device for system
CN112766827A (en) Automatic processing method and device for asset inventory data
CN113434423A (en) Interface test method and device
CN112101810A (en) Risk event control method, device and system
CN113377385A (en) Client automatic deployment method and device
CN113553152A (en) Job scheduling method and device
CN111158744B (en) Cross-platform heterogeneous data integration method and device
CN111953847A (en) Client message risk reminding method, device and system
CN114285657B (en) Firewall security policy change verification method and device
CN113342501B (en) System fault processing method and device
CN113176892B (en) Standardized continuous delivery method and system based on release unit
CN112396511B (en) Distributed wind control variable data processing method, device and system
CN112035557B (en) Transaction log report display method and device
CN112817875B (en) Automatic online banking transaction pressure testing method and device and RPA robot
CN113190236B (en) HQL script verification method and device
CN111679790B (en) Remote software development storage space allocation method and device
CN114880229A (en) Batch file testing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant