CA3139243A1 - Information collection method, device, computer equipment and storage medium - Google Patents

Information collection method, device, computer equipment and storage medium Download PDF

Info

Publication number
CA3139243A1
CA3139243A1 CA3139243A CA3139243A CA3139243A1 CA 3139243 A1 CA3139243 A1 CA 3139243A1 CA 3139243 A CA3139243 A CA 3139243A CA 3139243 A CA3139243 A CA 3139243A CA 3139243 A1 CA3139243 A1 CA 3139243A1
Authority
CA
Canada
Prior art keywords
target
information
verification
business
fields
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CA3139243A
Other languages
French (fr)
Inventor
Zhu CHENG
Yuegen Yin
Xiaoyan Wang
Aina DIAO
Xiaobo SI
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
10353744 Canada Ltd
Original Assignee
10353744 Canada Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 10353744 Canada Ltd filed Critical 10353744 Canada Ltd
Publication of CA3139243A1 publication Critical patent/CA3139243A1/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2282Tablespace storage structures; Management thereof
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/252Integrating or interfacing systems involving database management systems between a Database Management System and a front-end application
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data

Abstract

The present application relates to an information collecting method, which comprises: obtaining user information to be collected via an interface, wherein the user information includes a target information type and field data of at least one business field pertaining to the target information type; obtaining a target fields mapping relation and a collection of target verification rules from a preset configuration table according to the target information type, wherein the configuration table includes therein fields mapping relations and collections of verification rules to which plural information types respectively correspond; verifying the user information according to the collection of target verification rules, and, when the user information has passed verification, collecting the user information and storing the user information in the business sheet according to the target fields mapping relation. Employment of this method enables to improve compatibility, enhance efficiency and lower development cost.

Description

INFORMATION ACQUISITION METHOD AND DEVICE, COMPUTER EQUIPMENT
AND STORAGE MEDIUM
BACKGROUND OF THE INVENTION
Technical Field [0001] The present application relates to the field of computer technology, and more particularly to a method, a collecting device, a computer equipment and a storage medium for information collecting.
Description of Related Art
[0002] In the smart retail industry, more and more enterprises start to depend on collected user information to realize precision marketing. For instance, the enterprise supplies users with associated commodity recommendations according to such information collected from the users as relevant to mobile phones, health, pets, automobiles, computers and digital products, etc., whereby is made possible to greatly enhance conversion rate and sales amount. However, since operational requirements are flexible and subject to changes, it is usual for enterprises to frequently collect information of different types.
[0003] However, in the conventional information collecting process, the interface for information collection possesses the functions to receive data and to verify data both.
Field types and their verification rules included in different information types are also different, for instance, it is difficult for automobile information and health information to share any commonality, and these can hence not be put in a single business sheet. Accordingly, once it is required to collect a new information type, a new business sheet should be created, and an interface should be again developed for the information to be collected. In other words, one new information type corresponds to one newly created business sheet and one newly developed interface, different information types should be created with different business sheets and developed with different interfaces, but the different business sheets and the different Date Recue/Date Received 2021-11-15 interfaces are not compatible with each other, and the repeated development works further reduce the efficiency for collecting new information types. In addition, it is needed for the big data system to again extract data from business sheets of a new database for subsequent precision marketing, thus lowering subsequent processing efficiency. In summary, the conventional information collecting method is not only inferior in compatibility, but also has long development period and high development cost, is low in efficiency, and further causes waste of system resources.
SUMMARY OF THE INVENTION
[0004] In view of the above, there is an urgent need to propose a method, a device, a computer equipment and a storage medium for information collecting that are capable of improving compatibility, enhancing efficiency and reducing development cost, so as to address the aforementioned technical problems.
[0005] An information collecting method is provided, which comprises:
[0006] obtaining user information to be collected via an interface, wherein the user information includes a target information type and field data of at least one business field pertaining to the target information type;
[0007] obtaining a target fields mapping relation and a collection of target verification rules from a preset configuration table according to the target information type, wherein the configuration table includes therein fields mapping relations and collections of verification rules to which plural information types respectively correspond, the fields mapping relations are employed to configure mapping relations between business fields pertaining to the information types and information fields in a business sheet of a database, and the collections of verification rules are employed to perform parameter verification on field data of the business fields pertaining to the information types; and
[0008] verifying the user information according to the collection of target verification rules, and, Date Recue/Date Received 2021-11-15 when the user information has passed verification, collecting the user information and storing the user information in the business sheet according to the target fields mapping relation.
[0009] In one of the embodiments, the configuration table includes a mapping rule configuration table and a system rule configuration table, the collections of verification rules are further employed to verify user information of the information types, the collection of target verification rules includes a target parameter verification rule and a target system verification rule, and the step of obtaining a target fields mapping relation and a collection of target verification rules from a preset configuration table according to the target information type includes:
[0010] obtaining the target fields mapping relation and the target parameter verification rule to which the target information type corresponds from the mapping rule configuration table, and obtaining the target system verification rule from the system rule configuration table according to the target information type;
[0011] the step of verifying the user information according to the collection of target verification rules, and, when the user information has passed verification, collecting the user information and storing the user information in the business sheet according to the target fields mapping relation includes:
[0012] performing parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule, and verifying the user information according to the target system verification rule; and
[0013] when the field data of the business field has passed verification and the user information has passed verification, collecting the user information and storing the user information in the business sheet according to the target fields mapping relation.
[0014] In one of the embodiments, the method further comprises:

Date Recue/Date Received 2021-11-15
[0015] obtaining a target operation type to which the user information corresponds via an interface;
[0016] the step of obtaining the target system verification rule from the system rule configuration table according to the target information type includes:
[0017] obtaining plural system verification rules to which the target information type corresponds from the system rule configuration table, and selecting a system verification rule to which the target operation type corresponds from the plural system verification rules to serve as the target system verification rule; wherein the target system verification rule is employed to verify the user information when an operation by which the user information is executed is of the target operation type.
[0018] In one of the embodiments, the step of verifying the user information according to the collection of target verification rules includes:
[0019] performing parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule, when the field data of the business field has passed verification, verifying the user information according to the target system verification rule; alternatively,
[0020] verifying the user information according to the target system verification rule, when the user information has passed verification, performing parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule;
[0021] preferably, the target parameter verification rule includes at least one of non-empty verification rule, field length verification rule, format verification rule, sensitive word verification rule and identification number verification rule, and the target system verification rule includes number of pieces of information restriction verification rule.
[0022] In one of the embodiments, the method further comprises:

Date Recue/Date Received 2021-11-15
[0023] prior to obtaining user information to be collected via an interface, obtaining the target information type, respective business fields pertaining to the target information type, mapping relations between the respective business fields and information fields in the business sheet, and the target parameter verification rules to which the respective business fields correspond;
[0024] configuring the mapping rule configuration table according to the target information type, the respective business fields, the mapping relations between the respective business fields and the respective information fields in the business sheet, and the respective target parameter verification rules, wherein the mapping rule configuration table is employed to configure mapping relations between respective information fields in the business sheet and the respective business fields, and the target parameter verification rules to which the respective business fields correspond;
[0025] preferably, the method further comprises:
[0026] prior to obtaining user information to be collected via an interface, obtaining the target information type, respective operation types to which user information of the target information type corresponds, and the respective system verification rules to which the respective operation types correspond; and
[0027] configuring the system rule configuration table according to the target information type, the respective operation types, and the respective system verification rules to which the respective operation types correspond, wherein the system rule configuration table is employed to configure system verification rules of different operation types to which the user information of the target information type corresponds.
[0028] In one of the embodiments, the step of performing parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule includes:
[0029] filtering respective target field data of the respective information fields to be stored in the Date Recue/Date Received 2021-11-15 business sheet out of the field data of the respective business fields according to the target fields mapping relation; and
[0030] verifying the respective target field data according to the target parameter verification rule.
[0031] In one of the embodiments, the user information further includes user identification information, and the step of, when the user information has passed verification, collecting the user information and storing the user information in the business sheet according to the target fields mapping relation includes:
[0032] when the user information has passed verification, storing the user identification information and the target information type in the business sheet, and storing the field data of the respective business fields in the business sheet according to the target fields mapping relation; and
[0033] preferably, when the user information has not passed verification, generating error reporting information, and sending the error reporting information to a terminal.
[0034] An information collecting device is provided, which comprises:
[0035] a first obtaining module, for obtaining user information to be collected via an interface, wherein the user information includes a target information type and field data of at least one business field pertaining to the target information type;
[0036] a second obtaining module, for obtaining a target fields mapping relation and a collection of target verification rules from a preset configuration table according to the target information type, wherein the configuration table includes therein fields mapping relations and collections of verification rules to which plural information types respectively correspond, the fields mapping relations are employed to configure mapping relations between business fields pertaining to the information types and information fields in a business sheet of a database, and the collections of verification rules are employed to perform parameter verification on field data of the business fields pertaining to the information types;

Date Recue/Date Received 2021-11-15
[0037] a verifying module, for verifying the user information according to the collection of target verification rules; and
[0038] a collecting module, for collecting, when the user information has passed verification, the user information and storing the user information in the business sheet according to the target fields mapping relation.
[0039] Further provided is a computer equipment that comprises a memory, a processor and a computer program stored on the memory and executable on the processor, and the method steps according to anyone of the aforementioned embodiments are realized when the processor executes the computer program.
[0040] Further provided is a computer-readable storage medium storing thereon a computer program, and the method steps according to anyone of the aforementioned embodiments are realized when the computer program is executed by a processor.
[0041] In the aforementioned information collecting method, device, computer equipment and storage medium, user information to be collected is obtained via an interface, which user information includes a target information type and field data of at least one business field pertaining to the target information type, the interface in this step is a general interface that is used only to obtain data and does not have to perform parameter verification on the obtained data, so it is applicable to the collection of differently typed information; a target fields mapping relation and a collection of target verification rules are obtained from a preset configuration table according to the target information type, the configuration table includes therein fields mapping relations and collections of verification rules to which plural information types respectively correspond, the fields mapping relations are employed to configure mapping relations between business fields pertaining to the information types and information fields in a business sheet of a database, the business sheet is a datasheet used in Date Recue/Date Received 2021-11-15 a database to store user information, the collections of verification rules are employed to perform parameter verification on field data of the business fields pertaining to the information types, the user information is verified according to the collection of target verification rules, and, when the user information has passed verification, the user information is collected and stored in the business sheet according to the target fields mapping relation. The corresponding interface here is equipped with a configuration table, the configuration table includes therein plural information types and mapping relations of business fields to which the respective information types correspond, while it is further possible to add in the configuration table fields mapping relations to which new information types correspond, so, when the user information accessed by the interface is of a different information type, a corresponding fields mapping relation can be searched out in the configuration table according to the information type, and the fields mapping relation can be based on to store field data of the user information in the business sheet of the database, without having to create a new business sheet; in addition, the configuration table further contains therein collections of verification rules to which the respective information types correspond, when the user information accessed by the interface is of a different information type, it is possible to search out the corresponding collection of verification rules according to the information type, and to perform parameter verification on the field data of the business fields pertaining to this information type according to the collection of verification rules.
[0042] The technical solutions of the present application make it possible to configure fields mapping relations and collections of verification rules of plural information types by equipping the user information accessed by the interface with a configuration table, to hence verify the user information according to the collection of verification rules, and to store the verified user information in the business sheet of the database according to the fields mapping relation, so that there is no need to develop any new interface when a request is Date Recue/Date Received 2021-11-15 received to collect new information types, as it suffices to configure the configuration table on the original interface, and there is also no need to again create a business sheet, thus lowering development cost, avoiding waste of system resources, improving compatibility, and enhancing collection efficiency.
BRIEF DESCRIPTION OF THE DRAWINGS
[0043] Fig. 1 is a view illustrating the application environment of an information collecting method in an embodiment;
[0044] Fig. 2 is a flowchart schematically illustrating an information collecting method in an embodiment;
[0045] Fig. 3 is a view illustrating an example of a business sheet in an embodiment;
[0046] Fig. 4 is a view illustrating an example of a mapping rule configuration table in an embodiment;
[0047] Fig. 5 is a view illustrating an example of a system rule configuration table in an embodiment;
[0048] Fig. 6 is an exemplary table of interface services in an embodiment;
[0049] Fig. 7 is a flowchart schematically illustrating an information collecting method in another embodiment;
[0050] Fig. 8 is a block diagram illustrating the structure of an information collecting device in an embodiment; and Date Recue/Date Received 2021-11-15
[0051] Fig. 9 is a view illustrating the internal structure of a computer equipment in an embodiment.
DETAILED DESCRIPTION OF THE INVENTION
[0052] To make more lucid and clear the objectives, technical solutions and advantages of the present application, the present application is described in greater detail below with reference to the accompanying drawings and embodiments. As should be understood, the specific embodiments as described here are merely meant to explain the present application, rather than to restrict the present application.
[0053] The information collecting method provided by the present application is applicable to the application environment as shown in Fig. 1, in which terminal 102 communicates with server 104 through network. The user can fill in a user information form at terminal 102, namely to input user information, and the user information can include a target information type and field data of at least one business field pertaining to the target information type;
server 104 obtains the user information to be collected via an interface, server 104 is internally equipped with a database, and the database is provided therein with a table data structure consisting of configuration tables and business sheets, of which a business sheet is employed to store data of the user information, a configuration table is employed to store configuration data, and the configuration table can be preset by an operating personnel in the database. Server 104 obtains a target fields mapping relation and a collection of target verification rules from a preset configuration table according to the target information type, and verifies the user information according to the collection of target verification rules; when the user information has passed verification, server 104 collects the user information and stores the user information in the business sheet of the database according to the target fields mapping relation. Terminal 102 can be, but is not limited to be, a personal computer, a Date Recue/Date Received 2021-11-15 notebook computer, a smart mobile phone, a panel computer, or a portable wearable device, while server 104 can be embodied as an independent server or a server cluster consisting of a plurality of servers.
[0054] In one embodiment, as shown in Fig. 2, there is provided an information collecting method, the method is explained by an example of its being applied in the server in Fig.1, and the method comprises the following steps.
[0055] Step 202 - obtaining user information to be collected via an interface, the user information including a target information type and field data of at least one business field pertaining to the target information type.
[0056] The interface is a general interface that is used only to obtain data and does not have to perform parameter verification on the obtained data, so it is applicable to the collection of differently typed information. The user information can indicate member information on an internet platform, and the interface can obtain the member information from the information collection form filled in by the member on a display page table of the terminal. The user information has many information types, such as equipment information, health information, automobile information and size information, etc. Each information type can include at least one business field, and the business field is usually the field name of an interface input parameter, for instance, health information includes at least two business fields height and weight, field data of the business field "height" can be 50kg, and field data of the business field "weight" can be 1.6m. The target information type is an information type to which the user information to be obtained by the current information collection operation corresponds.
[0057] Specifically, the server obtains user information to be collected via an interface, and the user information can include user identification information, information type of the user Date Recue/Date Received 2021-11-15 information, and field data of plural business fields pertaining to the information type.
[0058] Step 204 - obtaining a target fields mapping relation and a collection of target verification rules from a preset configuration table according to the target information type.
[0059] The configuration table includes therein fields mapping relations and collections of verification rules to which plural information types respectively correspond.
The fields mapping relations can be employed to configure mapping relations between business fields pertaining to the information types and information fields in a business sheet of a database, and the business sheet is a datasheet used in the database to store user information. The business field can be the field name of an interface input parameter, so the operating personnel configure the corresponding relations between the interface input parameters and the information fields in the business sheet of the database by preconfiguring the aforementioned fields mapping relations, whereby configuration of the interface and the database is realized to certain extent.
[0060] In some embodiments, the collection of verification rules can be used to perform parameter verification on field data of business fields pertaining to the information type, that is to say, the collection of verification rules includes a parameter verification rule for performing parameter verification on the field data. In some other embodiments, the collection of verification rules can also be used to verify user information of the information type. The verification rule used to perform parameter verification on the field data and the verification rule used to verify user information are generally different, so it can be known that the collection of verification rules includes two kinds of verification rules at this time, one is the parameter verification rule used to perform parameter verification on field data, and another one is the system verification rule used to verify user information. Verification of user information here generally means to verify the entire piece of user information, for Date Recue/Date Received 2021-11-15 instance, to add/delete/amend/enquiry rules with respect to the entire piece of the user information. During specific implementation, the parameter verification rule and the system verification rule can be configured either in two separate configuration tables or in the same and single configuration table.
[0061] Seen as such, the target fields mapping relation is precisely the corresponding fields mapping relation of the target information type in the configuration table, and the collection of target verification rules is precisely the corresponding collection of verification rules of the target information type in the configuration table.
[0062] Specifically, the server obtains the target fields mapping relation to which the target information type corresponds from the preset configuration table, based on which target fields mapping relation can be determined the respective business fields to be collected and stored in the business sheet, and then obtains the collection of target verification rules to which the target information type corresponds from the configuration table.
[0063] Step 206 - verifying the user information according to the collection of target verification rules, and, when the user information has passed verification, collecting the user information and storing the user information in the business sheet according to the target fields mapping relation.
[0064] As can be known from the collection of target verification rules being employed to perform parameter verification on field data of business fields pertaining to the information types, the collection of target verification rules includes the target parameter verification rule, during specific implementation, the target parameter verification rule can include at least one of non-empty verification rule, field length verification rule and format verification rule.

Date Recue/Date Received 2021-11-15
[0065] Specifically, the target parameter verification rule is based on to perform parameter verification on field data of respective business fields in the user information to be collected and stored in the business sheet, when the field data has all passed parameter verification, the target information type in the user information and the field data of the respective business fields are collected and stored in the business sheet according to the target fields mapping relation. Further specifically, the user information further includes user identification information, when the user information has passed verification, the user identification information and the target information type are stored in the business sheet, and the field data of the respective business fields is stored in the business sheet according to the target fields mapping relation. If the user information has not passed verification, error reporting information is generated, and the error reporting information is sent to the terminal.
[0066] In the aforementioned information collecting method, user information to be collected is obtained via an interface in the server, which user information includes a target information type and field data of at least one business field pertaining to the target information type, the interface in this step is a general interface that is used only to obtain data and does not have to perform parameter verification on the obtained data, so it is applicable to the collection of differently typed information; a target fields mapping relation and a collection of target verification rules are obtained from a preset configuration table according to the target information type, the configuration table includes therein fields mapping relations and collections of verification rules to which plural information types respectively correspond, the fields mapping relations are employed to configure mapping relations between business fields pertaining to the information types and information fields in a business sheet of a database, the business sheet is a datasheet used in a database to store user information, the collections of verification rules are employed to perform parameter verification on field data of the business fields pertaining to the information types, the user information is verified according to the collection of target verification rules, and, when the user information has Date Recue/Date Received 2021-11-15 passed verification, the user information is collected and stored in the business sheet according to the target fields mapping relation. The corresponding interface here is equipped with a configuration table, the configuration table includes therein plural information types and mapping relations of business fields to which the respective information types correspond, so, when the user information accessed by the interface is of a different information type, a corresponding fields mapping relation can be searched out in the configuration table according to the information type, and the fields mapping relation can be based on to store field data of the user information in the business sheet of the database; in addition, the configuration table further contains therein collections of verification rules to which the respective information types correspond, when the user information accessed by the interface is of a different information type, it is possible to search out the corresponding collection of verification rules according to the information type, and to perform parameter verification on the field data of the business fields pertaining to this information type according to the collection of verification rules.
[0067] The technical solutions of the present application make it possible to configure fields mapping relations and collections of verification rules of plural information types by equipping the user information accessed by the interface with a configuration table, to hence verify the user information according to the collection of verification rules, and to store the verified user information in the business sheet of the database according to the fields mapping relation, so that there is no need to develop any new interface when a request is received to collect new information types, as it suffices to configure the configuration table on the original interface, and there is also no need to again create a business sheet, thus lowering development cost, avoiding waste of system resources, improving compatibility, and enhancing collection efficiency.
[0068] In one embodiment, the configuration table includes a mapping rule configuration table Date Recue/Date Received 2021-11-15 and a system rule configuration table, the collections of verification rules can be employed to perform parameter verification on field data of business fields pertaining to the information types and to verify user information of the information types, and the collection of target verification rules includes a target parameter verification rule and a target system verification rule, of which the target parameter verification rule is employed to perform parameter verification on the field data of the business fields pertaining to the target information type, and the target system verification rule is employed to verify the user information.
[0069] The information collecting method makes use of a table data structure consisting of three sheet/tables, namely business sheet, mapping rule configuration table and system rule configuration table, and a general interface that is compatible with multiple typed information collection.
[0070] By way of examples, Figs. 3 to 6 respectively illustrate an example of a business sheet, an example of a mapping rule configuration table, an example of a system rule configuration table, and an example of interface services in an embodiment.
[0071] Fig. 3 is a view illustrating an example of a business sheet in an embodiment. As shown in Fig. 3, the business sheet is a sheet that stores user information data, and can contain UID
(user identification), information type, information identification, and information fields.
[0072] Fig. 4 is a view illustrating an example of a mapping rule configuration table in an embodiment. As shown in Fig. 4, the mapping rule configuration table is employed to define business meanings and rules of respective information fields in the business sheet, namely business fields and parameter verification rules to which the respective information fields correspond, and can contain information types, business fields, mapped fields (namely Date Recue/Date Received 2021-11-15 information fields to which the business fields correspond), verification types and verification values. For instance, the business field is height information or automobile kilometers, the height information ranges 0-300cm, and the automobile kilometers range 0-300,000 kilometers, out of which ranges storage would be impossible.
[0073] Fig. 5 is a view illustrating an example of a system rule configuration table in an embodiment. As shown in Fig. 5, the system rule configuration table in this example is employed to define the rules to add/delete/amend/enquiry the entire piece of the user information, and can contain information types, operation types, verification types and verification values. For instance, the user information to be collected is member health information, each member at most maintains one piece of member health information, so the operation type is configured as "newly added" and the verification value as "1" in the system rule configuration table.
[0074] Fig. 6 is an exemplary table of interface services in an embodiment. As shown in Fig. 6, the exemplary table of interface services can contain UID (User Identification), information types, member information, and plural input parameters. The interface merely obtains user information of one information type each time it obtains user information, and field names of input parameters of map containers to which different information types correspond are different from one another.
[0075] In this embodiment, step 204 includes: obtaining the target fields mapping relation and the target parameter verification rule to which the target information type corresponds from the mapping rule configuration table, and obtaining the target system verification rule from the system rule configuration table according to the target information type.
[0076] Specifically, the server invokes the mapping rule configuration table and obtains the target Date Recue/Date Received 2021-11-15 fields mapping relation and the target parameter verification rule to which the target information type corresponds from the mapping rule configuration table, and the server invokes the system rule configuration table and obtains the target system verification rule to which the target information type corresponds from the system rule configuration table.
During specific implementation, the step of obtaining the target fields mapping relation and the target parameter verification rule and the step of obtaining the system rule configuration table can be either simultaneously performed or sequentially performed.
[0077] As shown in Fig. 5, the system rule configuration table is employed to define the rules to add/delete/amend/enquiry the entire piece of the user information, in other words, the system rule configuration table can be employed to define the verification rules when operations to add/delete/amend/enquiry the entire piece of the user information are performed, and to add/delete/amend/enquiry are the operation types by which the user information is executed.
During specific implementation, in order to precisely select the verification rule to which the operation type by which the user information is executed corresponds, the method further comprises: the server obtaining a target operation type to which the user information corresponds via the interface.
[0078] At this time, the step of obtaining the target system verification rule from the system rule configuration table according to the target information type includes:
obtaining plural system verification rules to which the target information type corresponds from the system rule configuration table, and selecting a system verification rule to which the target operation type corresponds from the plural system verification rules to serve as the target system verification rule; wherein the target system verification rule is employed to verify the user information when an operation by which the user information is executed is of the target operation type. The above step of obtaining the target system verification rule is to base on the target information type and the target operation type to obtain a corresponding system Date Recue/Date Received 2021-11-15 verification rule from the system rule configuration table to serve as the target system verification rule.
[0079] What the operation type indicates is an operation on the entire piece of the user information, and the system verification rule to which the operation type corresponds is employed to verify the entire piece of the user information. During specific implementation, the verification rule to which the operation type corresponds can be number of pieces of information restriction verification rule, and can also be a verification rule that makes use of sensitive words or identification numbers in certain application scenarios.
[0080] Step 206 includes: performing parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule, and verifying the user information according to the target system verification rule.
When the field data of the business field has passed verification and the user information has passed verification, the user information is collected and stored in the business sheet according to the target fields mapping relation.
[0081] Specifically, the step of performing parameter verification on the field data and the step of verifying the user information can be either simultaneously performed or sequentially performed.
[0082] For instance, in one embodiment, the server firstly performs parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule, when the field data of the business field has passed verification, then verifies the user information according to the target system verification rule, and when the user information has passed verification, collects the user information and stores the user information in the business sheet according to the target fields mapping relation. This Date Recue/Date Received 2021-11-15 embodiment firstly performs parameter verification on the field data and subsequently verifies the user information, and is hence suitable for application in the circumstance in which there are few business fields to be verified as pertaining to the target information type and there are many target system verification rules, so as to avoid the case in which the few field data does not pass parameter verification after the user information has been verified to completion according to the plural target system verification rules, thereby avoiding waste of system resources.
[0083] In another embodiment, the server firstly verifies the user information according to the target system verification rule, when the user information has passed verification, then performs parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule, and when the field data of the business field has passed verification, collects the user information and stores the user information in the business sheet according to the target fields mapping relation. This embodiment firstly verifies the user information and subsequently performs parameter verification on the field data, and is hence suitable for application in the circumstance in which there are many business fields pertaining to the target information type and there are few target system verification rules, so as to avoid the case in which the user information does not pass verification through the target system verification rules after the great amount of field data has passed verification, thereby avoiding waste of system resources.
[0084] In the aforementioned embodiments, it is further possible to select the sequential orders for the step of performing parameter verification on the field data and the step of verifying the user information according to the number of business fields to which different information types correspond, for instance, the method can further comprise:
obtaining a value of numbers of the business fields pertaining to the target information type, when the value of numbers is greater than or equal to a preset threshold, the step of verifying the user Date Recue/Date Received 2021-11-15 information is firstly performed; when the value of numbers is less than the preset threshold, the step of performing parameter verification on the field data is firstly performed.
[0085] During specific implementation, the target parameter verification rule includes at least one of non-empty verification rule, field length verification rule, format verification rule, sensitive word verification rule and identification number verification rule, and the target system verification rule includes number of pieces of information restriction verification rule.
[0086] In order to remove noise data, the obtained data can be filtered to determine the data to be stored, thereby reducing the amount of data to be subsequently verified, quickening the subsequent verification speed, and enhancing information collection efficiency. The step of performing parameter verification on the field data can include the following steps: filtering respective target field data of the respective information fields to be stored in the business sheet out of the field data of the respective business fields according to the target fields mapping relation; and verifying the respective target field data according to the target parameter verification rule.
[0087] The information collecting method provided in this embodiment is capable of completing rule verification and data storage of user information of plural information types through a table data structure consisting of three sheet/tables, namely business sheet, mapping rule configuration table and system rule configuration table, and a general interface that is compatible with plural information types, so as to support diversified, flexible information collection of different information types, avoid the case in which one database business sheet and one data collecting interface should be newly added each time a type of information collection is newly added, and to realize a configurable information collecting method.
[0088] As shown in Fig. 7, a specific embodiment is proposed below to describe the Date Recue/Date Received 2021-11-15 aforementioned information collecting method.
[0089] In this embodiment, the information collecting method comprises the following steps:
[0090] Step 302 ¨ obtaining user information to be collected and a target operation type to which the user information corresponds via an interface, the user information including a target information type and field data of at least one business field pertaining to the target information type.
[0091] In this step, respective data obtained via the interface can be firstly stored in a cache.
[0092] Step 304 ¨ obtaining a target fields mapping relation to which the target information type corresponds from a preset configuration table.
[0093] Step 306 ¨ filtering respective target field data of the respective information fields to be stored in the business sheet out of the field data of the respective business fields according to the target fields mapping relation.
[0094] Step 308 ¨ obtaining a target parameter verification rule to which the target information type corresponds from the configuration table, and performing parameter verification on the respective target field data to be collected and stored in the business sheet according to the target parameter verification rule.
[0095] Step 310 ¨ judging whether the field data of the business field has passed verification, if not, the process entering step 320.
[0096] Step 312 ¨ when the field data of the business field has passed verification, obtaining a target system verification rule to which the target information type corresponds from the configuration table.
[0097] Step 314 ¨ verifying the user information according to the target system verification rule.
[0098] Step 316 ¨ judging whether the user information has passed verification, if not, the process entering step 320.
[0099] Step 318 ¨ when the user information has passed verification, collecting the user information and storing the user information in the business sheet according to the target fields mapping relation.

Date Recue/Date Received 2021-11-15
[0100] Step 320 ¨ completing information collection.
[0101] This embodiment provides a specific embodiment of an information collecting method, and the embodiment can be applied in a member information collecting scenario.
However, the technical solutions of the respective embodiments can not only be applied in the member information collecting scenario in which field rules are relatively fixed, field changes are relatively frequent, and system pressure is relatively small, but can also be applied in other application scenarios in which business cooperation is carried out with outside enterprises.
Through the mapping rule configuration table and the system rule configuration table, the information collecting method makes it possible to realize configuration of database and interface, to hence shorten the online duration required for member information collection in the operation of products of the enterprise, and also makes it possible to adeptly and quickly support business scenarios of similar functions; moreover, one piece of business sheet is used, and repeated creation of sheet is avoided for the big data, whereby later-stage development time can be shortened, and development cost can be reduced.
[0102] In one embodiment, the method further comprises a step of configuring a mapping rule configuration table: prior to obtaining user information to be collected via an interface, obtaining the target information type, respective business fields pertaining to the target information type, mapping relations between the respective business fields and information fields in the business sheet, and the target parameter verification rules to which the respective business fields correspond; configuring the mapping rule configuration table according to the target information type, the respective business fields, the mapping relations between the respective business fields and the respective information fields in the business sheet, and the respective target parameter verification rules.
[0103] Moreover, the method further comprises a step of configuring a system rule configuration Date Recue/Date Received 2021-11-15 table: prior to obtaining user information to be collected via an interface, obtaining the target information type, respective operation types to which user information of the target information type corresponds, and the respective system verification rules to which the respective operation types correspond; and configuring the system rule configuration table according to the target information type, the respective operation types, and the respective system verification rules to which the respective operation types correspond.
[0104] The mapping rule configuration table is employed to configure mapping relations between respective information fields in the business sheet and the respective business fields, and the target parameter verification rules to which the respective business fields correspond; the respective business fields are precisely the field names of input parameters in the interface, in other words, the mapping rule configuration table is employed to define respective information fields in the business sheet of the database, and is further employed to configure the meanings and verification rules of input parameters in the interface. The system rule configuration table is employed to configure system verification rules of different operation types to which the user information of the target information type corresponds.
[0105] An example is taken below to describe the configuring flow of the configuration table.
[0106] In one example, the operational business of products requires to collect the mobile phone equipment information of a member; the mapping relation between the business fields and the respective information fields in the business sheet of the mobile phone equipment information is firstly newly added in the mapping rule configuration table, and the mobile phone equipment information can include such business fields as phone number, brand, series, model, price, and purchasing date, etc.
[0107] For instance, the phone number field corresponds to field Cl in the business sheet, the Date Recue/Date Received 2021-11-15 price field corresponds to field C3 in the business sheet, and the format verification rule of the fields is defined at the same time, for instance, the price field is 12-bit pure digits starting with 1000. The system verification rule of the entire piece of user information is subsequently configured in the system rule configuration table, for instance, a member maintains 5 pieces of phone number equipment information at most.
[0108] In another example, health information of a member should be collected.
[0109] For instance, member health information collection is currently added, the health information includes height and weight of the member, each member at most maintains one piece of health information, in which the height ranges 0-300cm, and the weight ranges 0-500kg. Then, a business field "Height" is configured in the mapping rule configuration table, it is mapped to information field Cl in the business sheet, and subsequently a verification rule is configured to be the numerical value range 0-300cm; a business field "Weight" is configured and mapped to information field C2, and subsequently the verification rule will be the numerical value range 0-500kg. The operation type is thereafter configured as "newly added" and the verification value as "1" in the system rule configuration table.
[0110] The information collecting method provided by this embodiment configures the definitions to the respective information fields in the business sheet of the database and the business meanings and verification rules of the respective input parameters in the interface by configuring the mapping rule configuration table, and also configures system verification rules to which the entire piece of user information corresponds by configuring the system rule configuration table, whereby is realized configuration of interface and database, when subsequently newly added members should be collected, there is no need to invoke any new interface to realize data access; there is no need for the big data system to extract any new database before report and user label can be quickly realized, and it is ensured that each Date Recue/Date Received 2021-11-15 collection requirement can be quickly supported, that development duration is shortened, and that development cost is reduced.
[0111] An example of a specific application scenario is proposed below to more visually describe the difference in practical application between an information collecting method provided by the technical solution of the present application and a conventional information collecting method.
[0112] Business flow of conventional member information collection includes the following steps:
1) the operating personnel determines form content and business rule of each field; 2) the middle-stage development team bases on the business requirement to design database and interface, and completes development; 3) the front-stage development team designs form and completes development; 4) the user fills in the form, and submits it for storage; 5) collected member information is stored in middle-stage database; 6) the big data team extracts data from the business sheet, forms report and user label; and 7) precise operation is performed according to the report, and precision marketing is carried out according to the user label.
[0113] Conventional member information collection flow has the following defects: firstly, system design for member information collection is long in duration, new design and development are needed each time the form content is changed or a new form is added, thereby making it impossible to achieve adept support of operational activities; moreover, when data is being applied, it is needed for big data to extract from the sheet again, and tasks should be separately developed for each form, thereby making it impossible to quickly form report and user label.

Date Recue/Date Received 2021-11-15
[0114] When the information collecting method provided in the technical solution of the present application is applied in this application scenario, business flow of the improved member information collection includes the following steps:
1) Form content and business rule of each field is determined by business; 2) the middle-stage development team configures business rules and system rules; 3) the front-stage development team designs form and completes development; 4) the user fills in the form, and submits it for storage; 5) the system obtains field mapping configuration according to parameter-input types, and performs parameter verification (required, length, format, etc.); 6) business rule configuration and verification rules (upper limit of the number of pieces of the information, etc.) are obtained after verification having been passed; 7) verification has been passed, the collected member information is stored in the middle-stage database; and 8) precise operation is performed according to the report, and precision marketing is carried out according to the user label.
[0115] In summary, the business flow of the improved member information collection possesses the following advantages: configuration is short in duration, there is no need for development again each time the form content is changed or a new form is added, thereby making it possible to adeptly and quickly respond to business requirement; when data is being applied, it is not needed for big data system to extract from the sheet again, and the report and user label can be quickly formed.
[0116] As should be understood, although the respective steps in the flowcharts of Figs. 1-7 are sequentially displayed as indicated by arrows, these steps are not necessarily executed in the sequences indicated by arrows. Unless otherwise explicitly noted in this paper, execution of these steps is not restricted by any sequence, as these steps can also be executed in other sequences (than those indicated in the drawings). Moreover, at least partial steps in Figs. 1-Date Recue/Date Received 2021-11-15 7 may include plural sub-steps or multi-phases, these sub-steps or phases are not necessarily completed at the same timing, but can be executed at different timings, and these sub-steps or phases are also not necessarily sequentially performed, but can be performed in turns or alternately with other steps or with at least some of sub-steps or phases of other steps.
[0117] In one embodiment, as shown in Fig. 8, there is provided an information collecting device, and the device comprises a first obtaining module 402, a second obtaining module 404, a verifying module 406 and a collecting module 408, of which
[0118] the first obtaining module 402 is employed for obtaining user information to be collected via an interface, wherein the user information includes a target information type and field data of at least one business field pertaining to the target information type;
[0119] the second obtaining module 404 is employed for obtaining a target fields mapping relation and a collection of target verification rules from a preset configuration table according to the target information type, wherein the configuration table includes therein fields mapping relations and collections of verification rules to which plural information types respectively correspond, the fields mapping relations are employed to configure mapping relations between business fields pertaining to the information types and information fields in a business sheet of a database, and the collections of verification rules are employed to perform parameter verification on field data of the business fields pertaining to the information types;
[0120] the verifying module 406 is employed for verifying the user information according to the collection of target verification rules; and
[0121] the collecting module 408 is employed for collecting, when the user information has passed verification, the user information and storing the user information in the business sheet according to the target fields mapping relation.
[0122] In one embodiment, the configuration table includes a mapping rule configuration table Date Recue/Date Received 2021-11-15 and a system rule configuration table, the collections of verification rules are further employed to verify user information of the information types, the collection of target verification rules includes a target parameter verification rule and a target system verification rule,
[0123] the second obtaining module 404 includes:
[0124] a first obtaining unit, for obtaining the target fields mapping relation and the target parameter verification rule to which the target information type corresponds from the mapping rule configuration table, and a second obtaining unit, for obtaining the target system verification rule from the system rule configuration table according to the target information type.
[0125] The verifying module 406 includes:
[0126] a first verifying unit, for performing parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule, and a second verifying unit, for verifying the user information according to the target system verification rule.
[0127] The collecting module 408 is employed for, when the field data of the business field has passed verification and the user information has passed verification, collecting the user information and storing the user information in the business sheet according to the target fields mapping relation.
[0128] In one embodiment, the device further comprises:
[0129] a third obtaining module, for obtaining a target operation type to which the user information corresponds via an interface;
[0130] specifically, the second obtaining unit is employed for obtaining plural system verification rules to which the target information type corresponds from the system rule configuration Date Recue/Date Received 2021-11-15 table, and selecting a system verification rule to which the target operation type corresponds from the plural system verification rules to serve as the target system verification rule;
wherein the target system verification rule is employed to verify the user information when an operation by which the user information is executed is of the target operation type.
[0131] In one embodiment, the verifying module 406 is employed for performing parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule, when the field data of the business field has passed verification, verifying the user information according to the target system verification rule; alternatively,
[0132] the verifying module 406 is employed for verifying the user information according to the target system verification rule, when the user information has passed verification, performing parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule;
[0133] preferably, the target parameter verification rule includes at least one of non-empty verification rule, field length verification rule, format verification rule, sensitive word verification rule and identification number verification rule, and the target system verification rule includes number of pieces of information restriction verification rule.
[0134] In one embodiment, the device further comprises:
[0135] a first configuring module, for, prior to obtaining user information to be collected via an interface, obtaining the target information type, respective business fields pertaining to the target information type, mapping relations between the respective business fields and information fields in the business sheet, and the target parameter verification rules to which the respective business fields correspond;
[0136] configuring the mapping rule configuration table according to the target information type, the respective business fields, the mapping relations between the respective business fields Date Recue/Date Received 2021-11-15 and the respective information fields in the business sheet, and the respective target parameter verification rules, wherein the mapping rule configuration table is employed to configure mapping relations between respective information fields in the business sheet and the respective business fields, and the target parameter verification rules to which the respective business fields correspond;
[0137] preferably, the device further comprises:
[0138] a second configuring module, for, prior to obtaining user information to be collected via an interface, obtaining the target information type, respective operation types to which user information of the target information type corresponds, and the respective system verification rules to which the respective operation types correspond; and
[0139] configuring the system rule configuration table according to the target information type, the respective operation types, and the respective system verification rules to which the respective operation types correspond, wherein the system rule configuration table is employed to configure system verification rules of different operation types to which the user information of the target information type corresponds.
[0140] In one embodiment, the first verifying unit is further employed for filtering respective target field data of the respective information fields to be stored in the business sheet out of the field data of the respective business fields according to the target fields mapping relation;
and verifying the respective target field data according to the target parameter verification rule.
[0141] In one embodiment, the user information further includes user identification information, and the collecting module 408 is further employed for, when the user information has passed verification, storing the user identification information and the target information type in the business sheet, and storing the field data of the respective business fields in the business sheet according to the target fields mapping relation.

Date Recue/Date Received 2021-11-15
[0142] The device further comprises an error reporting module that is employed for, when the user information has not passed verification, generating error reporting information, and sending the error reporting information to a terminal.
[0143] Specific definitions relevant to the information collecting device may be inferred from the aforementioned definitions to the information collecting method, while no repetition is made in this context. The respective modules in the aforementioned information collecting device can be wholly or partly realized via software, hardware, and a combination of software with hardware. The respective modules can be embedded in the form of hardware in a processor in a computer equipment or independent of any computer equipment, and can also be stored in the form of software in a memory in a computer equipment, so as to facilitate the processor to invoke and perform operations corresponding to the aforementioned respective modules.
[0144] In one embodiment, a computer equipment is provided, the computer equipment can be a server, and its internal structure can be as shown in Fig. 9. The computer equipment comprises a processor, a memory, a network interface and a database connected to each other via a system bus. The processor of the computer equipment is employed to provide computing and controlling capabilities. The memory of the computer equipment includes a nonvolatile storage medium, and an internal memory. The nonvolatile storage medium stores therein an operating system, a computer program and a database. The internal memory provides environment for the running of the operating system and the computer program in the nonvolatile storage medium. The database of the computer equipment is employed to store user information data. The network interface of the computer equipment is employed to connect to an external terminal via network for communication. The computer program realizes an information collecting method when it is executed by a processor.

Date Recue/Date Received 2021-11-15
[0145] As understandable to persons skilled in the art, the structure illustrated in Fig. 9 is merely a block diagram of partial structure relevant to the solution of the present application, and does not constitute any restriction to the computer equipment on which the solution of the present application is applied, as the specific computer equipment may comprise component parts that are more than or less than those illustrated in Fig. 9, or may combine certain component parts, or may have different layout of component parts.
[0146] In one embodiment, further provided is a computer equipment that comprises a memory, a processor and a computer program stored on the memory and operable on the processor, and the following steps are realized when the processor executes the computer program:
obtaining user information to be collected via an interface, wherein the user information includes a target information type and field data of at least one business field pertaining to the target information type; obtaining a target fields mapping relation and a collection of target verification rules from a preset configuration table according to the target information type, wherein the configuration table includes therein fields mapping relations and collections of verification rules to which plural information types respectively correspond, the fields mapping relations are employed to configure mapping relations between business fields pertaining to the information types and information fields in a business sheet of a database, and the collections of verification rules are employed to perform parameter verification on field data of the business fields pertaining to the information types; and verifying the user information according to the collection of target verification rules, and, when the user information has passed verification, collecting the user information and storing the user information in the business sheet according to the target fields mapping relation.
[0147] In one embodiment, the configuration table includes a mapping rule configuration table Date Recue/Date Received 2021-11-15 and a system rule configuration table, the collections of verification rules are further employed to verify user information of the information types, the collection of target verification rules includes a target parameter verification rule and a target system verification rule, and when the processor executes the computer program to realize the step of obtaining a target fields mapping relation and a collection of target verification rules from a preset configuration table according to the target information type, the following steps are specifically realized: obtaining the target fields mapping relation and the target parameter verification rule to which the target information type corresponds from the mapping rule configuration table, and obtaining the target system verification rule from the system rule configuration table according to the target information type; when the processor executes the computer program to realize the step of verifying the user information according to the collection of target verification rules, and, when the user information has passed verification, collecting the user information and storing the user information in the business sheet according to the target fields mapping relation, the following steps are specifically realized:
performing parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule, and verifying the user information according to the target system verification rule; and when the field data of the business field has passed verification and the user information has passed verification, collecting the user information and storing the user information in the business sheet according to the target fields mapping relation.
[0148] In one embodiment, when the processor executes the computer program, the following step is further realized: obtaining a target operation type to which the user information corresponds via an interface; when the processor executes the computer program to realize the step of obtaining the target system verification rule from the system rule configuration table according to the target information type, the following steps are specifically realized:
obtaining plural system verification rules to which the target information type corresponds Date Recue/Date Received 2021-11-15 from the system rule configuration table, and selecting a system verification rule to which the target operation type corresponds from the plural system verification rules to serve as the target system verification rule; wherein the target system verification rule is employed to verify the user information when an operation by which the user information is executed is of the target operation type.
[0149] In one embodiment, when the processor executes the computer program to realize the step of verifying the user information according to the collection of target verification rules, the following steps are specifically realized: performing parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule, when the field data of the business field has passed verification, verifying the user information according to the target system verification rule; alternatively,
[0150] verifying the user information according to the target system verification rule, when the user information has passed verification, performing parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule; preferably, the target parameter verification rule includes at least one of non-empty verification rule, field length verification rule, format verification rule, sensitive word verification rule and identification number verification rule, and the target system verification rule includes number of pieces of information restriction verification rule.
[0151] In one embodiment, when the processor executes the computer program, the following steps are further realized: prior to obtaining user information to be collected via an interface, obtaining the target information type, respective business fields pertaining to the target information type, mapping relations between the respective business fields and information fields in the business sheet, and the target parameter verification rules to which the respective business fields correspond; configuring the mapping rule configuration table according to the target information type, the respective business fields, the mapping relations between the Date Recue/Date Received 2021-11-15 respective business fields and the respective information fields in the business sheet, and the respective target parameter verification rules, wherein the mapping rule configuration table is employed to configure mapping relations between respective information fields in the business sheet and the respective business fields, and the target parameter verification rules to which the respective business fields correspond; preferably, when the processor executes the computer program, the following steps are further realized: prior to obtaining user information to be collected via an interface, obtaining the target information type, respective operation types to which user information of the target information type corresponds, and the respective system verification rules to which the respective operation types correspond;
and configuring the system rule configuration table according to the target information type, the respective operation types, and the respective system verification rules to which the respective operation types correspond, wherein the system rule configuration table is employed to configure system verification rules of different operation types to which the user information of the target information type corresponds.
[0152] In one embodiment, when the processor executes the computer program to realize the step of performing parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule, the following steps are specifically realized: filtering respective target field data of the respective information fields to be stored in the business sheet out of the field data of the respective business fields according to the target fields mapping relation; and verifying the respective target field data according to the target parameter verification rule.
[0153] In one embodiment, the user information further includes user identification information, and when the processor executes the computer program to realize the step of, when the user information has passed verification, collecting the user information and storing the user information in the business sheet according to the target fields mapping relation, the Date Recue/Date Received 2021-11-15 following steps are specifically realized: when the user information has passed verification, storing the user identification information and the target information type in the business sheet, and storing the field data of the respective business fields in the business sheet according to the target fields mapping relation; and preferably, when the user information has not passed verification, generating error reporting information, and sending the error reporting information to a terminal.
[0154] In one embodiment, further provided is a computer-readable storage medium storing thereon a computer program, and the following steps are realized when the computer program is executed by a processor: obtaining user information to be collected via an interface, wherein the user information includes a target information type and field data of at least one business field pertaining to the target information type;
obtaining a target fields mapping relation and a collection of target verification rules from a preset configuration table according to the target information type, wherein the configuration table includes therein fields mapping relations and collections of verification rules to which plural information types respectively correspond, the fields mapping relations are employed to configure mapping relations between business fields pertaining to the information types and information fields in a business sheet of a database, and the collections of verification rules are employed to perform parameter verification on field data of the business fields pertaining to the information types; and verifying the user information according to the collection of target verification rules, and, when the user information has passed verification, collecting the user information and storing the user information in the business sheet according to the target fields mapping relation.
[0155] In one embodiment, the configuration table includes a mapping rule configuration table and a system rule configuration table, the collections of verification rules are further employed to verify user information of the information types, the collection of target Date Recue/Date Received 2021-11-15 verification rules includes a target parameter verification rule and a target system verification rule, and when the computer program is executed by a processor to realize the step of obtaining a target fields mapping relation and a collection of target verification rules from a preset configuration table according to the target information type, the following steps are specifically realized: obtaining the target fields mapping relation and the target parameter verification rule to which the target information type corresponds from the mapping rule configuration table, and obtaining the target system verification rule from the system rule configuration table according to the target information type; when the computer program is executed by a processor to realize the step of verifying the user information according to the collection of target verification rules, and, when the user information has passed verification, collecting the user information and storing the user information in the business sheet according to the target fields mapping relation, the following steps are specifically realized:
performing parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule, and verifying the user information according to the target system verification rule; and when the field data of the business field has passed verification and the user information has passed verification, collecting the user information and storing the user information in the business sheet according to the target fields mapping relation.
[0156] In one embodiment, when the computer program is executed by a processor, the following step is further realized: obtaining a target operation type to which the user information corresponds via an interface; when the computer program is executed by a processor to realize the step of obtaining the target system verification rule from the system rule configuration table according to the target information type, the following steps are specifically realized: obtaining plural system verification rules to which the target information type corresponds from the system rule configuration table, and selecting a system verification rule to which the target operation type corresponds from the plural Date Recue/Date Received 2021-11-15 system verification rules to serve as the target system verification rule;
wherein the target system verification rule is employed to verify the user information when an operation by which the user information is executed is of the target operation type.
[0157] In one embodiment, when the computer program is executed by a processor to realize the step of verifying the user information according to the collection of target verification rules, the following steps are specifically realized: performing parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule, when the field data of the business field has passed verification, verifying the user information according to the target system verification rule; alternatively, verifying the user information according to the target system verification rule, when the user information has passed verification, performing parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule; preferably, the target parameter verification rule includes at least one of non-empty verification rule, field length verification rule, format verification rule, sensitive word verification rule and identification number verification rule, and the target system verification rule includes number of pieces of information restriction verification rule.
[0158] In one embodiment, when the computer program is executed by a processor, the following steps are further realized: prior to obtaining user information to be collected via an interface, obtaining the target information type, respective business fields pertaining to the target information type, mapping relations between the respective business fields and information fields in the business sheet, and the target parameter verification rules to which the respective business fields correspond; configuring the mapping rule configuration table according to the target information type, the respective business fields, the mapping relations between the respective business fields and the respective information fields in the business sheet, and the respective target parameter verification rules, wherein the mapping rule configuration table Date Recue/Date Received 2021-11-15 is employed to configure mapping relations between respective information fields in the business sheet and the respective business fields, and the target parameter verification rules to which the respective business fields correspond; preferably, when the computer program is executed by a processor, the following steps are further realized: prior to obtaining user information to be collected via an interface, obtaining the target information type, respective operation types to which user information of the target information type corresponds, and the respective system verification rules to which the respective operation types correspond;
and configuring the system rule configuration table according to the target information type, the respective operation types, and the respective system verification rules to which the respective operation types correspond, wherein the system rule configuration table is employed to configure system verification rules of different operation types to which the user information of the target information type corresponds.
[0159] In one embodiment, when the computer program is executed by a processor to realize the step of performing parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule, the following steps are specifically realized: filtering respective target field data of the respective information fields to be stored in the business sheet out of the field data of the respective business fields according to the target fields mapping relation; and verifying the respective target field data according to the target parameter verification rule.
[0160] In one embodiment, the user information further includes user identification information, and when the computer program is executed by a processor to realize the step of, when the user information has passed verification, collecting the user information and storing the user information in the business sheet according to the target fields mapping relation, the following steps are specifically realized: when the user information has passed verification, storing the user identification information and the target information type in the business Date Recue/Date Received 2021-11-15 sheet, and storing the field data of the respective business fields in the business sheet according to the target fields mapping relation; and preferably, when the user information has not passed verification, generating error reporting information, and sending the error reporting information to a terminal.
[0161] As comprehensible to persons ordinarily skilled in the art, the entire or partial flows in the methods according to the aforementioned embodiments can be completed via a computer program instructing relevant hardware, the computer program can be stored in a nonvolatile computer-readable storage medium, and the computer program can include the flows as embodied in the aforementioned respective methods when executed. Any reference to the memory, storage, database or other media used in the respective embodiments provided by the present application can all include nonvolatile and/or volatile memory/memories. The nonvolatile memory can include a read-only memory (ROM), a programmable ROM
(PROM), an electrically programmable ROM (EPROM), an electrically erasable and programmable ROM (EEPROM) or a flash memory. The volatile memory can include a random-access memory (RAM) or an external cache memory. To serve as explanation rather than restriction, the RAM is obtainable in many forms, such as static RAM
(SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual data rate SDRAM
(DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous link (Synchlink) DRAM
(SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct Rambus dynamic RAM
(DRDRAM), and Rambus dynamic RAM (RDRAM), etc.
[0162] Technical features of the aforementioned embodiments are randomly combinable, while all possible combinations of the technical features in the aforementioned embodiments are not exhausted for the sake of brevity, but all these should be considered to fall within the scope recorded in the Description as long as such combinations of the technical features are not mutually contradictory.

Date Recue/Date Received 2021-11-15
[0163] The foregoing embodiments are merely directed to several modes of execution of the present application, and their descriptions are relatively specific and detailed, but they should not be hence misunderstood as restrictions to the inventive patent scope. As should be pointed out, persons with ordinary skill in the art may further make respective modifications and improvements without departing from the conception of the present application, and all these should pertain to the protection scope of the present application.
Accordingly, the patent protection scope of the present application shall be based on the attached Claims.

Date Recue/Date Received 2021-11-15

Claims (10)

What is claimed is:
1. An information collecting method, characterized in comprising:
obtaining user information to be collected via an interface, wherein the user information includes a target information type and field data of at least one business field pertaining to the target information type;
obtaining a target fields mapping relation and a collection of target verification rules from a preset configuration table according to the target information type, wherein the configuration table includes therein fields mapping relations and collections of verification rules to which plural information types respectively correspond, the fields mapping relations are employed to configure mapping relations between business fields pertaining to the information types and information fields in a business sheet of a database, and the collections of verification rules are employed to perform parameter verification on field data of the business fields pertaining to the information types; and verifying the user information according to the collection of target verification rules, and, when the user information has passed verification, collecting and storing the user information in the business sheet according to the target fields mapping relation.
2. The method according to Claim 1, characterized in that the configuration table includes a mapping rule configuration table and a system rule configuration table, the collections of verification rules are further employed to verify user information of the information types, the collection of target verification rules includes a target parameter verification rule and a target system verification rule, the step of obtaining a target fields mapping relation and a collection of target verification rules from a preset configuration table according to the target information type includes:
obtaining the target fields mapping relation and the target parameter verification rule to which the target information type corresponds from the mapping rule configuration table, and obtaining the target system verification rule from the system rule configuration table according to the target information type;
the step of verifying the user information according to the collection of target verification rules, and, when the user information has passed verification, collecting and storing the user information in the business sheet according to the target fields mapping relation includes:
performing parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule, and verifying the user information according to the target system verification rule; and when the field data of the business field has passed verification and the user information has passed verification, collecting and storing the user information in the business sheet according to the target fields mapping relation.
3. The method according to Claim 2, characterized in further comprising:
obtaining a target operation type to which the user information corresponds via an interface;
the step of obtaining the target system verification rule from the system rule configuration table according to the target information type includes:
obtaining plural system verification rules to which the target information type corresponds from the system rule configuration table, and selecting a system verification rule to which the target operation type corresponds from the plural system verification rules to serve as the target system verification rule; wherein the target system verification rule is employed to verify the user information when an operation by which the user information is executed is of the target operation type.
4. The method according to Claim 3, characterized in that the step of verifying the user information according to the collection of target verification rules includes:
performing parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule, when the field data of the business field has passed verification, verifying the user information according to the target system verification rule;
or, verifying the user information according to the target system verification rule, when the user information has passed verification, performing parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule;
preferably, the target parameter verification rule includes at least one of non-empty verification rule, field length verification rule, format verification rule, sensitive word verification rule and identification number verification rule, and the target system verification rule includes number of pieces of information restriction verification rule.
5. The method according to Claim 3 or 4, characterized in further comprising:
prior to obtaining user information to be collected via an interface, obtaining the target information type, respective business fields pertaining to the target information type, mapping relations between the respective business fields and information fields in the business sheet, and the target parameter verification rules to which the respective business fields correspond;
configuring the mapping rule configuration table according to the target information type, the respective business fields, the mapping relations between the respective business fields and the respective information fields in the business sheet, and the respective target parameter verification rules, wherein the mapping rule configuration table is employed to configure mapping relations between respective information fields in the business sheet and the respective business fields, and the target parameter verification rules to which the respective business fields correspond;
preferably, the method further comprises:
prior to obtaining user information to be collected via an interface, obtaining the target information type, respective operation types to which user information of the target information type corresponds, and the respective system verification rules to which the respective operation types correspond; and configuring the system rule configuration table according to the target information type, the respective operation types, and the respective system verification rules to which the respective operation types correspond, wherein the system rule configuration table is employed to configure system verification rules of different operation types to which the user information of the target information type corresponds.
6. The method according to Claim 3 or 4, characterized in that the step of performing parameter verification on the field data of the business field pertaining to the target information type according to the target parameter verification rule includes:

filtering respective target field data of the respective information fields to be stored in the business sheet out of the field data of the respective business fields according to the target fields mapping relation; and verifying the respective target field data according to the target parameter verification rule.
7. The method according to Claim 1, characterized in that the user information further includes user identification information, and that the step of, when the user information has passed verification, collecting and storing the user information in the business sheet according to the target fields mapping relation includes:
when the user information has passed verification, storing the user identification information and the target information type in the business sheet, and storing the field data of the respective business fields in the business sheet according to the target fields mapping relation; and preferably, when the user information has not passed verification, generating error reporting information, and sending the error reporting information to a terminal.
8. An information collecting device, characterized in that the device comprises:
a first obtaining module, for obtaining user information to be collected via an interface, wherein the user information includes a target information type and field data of at least one business field pertaining to the target information type;
a second obtaining module, for obtaining a target fields mapping relation and a collection of target verification rules from a preset configuration table according to the target information type, wherein the configuration table includes therein fields mapping relations and collections of verification rules to which plural information types respectively correspond, the fields mapping relations are employed to configure mapping relations between business fields pertaining to the information types and information fields in a business sheet of a database, and the collections of verification rules are employed to perform parameter verification on field data of the business fields pertaining to the information types;
a verifying module, for verifying the user information according to the collection of target verification rules; and a collecting module, for, when the user information has passed verification, collecting and storing the user information in the business sheet according to the target fields mapping relation.
9. A computer equipment, comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the method steps according to any of Claims 1 to 7 are realized when the processor executes the computer program.
10. A computer-readable storage medium, storing thereon a computer program, characterized in that the method steps according to any of Claims 1 to 7 are realized when the computer program is executed by a processor.
CA3139243A 2020-11-13 2021-11-15 Information collection method, device, computer equipment and storage medium Pending CA3139243A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011269484.1 2020-11-13
CN202011269484.1A CN112380213B (en) 2020-11-13 2020-11-13 Information acquisition method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CA3139243A1 true CA3139243A1 (en) 2022-05-13

Family

ID=74583875

Family Applications (1)

Application Number Title Priority Date Filing Date
CA3139243A Pending CA3139243A1 (en) 2020-11-13 2021-11-15 Information collection method, device, computer equipment and storage medium

Country Status (2)

Country Link
CN (1) CN112380213B (en)
CA (1) CA3139243A1 (en)

Families Citing this family (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114662128A (en) * 2021-03-05 2022-06-24 支付宝(杭州)信息技术有限公司 Data verification system construction method and device
CN113259154B (en) * 2021-04-20 2022-10-14 广州骏伯网络科技有限公司 Method and device for informing middle station data verification, computer equipment and storage medium
CN113609014A (en) * 2021-08-04 2021-11-05 深圳鼎盛电脑科技有限公司 Interface field checking method and device, storage medium and electronic equipment
CN113779132A (en) * 2021-09-15 2021-12-10 深圳我家云网络科技有限公司 Data import method and device, computer equipment and storage medium
CN113986384A (en) * 2021-10-28 2022-01-28 数字天堂(北京)网络技术有限公司 Processing device, method, equipment and storage medium based on client and cloud
CN114553954B (en) * 2022-04-21 2022-09-02 北京时代亿信科技股份有限公司 Information pushing method, nonvolatile storage medium and electronic equipment
CN117235079A (en) * 2023-11-16 2023-12-15 中国人民财产保险股份有限公司 Data processing method, device and equipment
CN117312435A (en) * 2023-11-23 2023-12-29 首都信息发展股份有限公司 Data acquisition method and device and electronic equipment

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US7596573B2 (en) * 2003-06-11 2009-09-29 Oracle International Corporation System and method for automatic data mapping
CN110020358B (en) * 2017-11-07 2021-08-17 北京京东尚科信息技术有限公司 Method and device for generating dynamic page

Also Published As

Publication number Publication date
CN112380213B (en) 2022-11-15
CN112380213A (en) 2021-02-19

Similar Documents

Publication Publication Date Title
CA3139243A1 (en) Information collection method, device, computer equipment and storage medium
US11762920B2 (en) Composite index on hierarchical nodes in the hierarchical data model within a case model
CN108563768A (en) Data transfer device, device, equipment and the storage medium of different data model
CN105488125A (en) Page access method and apparatus
CN102135895B (en) System upgrading method and system
CN108038655A (en) Recommendation method, application server and the computer-readable recording medium of department's demand
WO2012174680A1 (en) Identity based automated form filling
CN110598107A (en) Management method of query system and computer storage medium
US20220309546A1 (en) Ad Simulator Browser Extension
CN110737706A (en) Data management method, device, equipment and computer readable storage medium
CN103399776A (en) Creation method and system for reusable MOCK
CN112818270A (en) Data cross-domain transfer method and device and computer equipment
US20150046443A1 (en) Document-based search with facet information
CN110908907A (en) Web page testing method, device, equipment and storage medium
CN107169026B (en) Website page display method and device
CN109240660B (en) Access method of advertisement data, storage medium, electronic device and system
CN112348403B (en) Wind control model construction method and device and electronic equipment
CN106886546B (en) Construction method and equipment of data website
US8245020B1 (en) Creating a partial instance of component in response to user specifying a value for a dynamic attribute of a selected component
CN113688899A (en) Data fusion method and device, storage medium and electronic equipment
CN111026613A (en) Log processing method and device
CN110134867A (en) Corporation information query method and Related product
CN111597179B (en) Method and device for automatically cleaning data, electronic equipment and storage medium
CN109254985A (en) Method for exhibiting data and device, the electronic equipment of database
CN114417803B (en) Report generation method and device, computing equipment and computer storage medium

Legal Events

Date Code Title Description
EEER Examination request

Effective date: 20220916

EEER Examination request

Effective date: 20220916

EEER Examination request

Effective date: 20220916

EEER Examination request

Effective date: 20220916

EEER Examination request

Effective date: 20220916