CN108090784A - Marketing activity emulation verification method and device - Google Patents

Marketing activity emulation verification method and device Download PDF

Info

Publication number
CN108090784A
CN108090784A CN201711220914.9A CN201711220914A CN108090784A CN 108090784 A CN108090784 A CN 108090784A CN 201711220914 A CN201711220914 A CN 201711220914A CN 108090784 A CN108090784 A CN 108090784A
Authority
CN
China
Prior art keywords
shadow
marketing activity
data
information
activity
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711220914.9A
Other languages
Chinese (zh)
Other versions
CN108090784B (en
Inventor
武律
王小冬
沈悦斌
兰杰
朱兴
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koubei Shanghai Information Technology Co Ltd
Original Assignee
Koubei Shanghai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koubei Shanghai Information Technology Co Ltd filed Critical Koubei Shanghai Information Technology Co Ltd
Priority to CN201711220914.9A priority Critical patent/CN108090784B/en
Publication of CN108090784A publication Critical patent/CN108090784A/en
Application granted granted Critical
Publication of CN108090784B publication Critical patent/CN108090784B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0201Market modelling; Market analysis; Collecting market data

Landscapes

  • Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Game Theory and Decision Science (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

This application discloses a kind of marketing activity emulation verification method, including:Obtain the marketing activity for needing to carry out simulating, verifying;According to the marketing activity, acquisition and the relevant known incidence relation between creation data and known creation data of the marketing activity, and according to predetermined shadow mapping relations, they are each mapped to the shadow relationship between shadow data and shadow data, so as to obtain shadow environment;In the shadow environment, shadow marketing activity is created and run according to the shadow relationship between the shadow data and shadow data;The shadow result data generated to the shadow marketing activity operational process is checked and verified, determines whether the marketing activity being capable of normal operation with this.The application use is verified with the one-to-one virtual data of production environment, is avoided the risk of artificial creation data verification, is improved simulated effect, is reduced cost, and using simulation O2O verification methods, verification result is made to be more convenient accurately.

Description

Marketing activity emulation verification method and device
Technical field
This application involves online artificial fields, and in particular to a kind of marketing activity emulation verification method.The application relates to simultaneously And a kind of marketing activity simulating, verifying device.
Background technology
In recent years, net purchase has become the consumption pattern that people increasingly favor;In each net purchase platform, often there is businessman to lead to It crosses in the short time and consumer is attracted to marketing activity of making concessions on the line of specific user group, realize better product promotion and pin It sells.The general process of marketing activity, which is that operation personnel starts to start a period of time before marketing activity starts, promotes trade and investment, trade company's report Name success can just generate actual marketing activity.
In order to ensure marketing activity can be carried out normally in order, avoid the occurrence of rule conflict and resource contention and ensure Related resource can be supported fully, before marketing activity is carried out, generally require and carry out validation test in advance to marketing activity, this Kind validation test is known as simulating, verifying.
Presently disclosed Above-the-line emulation verification method has, traditional automated function test, under tester is online Environment constructs automatic test cases by boundary method principle, and by data base querying or service call mode verification at Manage result;Creation data is synchronized under line and is verified, by recording and playback technology, the operation activity number that production environment is created Test verification is carried out according to environment under line is played back to, avoids having an impact creation data;Marketing activity is by configuring white name on line Single, the user allowed in white list can see preferential commodity in advance, it is movable it is formal start before, received, check and write off it is a series of It operates to carry out movable verification.
The Above-the-line verification method that the above-mentioned prior art provides there are it is apparent the defects of.
The shortcomings that Above-the-line verification method that the prior art provides, is:Traditional automated function test, covering Data surface is limited, it is virtually impossible to strictly all rules combine scenes are completely covered by use-case, and the more inputs of the scene covered into This is higher.Creation data is synchronized under line and is verified, production environment may not with environment code, environment, system link under line Unanimously, test result is caused with inconsistent on line, in addition, the data verification of environment is also inaccurate under line.Marketing activity is led on line Configuration white list is crossed, the information of discount coupon is exposed in advance before movable formal startup, but the maintenance of white list once malfunctions, meeting Marketing activity is caused to be exposed in advance, there are certain business risks;The stock of discount coupon is used in advance, and activity is formal to be started Afterwards, physical holding of stock may be inconsistent with the stockpile number of publicity, and needs to carry out core using the real accounts fund of oneself Pin, the cost of manual verification are higher;The scene and limited amount being able to verify that can not carry out the rule of neck certificate/check and write off comprehensive Covering, cause actual activity start after or may go wrong in not authenticated scene;In business verification process In, due to the use of the reconciliation process for being the real data of production environment, influencing trade company in actual activity.Especially at O2O Under scape, many verification process must have trade company scene to be coordinated, and seriously affect the progress of simulating, verifying.
The content of the invention
The present invention provides a kind of marketing activity emulation verification method, to solve existing for existing Above-the-line verification method There is business risk, verification is of high cost, cannot carry out the problem of on-line off-line operation combines.The present invention additionally provides a kind of marketing to live Dynamic simulating, verifying device.
The application provides a kind of marketing activity emulation verification method, including:
Obtain the marketing activity for needing to carry out simulating, verifying;
According to the marketing activity, obtain and the relevant known creation data of the marketing activity and known creation data Between incidence relation, and according to predetermined shadow mapping relations, they are each mapped to shadow data and shadow number Shadow relationship between, so as to obtain shadow environment;
In the shadow environment, created and run according to the shadow relationship between the shadow data and shadow data Shadow marketing activity;
The shadow result data generated to the shadow marketing activity operational process is checked and verified, institute is determined with this Whether state marketing activity being capable of normal operation.
Optionally, it is described before the step of acquisition shadow environment, it further includes:
Create shadow resource.
Optionally, the shadow resource, including at least one of following:
Shadow trade company, shadow user, shadow budget subsidy account.
Optionally, product is paid in the shadow trade company signing face to face, and opens open platform interface authority.
Optionally, before the step of acquisition shadow environment, further include:
Create shadow mapping relations.
Optionally, the shadow mapping relations, including following content:
All kinds of creation datas are mapped as the map type of shadow data and the mapping method of corresponding each map type.
Optionally, it is described acquisition need carry out simulating, verifying the marketing activity step in or before this step, It further includes:
According to the operation activity of the marketing activity foundation, the related data of the marketing activity and the correlation are determined Incidence relation between data.
Optionally, the operation activity according to the marketing activity foundation determines the related data of the marketing activity And the incidence relation between the related data includes:
According to the operation activity of the marketing activity foundation, the marketing activity information of the marketing activity is determined;
According to the operation activity of the marketing activity foundation, the user information of the marketing activity, merchant information, shop are determined Spread information, merchandise news, certificate Template Information and the user information, merchant information, store information, merchandise news, certificate template Incidence relation between information.
Optionally, the operation activity according to the marketing activity foundation determines the related data of the marketing activity It is described in the shadow environment after step, according between the shadow data and shadow data shadow relationship create with And it is further included before operation shadow marketing activity step:
Create shadow campaign allocation list;The parameter that the establishment and operation shadow marketing activity are provided according to the allocation list It carries out.
Optionally, the shadow campaign allocation list records the following configuration data of the shadow marketing activity:
Operation activity account relevant with the shadow marketing activity, the shadow marketing activity account, shadow battalion Sell active state, shadow marketing activity context pressure mark note.
Optionally, it is described according to the marketing activity, obtain known creation data relevant with the marketing activity and Incidence relation between known creation data, and according to pre-determined shadow mapping relations, they are each mapped to shadow Shadow relationship between data and shadow data, the step of so as to obtain shadow environment in, the acquisition and the marketing activity Relevant known incidence relation between creation data and known creation data, specifically includes:
Obtain marketing activity information in the marketing activity, user information, merchant information, store information, merchandise news, Certificate Template Information;
Obtain user information in the marketing activity, merchant information, store information, merchandise news, certificate Template Information it Between incidence relation.
Optionally, it is described according to the marketing activity, obtain known creation data relevant with the marketing activity and Incidence relation between known creation data, and according to pre-determined shadow mapping relations, they are each mapped to shadow In the step of shadow relationship between data and shadow data, it is described by they be each mapped to shadow data and shadow data it Between shadow relationship include:Including:
Whether judge in the shadow mapping relations comprising the corresponding shadow mapping relations of the merchant information;
If so, the merchant information is mapped as shadow merchant information by the shadow mapping relations;
If it is not, then obtain the shadow merchant information from the shadow resource, and by the merchant information and the shadow The incidence relation of sub- merchant information is added in the shadow mapping relations.
Optionally, it is described according to the marketing activity, obtain known creation data relevant with the marketing activity and Incidence relation between known creation data, and according to pre-determined shadow mapping relations, they are each mapped to shadow In the step of shadow relationship between data and shadow data, it is described by they be each mapped to shadow data and shadow data it Between shadow relationship include:
Whether judge in the shadow mapping relations comprising the corresponding shadow mapping relations of the user information;
If so, the user information is mapped as shadow user information by the shadow mapping relations;
If it is not, then obtain the shadow user information from the shadow resource, and by the user information and the shadow The incidence relation of child user information is added in the shadow mapping relations.
Optionally, it is described according to the marketing activity, obtain known creation data relevant with the marketing activity and Incidence relation between known creation data, and according to pre-determined shadow mapping relations, they are each mapped to shadow In the step of shadow relationship between data and shadow data, it is described by they be each mapped to shadow data and shadow data it Between shadow relationship include:
By the store information, merchandise news, certificate Template Information, shadow shop is mapped as by the shadow mapping relations Information, shadow merchandise news, shadow certificate Template Information;
By the incidence relation between the user information, merchant information, store information, merchandise news, certificate Template Information, lead to It crosses the shadow mapping relations and is mapped as the shadow user information, shadow merchant information, shadow store information, shadow commodity letter Shadow relationship between breath, shadow certificate Template Information.
Optionally, it is described in the shadow environment, according to the shadow relationship between the shadow data and shadow data The shadow marketing activity is created and runs, including:
Using the shadow user, shadow trade company, shadow shop as active agent, using the shadow commodity, shadow service as Trading object according to the marketing activity information, establishes shadow transaction;
To the shadow user that the shadow transaction is related to, according to the activity rule in the marketing activity information Then, it is preferential to shadow user offer shadow.
Optionally, the shadow transaction is to pay transaction face to face, and payment interface is paid face to face by related shadow shop, Transaction program code is injected to platform, output carries out the shadow user of the shadow transaction, is subsidized from the shadow budget Account subsidizes the shadow user, realizes shadow payment;The injection pressure mark note in the context of the transaction program code.
Optionally, the shadow is preferential to get shadow discount coupon face to face, from shadow budget subsidy account subsidy institute It is preferential to state shadow;By the neck certificate interface for paying interface face to face in the shadow shop being traded, shadow coupon code is exported The shadow user for carrying out shadow transaction is supplied to, realizes getting for shadow discount coupon;The context of the shadow coupon code Middle injection pressure mark note.
Optionally, the preferential realization method of the shadow discount coupon is:
To obtain the shadow user of the shadow discount coupon as transaction agent, by the way that shadow discount coupon can be used The interface of paying face to face in shadow shop inject the shadow coupon code, realize the use of shadow discount coupon;The shadow is excellent Injection pressure mark note in the context of favour voucher code.
Optionally, the shadow result data generated to the shadow marketing activity process is checked and verified, really The fixed marketing activity whether can normal operation include:
Judge the Transaction Information in marketing activity, if meet the active rule of the marketing activity, to ensure movable work( It can be normal;
Judge the checked result information of verification platform in marketing activity, if meet the active rule of the marketing activity, To ensure working capital safety.
Optionally, the shadow budget subsidy account provides virtual fund to complete checking and writing off for marketing activity discount coupon.
Optionally, the described method includes:
The marketing activity is same city activity;
The shadow trade company, shadow user are all obtained from same city data.
In addition the application provides a kind of marketing activity simulating, verifying device, including:
First acquisition module, for obtaining the marketing activity for needing to carry out simulating, verifying;
First synchronization module, for according to the marketing activity, obtaining and the relevant known production number of the marketing activity According to this and the incidence relation between known creation data, and according to predetermined shadow mapping relations, they are mapped respectively For the shadow relationship between shadow data and shadow data, so as to obtain shadow environment;
First creation module, in the shadow environment, according to the shadow between the shadow data and shadow data Subrelation creates and operation shadow marketing activity;
First verification module, the shadow result data for being generated to the shadow marketing activity operational process are checked And verification, determine whether the marketing activity being capable of normal operation with this.
In addition the application provides a kind of electronic equipment for marketing activity simulating, verifying, including:
Display;
Processor;
Memory, for storing the program for marketing activity simulating, verifying, described program is read by the processor During execution, following operation is performed:Obtain the marketing activity for needing to carry out simulating, verifying;
According to the marketing activity, obtain and the relevant known creation data of the marketing activity and known creation data Between incidence relation, and according to predetermined shadow mapping relations, they are each mapped to shadow data and shadow number Shadow relationship between, so as to obtain shadow environment;
In the shadow environment, created and run according to the shadow relationship between the shadow data and shadow data Shadow marketing activity;
The shadow result data generated to the shadow marketing activity operational process is checked and verified, institute is determined with this Whether state marketing activity being capable of normal operation.
Compared with prior art, the present invention has the following advantages:
The marketing activity emulation verification method that the application provides passes through the data of synchronous marketing activity to shadow environment In, and shadow marketing activity, operation shadow battalion are created according to the incidence relation between the data and different data of marketing activity Pin activity, and the data generated to shadow marketing activity process are checked and verified.Functional verification, generation are carried out in shadow link Code, environment, link and production environment are completely the same, avoid verification and the otherness on line under line, creation data is replicated automatically To shadow environment, artificial creation data is avoided to occur the risk of larger discrepancy with actual conditions, improve simulated effect.
In the method, during simulating, verifying, the stock using actuals will not be generated;In preferred embodiment In, due to creating shadow budget subsidy account, without Marking Budget is employed, it is not related to actual inventory change and cash flow It is dynamic, effectively reduce verification cost.
After the preferred embodiment that the application is used to provide, all verification process, can be with especially including O2O verification process It is realized by the modes such as injecting codes on line analog form, avoiding related data needs cost caused by the acquisition of scene to increase; Also, these data can directly by check platform do the automation of data check, avoid artificial nucleus couple generation into This and omit the problem of, due to the use of be shadow data, trade company's bill of shadow environment will not influence trade company's production environment The reconciliation of bill makes verification result more accurate.
It further, can also be by obtaining the correlation with city on the basis of above-mentioned marketing activity emulation verification method Certificate is led under data, artificial line and checks and writes off realization activity and verifies the combination operated on line and under line, so as to further completely test Card method solves the problems, such as to run into actual marketing activity in advance, realizes the various situations that are likely to occur to marketing activity It more comprehensively analyzes and prejudges.
Description of the drawings
Fig. 1 is the flow chart for the marketing activity emulation verification method that the application first embodiment provides;
Fig. 2 be the application first embodiment be related to shadow resource table, shadow mapping table, shadow campaign synchronously configure The schematic diagram of table;
Fig. 3 is another flow chart for the marketing activity emulation verification method that the application first embodiment provides;
Fig. 4 is another flow chart for the marketing activity emulation verification method that the application first embodiment provides;
Fig. 5 is another flow chart for the marketing activity emulation verification method that the application first embodiment provides;
Fig. 6 is another flow chart for the marketing activity emulation verification method that the application first embodiment provides;
Fig. 7 is another flow chart for the marketing activity emulation verification method that the application first embodiment provides;
Fig. 8 is the marketing activity business relations figure that the application first embodiment is related to.
Fig. 9 is the structure diagram for the marketing activity simulating, verifying device that the application second embodiment provides.
Specific embodiment
Many details are elaborated in the following description in order to fully understand the present invention.But the present invention can be with Much implement different from other manner described here, those skilled in the art can be in the situation without prejudice to intension of the present invention Under do similar popularization, therefore the present invention is not limited to the specific embodiments disclosed below.
The embodiment of the present application provides a kind of marketing activity emulation verification method.Fig. 1 is refer to, which is that the application first is real Apply the flow chart of example.A kind of marketing activity emulation verification method is provided below in conjunction with Fig. 1 to the application first embodiment to carry out in detail It describes in detail bright.
The technical solution of the embodiment of the present application in order to better understand is first illustrated related term.
Production environment refers to environment on line during marketing activity actual motion (for example, actually providing the user with public praise service Internet system).
Shadow environment refers to, refers to the virtual environment for by simulating full link survey, shadow mapping relations etc. being pressed to build, generation Code, link, environment and production environment are completely the same.
Full link pressure is surveyed, and so-called " full link " refers to complete the holonomic system that an operation flow is undergone in production environment System calls link, and " full link pressure is surveyed " is then to carry out pressure test to completing the system involved by a business, so as to more accurate Really find out some ring in service link (for example, transaction, commodity, discount coupon, retail shop, server-side, client, development platform etc.) The performance bottleneck (for example, the service of some system, database performance, caching performance etc.) of section.It is in production ring that full link pressure, which is surveyed, What border was completed, therefore compared to the pressure survey of environment, environments under line, environment is truer, and it is more accurate that pressure surveys result.
The embodiment that the application is largely surveyed using full link pressure is simulated, in service link entrance system (for example, interface tune Gateway system etc.) in code, in full link pressure mark note involved in thread context, and down-stream system is being called, it will The mark passes to down-stream system as parameter.Before down-stream system service processing, which is parsed from parameter, and In the thread context that oneself is set.As long as in this way, full link pressure mark note, follow-up each system are provided in entrance system System chain road can take this mark, then, increase in the DAL (data access layer) of each system to full link pressure mark note Logic is handled with regard to the mark can be parsed.For inquiring about class service, judge whether with this pressure mark note in order number, if there is this Pressing mark note, then explanation is shadow data, so adds in full link pressure mark note within a context, can just be done in the DAL layers of inquiry SQL is replaced, and realizes inquiry shadow data.
Creation data refers to the truthful data that marketing activity is generated in production environment actual motion.
Shadow data are corresponded with creation data, are directly multiplexed the characteristic that full link pressure is surveyed, and creation data is automatically multiple Shadow environment is made, obtains shadow data, and the shadow mapping relations for passing through emulation survey pressure the shadow data generated and connect Get up so that shadow data possess same semanteme with creation data.
As shown in Figure 1, show the flow chart for the marketing activity emulation verification method that the application first embodiment provides, bag Include following steps.
Step S101 obtains the marketing activity for needing to carry out simulating, verifying.
This step needs the object of progress simulating, verifying, i.e., described marketing activity for obtaining.Under general retrieval purpose, obtain Take which marketing activity and the present embodiment relation little.The present embodiment be the technical foundation as marketing activity simulating, verifying and It is existing.
Simulating, verifying is also named preceding emulation, refers to emulate design in advance using emulation tool, the function of test design Whether correct, simulation process can find the mistake in design in time, accelerate design schedule, improve the reliability of design.
Marketing activity refers to the activity to making concessions under the line of specific user group in the short time, and attracts to use by making concessions Family is participated in, to treat that user has more information for recognizing or leaving user for products & services.It is main to include marketing work Dynamic ID, Activity Type, winnings information, activity time, participation trade company, commodity are applicable in the information such as shops, stockpile number, beginning and ending time (such as Fig. 8).
The marketing activity for needing to carry out simulating, verifying is obtained described in this step, in particular to is obtained and is emulated The essential information of the marketing activity of verification mainly includes marketing activity ID and other possible relevant informations;Specifically may be used To use, marketing activity ID and relevant information are added to in the shadow campaign synchronization allocation list being pre-created (such as Fig. 2, figure 3), so as to obtaining the marketing activity for needing simulating, verifying;Certainly, emulated by the acquisition of shadow campaign synchronization allocation list The marketing activity of verification, simply a concrete implementation mode, actually can also by other means, such as specially set into Journey realizes the acquisition of information of the marketing activity to simulating, verifying.The marketing activity for needing to carry out simulating, verifying may be according to flat The mandatory requirement of platform, it is also possible to random selection;Marketing activity can be trade company oneself initiate or platform according to What the trade and investment promotion trade company of the operation activity of marketing activity foundation initiated, any one marketing activity is therefrom selected as being imitated The object really verified.
Under normal circumstances, marketing activity is that the operation activity initiated by platform generates, i.e., platform initiates operation activity, phase It closes trade company's application to participate in, the preferential activity that specific trade company (such as McDonald) provides according to the operation activity is known as marketing activity. In that case it is preferable that refer to Fig. 3, in step S101 or before it is further comprising the steps of:Step S105, root According to the operation activity of the marketing activity foundation, between the related data and the related data that determine the marketing activity Incidence relation.
The situation before step S101 is only depicted in Fig. 3, it can be according to described in the step of obtaining marketing activity The operation activity of marketing activity foundation, determine the marketing activity related data and the related data between association close System.
Operation activity refer to operation personnel's planning through information such as rule, the resources of entire marketing activity life cycle, After operation personnel starts trade and investment promotion, trade company registers successfully can just generate actual marketing activity.The information that operation activity provides is main Including information (such as Fig. 8) such as trade and investment promotion scheme, city, beginning and ending time, dispensing mode, activity name, states.
Related data refers to the user information of marketing activity, merchant information, marketing activity information (for example, three days weekends It is happy), store information (for example, seabed fishing), merchandise news (for example, coupons commodity) and certificate Template Information be (for example, the whole audience 95 Folding, binds 20 yuan, limits the use of for each person every day once), the incidence relation between related data refers to user information, merchant information, shop Spread information, merchandise news, between certificate Template Information incidence relation (for example, McDonald sells fried chicken, fried chicken be merchandise news, McDonald is store information).
Specifically, after operation activity starts trade and investment promotion, trade company registers successfully to generate actual marketing activity, according to the battalion The operation activity ID (the operation activity ID is added in shadow campaign synchronization allocation list by such as Fig. 2) of pin activity foundation, inquiry Incidence relation between the related data and related data of operation activity, and by the related data and dependency number of operation activity Incidence relation between is synchronized in marketing activity.
Preferably, Fig. 4 is refer to, step S105 includes step S105-1, lives according to the operation of the marketing activity foundation It is dynamic, determine the marketing activity information of the marketing activity;Step S105-2, according to the operation activity of the marketing activity foundation, Determine user information, merchant information, store information, merchandise news, certificate Template Information and the user of the marketing activity Incidence relation between information, merchant information, store information, merchandise news, certificate Template Information.
Above-mentioned steps are used to determine marketing activity information, the user of marketing activity according to the operation activity of marketing activity foundation Information, merchant information, store information, merchandise news, certificate Template Information and the user information, merchant information, store information, Incidence relation between merchandise news, certificate Template Information.
Marketing activity information includes marketing activity ID, activity name, active rule, operation activity ID, trade company ID, shop The information such as ID, stockpile number.
User information includes the information such as User ID, user balance.
Merchant information includes the information such as trade company ID, trade company's remaining sum.
Store information includes the information such as shop ID, shop title, trade company ID, shops's classification, address.
Merchandise news includes the information such as commodity ID, trade name, commodity ID, commodity classification, stock.
Certificate Template Information includes certificate template ID, marketing activity ID, trade company ID, commodity ID, applicable shops ID set, subsidy account The information (such as Fig. 8) such as family ID, the preferential amount of money, stockpile number, displaying configuration information.
Specifically, after operation activity is promoted trade and investment successfully, actual marketing activity is generated, according to the marketing activity foundation Operation activity ID, the marketing activity information of inquiry operation activity, user information, merchant information, store information, merchandise news, certificate Incidence relation between Template Information and the user information, merchant information, store information, merchandise news, certificate Template Information, And it is synchronized in marketing activity.The merchant information of generation, store information, stockpile number, certificate template after promoting trade and investment successfully Synchronizing informations are waited into marketing activity, and operation activity is had in itself activity name, activity scheme, the beginning and ending time, trade company The information such as ID, marketing activity ID are also synchronized in marketing activity.
Step S102 according to the marketing activity, obtains known creation data relevant with the marketing activity and Know the incidence relation between creation data, and according to predetermined shadow mapping relations, they are each mapped to shadow number According to the shadow relationship between shadow data, so as to obtain shadow environment.
This step is used to the incidence relation between creation data and creation data being mapped as shadow data and shadow Shadow relationship between data, so as to obtain shadow environment.
Shadow mapping relations, will by the mapping table of creation data major key ID (number) and shadow data major key ID (such as Fig. 3, shadow mapping relations needs shift to an earlier date relation of the relationship map between all shadow data between all creation datas It creates, hereafter has a detailed description).
Shadow relationship refers to the incidence relation between various shadow data under shadow environment;In this step, according to production Incidence relation and the shadow mapping relations between data obtain the incidence relation between shadow data, i.e. these shadows Relation is projection of the relation under shadow environment between corresponding creation data.
Specifically, the incidence relation between the creation data and creation data of first acquisition marketing activity, then passes through simulation Full link pressure survey mode calls relevant interface to create shadow data, and passes through shadow mapping relations by creation data and production number Incidence relation between is mapped as the incidence relation between shadow data and shadow data, so as to obtain shadow environment, after being Continuous establishment shadow marketing activity performs early-stage preparations.By injecting full link in thread context mark is pressed to remember, and adjusted During with down-stream system, down-stream system is passed to using the mark as parameter, before down-stream system service processing, by the mark from parameter In parse, and set into the thread context of oneself, realize create shadow data when required relevant interface calling. Shadow mapping relations include the corresponding different mappings type of different creation datas, and creation data is specifically reflected according to affiliated type The mode of penetrating is mapped as the relation between corresponding shadow data and corresponding shadow data, has shadow data and creation data Same semantic, the shadow relationship between shadow data also has identical semanteme with the incidence relation of creation data.
Preferably, Fig. 3 is refer to, it is further comprising the steps of before step S102:Step S106 creates shadow resource.
Preferably, the shadow resource, including at least one of following:Shadow trade company, shadow user, shadow budget subsidy account Family.
Preferably, product is paid in the shadow trade company signing face to face, and opens open platform interface authority.
Shadow resource is the finger pressure surveyor's chain information such as the shadow trade company of establishment, shadow user, shadow platform subsidy account on the road (such as Fig. 8 includes the information such as merchant information, user information, platform subsidy account information in actual marketing activity), is mainly used to retouch Business participant's entity is stated, with account on line without direct relation, but equally exists name, identification card number, real-name authentication information etc. The essential attribute of business division.Xian Shang trade companies, user etc. need individual that Alipay website is gone to register, and pass through safety, close rule etc. Business verifies, and the information such as shadow trade company, user can be created directly by relevant interface, from quantity, safety, closes rule Limitation, flow are lighter.The main distinction of shadow trade company and shadow user is that shadow trade company will be signed Alipay face to face It pays, the products & services such as bill management, shadow user is mainly used for initiating receiving and simulating for discount coupon in shadow link Businessman initiates to pay request face to face.
Specifically, it is necessary to first prepare following shadow resource in advance before the step of acquisition shadow environment, and by number According to being initialised in shadow resource table;Fig. 2 is refer to, shadow resource table includes herein below, resource identification, resource type (example Such as, merchant type, user type), resource details (for example, trade company ID, User ID).
Shadow environment creates shadow trade company by interface, and the signing of shadow trade company pays product and opens open platform face to face to be connect Mouth permission, the open platform interface opened include paying interface face to face and pay the neck certificate interface in interface face to face, markets for shadow Payment and neck certificate in activity;The shadow user that shadow environment is created by interface, for verifying receiving and checking and writing off for discount coupon; Account is subsidized in the shadow budget that shadow environment is created by interface, and platform subsidy class shadow marketing activity is created that the discount coupon come This account is associated, and shadow trade company and shadow user remaining sum are subsidized, it just can be during transaction payment, from shadow budget Subsidy account provides funds to complete checking and writing off (such as Fig. 8) for certificate.
Preferably, Fig. 3 is refer to, it is further comprising the steps of before step S102:Step S107 creates shadow mapping and closes System.
Preferably, the shadow mapping relations, including following content:All kinds of creation datas are mapped as the mapping of shadow data The mapping method of type and corresponding each map type.
The shadow mapping relations can be other forms of expression in shadow mapping table or database, By the mapping table of creation data major key ID (number) and shadow data major key ID, by the relation between all creation datas The relation being mapped as between all shadow data, i.e., described shadow relationship.Fig. 2 is refer to, shadow mapping table includes following Content, all kinds of creation datas are mapped as the map type (for example, shop type) of shadow data, correspond to reflecting for each map type Shooting method (for example, the mapped specific mode of store information to shadow store information), creation data (for example, store information), shadow Subdata (shadow store information).
Preferably, it refer to Fig. 5, according to the marketing activity in step 102, obtain relevant with the marketing activity Know that the incidence relation between creation data and known creation data includes step S102-1 and step S102-2.
The step S102-1 obtains marketing activity information in the marketing activity, user information, merchant information, shop Spread information, merchandise news, certificate Template Information;
The step S102-2 obtains the user information in the marketing activity, merchant information, store information, commodity and believes Incidence relation between breath, certificate Template Information.
Above-mentioned steps are for obtaining and the marketing activity is relevant known between creation data and known creation data Incidence relation.
Specifically, according to marketing activity ID, the known creation data of marketing activity and the pass of known creation data are obtained Connection relation, for the foundation of incidence relation between mapping afterwards and shadow data and shadow data.Known creation data bag It includes, marketing activity information, user information in marketing activity, merchant information, store information, merchandise news, certificate Template Information, Know the incidence relation between creation data refer to the user information in marketing activity, merchant information, store information, merchandise news, Incidence relation between certificate Template Information.
Preferably, it refer to Fig. 5, the incidence relation of creation data and creation data be each mapped to shadow in step 102 Shadow relationship between subdata and shadow data, the step of so as to obtain shadow environment, including step S102-3 to step S102-5。
The step S102-3 judges whether reflected in the shadow mapping relations comprising the corresponding shadow of the merchant information Penetrate relation;
The step S102-4, if so, the merchant information is mapped as shadow business by the shadow mapping relations Family information;
The step S102-5, if it is not, then obtain the shadow merchant information from the shadow resource, and by the business Family information and the incidence relation of the shadow merchant information are added in the shadow mapping relations.
Above-mentioned steps are used to the merchant information in marketing activity being mapped as shadow merchant information, and by merchant information and shadow The incidence relation of sub- merchant information is added in shadow mapping relations.
Shadow merchant information is mapped according to merchant information and generated, including information such as shadow trade company ID, shadow trade company remaining sums.
Specifically, the essence of above-mentioned several steps is, first according to Xian Shang trade companies ID, go in shadow mapping relations to look for corresponding be somebody's turn to do The mapping relations of merchant type, if it is present merchant information is mapped by specific mapping mode in shadow mapping relations For shadow merchant information.If it does not exist, then a resource type is looked for from shadow resource table (such as Fig. 2) for similar trade company The mapping relations of merchant information and the shadow merchant information are persisted to shadow and reflected by shadow resource as shadow merchant information It penetrates in relation.
Preferably, refer to Fig. 5, the shadow them being each mapped in step 102 between shadow data and shadow data Subrelation so as to obtain shadow environment, further includes step S102-6 to step S102-8.
Step S102-6 judges whether closed in the shadow mapping relations comprising the corresponding shadow mapping of the user information System;
Step S102-7 believes if so, the user information is mapped as shadow user by the shadow mapping relations Breath;
Step S102-8 if it is not, then obtaining the shadow user information from the shadow resource, and the user is believed Breath and the incidence relation of the shadow user information are added in the shadow mapping relations (such as Fig. 5).
Above-mentioned steps are used to the user information in marketing activity being mapped as shadow user information, and by user information and shadow The incidence relation of child user information is added in shadow mapping relations.
Shadow user information is mapped according to user information and generated, including information such as shadow user ID, shadow user remaining sums.
Specifically, the essence of above-mentioned several steps is, first according to User ID on line, go in shadow mapping relations to look for corresponding be somebody's turn to do The mapping relations of user type, if it is present user information is mapped by specific mapping mode in shadow mapping relations For shadow user information.If there is no a resource type is then looked for be similar user from shadow resource table (such as Fig. 2) The mapping relations of user information and the shadow user information are persisted to shadow and reflected by shadow resource as shadow user information It penetrates in relation.
Preferably, refer to Fig. 5, the shadow them being each mapped in step 102 between shadow data and shadow data Subrelation further includes step S102-9 and step S102-10 so as to obtain shadow environment.
Step S102-9 by the store information, merchandise news, certificate Template Information, is reflected by the shadow mapping relations It penetrates as shadow store information, shadow merchandise news, shadow certificate Template Information;
Step S102-10, will be between the user information, merchant information, store information, merchandise news, certificate Template Information Incidence relation, by the shadow mapping relations be mapped as the shadow user information, shadow merchant information, shadow shop believe Shadow relationship (such as Fig. 5) between breath, shadow merchandise news, shadow certificate Template Information.
Above-mentioned steps be used for by marketing activity store information, merchandise news, certificate Template Information be mapped as shadow shop Information, shadow merchandise news, shadow certificate Template Information, and obtain shadow user information, shadow merchant information, shadow shop letter Shadow relationship between breath, shadow merchandise news, shadow certificate Template Information.
Shadow store information, including shadow shop ID, shadow shop title, shadow trade company ID, shadow shops classification, shadow The information such as store address.
Shadow merchandise news includes shadow commodity ID, shadow trade name, shadow commodity ID, shadow commodity classification, shadow The information such as stock.
Shadow certificate Template Information include shadow certificate template ID, shadow marketing activity ID, shadow trade company ID, shadow commodity ID, Shadow is applicable in shops ID set, shadow subsidy account ID, the preferential amount of money of shadow, shadow stockpile number, shadow displaying configuration information Etc. information.
Specifically, shadow shop, shadow commodity press survey mode that relevant interface is called to create by simulating full link, and by line Upper shop and the mapping relations of commodity and shadow commodity on shadow shop, line are added in shadow mapping relations.Shadow certificate template Simulating full link pressure survey mode according to shadow trade company, shadow shop, shadow commodity calls relevant interface to create, and by certificate template with The relation of shadow certificate template is added in shadow mapping relations.Then by marketing activity store information, merchandise news, certificate mould Plate information is mapped as shadow store information, shadow merchandise news, shadow certificate by specific mapping mode in shadow mapping relations Template Information;By the incidence relation between user information, merchant information, store information, merchandise news, certificate Template Information, pass through Specific mapping mode is mapped as shadow user information, shadow merchant information, shadow store information, shadow in shadow mapping relations Shadow relationship between merchandise news, shadow certificate Template Information.
The specific implementation of realization step S102 and the order of correlation step shown in above-mentioned Fig. 5 are only one kind Possibility actually it is of course possible to flexibly handle, is finally reached the effect for establishing shadow environment.
Step S103 in the shadow environment, is created according to the shadow relationship between the shadow data and shadow data Build and run shadow marketing activity.
This step is used to creating and running shadow marketing activity.
Shadow marketing activity is the shadow campaign created in shadow environment, corresponding with the marketing activity in production environment.
Specifically, in shadow environment, according to the shadow being synchronized between the shadow data of shadow environment and shadow data Relation simulates the establishment that full link pressure survey mode realizes shadow marketing activity by related calling interface, and shadow marketing activity includes Shadow transaction and for shadow user provide shadow it is preferential, under artificial line barcode scanning payment and line under barcode scanning neck certificate mistake Journey, run shadow marketing activity, so as to carry out verification marketing activity, in advance examine marketing activity it is possible that the problem of.
Preferably, it refer to Fig. 3, after the step after S105, further included before the step S103:Step S108, Create shadow campaign allocation list;The parameter that the establishment and operation shadow marketing activity are provided according to the allocation list carries out.
Preferably, the shadow campaign allocation list records the following configuration data of the shadow marketing activity:With the shadow The relevant operation activity account of sub- marketing activity, the shadow marketing activity account, the shadow marketing activity state, the shadow Sub- marketing activity context pressure mark note.
Shadow campaign synchronization allocation list is for creating and running shadow marketing activity, with creating and running shadow marketing Active synchronization carries out, and includes herein below, operation activity ID, production & marketing activity ID, shadow marketing activity ID, shadow marketing shape State, shadow marketing activity context data (such as Fig. 2).
Preferably, Fig. 6 is refer to, step S103 includes step S103-1 and step S103-2.
Step S103-1, using the shadow user, shadow trade company, shadow shop as active agent, with the shadow commodity, Shadow service is trading object, according to the marketing activity information, establishes shadow transaction;
Step S103-2, to the shadow user that the shadow transaction is related to, according to the marketing activity information In active rule, to the shadow user provide shadow it is preferential.
Above-mentioned steps are used to create shadow transaction, and root according to the shadow relationship between shadow data and shadow data It is preferential to shadow user offer shadow according to the active rule in marketing activity information.
Shadow transaction refers to using the shadow user, shadow trade company, shadow shop as active agent, with the shadow Sub- commodity, shadow service are trading object, and according to the marketing activity information, the transaction of foundation is (for example, weekend finds pleasure in three days Shadow transaction).
Shadow is preferential, refers in shadow marketing activity to be that the shadow user provides preferential.
Specifically, the information such as shadow certificate template, shadow shops in marketing activity information, with the shadow user, Shadow trade company, shadow shop are active agent, using the shadow commodity, shadow service as trading object, simulate full link pressure and survey Mode is by calling relevant interface to create shadow transaction and coming into force.According to the active rule in marketing activity information, to institute State shadow user provide shadow it is preferential, shadow is preferential directly to be provided when shadow transaction carries out, can also be in shadow There is provided in a manner of discount coupon after transaction, and provide in some transaction of next time it is preferential, wherein being carried in a manner of discount coupon For being usually more important preferential mode.
It should be noted that in a specific discount coupon example, following information, certificate ID, certificate title, certificate template are included The letters such as ID, User ID, trade company ID, commodity ID, applicable shop ID set, certificate type, the preferential amount of money, entry-into-force time, out-of-service time Cease (such as Fig. 8)
In business low peak period, by the rule configuration information of marketing activity, each rule are constructed according to boundary values test mode Checking case then carries out the functional verification of shadow marketing activity in shadow environment.Boundary value analysis is also a kind of Black-box Testing Method, is a kind of supplement of parity price alanysis method, learns that substantial amounts of mistake is to be happened at by long-term test job experience On the border of input or output.Therefore for various border condition design test cases, more mistakes can be found
Preferably, the shadow transaction is to pay transaction face to face, and payment interface is paid face to face by related shadow shop, Transaction program code is injected to platform, output carries out the shadow user of the shadow transaction, and account is subsidized from the budget The shadow user is subsidized, realizes shadow payment;The injection pressure mark note in the context of the transaction program code, by shadow Subactivity is mutually distinguishable with other arm's length dealing activities.
Specifically, pay barcode scanning payment process under transaction simulation line face to face, a shadow user is selected as initiator's main body, Request is received to construct shadow discount coupon according to shadow commodity, shadow store information, by calling related shadow shop face to face Interface is paid, the transaction program code of pressure mark note is injected with to platform, realizes shadow payment.Press the transaction program code of mark note Shadow campaign is shown to be, related shadow shop corresponds to the solid shop/brick and mortar store in marketing activity.
It should be noted that emulation verification method provided in this embodiment, the special standby marketing suitable for the transaction of O2O patterns is lived Dynamic verification, so-called O2O patterns, i.e. Online To Offline refer to be combined the commercial chance under line with internet, allow mutually Networking is taken the consumer on line to as the platform of off-line transaction in the shop of reality.There are mainly two types of patterns, make user On-line payment is first carried out, then gets the commodity of solid shop/brick and mortar store or enjoys service;Or user is made to arrive first solid shop/brick and mortar store and is searched specifically Commodity or service, then carry out on-line payment.In the present embodiment, shadow user can be made first to carry out simulation barcode scanning payment, then led It takes the commodity in shadow shop or enjoys service;Or shadow user is made to arrive first shadow shop and searches specific commodity or service, then Carry out barcode scanning payment.The barcode scanning payment, as previously mentioned, interface is paid face to face indeed through the related shadow shop of calling, The transaction program code (wherein comprising the 2 D code information) of pressure mark note is injected with to platform, realizes shadow payment.
Preferably, the shadow is preferential to get shadow discount coupon face to face, and the shadow is subsidized from budget subsidy account Son is preferential;By the neck certificate interface for paying interface face to face in the shadow shop being traded, output shadow coupon code provides To the shadow user for carrying out shadow transaction, getting for shadow discount coupon is realized;It is noted in the context of the shadow coupon code Enter mark is pressed to remember.
In marketing activity, preferential way of realization, can be red packet, coupons, discount coupon or completely subtract, discount, Buy the activity of giving, head Dan Li subtract, the new visitor of shops stands and subtracts, wherein discount coupon is a kind of more commonly used realization method;Corresponding to reality The discount coupon of border marketing activity under shadow environment, can also generate shadow discount coupon, to simulate the realization of discount coupon Journey.,.
Specifically, face to face lead certificate artificial line under barcode scanning neck certificate process, according to use before shadow user, shadow trade company account The information such as family, shadow shop, construction pay interface requests parameter face to face, by the neck for paying interface face to face for calling related shadow shop Certificate interface exports and realizes getting for shadow discount coupon to shadow user.Injection pressure mark in the context of shadow coupon code Note, is shown to be shadow campaign.
It should be noted that getting for shadow discount coupon is also O2O patterns, even if shadow user first carries out simulation barcode scanning branch It pays, then simulates barcode scanning and get discount coupon, then get the commodity in shadow shop or enjoy service;Or shadow user is made to arrive first shadow Specific commodity or service are searched in sub- shop, then carry out barcode scanning payment, simulate barcode scanning afterwards and get discount coupon.Shadow discount coupon is also Shadow user can be just issued to before shadow user simulates barcode scanning payment.
Preferably, the preferential realization method of the shadow discount coupon is:To obtain the shadow of the shadow discount coupon Child user is transaction agent, and by that can use the interface of paying face to face in shadow shop of shadow discount coupon, to inject the shadow preferential Voucher code realizes the use of shadow discount coupon;In the context of the shadow coupon code injection pressure mark note, so as to just Normal transaction distinguishes.
Specifically, the process of discount coupon is used under the preferential realization method artificial line of shadow discount coupon, it can be with by calling Interface is paid face to face using the shadow shop of shadow discount coupon, is injected the shadow coupon code and is realized making for shadow discount coupon With injection pressure mark note, is shown to be shadow campaign in the context of shadow coupon code.The use of shadow discount coupon can limit The fixed specific time, (for example, the week or within several days effectively), specific hotel owner (for example, McDonald) is minimum to disappear Take amount of money (for example, full 50 yuan available) etc..
Preferably, the shadow budget subsidy account provides virtual fund to complete checking and writing off for marketing activity discount coupon. (such as Fig. 8) described budget subsidy account subsidizes the shadow user, realizes shadow payment;Described in the budget subsidy account subsidy Shadow is preferential, realizes getting for shadow discount coupon.Specific implementation, exactly send shadow it is preferential when, it is pre- in the shadow It calculates in subsidy account and reduces corresponding fund or other preferential resources.
Step S104, to the shadow marketing activity operational process generate shadow result data checked and verified, Determine whether the marketing activity being capable of normal operation with this.
This step is used to that the shadow result data of shadow marketing activity process to be checked and verified.
Specifically, shadow discount coupon is received and after checking and writing off, it is necessary to whole process data are checked and verified, mainly from Functional verification and two aspect of fund flow verification are set about, so that it is guaranteed that marketing activity being capable of normal operation.
Preferably, Fig. 7 is refer to, step S104 includes step S104-1 and step S104-2.
Step S104-1 judges the Transaction Information in marketing activity, if meet the active rule of the marketing activity, with Ensure that movable function is normal;
Step S104-2 judges to check the checked result information of platform in marketing activity, if meet the marketing activity Active rule, with ensure working capital safety,.
Whether whether normal, working capital is safe for verifying marketing activity function for above-mentioned steps.
Check platform, refer to each service line (for example, food and drink, disappear soon, general industry, big customer, quotient graph) offer business patrols The ability of verification is collected, including being damaged to money, the ability that the quality of data and other business datums are checked and checked.Production environment Each system-critical data has disposed verification script, and all business datums for occurring on line are carried out in real time/data quasi real time Verification.
Specifically, by Transaction Inquiries interface polls transaction details, order total amount in Transaction Information, payment are judged When the information such as the remaining sum, the discount coupon that use whether meet marketing activity dependency rule, it is ensured that movable function is normal;It is flat according to verification Platform checked result is (for example, hair certificate flowing water, certificate check and write off the upstream and downstream data such as flowing water, commodity stocks, trading order form, account balance Uniformity is checked), judge that transaction funds stream, discount coupon assets are checked and write off, platform subsidy budget funds associated therewith reduces whether meet battalion Sell active rule, it is ensured that working capital safety.
The marketing activity emulation verification method that the application provides passes through the data of synchronous marketing activity to shadow environment In, and shadow marketing activity, operation shadow battalion are created according to the incidence relation between the data and different data of marketing activity Pin activity, and the data generated to shadow marketing activity process are checked and verified.Functional verification, generation are carried out in shadow link Code, environment, link and production environment are completely the same, avoid verification and the otherness on line under line, creation data is replicated automatically To shadow environment, artificial creation data is avoided to occur the risk of larger discrepancy with actual conditions, improve simulated effect.
In the method, during simulating, verifying, the stock using actuals will not be generated;In preferred embodiment In, due to creating shadow budget subsidy account, without Marking Budget is employed, it is not related to actual inventory change and cash flow It is dynamic, effectively reduce verification cost.
After the preferred embodiment that the application is used to provide, all verification process, can be with especially including O2O verification process It is realized by the modes such as injecting codes on line analog form, avoiding related data needs cost caused by the acquisition of scene to increase; Also, these data can directly by check platform do the automation of data check, avoid artificial nucleus couple generation into This and omit the problem of, due to the use of be shadow data, trade company's bill of shadow environment will not influence trade company's production environment The reconciliation of bill makes verification result more accurate.
Preferably, the marketing activity is same city activity;The shadow trade company, shadow user are all obtained from same city data It takes.On the basis of above-mentioned marketing activity emulation verification method, it can also be led by obtaining under the related data with city, artificial line Certificate, so as to further integrity authentication method, solves in advance with checking and writing off the combination operated on realization activity verification line and under line The problem of being run into actual marketing activity.
As shown in figure 9, the application second embodiment also provides a kind of marketing activity simulating, verifying device, including with lower die Block:
First acquisition module 901, for obtaining the marketing activity for needing to carry out simulating, verifying;
First mapping block 902, for according to the marketing activity, obtaining and the relevant known production of the marketing activity Incidence relation between data and known creation data, and according to predetermined shadow mapping relations, they are reflected respectively The shadow relationship between shadow data and shadow data is penetrated, so as to obtain shadow environment;
First creation module 903, in the shadow environment, according between the shadow data and shadow data Shadow relationship creates and operation shadow marketing activity;
First verification module 904, the shadow result data for being generated to the shadow marketing activity operational process carry out Verification and verification, with this determine the marketing activity whether can normal operation, realize marketing activity is likely to occur it is various The more comprehensively analysis and anticipation of situation.
The application 3rd embodiment also provides a kind of electronic equipment for marketing activity simulating, verifying, the electronic equipment Including:
Display;
Processor;
Memory, for storing the program for marketing activity simulating, verifying, described program is read by the processor During execution, following operation is performed:Obtain the marketing activity for needing to carry out simulating, verifying;
According to the marketing activity, obtain and the relevant known creation data of the marketing activity and known creation data Between incidence relation, and according to predetermined shadow mapping relations, they are each mapped to shadow data and shadow number Shadow relationship between, so as to obtain shadow environment;
In the shadow environment, created and run according to the shadow relationship between the shadow data and shadow data Shadow marketing activity;
The shadow result data generated to the shadow marketing activity operational process is checked and verified, institute is determined with this Whether state marketing activity being capable of normal operation.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
1st, computer-readable medium can be by any side including permanent and non-permanent, removable and non-removable media Method or technology realize that information stores.Information can be computer-readable instruction, data structure, the module of program or other numbers According to.The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc are read-only Memory (CD-ROM), digital versatile disc (DVD) or other optical storages, magnetic tape cassette, tape magnetic rigid disk storage or Other magnetic storage apparatus or any other non-transmission medium, the information that can be accessed by a computing device available for storage.According to Herein defines, and computer-readable medium does not include non-temporary computer readable media (transitory media), such as modulates Data-signal and carrier wave.
2nd, it will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program production Product.Therefore, the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware can be used in the application Form.It can use moreover, the application can be used in one or more computers for wherein including computer usable program code The computer program product that storage medium is implemented on (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Form.

Claims (10)

1. a kind of marketing activity emulation verification method, which is characterized in that the described method includes:
Obtain the marketing activity for needing to carry out simulating, verifying;
According to the marketing activity, obtain and the marketing activity is relevant known between creation data and known creation data Incidence relation, and according to predetermined shadow mapping relations, by they be each mapped to shadow data and shadow data it Between shadow relationship, so as to obtain shadow environment;
In the shadow environment, shadow is created and run according to the shadow relationship between the shadow data and shadow data Marketing activity;
The shadow result data generated to the shadow marketing activity operational process is checked and verified, the battalion is determined with this Whether pin activity being capable of normal operation.
2. marketing activity emulation verification method according to claim 1, which is characterized in that described in the acquisition shadow ring Before the step of border, further include:
Create shadow resource.
3. marketing activity emulation verification method according to claim 2, which is characterized in that the shadow resource, including such as It is at least one of lower:
Shadow trade company, shadow user, shadow budget subsidy account.
4. marketing activity emulation verification method according to claim 3, which is characterized in that the shadow trade company signing is face to face Product is paid, and opens open platform interface authority.
5. marketing activity emulation verification method according to claim 4, which is characterized in that the step for obtaining shadow environment Before rapid, further include:
Create shadow mapping relations.
6. marketing activity emulation verification method according to claim 5, which is characterized in that described to be lived according to the marketing It is dynamic, acquisition and the relevant known incidence relation between creation data and known creation data of the marketing activity, and according to They are each mapped to the shadow relationship between shadow data and shadow data by pre-determined shadow mapping relations, so as to In the step of obtaining shadow environment, the acquisition and the relevant known creation data of the marketing activity and known creation data Between incidence relation, specifically include:
Obtain marketing activity information in the marketing activity, user information, merchant information, store information, merchandise news, certificate mould Plate information;
It obtains between user information in the marketing activity, merchant information, store information, merchandise news, certificate Template Information Incidence relation.
7. marketing activity emulation verification method according to claim 6, which is characterized in that described to be lived according to the marketing It is dynamic, acquisition and the relevant known incidence relation between creation data and known creation data of the marketing activity, and according to Pre-determined shadow mapping relations, the step of they are each mapped to the shadow relationship between shadow data and shadow data In, the shadow relationship that they are each mapped between shadow data and shadow data includes:
By the store information, merchandise news, certificate Template Information, it is mapped as shadow shop by the shadow mapping relations and believes Breath, shadow merchandise news, shadow certificate Template Information;
By the incidence relation between the user information, merchant information, store information, merchandise news, certificate Template Information, pass through institute State shadow mapping relations be mapped as the shadow user information, shadow merchant information, shadow store information, shadow merchandise news, Shadow relationship between shadow certificate Template Information.
8. marketing activity emulation verification method according to claim 7, which is characterized in that described in the shadow environment In, it is created according to the shadow relationship between the shadow data and shadow data and runs the shadow marketing activity, including:
Using the shadow user, shadow trade company, shadow shop as active agent, using the shadow commodity, shadow service as transaction Object according to the marketing activity information, establishes shadow transaction;
To the shadow user that the shadow transaction is related to, according to the active rule in the marketing activity information, to It is preferential that the shadow user provides shadow.
9. marketing activity emulation verification method according to claim 8, which is characterized in that the shadow transaction is to work as Transaction is paid in face, and payment interface is paid face to face by related shadow shop, is injected transaction program code to platform, is exported described in carrying out The shadow user of shadow transaction subsidizes the shadow user from shadow budget subsidy account, realizes shadow payment; Injection pressure mark note in the context of the transaction program code.
10. marketing activity emulation verification method according to claim 8, which is characterized in that the shadow is preferential for face to face Shadow discount coupon is got, it is preferential to subsidize the shadow from shadow budget subsidy account;By in the shadow store being traded The neck certificate interface for paying interface face to face of paving, output shadow coupon code are supplied to the shadow user for carrying out shadow transaction, realize Shadow discount coupon is got;Injection pressure mark note in the context of the shadow coupon code.
CN201711220914.9A 2017-11-28 2017-11-28 Marketing activity simulation verification method and device Active CN108090784B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711220914.9A CN108090784B (en) 2017-11-28 2017-11-28 Marketing activity simulation verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711220914.9A CN108090784B (en) 2017-11-28 2017-11-28 Marketing activity simulation verification method and device

Publications (2)

Publication Number Publication Date
CN108090784A true CN108090784A (en) 2018-05-29
CN108090784B CN108090784B (en) 2021-04-30

Family

ID=62173065

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711220914.9A Active CN108090784B (en) 2017-11-28 2017-11-28 Marketing activity simulation verification method and device

Country Status (1)

Country Link
CN (1) CN108090784B (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112199218A (en) * 2020-10-26 2021-01-08 北京百家科技集团有限公司 Pressure measurement method and device, electronic equipment and storage medium
CN113344624A (en) * 2021-06-01 2021-09-03 支付宝(杭州)信息技术有限公司 Virtual verification method, device, equipment and readable medium for electronic ticket
CN114143236A (en) * 2020-08-13 2022-03-04 网联清算有限公司 Business system testing method and device, electronic equipment and readable storage medium
CN116402550A (en) * 2023-06-07 2023-07-07 八维通科技有限公司 Reliability control method and system for riding calculation preference and computer program medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102117379A (en) * 2010-01-04 2011-07-06 黑龙江电力职工大学 Experiential teaching simulation training method for power market commercial operation
CN103020840A (en) * 2011-10-04 2013-04-03 微软公司 Incentive optimization for social media marketing campaigns
CN103119617A (en) * 2010-08-02 2013-05-22 阿玛得斯两合公司 Automatic traffic generation for a faring system
WO2014124310A1 (en) * 2013-02-07 2014-08-14 MaxPoint Interactive, Inc. A system for improving shape-based targeting by using interest level data
CN104410542A (en) * 2014-11-18 2015-03-11 小米科技有限责任公司 Method and device for simulation test
CN107133162A (en) * 2016-02-29 2017-09-05 阿里巴巴集团控股有限公司 A kind of method of testing and device

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102117379A (en) * 2010-01-04 2011-07-06 黑龙江电力职工大学 Experiential teaching simulation training method for power market commercial operation
CN103119617A (en) * 2010-08-02 2013-05-22 阿玛得斯两合公司 Automatic traffic generation for a faring system
CN103020840A (en) * 2011-10-04 2013-04-03 微软公司 Incentive optimization for social media marketing campaigns
WO2014124310A1 (en) * 2013-02-07 2014-08-14 MaxPoint Interactive, Inc. A system for improving shape-based targeting by using interest level data
CN104410542A (en) * 2014-11-18 2015-03-11 小米科技有限责任公司 Method and device for simulation test
CN107133162A (en) * 2016-02-29 2017-09-05 阿里巴巴集团控股有限公司 A kind of method of testing and device

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114143236A (en) * 2020-08-13 2022-03-04 网联清算有限公司 Business system testing method and device, electronic equipment and readable storage medium
CN112199218A (en) * 2020-10-26 2021-01-08 北京百家科技集团有限公司 Pressure measurement method and device, electronic equipment and storage medium
CN113344624A (en) * 2021-06-01 2021-09-03 支付宝(杭州)信息技术有限公司 Virtual verification method, device, equipment and readable medium for electronic ticket
CN116402550A (en) * 2023-06-07 2023-07-07 八维通科技有限公司 Reliability control method and system for riding calculation preference and computer program medium
CN116402550B (en) * 2023-06-07 2023-10-27 八维通科技有限公司 Reliability control method and system for riding calculation preference and computer program medium

Also Published As

Publication number Publication date
CN108090784B (en) 2021-04-30

Similar Documents

Publication Publication Date Title
TWI768163B (en) Method and device for generating smart contracts
CN108536521B (en) Simulation platform-based offline environment checking method and device
CN108090784A (en) Marketing activity emulation verification method and device
CN104217362B (en) The method of score-clearing system and off-line transaction based on internet communication, online i.e. time-division account
CN108427638A (en) Region network of relation marketing activity test method and device
KR20190006506A (en) Digital Asset Modeling
CN110162470A (en) A kind of test method and device of block chain
US11443307B2 (en) Cross-border resource transfer authenticity verification method, device and electronic equipment
CN110210968A (en) Intelligent Service transaction system
CN109559233A (en) A kind of real estate supply chain accounts receivable transfer system based on block chain
CN109432781A (en) A kind of current game stage property transaction system and method based on block chain intelligence contract
CN111899072A (en) Block chain based product sale method and system
CN110232601A (en) Card certificate management method, device, equipment and storage medium
CN110163614A (en) Accounts payable order method of calibration, device, equipment and storage medium
CN113344624A (en) Virtual verification method, device, equipment and readable medium for electronic ticket
CN108898492A (en) A kind of crowdsourcing task implementation method and apparatus and system based on alliance's chain
Madl et al. Formal verification of smart contracts using interface automata
CN113641759A (en) Data privacy protection method in supply chain finance based on block chain technology
CN111221855A (en) Data processing method and device
CN109636517B (en) Matching method and device for bartering resources
CN108389104B (en) Simulation verification method and device for network activities
CN104616168B (en) A kind of method and device of marketing tool legitimacy verifies
KR102429000B1 (en) Method of providing service for issuing mobile gift certification, server and system thereof
CN106600254A (en) User's multi-account management method and device
KR102382379B1 (en) System and method for providing ai bigdata estimation based on clutch engine

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant