CN108090784A - Marketing activity emulation verification method and device - Google Patents
Marketing activity emulation verification method and device Download PDFInfo
- Publication number
- CN108090784A CN108090784A CN201711220914.9A CN201711220914A CN108090784A CN 108090784 A CN108090784 A CN 108090784A CN 201711220914 A CN201711220914 A CN 201711220914A CN 108090784 A CN108090784 A CN 108090784A
- Authority
- CN
- China
- Prior art keywords
- shadow
- marketing activity
- data
- information
- activity
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/02—Marketing; Price estimation or determination; Fundraising
- G06Q30/0201—Market modelling; Market analysis; Collecting market data
Landscapes
- Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Engineering & Computer Science (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Finance (AREA)
- Entrepreneurship & Innovation (AREA)
- Game Theory and Decision Science (AREA)
- Data Mining & Analysis (AREA)
- Economics (AREA)
- Marketing (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
This application discloses a kind of marketing activity emulation verification method, including:Obtain the marketing activity for needing to carry out simulating, verifying;According to the marketing activity, acquisition and the relevant known incidence relation between creation data and known creation data of the marketing activity, and according to predetermined shadow mapping relations, they are each mapped to the shadow relationship between shadow data and shadow data, so as to obtain shadow environment;In the shadow environment, shadow marketing activity is created and run according to the shadow relationship between the shadow data and shadow data;The shadow result data generated to the shadow marketing activity operational process is checked and verified, determines whether the marketing activity being capable of normal operation with this.The application use is verified with the one-to-one virtual data of production environment, is avoided the risk of artificial creation data verification, is improved simulated effect, is reduced cost, and using simulation O2O verification methods, verification result is made to be more convenient accurately.
Description
Technical field
This application involves online artificial fields, and in particular to a kind of marketing activity emulation verification method.The application relates to simultaneously
And a kind of marketing activity simulating, verifying device.
Background technology
In recent years, net purchase has become the consumption pattern that people increasingly favor;In each net purchase platform, often there is businessman to lead to
It crosses in the short time and consumer is attracted to marketing activity of making concessions on the line of specific user group, realize better product promotion and pin
It sells.The general process of marketing activity, which is that operation personnel starts to start a period of time before marketing activity starts, promotes trade and investment, trade company's report
Name success can just generate actual marketing activity.
In order to ensure marketing activity can be carried out normally in order, avoid the occurrence of rule conflict and resource contention and ensure
Related resource can be supported fully, before marketing activity is carried out, generally require and carry out validation test in advance to marketing activity, this
Kind validation test is known as simulating, verifying.
Presently disclosed Above-the-line emulation verification method has, traditional automated function test, under tester is online
Environment constructs automatic test cases by boundary method principle, and by data base querying or service call mode verification at
Manage result;Creation data is synchronized under line and is verified, by recording and playback technology, the operation activity number that production environment is created
Test verification is carried out according to environment under line is played back to, avoids having an impact creation data;Marketing activity is by configuring white name on line
Single, the user allowed in white list can see preferential commodity in advance, it is movable it is formal start before, received, check and write off it is a series of
It operates to carry out movable verification.
The Above-the-line verification method that the above-mentioned prior art provides there are it is apparent the defects of.
The shortcomings that Above-the-line verification method that the prior art provides, is:Traditional automated function test, covering
Data surface is limited, it is virtually impossible to strictly all rules combine scenes are completely covered by use-case, and the more inputs of the scene covered into
This is higher.Creation data is synchronized under line and is verified, production environment may not with environment code, environment, system link under line
Unanimously, test result is caused with inconsistent on line, in addition, the data verification of environment is also inaccurate under line.Marketing activity is led on line
Configuration white list is crossed, the information of discount coupon is exposed in advance before movable formal startup, but the maintenance of white list once malfunctions, meeting
Marketing activity is caused to be exposed in advance, there are certain business risks;The stock of discount coupon is used in advance, and activity is formal to be started
Afterwards, physical holding of stock may be inconsistent with the stockpile number of publicity, and needs to carry out core using the real accounts fund of oneself
Pin, the cost of manual verification are higher;The scene and limited amount being able to verify that can not carry out the rule of neck certificate/check and write off comprehensive
Covering, cause actual activity start after or may go wrong in not authenticated scene;In business verification process
In, due to the use of the reconciliation process for being the real data of production environment, influencing trade company in actual activity.Especially at O2O
Under scape, many verification process must have trade company scene to be coordinated, and seriously affect the progress of simulating, verifying.
The content of the invention
The present invention provides a kind of marketing activity emulation verification method, to solve existing for existing Above-the-line verification method
There is business risk, verification is of high cost, cannot carry out the problem of on-line off-line operation combines.The present invention additionally provides a kind of marketing to live
Dynamic simulating, verifying device.
The application provides a kind of marketing activity emulation verification method, including:
Obtain the marketing activity for needing to carry out simulating, verifying;
According to the marketing activity, obtain and the relevant known creation data of the marketing activity and known creation data
Between incidence relation, and according to predetermined shadow mapping relations, they are each mapped to shadow data and shadow number
Shadow relationship between, so as to obtain shadow environment;
In the shadow environment, created and run according to the shadow relationship between the shadow data and shadow data
Shadow marketing activity;
The shadow result data generated to the shadow marketing activity operational process is checked and verified, institute is determined with this
Whether state marketing activity being capable of normal operation.
Optionally, it is described before the step of acquisition shadow environment, it further includes:
Create shadow resource.
Optionally, the shadow resource, including at least one of following:
Shadow trade company, shadow user, shadow budget subsidy account.
Optionally, product is paid in the shadow trade company signing face to face, and opens open platform interface authority.
Optionally, before the step of acquisition shadow environment, further include:
Create shadow mapping relations.
Optionally, the shadow mapping relations, including following content:
All kinds of creation datas are mapped as the map type of shadow data and the mapping method of corresponding each map type.
Optionally, it is described acquisition need carry out simulating, verifying the marketing activity step in or before this step,
It further includes:
According to the operation activity of the marketing activity foundation, the related data of the marketing activity and the correlation are determined
Incidence relation between data.
Optionally, the operation activity according to the marketing activity foundation determines the related data of the marketing activity
And the incidence relation between the related data includes:
According to the operation activity of the marketing activity foundation, the marketing activity information of the marketing activity is determined;
According to the operation activity of the marketing activity foundation, the user information of the marketing activity, merchant information, shop are determined
Spread information, merchandise news, certificate Template Information and the user information, merchant information, store information, merchandise news, certificate template
Incidence relation between information.
Optionally, the operation activity according to the marketing activity foundation determines the related data of the marketing activity
It is described in the shadow environment after step, according between the shadow data and shadow data shadow relationship create with
And it is further included before operation shadow marketing activity step:
Create shadow campaign allocation list;The parameter that the establishment and operation shadow marketing activity are provided according to the allocation list
It carries out.
Optionally, the shadow campaign allocation list records the following configuration data of the shadow marketing activity:
Operation activity account relevant with the shadow marketing activity, the shadow marketing activity account, shadow battalion
Sell active state, shadow marketing activity context pressure mark note.
Optionally, it is described according to the marketing activity, obtain known creation data relevant with the marketing activity and
Incidence relation between known creation data, and according to pre-determined shadow mapping relations, they are each mapped to shadow
Shadow relationship between data and shadow data, the step of so as to obtain shadow environment in, the acquisition and the marketing activity
Relevant known incidence relation between creation data and known creation data, specifically includes:
Obtain marketing activity information in the marketing activity, user information, merchant information, store information, merchandise news,
Certificate Template Information;
Obtain user information in the marketing activity, merchant information, store information, merchandise news, certificate Template Information it
Between incidence relation.
Optionally, it is described according to the marketing activity, obtain known creation data relevant with the marketing activity and
Incidence relation between known creation data, and according to pre-determined shadow mapping relations, they are each mapped to shadow
In the step of shadow relationship between data and shadow data, it is described by they be each mapped to shadow data and shadow data it
Between shadow relationship include:Including:
Whether judge in the shadow mapping relations comprising the corresponding shadow mapping relations of the merchant information;
If so, the merchant information is mapped as shadow merchant information by the shadow mapping relations;
If it is not, then obtain the shadow merchant information from the shadow resource, and by the merchant information and the shadow
The incidence relation of sub- merchant information is added in the shadow mapping relations.
Optionally, it is described according to the marketing activity, obtain known creation data relevant with the marketing activity and
Incidence relation between known creation data, and according to pre-determined shadow mapping relations, they are each mapped to shadow
In the step of shadow relationship between data and shadow data, it is described by they be each mapped to shadow data and shadow data it
Between shadow relationship include:
Whether judge in the shadow mapping relations comprising the corresponding shadow mapping relations of the user information;
If so, the user information is mapped as shadow user information by the shadow mapping relations;
If it is not, then obtain the shadow user information from the shadow resource, and by the user information and the shadow
The incidence relation of child user information is added in the shadow mapping relations.
Optionally, it is described according to the marketing activity, obtain known creation data relevant with the marketing activity and
Incidence relation between known creation data, and according to pre-determined shadow mapping relations, they are each mapped to shadow
In the step of shadow relationship between data and shadow data, it is described by they be each mapped to shadow data and shadow data it
Between shadow relationship include:
By the store information, merchandise news, certificate Template Information, shadow shop is mapped as by the shadow mapping relations
Information, shadow merchandise news, shadow certificate Template Information;
By the incidence relation between the user information, merchant information, store information, merchandise news, certificate Template Information, lead to
It crosses the shadow mapping relations and is mapped as the shadow user information, shadow merchant information, shadow store information, shadow commodity letter
Shadow relationship between breath, shadow certificate Template Information.
Optionally, it is described in the shadow environment, according to the shadow relationship between the shadow data and shadow data
The shadow marketing activity is created and runs, including:
Using the shadow user, shadow trade company, shadow shop as active agent, using the shadow commodity, shadow service as
Trading object according to the marketing activity information, establishes shadow transaction;
To the shadow user that the shadow transaction is related to, according to the activity rule in the marketing activity information
Then, it is preferential to shadow user offer shadow.
Optionally, the shadow transaction is to pay transaction face to face, and payment interface is paid face to face by related shadow shop,
Transaction program code is injected to platform, output carries out the shadow user of the shadow transaction, is subsidized from the shadow budget
Account subsidizes the shadow user, realizes shadow payment;The injection pressure mark note in the context of the transaction program code.
Optionally, the shadow is preferential to get shadow discount coupon face to face, from shadow budget subsidy account subsidy institute
It is preferential to state shadow;By the neck certificate interface for paying interface face to face in the shadow shop being traded, shadow coupon code is exported
The shadow user for carrying out shadow transaction is supplied to, realizes getting for shadow discount coupon;The context of the shadow coupon code
Middle injection pressure mark note.
Optionally, the preferential realization method of the shadow discount coupon is:
To obtain the shadow user of the shadow discount coupon as transaction agent, by the way that shadow discount coupon can be used
The interface of paying face to face in shadow shop inject the shadow coupon code, realize the use of shadow discount coupon;The shadow is excellent
Injection pressure mark note in the context of favour voucher code.
Optionally, the shadow result data generated to the shadow marketing activity process is checked and verified, really
The fixed marketing activity whether can normal operation include:
Judge the Transaction Information in marketing activity, if meet the active rule of the marketing activity, to ensure movable work(
It can be normal;
Judge the checked result information of verification platform in marketing activity, if meet the active rule of the marketing activity,
To ensure working capital safety.
Optionally, the shadow budget subsidy account provides virtual fund to complete checking and writing off for marketing activity discount coupon.
Optionally, the described method includes:
The marketing activity is same city activity;
The shadow trade company, shadow user are all obtained from same city data.
In addition the application provides a kind of marketing activity simulating, verifying device, including:
First acquisition module, for obtaining the marketing activity for needing to carry out simulating, verifying;
First synchronization module, for according to the marketing activity, obtaining and the relevant known production number of the marketing activity
According to this and the incidence relation between known creation data, and according to predetermined shadow mapping relations, they are mapped respectively
For the shadow relationship between shadow data and shadow data, so as to obtain shadow environment;
First creation module, in the shadow environment, according to the shadow between the shadow data and shadow data
Subrelation creates and operation shadow marketing activity;
First verification module, the shadow result data for being generated to the shadow marketing activity operational process are checked
And verification, determine whether the marketing activity being capable of normal operation with this.
In addition the application provides a kind of electronic equipment for marketing activity simulating, verifying, including:
Display;
Processor;
Memory, for storing the program for marketing activity simulating, verifying, described program is read by the processor
During execution, following operation is performed:Obtain the marketing activity for needing to carry out simulating, verifying;
According to the marketing activity, obtain and the relevant known creation data of the marketing activity and known creation data
Between incidence relation, and according to predetermined shadow mapping relations, they are each mapped to shadow data and shadow number
Shadow relationship between, so as to obtain shadow environment;
In the shadow environment, created and run according to the shadow relationship between the shadow data and shadow data
Shadow marketing activity;
The shadow result data generated to the shadow marketing activity operational process is checked and verified, institute is determined with this
Whether state marketing activity being capable of normal operation.
Compared with prior art, the present invention has the following advantages:
The marketing activity emulation verification method that the application provides passes through the data of synchronous marketing activity to shadow environment
In, and shadow marketing activity, operation shadow battalion are created according to the incidence relation between the data and different data of marketing activity
Pin activity, and the data generated to shadow marketing activity process are checked and verified.Functional verification, generation are carried out in shadow link
Code, environment, link and production environment are completely the same, avoid verification and the otherness on line under line, creation data is replicated automatically
To shadow environment, artificial creation data is avoided to occur the risk of larger discrepancy with actual conditions, improve simulated effect.
In the method, during simulating, verifying, the stock using actuals will not be generated;In preferred embodiment
In, due to creating shadow budget subsidy account, without Marking Budget is employed, it is not related to actual inventory change and cash flow
It is dynamic, effectively reduce verification cost.
After the preferred embodiment that the application is used to provide, all verification process, can be with especially including O2O verification process
It is realized by the modes such as injecting codes on line analog form, avoiding related data needs cost caused by the acquisition of scene to increase;
Also, these data can directly by check platform do the automation of data check, avoid artificial nucleus couple generation into
This and omit the problem of, due to the use of be shadow data, trade company's bill of shadow environment will not influence trade company's production environment
The reconciliation of bill makes verification result more accurate.
It further, can also be by obtaining the correlation with city on the basis of above-mentioned marketing activity emulation verification method
Certificate is led under data, artificial line and checks and writes off realization activity and verifies the combination operated on line and under line, so as to further completely test
Card method solves the problems, such as to run into actual marketing activity in advance, realizes the various situations that are likely to occur to marketing activity
It more comprehensively analyzes and prejudges.
Description of the drawings
Fig. 1 is the flow chart for the marketing activity emulation verification method that the application first embodiment provides;
Fig. 2 be the application first embodiment be related to shadow resource table, shadow mapping table, shadow campaign synchronously configure
The schematic diagram of table;
Fig. 3 is another flow chart for the marketing activity emulation verification method that the application first embodiment provides;
Fig. 4 is another flow chart for the marketing activity emulation verification method that the application first embodiment provides;
Fig. 5 is another flow chart for the marketing activity emulation verification method that the application first embodiment provides;
Fig. 6 is another flow chart for the marketing activity emulation verification method that the application first embodiment provides;
Fig. 7 is another flow chart for the marketing activity emulation verification method that the application first embodiment provides;
Fig. 8 is the marketing activity business relations figure that the application first embodiment is related to.
Fig. 9 is the structure diagram for the marketing activity simulating, verifying device that the application second embodiment provides.
Specific embodiment
Many details are elaborated in the following description in order to fully understand the present invention.But the present invention can be with
Much implement different from other manner described here, those skilled in the art can be in the situation without prejudice to intension of the present invention
Under do similar popularization, therefore the present invention is not limited to the specific embodiments disclosed below.
The embodiment of the present application provides a kind of marketing activity emulation verification method.Fig. 1 is refer to, which is that the application first is real
Apply the flow chart of example.A kind of marketing activity emulation verification method is provided below in conjunction with Fig. 1 to the application first embodiment to carry out in detail
It describes in detail bright.
The technical solution of the embodiment of the present application in order to better understand is first illustrated related term.
Production environment refers to environment on line during marketing activity actual motion (for example, actually providing the user with public praise service
Internet system).
Shadow environment refers to, refers to the virtual environment for by simulating full link survey, shadow mapping relations etc. being pressed to build, generation
Code, link, environment and production environment are completely the same.
Full link pressure is surveyed, and so-called " full link " refers to complete the holonomic system that an operation flow is undergone in production environment
System calls link, and " full link pressure is surveyed " is then to carry out pressure test to completing the system involved by a business, so as to more accurate
Really find out some ring in service link (for example, transaction, commodity, discount coupon, retail shop, server-side, client, development platform etc.)
The performance bottleneck (for example, the service of some system, database performance, caching performance etc.) of section.It is in production ring that full link pressure, which is surveyed,
What border was completed, therefore compared to the pressure survey of environment, environments under line, environment is truer, and it is more accurate that pressure surveys result.
The embodiment that the application is largely surveyed using full link pressure is simulated, in service link entrance system (for example, interface tune
Gateway system etc.) in code, in full link pressure mark note involved in thread context, and down-stream system is being called, it will
The mark passes to down-stream system as parameter.Before down-stream system service processing, which is parsed from parameter, and
In the thread context that oneself is set.As long as in this way, full link pressure mark note, follow-up each system are provided in entrance system
System chain road can take this mark, then, increase in the DAL (data access layer) of each system to full link pressure mark note
Logic is handled with regard to the mark can be parsed.For inquiring about class service, judge whether with this pressure mark note in order number, if there is this
Pressing mark note, then explanation is shadow data, so adds in full link pressure mark note within a context, can just be done in the DAL layers of inquiry
SQL is replaced, and realizes inquiry shadow data.
Creation data refers to the truthful data that marketing activity is generated in production environment actual motion.
Shadow data are corresponded with creation data, are directly multiplexed the characteristic that full link pressure is surveyed, and creation data is automatically multiple
Shadow environment is made, obtains shadow data, and the shadow mapping relations for passing through emulation survey pressure the shadow data generated and connect
Get up so that shadow data possess same semanteme with creation data.
As shown in Figure 1, show the flow chart for the marketing activity emulation verification method that the application first embodiment provides, bag
Include following steps.
Step S101 obtains the marketing activity for needing to carry out simulating, verifying.
This step needs the object of progress simulating, verifying, i.e., described marketing activity for obtaining.Under general retrieval purpose, obtain
Take which marketing activity and the present embodiment relation little.The present embodiment be the technical foundation as marketing activity simulating, verifying and
It is existing.
Simulating, verifying is also named preceding emulation, refers to emulate design in advance using emulation tool, the function of test design
Whether correct, simulation process can find the mistake in design in time, accelerate design schedule, improve the reliability of design.
Marketing activity refers to the activity to making concessions under the line of specific user group in the short time, and attracts to use by making concessions
Family is participated in, to treat that user has more information for recognizing or leaving user for products & services.It is main to include marketing work
Dynamic ID, Activity Type, winnings information, activity time, participation trade company, commodity are applicable in the information such as shops, stockpile number, beginning and ending time
(such as Fig. 8).
The marketing activity for needing to carry out simulating, verifying is obtained described in this step, in particular to is obtained and is emulated
The essential information of the marketing activity of verification mainly includes marketing activity ID and other possible relevant informations;Specifically may be used
To use, marketing activity ID and relevant information are added to in the shadow campaign synchronization allocation list being pre-created (such as Fig. 2, figure
3), so as to obtaining the marketing activity for needing simulating, verifying;Certainly, emulated by the acquisition of shadow campaign synchronization allocation list
The marketing activity of verification, simply a concrete implementation mode, actually can also by other means, such as specially set into
Journey realizes the acquisition of information of the marketing activity to simulating, verifying.The marketing activity for needing to carry out simulating, verifying may be according to flat
The mandatory requirement of platform, it is also possible to random selection;Marketing activity can be trade company oneself initiate or platform according to
What the trade and investment promotion trade company of the operation activity of marketing activity foundation initiated, any one marketing activity is therefrom selected as being imitated
The object really verified.
Under normal circumstances, marketing activity is that the operation activity initiated by platform generates, i.e., platform initiates operation activity, phase
It closes trade company's application to participate in, the preferential activity that specific trade company (such as McDonald) provides according to the operation activity is known as marketing activity.
In that case it is preferable that refer to Fig. 3, in step S101 or before it is further comprising the steps of:Step S105, root
According to the operation activity of the marketing activity foundation, between the related data and the related data that determine the marketing activity
Incidence relation.
The situation before step S101 is only depicted in Fig. 3, it can be according to described in the step of obtaining marketing activity
The operation activity of marketing activity foundation, determine the marketing activity related data and the related data between association close
System.
Operation activity refer to operation personnel's planning through information such as rule, the resources of entire marketing activity life cycle,
After operation personnel starts trade and investment promotion, trade company registers successfully can just generate actual marketing activity.The information that operation activity provides is main
Including information (such as Fig. 8) such as trade and investment promotion scheme, city, beginning and ending time, dispensing mode, activity name, states.
Related data refers to the user information of marketing activity, merchant information, marketing activity information (for example, three days weekends
It is happy), store information (for example, seabed fishing), merchandise news (for example, coupons commodity) and certificate Template Information be (for example, the whole audience 95
Folding, binds 20 yuan, limits the use of for each person every day once), the incidence relation between related data refers to user information, merchant information, shop
Spread information, merchandise news, between certificate Template Information incidence relation (for example, McDonald sells fried chicken, fried chicken be merchandise news,
McDonald is store information).
Specifically, after operation activity starts trade and investment promotion, trade company registers successfully to generate actual marketing activity, according to the battalion
The operation activity ID (the operation activity ID is added in shadow campaign synchronization allocation list by such as Fig. 2) of pin activity foundation, inquiry
Incidence relation between the related data and related data of operation activity, and by the related data and dependency number of operation activity
Incidence relation between is synchronized in marketing activity.
Preferably, Fig. 4 is refer to, step S105 includes step S105-1, lives according to the operation of the marketing activity foundation
It is dynamic, determine the marketing activity information of the marketing activity;Step S105-2, according to the operation activity of the marketing activity foundation,
Determine user information, merchant information, store information, merchandise news, certificate Template Information and the user of the marketing activity
Incidence relation between information, merchant information, store information, merchandise news, certificate Template Information.
Above-mentioned steps are used to determine marketing activity information, the user of marketing activity according to the operation activity of marketing activity foundation
Information, merchant information, store information, merchandise news, certificate Template Information and the user information, merchant information, store information,
Incidence relation between merchandise news, certificate Template Information.
Marketing activity information includes marketing activity ID, activity name, active rule, operation activity ID, trade company ID, shop
The information such as ID, stockpile number.
User information includes the information such as User ID, user balance.
Merchant information includes the information such as trade company ID, trade company's remaining sum.
Store information includes the information such as shop ID, shop title, trade company ID, shops's classification, address.
Merchandise news includes the information such as commodity ID, trade name, commodity ID, commodity classification, stock.
Certificate Template Information includes certificate template ID, marketing activity ID, trade company ID, commodity ID, applicable shops ID set, subsidy account
The information (such as Fig. 8) such as family ID, the preferential amount of money, stockpile number, displaying configuration information.
Specifically, after operation activity is promoted trade and investment successfully, actual marketing activity is generated, according to the marketing activity foundation
Operation activity ID, the marketing activity information of inquiry operation activity, user information, merchant information, store information, merchandise news, certificate
Incidence relation between Template Information and the user information, merchant information, store information, merchandise news, certificate Template Information,
And it is synchronized in marketing activity.The merchant information of generation, store information, stockpile number, certificate template after promoting trade and investment successfully
Synchronizing informations are waited into marketing activity, and operation activity is had in itself activity name, activity scheme, the beginning and ending time, trade company
The information such as ID, marketing activity ID are also synchronized in marketing activity.
Step S102 according to the marketing activity, obtains known creation data relevant with the marketing activity and
Know the incidence relation between creation data, and according to predetermined shadow mapping relations, they are each mapped to shadow number
According to the shadow relationship between shadow data, so as to obtain shadow environment.
This step is used to the incidence relation between creation data and creation data being mapped as shadow data and shadow
Shadow relationship between data, so as to obtain shadow environment.
Shadow mapping relations, will by the mapping table of creation data major key ID (number) and shadow data major key ID
(such as Fig. 3, shadow mapping relations needs shift to an earlier date relation of the relationship map between all shadow data between all creation datas
It creates, hereafter has a detailed description).
Shadow relationship refers to the incidence relation between various shadow data under shadow environment;In this step, according to production
Incidence relation and the shadow mapping relations between data obtain the incidence relation between shadow data, i.e. these shadows
Relation is projection of the relation under shadow environment between corresponding creation data.
Specifically, the incidence relation between the creation data and creation data of first acquisition marketing activity, then passes through simulation
Full link pressure survey mode calls relevant interface to create shadow data, and passes through shadow mapping relations by creation data and production number
Incidence relation between is mapped as the incidence relation between shadow data and shadow data, so as to obtain shadow environment, after being
Continuous establishment shadow marketing activity performs early-stage preparations.By injecting full link in thread context mark is pressed to remember, and adjusted
During with down-stream system, down-stream system is passed to using the mark as parameter, before down-stream system service processing, by the mark from parameter
In parse, and set into the thread context of oneself, realize create shadow data when required relevant interface calling.
Shadow mapping relations include the corresponding different mappings type of different creation datas, and creation data is specifically reflected according to affiliated type
The mode of penetrating is mapped as the relation between corresponding shadow data and corresponding shadow data, has shadow data and creation data
Same semantic, the shadow relationship between shadow data also has identical semanteme with the incidence relation of creation data.
Preferably, Fig. 3 is refer to, it is further comprising the steps of before step S102:Step S106 creates shadow resource.
Preferably, the shadow resource, including at least one of following:Shadow trade company, shadow user, shadow budget subsidy account
Family.
Preferably, product is paid in the shadow trade company signing face to face, and opens open platform interface authority.
Shadow resource is the finger pressure surveyor's chain information such as the shadow trade company of establishment, shadow user, shadow platform subsidy account on the road
(such as Fig. 8 includes the information such as merchant information, user information, platform subsidy account information in actual marketing activity), is mainly used to retouch
Business participant's entity is stated, with account on line without direct relation, but equally exists name, identification card number, real-name authentication information etc.
The essential attribute of business division.Xian Shang trade companies, user etc. need individual that Alipay website is gone to register, and pass through safety, close rule etc.
Business verifies, and the information such as shadow trade company, user can be created directly by relevant interface, from quantity, safety, closes rule
Limitation, flow are lighter.The main distinction of shadow trade company and shadow user is that shadow trade company will be signed Alipay face to face
It pays, the products & services such as bill management, shadow user is mainly used for initiating receiving and simulating for discount coupon in shadow link
Businessman initiates to pay request face to face.
Specifically, it is necessary to first prepare following shadow resource in advance before the step of acquisition shadow environment, and by number
According to being initialised in shadow resource table;Fig. 2 is refer to, shadow resource table includes herein below, resource identification, resource type (example
Such as, merchant type, user type), resource details (for example, trade company ID, User ID).
Shadow environment creates shadow trade company by interface, and the signing of shadow trade company pays product and opens open platform face to face to be connect
Mouth permission, the open platform interface opened include paying interface face to face and pay the neck certificate interface in interface face to face, markets for shadow
Payment and neck certificate in activity;The shadow user that shadow environment is created by interface, for verifying receiving and checking and writing off for discount coupon;
Account is subsidized in the shadow budget that shadow environment is created by interface, and platform subsidy class shadow marketing activity is created that the discount coupon come
This account is associated, and shadow trade company and shadow user remaining sum are subsidized, it just can be during transaction payment, from shadow budget
Subsidy account provides funds to complete checking and writing off (such as Fig. 8) for certificate.
Preferably, Fig. 3 is refer to, it is further comprising the steps of before step S102:Step S107 creates shadow mapping and closes
System.
Preferably, the shadow mapping relations, including following content:All kinds of creation datas are mapped as the mapping of shadow data
The mapping method of type and corresponding each map type.
The shadow mapping relations can be other forms of expression in shadow mapping table or database,
By the mapping table of creation data major key ID (number) and shadow data major key ID, by the relation between all creation datas
The relation being mapped as between all shadow data, i.e., described shadow relationship.Fig. 2 is refer to, shadow mapping table includes following
Content, all kinds of creation datas are mapped as the map type (for example, shop type) of shadow data, correspond to reflecting for each map type
Shooting method (for example, the mapped specific mode of store information to shadow store information), creation data (for example, store information), shadow
Subdata (shadow store information).
Preferably, it refer to Fig. 5, according to the marketing activity in step 102, obtain relevant with the marketing activity
Know that the incidence relation between creation data and known creation data includes step S102-1 and step S102-2.
The step S102-1 obtains marketing activity information in the marketing activity, user information, merchant information, shop
Spread information, merchandise news, certificate Template Information;
The step S102-2 obtains the user information in the marketing activity, merchant information, store information, commodity and believes
Incidence relation between breath, certificate Template Information.
Above-mentioned steps are for obtaining and the marketing activity is relevant known between creation data and known creation data
Incidence relation.
Specifically, according to marketing activity ID, the known creation data of marketing activity and the pass of known creation data are obtained
Connection relation, for the foundation of incidence relation between mapping afterwards and shadow data and shadow data.Known creation data bag
It includes, marketing activity information, user information in marketing activity, merchant information, store information, merchandise news, certificate Template Information,
Know the incidence relation between creation data refer to the user information in marketing activity, merchant information, store information, merchandise news,
Incidence relation between certificate Template Information.
Preferably, it refer to Fig. 5, the incidence relation of creation data and creation data be each mapped to shadow in step 102
Shadow relationship between subdata and shadow data, the step of so as to obtain shadow environment, including step S102-3 to step
S102-5。
The step S102-3 judges whether reflected in the shadow mapping relations comprising the corresponding shadow of the merchant information
Penetrate relation;
The step S102-4, if so, the merchant information is mapped as shadow business by the shadow mapping relations
Family information;
The step S102-5, if it is not, then obtain the shadow merchant information from the shadow resource, and by the business
Family information and the incidence relation of the shadow merchant information are added in the shadow mapping relations.
Above-mentioned steps are used to the merchant information in marketing activity being mapped as shadow merchant information, and by merchant information and shadow
The incidence relation of sub- merchant information is added in shadow mapping relations.
Shadow merchant information is mapped according to merchant information and generated, including information such as shadow trade company ID, shadow trade company remaining sums.
Specifically, the essence of above-mentioned several steps is, first according to Xian Shang trade companies ID, go in shadow mapping relations to look for corresponding be somebody's turn to do
The mapping relations of merchant type, if it is present merchant information is mapped by specific mapping mode in shadow mapping relations
For shadow merchant information.If it does not exist, then a resource type is looked for from shadow resource table (such as Fig. 2) for similar trade company
The mapping relations of merchant information and the shadow merchant information are persisted to shadow and reflected by shadow resource as shadow merchant information
It penetrates in relation.
Preferably, refer to Fig. 5, the shadow them being each mapped in step 102 between shadow data and shadow data
Subrelation so as to obtain shadow environment, further includes step S102-6 to step S102-8.
Step S102-6 judges whether closed in the shadow mapping relations comprising the corresponding shadow mapping of the user information
System;
Step S102-7 believes if so, the user information is mapped as shadow user by the shadow mapping relations
Breath;
Step S102-8 if it is not, then obtaining the shadow user information from the shadow resource, and the user is believed
Breath and the incidence relation of the shadow user information are added in the shadow mapping relations (such as Fig. 5).
Above-mentioned steps are used to the user information in marketing activity being mapped as shadow user information, and by user information and shadow
The incidence relation of child user information is added in shadow mapping relations.
Shadow user information is mapped according to user information and generated, including information such as shadow user ID, shadow user remaining sums.
Specifically, the essence of above-mentioned several steps is, first according to User ID on line, go in shadow mapping relations to look for corresponding be somebody's turn to do
The mapping relations of user type, if it is present user information is mapped by specific mapping mode in shadow mapping relations
For shadow user information.If there is no a resource type is then looked for be similar user from shadow resource table (such as Fig. 2)
The mapping relations of user information and the shadow user information are persisted to shadow and reflected by shadow resource as shadow user information
It penetrates in relation.
Preferably, refer to Fig. 5, the shadow them being each mapped in step 102 between shadow data and shadow data
Subrelation further includes step S102-9 and step S102-10 so as to obtain shadow environment.
Step S102-9 by the store information, merchandise news, certificate Template Information, is reflected by the shadow mapping relations
It penetrates as shadow store information, shadow merchandise news, shadow certificate Template Information;
Step S102-10, will be between the user information, merchant information, store information, merchandise news, certificate Template Information
Incidence relation, by the shadow mapping relations be mapped as the shadow user information, shadow merchant information, shadow shop believe
Shadow relationship (such as Fig. 5) between breath, shadow merchandise news, shadow certificate Template Information.
Above-mentioned steps be used for by marketing activity store information, merchandise news, certificate Template Information be mapped as shadow shop
Information, shadow merchandise news, shadow certificate Template Information, and obtain shadow user information, shadow merchant information, shadow shop letter
Shadow relationship between breath, shadow merchandise news, shadow certificate Template Information.
Shadow store information, including shadow shop ID, shadow shop title, shadow trade company ID, shadow shops classification, shadow
The information such as store address.
Shadow merchandise news includes shadow commodity ID, shadow trade name, shadow commodity ID, shadow commodity classification, shadow
The information such as stock.
Shadow certificate Template Information include shadow certificate template ID, shadow marketing activity ID, shadow trade company ID, shadow commodity ID,
Shadow is applicable in shops ID set, shadow subsidy account ID, the preferential amount of money of shadow, shadow stockpile number, shadow displaying configuration information
Etc. information.
Specifically, shadow shop, shadow commodity press survey mode that relevant interface is called to create by simulating full link, and by line
Upper shop and the mapping relations of commodity and shadow commodity on shadow shop, line are added in shadow mapping relations.Shadow certificate template
Simulating full link pressure survey mode according to shadow trade company, shadow shop, shadow commodity calls relevant interface to create, and by certificate template with
The relation of shadow certificate template is added in shadow mapping relations.Then by marketing activity store information, merchandise news, certificate mould
Plate information is mapped as shadow store information, shadow merchandise news, shadow certificate by specific mapping mode in shadow mapping relations
Template Information;By the incidence relation between user information, merchant information, store information, merchandise news, certificate Template Information, pass through
Specific mapping mode is mapped as shadow user information, shadow merchant information, shadow store information, shadow in shadow mapping relations
Shadow relationship between merchandise news, shadow certificate Template Information.
The specific implementation of realization step S102 and the order of correlation step shown in above-mentioned Fig. 5 are only one kind
Possibility actually it is of course possible to flexibly handle, is finally reached the effect for establishing shadow environment.
Step S103 in the shadow environment, is created according to the shadow relationship between the shadow data and shadow data
Build and run shadow marketing activity.
This step is used to creating and running shadow marketing activity.
Shadow marketing activity is the shadow campaign created in shadow environment, corresponding with the marketing activity in production environment.
Specifically, in shadow environment, according to the shadow being synchronized between the shadow data of shadow environment and shadow data
Relation simulates the establishment that full link pressure survey mode realizes shadow marketing activity by related calling interface, and shadow marketing activity includes
Shadow transaction and for shadow user provide shadow it is preferential, under artificial line barcode scanning payment and line under barcode scanning neck certificate mistake
Journey, run shadow marketing activity, so as to carry out verification marketing activity, in advance examine marketing activity it is possible that the problem of.
Preferably, it refer to Fig. 3, after the step after S105, further included before the step S103:Step S108,
Create shadow campaign allocation list;The parameter that the establishment and operation shadow marketing activity are provided according to the allocation list carries out.
Preferably, the shadow campaign allocation list records the following configuration data of the shadow marketing activity:With the shadow
The relevant operation activity account of sub- marketing activity, the shadow marketing activity account, the shadow marketing activity state, the shadow
Sub- marketing activity context pressure mark note.
Shadow campaign synchronization allocation list is for creating and running shadow marketing activity, with creating and running shadow marketing
Active synchronization carries out, and includes herein below, operation activity ID, production & marketing activity ID, shadow marketing activity ID, shadow marketing shape
State, shadow marketing activity context data (such as Fig. 2).
Preferably, Fig. 6 is refer to, step S103 includes step S103-1 and step S103-2.
Step S103-1, using the shadow user, shadow trade company, shadow shop as active agent, with the shadow commodity,
Shadow service is trading object, according to the marketing activity information, establishes shadow transaction;
Step S103-2, to the shadow user that the shadow transaction is related to, according to the marketing activity information
In active rule, to the shadow user provide shadow it is preferential.
Above-mentioned steps are used to create shadow transaction, and root according to the shadow relationship between shadow data and shadow data
It is preferential to shadow user offer shadow according to the active rule in marketing activity information.
Shadow transaction refers to using the shadow user, shadow trade company, shadow shop as active agent, with the shadow
Sub- commodity, shadow service are trading object, and according to the marketing activity information, the transaction of foundation is (for example, weekend finds pleasure in three days
Shadow transaction).
Shadow is preferential, refers in shadow marketing activity to be that the shadow user provides preferential.
Specifically, the information such as shadow certificate template, shadow shops in marketing activity information, with the shadow user,
Shadow trade company, shadow shop are active agent, using the shadow commodity, shadow service as trading object, simulate full link pressure and survey
Mode is by calling relevant interface to create shadow transaction and coming into force.According to the active rule in marketing activity information, to institute
State shadow user provide shadow it is preferential, shadow is preferential directly to be provided when shadow transaction carries out, can also be in shadow
There is provided in a manner of discount coupon after transaction, and provide in some transaction of next time it is preferential, wherein being carried in a manner of discount coupon
For being usually more important preferential mode.
It should be noted that in a specific discount coupon example, following information, certificate ID, certificate title, certificate template are included
The letters such as ID, User ID, trade company ID, commodity ID, applicable shop ID set, certificate type, the preferential amount of money, entry-into-force time, out-of-service time
Cease (such as Fig. 8)
In business low peak period, by the rule configuration information of marketing activity, each rule are constructed according to boundary values test mode
Checking case then carries out the functional verification of shadow marketing activity in shadow environment.Boundary value analysis is also a kind of Black-box Testing
Method, is a kind of supplement of parity price alanysis method, learns that substantial amounts of mistake is to be happened at by long-term test job experience
On the border of input or output.Therefore for various border condition design test cases, more mistakes can be found
Preferably, the shadow transaction is to pay transaction face to face, and payment interface is paid face to face by related shadow shop,
Transaction program code is injected to platform, output carries out the shadow user of the shadow transaction, and account is subsidized from the budget
The shadow user is subsidized, realizes shadow payment;The injection pressure mark note in the context of the transaction program code, by shadow
Subactivity is mutually distinguishable with other arm's length dealing activities.
Specifically, pay barcode scanning payment process under transaction simulation line face to face, a shadow user is selected as initiator's main body,
Request is received to construct shadow discount coupon according to shadow commodity, shadow store information, by calling related shadow shop face to face
Interface is paid, the transaction program code of pressure mark note is injected with to platform, realizes shadow payment.Press the transaction program code of mark note
Shadow campaign is shown to be, related shadow shop corresponds to the solid shop/brick and mortar store in marketing activity.
It should be noted that emulation verification method provided in this embodiment, the special standby marketing suitable for the transaction of O2O patterns is lived
Dynamic verification, so-called O2O patterns, i.e. Online To Offline refer to be combined the commercial chance under line with internet, allow mutually
Networking is taken the consumer on line to as the platform of off-line transaction in the shop of reality.There are mainly two types of patterns, make user
On-line payment is first carried out, then gets the commodity of solid shop/brick and mortar store or enjoys service;Or user is made to arrive first solid shop/brick and mortar store and is searched specifically
Commodity or service, then carry out on-line payment.In the present embodiment, shadow user can be made first to carry out simulation barcode scanning payment, then led
It takes the commodity in shadow shop or enjoys service;Or shadow user is made to arrive first shadow shop and searches specific commodity or service, then
Carry out barcode scanning payment.The barcode scanning payment, as previously mentioned, interface is paid face to face indeed through the related shadow shop of calling,
The transaction program code (wherein comprising the 2 D code information) of pressure mark note is injected with to platform, realizes shadow payment.
Preferably, the shadow is preferential to get shadow discount coupon face to face, and the shadow is subsidized from budget subsidy account
Son is preferential;By the neck certificate interface for paying interface face to face in the shadow shop being traded, output shadow coupon code provides
To the shadow user for carrying out shadow transaction, getting for shadow discount coupon is realized;It is noted in the context of the shadow coupon code
Enter mark is pressed to remember.
In marketing activity, preferential way of realization, can be red packet, coupons, discount coupon or completely subtract, discount,
Buy the activity of giving, head Dan Li subtract, the new visitor of shops stands and subtracts, wherein discount coupon is a kind of more commonly used realization method;Corresponding to reality
The discount coupon of border marketing activity under shadow environment, can also generate shadow discount coupon, to simulate the realization of discount coupon
Journey.,.
Specifically, face to face lead certificate artificial line under barcode scanning neck certificate process, according to use before shadow user, shadow trade company account
The information such as family, shadow shop, construction pay interface requests parameter face to face, by the neck for paying interface face to face for calling related shadow shop
Certificate interface exports and realizes getting for shadow discount coupon to shadow user.Injection pressure mark in the context of shadow coupon code
Note, is shown to be shadow campaign.
It should be noted that getting for shadow discount coupon is also O2O patterns, even if shadow user first carries out simulation barcode scanning branch
It pays, then simulates barcode scanning and get discount coupon, then get the commodity in shadow shop or enjoy service;Or shadow user is made to arrive first shadow
Specific commodity or service are searched in sub- shop, then carry out barcode scanning payment, simulate barcode scanning afterwards and get discount coupon.Shadow discount coupon is also
Shadow user can be just issued to before shadow user simulates barcode scanning payment.
Preferably, the preferential realization method of the shadow discount coupon is:To obtain the shadow of the shadow discount coupon
Child user is transaction agent, and by that can use the interface of paying face to face in shadow shop of shadow discount coupon, to inject the shadow preferential
Voucher code realizes the use of shadow discount coupon;In the context of the shadow coupon code injection pressure mark note, so as to just
Normal transaction distinguishes.
Specifically, the process of discount coupon is used under the preferential realization method artificial line of shadow discount coupon, it can be with by calling
Interface is paid face to face using the shadow shop of shadow discount coupon, is injected the shadow coupon code and is realized making for shadow discount coupon
With injection pressure mark note, is shown to be shadow campaign in the context of shadow coupon code.The use of shadow discount coupon can limit
The fixed specific time, (for example, the week or within several days effectively), specific hotel owner (for example, McDonald) is minimum to disappear
Take amount of money (for example, full 50 yuan available) etc..
Preferably, the shadow budget subsidy account provides virtual fund to complete checking and writing off for marketing activity discount coupon.
(such as Fig. 8) described budget subsidy account subsidizes the shadow user, realizes shadow payment;Described in the budget subsidy account subsidy
Shadow is preferential, realizes getting for shadow discount coupon.Specific implementation, exactly send shadow it is preferential when, it is pre- in the shadow
It calculates in subsidy account and reduces corresponding fund or other preferential resources.
Step S104, to the shadow marketing activity operational process generate shadow result data checked and verified,
Determine whether the marketing activity being capable of normal operation with this.
This step is used to that the shadow result data of shadow marketing activity process to be checked and verified.
Specifically, shadow discount coupon is received and after checking and writing off, it is necessary to whole process data are checked and verified, mainly from
Functional verification and two aspect of fund flow verification are set about, so that it is guaranteed that marketing activity being capable of normal operation.
Preferably, Fig. 7 is refer to, step S104 includes step S104-1 and step S104-2.
Step S104-1 judges the Transaction Information in marketing activity, if meet the active rule of the marketing activity, with
Ensure that movable function is normal;
Step S104-2 judges to check the checked result information of platform in marketing activity, if meet the marketing activity
Active rule, with ensure working capital safety,.
Whether whether normal, working capital is safe for verifying marketing activity function for above-mentioned steps.
Check platform, refer to each service line (for example, food and drink, disappear soon, general industry, big customer, quotient graph) offer business patrols
The ability of verification is collected, including being damaged to money, the ability that the quality of data and other business datums are checked and checked.Production environment
Each system-critical data has disposed verification script, and all business datums for occurring on line are carried out in real time/data quasi real time
Verification.
Specifically, by Transaction Inquiries interface polls transaction details, order total amount in Transaction Information, payment are judged
When the information such as the remaining sum, the discount coupon that use whether meet marketing activity dependency rule, it is ensured that movable function is normal;It is flat according to verification
Platform checked result is (for example, hair certificate flowing water, certificate check and write off the upstream and downstream data such as flowing water, commodity stocks, trading order form, account balance
Uniformity is checked), judge that transaction funds stream, discount coupon assets are checked and write off, platform subsidy budget funds associated therewith reduces whether meet battalion
Sell active rule, it is ensured that working capital safety.
The marketing activity emulation verification method that the application provides passes through the data of synchronous marketing activity to shadow environment
In, and shadow marketing activity, operation shadow battalion are created according to the incidence relation between the data and different data of marketing activity
Pin activity, and the data generated to shadow marketing activity process are checked and verified.Functional verification, generation are carried out in shadow link
Code, environment, link and production environment are completely the same, avoid verification and the otherness on line under line, creation data is replicated automatically
To shadow environment, artificial creation data is avoided to occur the risk of larger discrepancy with actual conditions, improve simulated effect.
In the method, during simulating, verifying, the stock using actuals will not be generated;In preferred embodiment
In, due to creating shadow budget subsidy account, without Marking Budget is employed, it is not related to actual inventory change and cash flow
It is dynamic, effectively reduce verification cost.
After the preferred embodiment that the application is used to provide, all verification process, can be with especially including O2O verification process
It is realized by the modes such as injecting codes on line analog form, avoiding related data needs cost caused by the acquisition of scene to increase;
Also, these data can directly by check platform do the automation of data check, avoid artificial nucleus couple generation into
This and omit the problem of, due to the use of be shadow data, trade company's bill of shadow environment will not influence trade company's production environment
The reconciliation of bill makes verification result more accurate.
Preferably, the marketing activity is same city activity;The shadow trade company, shadow user are all obtained from same city data
It takes.On the basis of above-mentioned marketing activity emulation verification method, it can also be led by obtaining under the related data with city, artificial line
Certificate, so as to further integrity authentication method, solves in advance with checking and writing off the combination operated on realization activity verification line and under line
The problem of being run into actual marketing activity.
As shown in figure 9, the application second embodiment also provides a kind of marketing activity simulating, verifying device, including with lower die
Block:
First acquisition module 901, for obtaining the marketing activity for needing to carry out simulating, verifying;
First mapping block 902, for according to the marketing activity, obtaining and the relevant known production of the marketing activity
Incidence relation between data and known creation data, and according to predetermined shadow mapping relations, they are reflected respectively
The shadow relationship between shadow data and shadow data is penetrated, so as to obtain shadow environment;
First creation module 903, in the shadow environment, according between the shadow data and shadow data
Shadow relationship creates and operation shadow marketing activity;
First verification module 904, the shadow result data for being generated to the shadow marketing activity operational process carry out
Verification and verification, with this determine the marketing activity whether can normal operation, realize marketing activity is likely to occur it is various
The more comprehensively analysis and anticipation of situation.
The application 3rd embodiment also provides a kind of electronic equipment for marketing activity simulating, verifying, the electronic equipment
Including:
Display;
Processor;
Memory, for storing the program for marketing activity simulating, verifying, described program is read by the processor
During execution, following operation is performed:Obtain the marketing activity for needing to carry out simulating, verifying;
According to the marketing activity, obtain and the relevant known creation data of the marketing activity and known creation data
Between incidence relation, and according to predetermined shadow mapping relations, they are each mapped to shadow data and shadow number
Shadow relationship between, so as to obtain shadow environment;
In the shadow environment, created and run according to the shadow relationship between the shadow data and shadow data
Shadow marketing activity;
The shadow result data generated to the shadow marketing activity operational process is checked and verified, institute is determined with this
Whether state marketing activity being capable of normal operation.
In a typical configuration, computing device includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
1st, computer-readable medium can be by any side including permanent and non-permanent, removable and non-removable media
Method or technology realize that information stores.Information can be computer-readable instruction, data structure, the module of program or other numbers
According to.The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM
(SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory
(ROM), electrically erasable programmable read-only memory (EEPROM), fast flash memory bank or other memory techniques, read-only optical disc are read-only
Memory (CD-ROM), digital versatile disc (DVD) or other optical storages, magnetic tape cassette, tape magnetic rigid disk storage or
Other magnetic storage apparatus or any other non-transmission medium, the information that can be accessed by a computing device available for storage.According to
Herein defines, and computer-readable medium does not include non-temporary computer readable media (transitory media), such as modulates
Data-signal and carrier wave.
2nd, it will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program production
Product.Therefore, the embodiment in terms of complete hardware embodiment, complete software embodiment or combination software and hardware can be used in the application
Form.It can use moreover, the application can be used in one or more computers for wherein including computer usable program code
The computer program product that storage medium is implemented on (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Form.
Claims (10)
1. a kind of marketing activity emulation verification method, which is characterized in that the described method includes:
Obtain the marketing activity for needing to carry out simulating, verifying;
According to the marketing activity, obtain and the marketing activity is relevant known between creation data and known creation data
Incidence relation, and according to predetermined shadow mapping relations, by they be each mapped to shadow data and shadow data it
Between shadow relationship, so as to obtain shadow environment;
In the shadow environment, shadow is created and run according to the shadow relationship between the shadow data and shadow data
Marketing activity;
The shadow result data generated to the shadow marketing activity operational process is checked and verified, the battalion is determined with this
Whether pin activity being capable of normal operation.
2. marketing activity emulation verification method according to claim 1, which is characterized in that described in the acquisition shadow ring
Before the step of border, further include:
Create shadow resource.
3. marketing activity emulation verification method according to claim 2, which is characterized in that the shadow resource, including such as
It is at least one of lower:
Shadow trade company, shadow user, shadow budget subsidy account.
4. marketing activity emulation verification method according to claim 3, which is characterized in that the shadow trade company signing is face to face
Product is paid, and opens open platform interface authority.
5. marketing activity emulation verification method according to claim 4, which is characterized in that the step for obtaining shadow environment
Before rapid, further include:
Create shadow mapping relations.
6. marketing activity emulation verification method according to claim 5, which is characterized in that described to be lived according to the marketing
It is dynamic, acquisition and the relevant known incidence relation between creation data and known creation data of the marketing activity, and according to
They are each mapped to the shadow relationship between shadow data and shadow data by pre-determined shadow mapping relations, so as to
In the step of obtaining shadow environment, the acquisition and the relevant known creation data of the marketing activity and known creation data
Between incidence relation, specifically include:
Obtain marketing activity information in the marketing activity, user information, merchant information, store information, merchandise news, certificate mould
Plate information;
It obtains between user information in the marketing activity, merchant information, store information, merchandise news, certificate Template Information
Incidence relation.
7. marketing activity emulation verification method according to claim 6, which is characterized in that described to be lived according to the marketing
It is dynamic, acquisition and the relevant known incidence relation between creation data and known creation data of the marketing activity, and according to
Pre-determined shadow mapping relations, the step of they are each mapped to the shadow relationship between shadow data and shadow data
In, the shadow relationship that they are each mapped between shadow data and shadow data includes:
By the store information, merchandise news, certificate Template Information, it is mapped as shadow shop by the shadow mapping relations and believes
Breath, shadow merchandise news, shadow certificate Template Information;
By the incidence relation between the user information, merchant information, store information, merchandise news, certificate Template Information, pass through institute
State shadow mapping relations be mapped as the shadow user information, shadow merchant information, shadow store information, shadow merchandise news,
Shadow relationship between shadow certificate Template Information.
8. marketing activity emulation verification method according to claim 7, which is characterized in that described in the shadow environment
In, it is created according to the shadow relationship between the shadow data and shadow data and runs the shadow marketing activity, including:
Using the shadow user, shadow trade company, shadow shop as active agent, using the shadow commodity, shadow service as transaction
Object according to the marketing activity information, establishes shadow transaction;
To the shadow user that the shadow transaction is related to, according to the active rule in the marketing activity information, to
It is preferential that the shadow user provides shadow.
9. marketing activity emulation verification method according to claim 8, which is characterized in that the shadow transaction is to work as
Transaction is paid in face, and payment interface is paid face to face by related shadow shop, is injected transaction program code to platform, is exported described in carrying out
The shadow user of shadow transaction subsidizes the shadow user from shadow budget subsidy account, realizes shadow payment;
Injection pressure mark note in the context of the transaction program code.
10. marketing activity emulation verification method according to claim 8, which is characterized in that the shadow is preferential for face to face
Shadow discount coupon is got, it is preferential to subsidize the shadow from shadow budget subsidy account;By in the shadow store being traded
The neck certificate interface for paying interface face to face of paving, output shadow coupon code are supplied to the shadow user for carrying out shadow transaction, realize
Shadow discount coupon is got;Injection pressure mark note in the context of the shadow coupon code.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711220914.9A CN108090784B (en) | 2017-11-28 | 2017-11-28 | Marketing activity simulation verification method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201711220914.9A CN108090784B (en) | 2017-11-28 | 2017-11-28 | Marketing activity simulation verification method and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108090784A true CN108090784A (en) | 2018-05-29 |
CN108090784B CN108090784B (en) | 2021-04-30 |
Family
ID=62173065
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201711220914.9A Active CN108090784B (en) | 2017-11-28 | 2017-11-28 | Marketing activity simulation verification method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108090784B (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112199218A (en) * | 2020-10-26 | 2021-01-08 | 北京百家科技集团有限公司 | Pressure measurement method and device, electronic equipment and storage medium |
CN113344624A (en) * | 2021-06-01 | 2021-09-03 | 支付宝(杭州)信息技术有限公司 | Virtual verification method, device, equipment and readable medium for electronic ticket |
CN114143236A (en) * | 2020-08-13 | 2022-03-04 | 网联清算有限公司 | Business system testing method and device, electronic equipment and readable storage medium |
CN116402550A (en) * | 2023-06-07 | 2023-07-07 | 八维通科技有限公司 | Reliability control method and system for riding calculation preference and computer program medium |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102117379A (en) * | 2010-01-04 | 2011-07-06 | 黑龙江电力职工大学 | Experiential teaching simulation training method for power market commercial operation |
CN103020840A (en) * | 2011-10-04 | 2013-04-03 | 微软公司 | Incentive optimization for social media marketing campaigns |
CN103119617A (en) * | 2010-08-02 | 2013-05-22 | 阿玛得斯两合公司 | Automatic traffic generation for a faring system |
WO2014124310A1 (en) * | 2013-02-07 | 2014-08-14 | MaxPoint Interactive, Inc. | A system for improving shape-based targeting by using interest level data |
CN104410542A (en) * | 2014-11-18 | 2015-03-11 | 小米科技有限责任公司 | Method and device for simulation test |
CN107133162A (en) * | 2016-02-29 | 2017-09-05 | 阿里巴巴集团控股有限公司 | A kind of method of testing and device |
-
2017
- 2017-11-28 CN CN201711220914.9A patent/CN108090784B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102117379A (en) * | 2010-01-04 | 2011-07-06 | 黑龙江电力职工大学 | Experiential teaching simulation training method for power market commercial operation |
CN103119617A (en) * | 2010-08-02 | 2013-05-22 | 阿玛得斯两合公司 | Automatic traffic generation for a faring system |
CN103020840A (en) * | 2011-10-04 | 2013-04-03 | 微软公司 | Incentive optimization for social media marketing campaigns |
WO2014124310A1 (en) * | 2013-02-07 | 2014-08-14 | MaxPoint Interactive, Inc. | A system for improving shape-based targeting by using interest level data |
CN104410542A (en) * | 2014-11-18 | 2015-03-11 | 小米科技有限责任公司 | Method and device for simulation test |
CN107133162A (en) * | 2016-02-29 | 2017-09-05 | 阿里巴巴集团控股有限公司 | A kind of method of testing and device |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN114143236A (en) * | 2020-08-13 | 2022-03-04 | 网联清算有限公司 | Business system testing method and device, electronic equipment and readable storage medium |
CN112199218A (en) * | 2020-10-26 | 2021-01-08 | 北京百家科技集团有限公司 | Pressure measurement method and device, electronic equipment and storage medium |
CN113344624A (en) * | 2021-06-01 | 2021-09-03 | 支付宝(杭州)信息技术有限公司 | Virtual verification method, device, equipment and readable medium for electronic ticket |
CN116402550A (en) * | 2023-06-07 | 2023-07-07 | 八维通科技有限公司 | Reliability control method and system for riding calculation preference and computer program medium |
CN116402550B (en) * | 2023-06-07 | 2023-10-27 | 八维通科技有限公司 | Reliability control method and system for riding calculation preference and computer program medium |
Also Published As
Publication number | Publication date |
---|---|
CN108090784B (en) | 2021-04-30 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
TWI768163B (en) | Method and device for generating smart contracts | |
CN108536521B (en) | Simulation platform-based offline environment checking method and device | |
CN108090784A (en) | Marketing activity emulation verification method and device | |
CN104217362B (en) | The method of score-clearing system and off-line transaction based on internet communication, online i.e. time-division account | |
CN108427638A (en) | Region network of relation marketing activity test method and device | |
KR20190006506A (en) | Digital Asset Modeling | |
CN110162470A (en) | A kind of test method and device of block chain | |
US11443307B2 (en) | Cross-border resource transfer authenticity verification method, device and electronic equipment | |
CN110210968A (en) | Intelligent Service transaction system | |
CN109559233A (en) | A kind of real estate supply chain accounts receivable transfer system based on block chain | |
CN109432781A (en) | A kind of current game stage property transaction system and method based on block chain intelligence contract | |
CN111899072A (en) | Block chain based product sale method and system | |
CN110232601A (en) | Card certificate management method, device, equipment and storage medium | |
CN110163614A (en) | Accounts payable order method of calibration, device, equipment and storage medium | |
CN113344624A (en) | Virtual verification method, device, equipment and readable medium for electronic ticket | |
CN108898492A (en) | A kind of crowdsourcing task implementation method and apparatus and system based on alliance's chain | |
Madl et al. | Formal verification of smart contracts using interface automata | |
CN113641759A (en) | Data privacy protection method in supply chain finance based on block chain technology | |
CN111221855A (en) | Data processing method and device | |
CN109636517B (en) | Matching method and device for bartering resources | |
CN108389104B (en) | Simulation verification method and device for network activities | |
CN104616168B (en) | A kind of method and device of marketing tool legitimacy verifies | |
KR102429000B1 (en) | Method of providing service for issuing mobile gift certification, server and system thereof | |
CN106600254A (en) | User's multi-account management method and device | |
KR102382379B1 (en) | System and method for providing ai bigdata estimation based on clutch engine |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |