CN109598512A - Tactful O&M method and device - Google Patents

Tactful O&M method and device Download PDF

Info

Publication number
CN109598512A
CN109598512A CN201811348589.9A CN201811348589A CN109598512A CN 109598512 A CN109598512 A CN 109598512A CN 201811348589 A CN201811348589 A CN 201811348589A CN 109598512 A CN109598512 A CN 109598512A
Authority
CN
China
Prior art keywords
strategy
range
data
result
initial release
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811348589.9A
Other languages
Chinese (zh)
Other versions
CN109598512B (en
Inventor
章李杰
赵闻飙
吴君佳
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced New Technologies Co Ltd
Advantageous New Technologies Co Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201811348589.9A priority Critical patent/CN109598512B/en
Publication of CN109598512A publication Critical patent/CN109598512A/en
Application granted granted Critical
Publication of CN109598512B publication Critical patent/CN109598512B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4016Transaction verification involving fraud or risk level assessment in transaction processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • G06Q20/4014Identity check for transactions
    • G06Q20/40145Biometric identity checks
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y04INFORMATION OR COMMUNICATION TECHNOLOGIES HAVING AN IMPACT ON OTHER TECHNOLOGY AREAS
    • Y04SSYSTEMS INTEGRATING TECHNOLOGIES RELATED TO POWER NETWORK OPERATION, COMMUNICATION OR INFORMATION TECHNOLOGIES FOR IMPROVING THE ELECTRICAL POWER GENERATION, TRANSMISSION, DISTRIBUTION, MANAGEMENT OR USAGE, i.e. SMART GRIDS
    • Y04S10/00Systems supporting electrical power generation, transmission or distribution
    • Y04S10/50Systems or methods supporting the power network operation or management, involving a certain degree of interaction with the load-side end user applications

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Computer Security & Cryptography (AREA)
  • Finance (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Debugging And Monitoring (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the present application provides a kind of tactful O&M method and device, wherein method, it include: that Utilization strategies verifying model verifies the performance of strategy to be released, if verification result data meets the verification result condition of setting, then the strategy is gradually issued by the way of gradually expanding scope of release, the operation result data of the strategy after monitors distribution carry out corresponding regulation processing to the strategy if operation result data are unsatisfactory for the operation result condition of setting.

Description

Tactful O&M method and device
Technical field
This application involves field of computer technology more particularly to a kind of tactful O&M method and devices.
Background technique
In business procession, it is often necessary to write various strategies to realize corresponding purpose.For example, writing abnormal number According to recognition strategy, to identify abnormal business datum from a large amount of business datum, alternatively, writing risk subscribers identification plan Slightly, to identify that account has the user of stolen risk from a large amount of user.
To guarantee that the strategy write being capable of smoothly online and operation, it is necessary to a kind of technical solution is provided, to send out in strategy Before cloth, in policy issue, after policy issue, strategy is runed and is safeguarded.
Summary of the invention
The purpose of the embodiment of the present application is to provide a kind of tactful O&M method and device, before policy issue, strategy hair In cloth, after policy issue, strategy is runed and is safeguarded.
To reach above-mentioned technical purpose, the embodiment of the present application is achieved in that
The embodiment of the present application provides a kind of tactful O&M method, comprising: Utilization strategies verify model to plan to be released Performance slightly is verified;If verification result data meets the verification result condition of setting, uses and gradually expand scope of release Mode gradually issue the strategy;The operation result data of the strategy after monitors distribution, if the operation result data It is unsatisfactory for the operation result condition of setting, then corresponding regulation processing is carried out to the strategy.
The embodiment of the present application provides a kind of tactful O&M device, comprising: authentication unit verifies model for Utilization strategies The performance of strategy to be released is verified;Release unit, if meeting the verification result item of setting for verification result data Part then gradually issues the strategy by the way of gradually expanding scope of release;Processing unit, described in after monitors distribution Strategy operation result data, if the operation result data be unsatisfactory for setting operation result condition, to it is described strategy into The corresponding regulation processing of row.
The embodiment of the present application provides a kind of tactful O&M equipment, comprising: processor;And it is arranged to storage computer The memory of executable instruction, the computer executable instructions make the processor realize plan described above when executed The step of omiting O&M method.
The embodiment of the present application provides a kind of storage medium, and for storing computer executable instructions, the computer can Execute instruction the step of realizing tactful O&M method described above when executed.
In the embodiment of the present application, before policy issue, Utilization strategies are verified model and are carried out to the performance of strategy to be released Verifying during policy issue, is issued if verification result data meets the verification result condition of setting using gradually expanding The mode of range gradually issues the strategy, and after policy issue, the operation result data of the strategy after monitors distribution, if Operation result data are unsatisfactory for the operation result condition of setting, then carry out corresponding regulation processing to the strategy, therefore pass through this Embodiment can run strategy and be safeguarded, to guarantee to compile before policy issue, in policy issue, after policy issue The strategy write being capable of smoothly online and operation.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The some embodiments recorded in application, for those of ordinary skill in the art, in the premise of not making the creative labor property Under, it is also possible to obtain other drawings based on these drawings.
Fig. 1 is the flow diagram for the tactful O&M method that one embodiment of the application provides;
Fig. 2 is the flow diagram for the publishing policy that one embodiment of the application provides;
Fig. 3 is the flow diagram for the publishing policy that another embodiment of the application provides;
Fig. 4 is the module composition schematic diagram for the tactful O&M device that one embodiment of the application provides;
Fig. 5 is the structural schematic diagram for the tactful O&M equipment that one embodiment of the application provides.
Specific embodiment
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with the application reality The attached drawing in example is applied, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described implementation Example is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this field is common The application protection all should belong in technical staff's every other embodiment obtained without creative efforts Range.
The embodiment of the present application provides a kind of tactful O&M method and device, with before policy issue, in policy issue, plan After slightly issuing, strategy is runed and is safeguarded.Tactful O&M method in the embodiment of the present application can be applied in tactful O&M In equipment, executed by tactful O&M equipment.
Fig. 1 is the flow diagram for the tactful O&M method that one embodiment of the application provides, as shown in Figure 1, this method packet It includes:
Step S102, Utilization strategies are verified model and are verified to the performance of strategy to be released;
Step S104 is used if verification result data meets the verification result condition of setting and is gradually expanded scope of release Mode gradually issue the strategy;
Step S106, the operation result data of the strategy after monitors distribution, if operation result data are unsatisfactory for setting Operation result condition then carries out corresponding regulation processing to the strategy.
In the embodiment of the present application, before policy issue, Utilization strategies are verified model and are carried out to the performance of strategy to be released Verifying during policy issue, is issued if verification result data meets the verification result condition of setting using gradually expanding The mode of range gradually issues the strategy, and after policy issue, the operation result data of the strategy after monitors distribution, if Operation result data are unsatisfactory for the operation result condition of setting, then carry out corresponding regulation processing to the strategy, therefore pass through this Embodiment can run strategy and be safeguarded, to guarantee to compile before policy issue, in policy issue, after policy issue The strategy write being capable of smoothly online and operation.
In above-mentioned steps S102, Utilization strategies are verified model and are verified to the performance of strategy to be released, specifically can be with Are as follows: strategy to be released is input to policy validation model, Utilization strategies verify model, according to the function of the strategy from history number According to the target data that middle acquisition matches with the strategy, Utilization strategies verify model, run the strategy, in target data with right The performance of the strategy is verified.
Policy validation model is properly termed as simulation laboratory again.In the present embodiment, strategy to be released is input to first Policy validation model, Utilization strategies are verified model, can be obtained from historical data according to the function of the strategy and the strategy phase Matched target data, and the strategy is run in target data, it is verified with the performance to the strategy.
Specifically, policy validation model can determine the function of the strategy, for example the function of the strategy is that identification has quilt The account for stealing risk, alternatively, the function of the strategy is to judge whether the account of user is stolen.Policy validation model is determining the plan After function slightly, according to the function of the strategy, the target data to match with the strategy is obtained from historical data.Historical data Can according to user historical operation generate data, for example, the history of the historical trading data of user account, user account Security settings data etc., target data are located in historical data, match with the strategy, for example, if the function of the strategy is to sentence Whether the account of disconnected user is stolen, then target data can be the historical trading data of user account, if the function of the strategy is Identify the account with stolen risk, then target data can be the history security settings data of user account.
Next, policy validation model runs above-mentioned strategy in target data, verified with the performance to the strategy. For example, above-mentioned strategy is run in the history security settings data of user account, there is stolen wind by above-mentioned strategy identification The account of danger for another example runs above-mentioned strategy in the historical trading data of user account, to judge user's by above-mentioned strategy Whether account is stolen.
In the present embodiment, Utilization strategies verify model, above-mentioned strategy is run in target data, with to strategy performance into After row verifying, result data can be verified.Verification result data may include each finger target value of the strategy.
For example, the function of the strategy is the account that identification has stolen risk, then the strategy has two indices, and one is It is determined as the first quantitative proportion of the account with stolen risk in whole user accounts, the other is in whole user accounts In be determined as the second quantitative proportion for not having the account of stolen risk, the first quantitative proportion is exemplified as 30%, the second quantity ratio Example is exemplified as 20%.For another example, the function of the strategy is to judge whether the account of user is stolen, then the strategy has two indices, One is the quantitative proportion for being determined as stolen account in whole user accounts, the other is determining in whole user accounts Another two quantitative proportion for the account not being stolen.
In the present embodiment, it is provided with verification result condition, which can be each finger target value of above-mentioned strategy each In self-corresponding threshold range, for example, the value of above-mentioned first quantitative proportion is between 15% to 30%, above-mentioned second quantitative proportion Value between 10% to 30%.
In the present embodiment, after Utilization strategies verifying model verifies the performance of strategy to be released, verifying knot is judged Whether whether fruit data meet the verification result condition of setting, that is, judging each finger target value of the strategy respectively right In the threshold range answered, if, it is determined that verification result data meets the verification result condition of setting, if it exists times of the strategy It anticipates one and refers to target value not in corresponding threshold range, it is determined that verification result data is unsatisfactory for the verification result item of setting Part.
In above-mentioned steps S104, if verification result data meets the verification result condition of setting, sent out using gradually expanding The mode of cloth range gradually issues the strategy.In addition, being needed if verification result data is unsatisfactory for the verification result condition of setting The operation maintenance personnel of strategy is prompted, to prompt whether operation maintenance personnel inspection policy writes correctly.
In above-mentioned steps S104, the gradually publishing policy by the way of gradually expanding scope of release, specifically:
(a1) the corresponding initial release range of strategy, the publishing policy in initial release range are determined;
(a2) operation result of the acquisition strategy within the scope of initial release, and judge whether operation result meets designated result Condition;
(a3) it if satisfied, then expanding initial release range, and repeats publishing policy, obtain operation result, judgement fortune The step of row result, until initial release range is extended to the corresponding maximum issue range of strategy.
Firstly, in above-mentioned movement (a1), the corresponding initial release range of strategy is determined, it can be with are as follows: according to the first of user Parameter is inputted, determines the corresponding initial release range of strategy, alternatively, first being originated using the scope of release of setting as strategy is corresponding Cloth range.
For example, the first input parameter is first user's serial number and second user serial number, then by user's serial number in the first user User between serial number and second user serial number, as the corresponding initial release range of strategy, for example, first user's serial number 10, second user serial number 1000, then the user by user's serial number between 10 and 1000 (including 10 and 1000), as strategy Corresponding initial release range.
Alternatively, the first input parameter is percent A, then preceding hundred after whole users sorting from small to large according to user's serial number The user of/A, as the corresponding initial release range of strategy.For example, the first input parameter is 10%, then whole users are pressed Preceding 10 user after sorting from small to large according to user's serial number, as the corresponding initial release range of strategy.
For another example, the user that the scope of release set is user's serial number between third user serial number and fourth user serial number, Then the user using user's serial number between third user serial number and fourth user serial number is as the corresponding initial release range of strategy. The user of the scope of release set preceding percent B as after whole users sort from small to large according to user's serial number, then by this hundred The user of/B is as the corresponding initial release range of strategy.
In above-mentioned movement (a1), the corresponding initial release range of strategy is being determined, the publishing policy in initial release range, For example, issuing the strategy in preceding 10 user after whole users sort from small to large according to user's serial number.
In above-mentioned movement (a2), operation result of the acquisition strategy within the scope of initial release, and whether judge operation result Meet designated result condition.In the present embodiment, operation result of the strategy within the scope of initial release may include each of the strategy A finger target value.Such as the example above, the function of the strategy is the account that identification has stolen risk, then there are two strategy tools Index, one is the first quantitative proportion for being determined as the account with stolen risk in whole user accounts, the other is It is determined as the second quantitative proportion for not having the account of stolen risk in whole user accounts, the value of the first quantitative proportion is exemplified as 30%, the value of the second quantitative proportion is exemplified as 20%.
In the present embodiment, it is provided with designated result condition, which can be each finger target value of above-mentioned strategy each In self-corresponding threshold range, for example, the value of above-mentioned first quantitative proportion is between 15% to 30%, above-mentioned second quantitative proportion Value between 10% to 30%.
In the present embodiment, operation result of the acquisition strategy within the scope of initial release, and judge whether operation result meets Designated result condition, that is, judge each finger target value of the strategy whether in corresponding threshold range, if, Then determine that operation result meets designated result condition, any one of the strategy refers to target value not in corresponding threshold value model if it exists In enclosing, it is determined that operation result is unsatisfactory for designated result condition.
In above-mentioned movement (a3), if satisfied, then expanding initial release range.Expanding initial release range specifically may is that According to the second of user input parameter, expand the initial release range, alternatively, alternatively, according to the range of setting expand parameter, Expand initial release range.In addition, needing to carry out the operation maintenance personnel of strategy if operation result is unsatisfactory for designated result condition Prompt, to prompt whether operation maintenance personnel inspection policy writes correctly.
For example, the second input parameter is the 5th user's serial number and the 6th user's serial number, then by user's serial number in the 5th user User between serial number and the 6th user's serial number, as the initial release range after expansion.Wherein, if the first input parameter is the One user's serial number and second user serial number, then the 5th user's serial number is less than or equal to first user's serial number, and the 6th user's serial number is greater than Equal to second user serial number.
Alternatively, the second input parameter is percent C, then preceding hundred after whole users sorting from small to large according to user's serial number The user of/C, as the initial release range after expansion.Wherein, if the first input parameter is percent A, the value of A is less than The value of C.
For another example, the range set expands user number of the parameter to set and increases then on the basis of initial release range The user number of the setting is just originated using the initial release range after increase as the initial release range after expanding with expanding Cloth range.
After expanding initial release range, above-mentioned publishing policy is repeated, operation result is obtained, judges operation result The step of, until initial release range is extended to the corresponding maximum issue range of strategy.In the present embodiment, initial release range refers to Be user scope on line, maximum issue may range from whole user groups on line.
Fig. 2 is the flow diagram for the publishing policy that one embodiment of the application provides, as shown in Fig. 2, the process includes:
Step S202 determines the corresponding initial release range of strategy.
Step S204, the publishing policy in initial release range.
Step S206, operation result of the acquisition strategy within the scope of initial release.
Step S208, judges whether the operation result obtained meets designated result condition.
If satisfied, executing step S210, otherwise, step S212 is executed.
Step S210 judges whether initial release range is maximum issue range.
If so, terminating process, otherwise, step S214 is executed.
Step S212, prompts whether operation maintenance personnel inspection policy writes correctly.
Step S214 expands initial release range, and return step S204.
It in step S212, can stop issuing the strategy, the strategy of publication can also be recalled.
As it can be seen that through this embodiment, can in using progressive manner on line user group gradually publishing policy, and The operation result of concern strategy in real time, to guarantee the smooth publication of strategy, avoiding disposably will be in policy issue to whole lines After user group, if strategy is operating abnormally the problem of causing a large amount of abnormal conditions to concentrate outburst.
It after policy issue, for example is published in initial release range, or is published to the initial release range after expanding In after, S106, monitors the operation result data of the strategy through the above steps, if operation result data be unsatisfactory for setting operation As a result condition then carries out corresponding regulation processing to the strategy.
In the present embodiment, operation result data may include each finger target value of the strategy.Such as the example above, the plan Function slightly is the account that identification has stolen risk, then the strategy has two indices, and one is in whole user accounts It is determined as the first quantitative proportion of the account with stolen risk, the other is being determined as not having quilt in whole user accounts The second quantitative proportion of the account of risk is stolen, the value of the first quantitative proportion is exemplified as 30%, and the value of the second quantitative proportion is exemplified as 20%.
In the present embodiment, it is provided with operation result condition, which can be each finger target value of above-mentioned strategy each In self-corresponding threshold range, for example, the value of above-mentioned first quantitative proportion is between 15% to 30%, above-mentioned second quantitative proportion Value between 10% to 30%.
In the present embodiment, the operation result data of the strategy are monitored, judge whether operation result data meet the fortune of setting Row result condition, that is, judge each finger target value of the strategy whether in corresponding threshold range, if, Determine that operation result data meet the operation result condition of setting, any one of the strategy refers to target value not in correspondence if it exists Threshold range in, it is determined that operation result data be unsatisfactory for setting operation result condition.
If satisfied, then continuing to be monitored the operation result data of strategy, if not satisfied, then carrying out strategy corresponding Regulation processing, specifically includes any one of following manner:
(b1) alarm operation is carried out for strategy;
(b2) it determines the corresponding subsequent operation of strategy, degrades and execute the subsequent operation;
(b3) it determines the corresponding subsequent operation of strategy, terminates and execute the subsequent operation;
(b4) if strategy is not distributed to corresponding maximum issue range, stop issuing the strategy;
(b5) if policy issue recalls the strategy to corresponding maximum issue range.
Specifically, if operation result data are unsatisfactory for the operation result condition of setting, alarm operation is carried out for strategy. For example, there is abnormal prompt information in the operation result data for exporting the strategy, it is different to prompt operation maintenance personnel to pay close attention to and solve this Often.
In the case of another, it can determine the corresponding subsequent operation of strategy, degrade and execute the subsequent operation, for example, at this A sub-operation is selected to execute in multiple sub-operations that subsequent operation includes, alternatively, the subsequent operation is replaced with predetermined Specified operation.
For example, the function of strategy is the account that identification has stolen risk, the corresponding subsequent operation of the strategy is to identify When the account with stolen risk out is traded, it is desirable that user carries out two kinds of identification sides of recognition of face and fingerprint recognition Formula.Then in this case, it can be to select one in multiple sub-operations that the subsequent operation includes that degradation, which executes the subsequent operation, Sub-operation executes, for example, a kind of this mode of fingerprint recognition is only provided, to (will such as not have in tactful operation result data exception There is the account of stolen risk to be mistakenly identified as the account with stolen risk), avoid subsequent operation for the interference of user's bring.
For example, the function of strategy is to judge whether the account of user is stolen, the corresponding subsequent operation of the strategy is in determination When the account of user is stolen, freeze the account.Then in this case, the degradation execution subsequent operation can be, by the subsequent operation Predetermined specified operation is replaced with, for example, the operation of Frozen Account is replaced with to the operation of the short-message verification account, thus (account not being stolen such as is mistakenly identified as to stolen account) in tactful operation result data exception, avoids the subsequent operation from being The interference of user's bring.
In the case of another, it can determine the corresponding subsequent operation of strategy, terminate and execute the subsequent operation.
For example, the function of strategy is the account that identification has stolen risk, the corresponding subsequent operation of the strategy is to identify When the account with stolen risk out is traded, it is desirable that user carries out two kinds of identification sides of recognition of face and fingerprint recognition Formula.Then in this case, it can be that user is not forced to carry out recognition of face and fingerprint recognition, user that termination, which executes the subsequent operation, Identification method can be voluntarily selected, to (such as will accidentally know without being stolen the account of risk in tactful operation result data exception Wei not be with the account of stolen risk), avoid subsequent operation for the interference of user's bring.
For example, the function of strategy is to judge whether the account of user is stolen, the corresponding subsequent operation of the strategy is in determination When the account of user is stolen, freeze the account.Then in this case, it can be not freeze to identify that termination, which executes the subsequent operation, The stolen account come, so that (account not being stolen such as be mistakenly identified as to stolen account in tactful operation result data exception Family), avoid subsequent operation for the interference of user's bring.
In another case, judge whether the strategy is distributed to corresponding maximum issue range, maximum issue range can be with For whole user groups on line.If the strategy is not distributed to corresponding maximum issue range, stop issuing the strategy, thus In tactful operation result data exception, avoidance strategy is continued to run as the interference of user's bring.It in this case, can also be It has issued and has recalled the strategy in the scope of release of the strategy.
In another case, judge whether the strategy is distributed to corresponding maximum issue range, maximum issue range can be with For whole user groups on line.If the policy issue, which to corresponding maximum issue range, is recalled, issues the strategy, thus When tactful operation result data exception, avoidance strategy is continued to run as the interference of user's bring.
In one embodiment, the operation result data of acquisition strategy, by the history of the data and the strategy of identical function Operation result data are compared, and determine difference size between the two, are more than difference allowed band, then if the difference is excessive Can carrying out degradation to the corresponding subsequent operation of strategy, perhaps termination degrades or termination may be collectively referred to as at fusing Reason.
In one embodiment, the operation result data of acquisition strategy transport the data and the history of identical function strategy Row result data is compared, and determines difference size between the two, and, which is compared with the index of setting, Determine difference size between the two, it, can be with countermeasure if above-mentioned two difference is more than corresponding difference allowed band Slightly corresponding subsequent operation carries out degradation, and perhaps termination degrades or termination may be collectively referred to as fusing processing.
It, can be with if the operation result data of strategy are unsatisfactory for the operation result condition of setting as it can be seen that in the present embodiment Corresponding regulation processing is carried out to the strategy, to alleviate the strategy for the interference of user's bring, so that operation maintenance personnel is repaired in time The multiple strategy.
In the present embodiment, can be with by the way of gradually expanding scope of release gradually before publishing policy: acquisition be worked as Data on preceding line run the strategy on current line in data, to carry out trial operation to the strategy, to result of trial operation number According to being detected, determine that result of trial operation data meet the result of trial operation condition of setting according to testing result.
Specifically, before gradually publishing policy, it is full to the verification result data of the performance of strategy that Utilization strategies verify model The verification result condition set enough, then data on available current line, run the strategy on current line in data, with Trial operation is carried out to the strategy.Wherein, data can operate on line on current line for the active user obtained from network The data generated in real time afterwards, such as customer transaction data on the front, when the user behavior data on front.Then, it obtains Result of trial operation data, and result of trial operation data are detected, to judge whether result of trial operation data meet setting Result of trial operation condition.
Result of trial operation data may include each finger target value of the strategy.Such as the example above, the function of the strategy There can be the account of stolen risk for identification, then the strategy has two indices, and one is determined as in whole user accounts First quantitative proportion of the account with stolen risk, the other is being determined as not having stolen risk in whole user accounts Account the second quantitative proportion, the value of the first quantitative proportion is exemplified as 30%, and the value of the second quantitative proportion is exemplified as 20%.
In the present embodiment, it is provided with result of trial operation condition, which can exist for each finger target value of above-mentioned strategy In corresponding threshold range, for example, the value of above-mentioned first quantitative proportion is between 15% to 30%, above-mentioned second quantity ratio The value of example is between 10% to 30%.
In the present embodiment, result of trial operation data are detected, judge whether result of trial operation data meet setting Result of trial operation condition, that is, each finger target value of the strategy is judged whether in corresponding threshold range, if inspection Surveying result is to meet the result of trial operation condition of setting in, it is determined that result of trial operation data, if testing result is that there are the plans Slightly any one refers to target value not in corresponding threshold range, it is determined that result of trial operation data are unsatisfactory for the test run of setting Row result condition.If result of trial operation data meet the result of trial operation condition of setting, using gradually expansion scope of release Mode gradually issues the strategy.
Fig. 3 is the flow diagram for the publishing policy that another embodiment of the application provides, as shown in figure 3, the process includes:
Step S302, Utilization strategies are verified model and are verified to the performance of strategy to be released;
Step S304, judges whether verification result data meets the verification result condition of setting;
If so, executing step S306, otherwise, step S312 is executed.
Step S306 obtains data on current line, runs the strategy in data on current line, with to the strategy into Row trial operation;
Step S308, judges whether result of trial operation data meet the result of trial operation condition of setting.
If satisfied, executing step S310, otherwise, step S312 is executed.
Step S310 gradually issues the strategy by the way of gradually expanding scope of release.
Step S312, the prompt information of output policy exception, to prompt operation maintenance personnel adjustable strategies.
Step S314, the operation result data of the strategy after monitors distribution, judges whether operation result data meet setting Operation result condition.
If satisfied, otherwise circulation step S314 executes step S316.
Step S316 carries out corresponding regulation processing to the strategy.
In method flow shown in Fig. 3, after policy issue to initial release range, so that it may to the operation result number of strategy According to being monitored, according to monitored results, alarm operation can be carried out, degrading executes subsequent operation, terminate execution subsequent operation, stop Only at least one of publishing policy and revocation policies.In a specific embodiment, start to be distributed in strategy and just originate After cloth range, strategy is monitored in real time, thus first time discovery strategy operation result exception and handled.
To sum up, through this embodiment in tactful O&M method, at least can achieve following technical effect:
(1) before policy issue, in policy issue, after policy issue, strategy is runed and is safeguarded, to guarantee to compile The strategy write can be smoothly online and be run, and the O&M efficiency of strategy is greatly improved.
(2) strategy can be monitored in real time after strategy starts publication, meets the requirement of real-time of policy monitor; When tactful operation result data exception, regulation processing is carried out to strategy automatically, is guaranteed once strategy is operating abnormally, it can be first Time is handled, and solving the problems, such as can only artificial treatment after original exception occurs.
(3) by policy validation model, crawl historical data that can be more intelligent verifies strategy, improves verifying Efficiency and accuracy.
For above-mentioned tactful O&M method, the embodiment of the present application provides a kind of tactful O&M device, and Fig. 4 is the application The module composition schematic diagram for the tactful O&M device that one embodiment provides, as shown in figure 4, the device includes:
Authentication unit 41 is verified for performance of the Utilization strategies verifying model to strategy to be released;
Release unit 42 is sent out if meeting the verification result condition of setting for verification result data using gradually expanding The mode of cloth range gradually issues the strategy;
Processing unit 43, for the operation result data of the strategy after monitors distribution, if the operation result data It is unsatisfactory for the operation result condition of setting, then corresponding regulation processing is carried out to the strategy.
Optionally, the authentication unit 41 is specifically used for:
Strategy to be released is input to policy validation model;
Using the policy validation model, obtained from historical data and the tactful phase according to the function of the strategy The target data matched;
Using the policy validation model, the strategy is run in the target data, with the performance to the strategy It is verified.
Optionally, the release unit 42 is specifically used for:
It determines the corresponding initial release range of the strategy, issues the strategy in the initial release range;
Operation result of the strategy within the scope of the initial release is obtained, and judges whether the operation result meets Designated result condition;
If satisfied, then expanding the initial release range, and the publication strategy is repeated, operation result is obtained, sentences The step of disconnected operation result, until the initial release range is extended to the corresponding maximum issue range of the strategy.
Optionally, the release unit 42 also particularly useful for:
According to the first of user the input parameter, the corresponding initial release range of the strategy is determined;
Alternatively,
Using the scope of release of setting as the corresponding initial release range of the strategy.
Optionally, the release unit 42 also particularly useful for:
According to the second of user the input parameter, expand the initial release range;
Alternatively,
Expand parameter according to the range of setting, expands the initial release range.
Optionally, further include trial operation unit, be used for:
Before gradually issuing the strategy by the way of gradually expanding scope of release, data on current line are obtained, The strategy is run in data on the current line, to carry out trial operation to the strategy;
Result of trial operation data are detected, determine that the result of trial operation data meet setting according to testing result Result of trial operation condition.
Optionally, the processing unit 43 is specifically used for any one of following manner:
Alarm operation is carried out for the strategy;
It determines the corresponding subsequent operation of the strategy, degrades and execute the subsequent operation;
It determines the corresponding subsequent operation of the strategy, terminates and execute the subsequent operation;
If the strategy is not distributed to corresponding maximum issue range, stop issuing the strategy;
If the policy issue recalls the strategy to corresponding maximum issue range.
In the embodiment of the present application, before policy issue, Utilization strategies are verified model and are carried out to the performance of strategy to be released Verifying during policy issue, is issued if verification result data meets the verification result condition of setting using gradually expanding The mode of range gradually issues the strategy, and after policy issue, the operation result data of the strategy after monitors distribution, if Operation result data are unsatisfactory for the operation result condition of setting, then carry out corresponding regulation processing to the strategy, therefore pass through this Embodiment can run strategy and be safeguarded, to guarantee to compile before policy issue, in policy issue, after policy issue The strategy write being capable of smoothly online and operation.
Tactful O&M device in the embodiment of the present application can be realized each process of tactful O&M method above-mentioned, and reach To identical effect, it is not repeated herein.
Further, the embodiment of the present application also provides a kind of tactful O&M equipment, Fig. 5 provides for one embodiment of the application Tactful O&M equipment structural schematic diagram, as shown in figure 5, tactful O&M equipment can generate and compare because configuration or performance are different Big difference may include one or more processor 901 and memory 902, can store one in memory 902 A or more than one storage application program or data.Wherein, memory 902 can be of short duration storage or persistent storage.It is stored in The application program of memory 902 may include one or more modules (diagram is not shown), and each module may include pair Series of computation machine executable instruction in tactful O&M equipment.Further, processor 901 can be set to and memory 902 communications execute the series of computation machine executable instruction in memory 902 in tactful O&M equipment.Tactful O&M equipment Can also include one or more power supplys 903, one or more wired or wireless network interfaces 904, one or one A above input/output interface 905, one or more keyboards 906 etc..
In a specific embodiment, tactful O&M equipment includes memory and one or more journey Sequence, perhaps more than one program is stored in memory and one or more than one program may include one for one of them Or more than one module, and each module may include to the series of computation machine executable instruction in tactful O&M equipment, and Be configured to be executed this by one or more than one processor or more than one program include by carry out it is following based on Calculation machine executable instruction:
Utilization strategies are verified model and are verified to the performance of strategy to be released;
If verification result data meets the verification result condition of setting, by the way of gradually expanding scope of release gradually Issue the strategy;
The operation result data of the strategy after monitors distribution, if the operation result data are unsatisfactory for the operation of setting As a result condition then carries out corresponding regulation processing to the strategy.
Optionally, when executed, Utilization strategies verify model to the property of strategy to be released to computer executable instructions It can be carried out verifying, comprising:
Strategy to be released is input to policy validation model;
Using the policy validation model, obtained from historical data and the tactful phase according to the function of the strategy The target data matched;
Using the policy validation model, the strategy is run in the target data, with the performance to the strategy It is verified.
Optionally, computer executable instructions when executed, are gradually issued by the way of gradually expanding scope of release The strategy, comprising:
It determines the corresponding initial release range of the strategy, issues the strategy in the initial release range;
Operation result of the strategy within the scope of the initial release is obtained, and judges whether the operation result meets Designated result condition;
If satisfied, then expanding the initial release range, and the publication strategy is repeated, operation result is obtained, sentences The step of disconnected operation result, until the initial release range is extended to the corresponding maximum issue range of the strategy.
Optionally, computer executable instructions when executed, determine the corresponding initial release range of the strategy, packet It includes:
According to the first of user the input parameter, the corresponding initial release range of the strategy is determined;
Alternatively,
Using the scope of release of setting as the corresponding initial release range of the strategy.
Optionally, computer executable instructions when executed, expand the initial release range, comprising:
According to the second of user the input parameter, expand the initial release range;
Alternatively,
Expand parameter according to the range of setting, expands the initial release range.
Optionally, computer executable instructions when executed, are gradually sent out by the way of gradually expanding scope of release Before strategy described in cloth, further includes:
Obtain data on current line, run the strategy in data on the current line, with to it is described strategy into Row trial operation;
Result of trial operation data are detected, determine that the result of trial operation data meet setting according to testing result Result of trial operation condition.
Optionally, computer executable instructions when executed, carry out corresponding regulation processing to the strategy, including with Any one of under type:
Alarm operation is carried out for the strategy;
It determines the corresponding subsequent operation of the strategy, degrades and execute the subsequent operation;
It determines the corresponding subsequent operation of the strategy, terminates and execute the subsequent operation;
If the strategy is not distributed to corresponding maximum issue range, stop issuing the strategy;
If the policy issue recalls the strategy to corresponding maximum issue range.
In the embodiment of the present application, before policy issue, Utilization strategies are verified model and are carried out to the performance of strategy to be released Verifying during policy issue, is issued if verification result data meets the verification result condition of setting using gradually expanding The mode of range gradually issues the strategy, and after policy issue, the operation result data of the strategy after monitors distribution, if Operation result data are unsatisfactory for the operation result condition of setting, then carry out corresponding regulation processing to the strategy, therefore pass through this Embodiment can run strategy and be safeguarded, to guarantee to compile before policy issue, in policy issue, after policy issue The strategy write being capable of smoothly online and operation.
Tactful O&M equipment in the embodiment of the present application can be realized each process of tactful O&M method above-mentioned, and reach To identical effect, it is not repeated herein.
Further, the embodiment of the present application also provides a kind of storage medium, for storing computer executable instructions, one In kind specific embodiment, which can be USB flash disk, CD, hard disk etc., and the computer of storage medium storage is executable Instruction is able to achieve following below scheme when being executed by processor:
Utilization strategies are verified model and are verified to the performance of strategy to be released;
If verification result data meets the verification result condition of setting, by the way of gradually expanding scope of release gradually Issue the strategy;
The operation result data of the strategy after monitors distribution, if the operation result data are unsatisfactory for the operation of setting As a result condition then carries out corresponding regulation processing to the strategy.
Optionally, the computer executable instructions of storage medium storage are when being executed by processor, Utilization strategies verifying Model verifies the performance of strategy to be released, comprising:
Strategy to be released is input to policy validation model;
Using the policy validation model, obtained from historical data and the tactful phase according to the function of the strategy The target data matched;
Using the policy validation model, the strategy is run in the target data, with the performance to the strategy It is verified.
Optionally, the computer executable instructions of storage medium storage are when being executed by processor, using gradually expanding The mode of scope of release gradually issues the strategy, comprising:
It determines the corresponding initial release range of the strategy, issues the strategy in the initial release range;
Operation result of the strategy within the scope of the initial release is obtained, and judges whether the operation result meets Designated result condition;
If satisfied, then expanding the initial release range, and the publication strategy is repeated, operation result is obtained, sentences The step of disconnected operation result, until the initial release range is extended to the corresponding maximum issue range of the strategy.
Optionally, the computer executable instructions of storage medium storage determine the strategy when being executed by processor Corresponding initial release range, comprising:
According to the first of user the input parameter, the corresponding initial release range of the strategy is determined;
Alternatively,
Using the scope of release of setting as the corresponding initial release range of the strategy.
Optionally, the computer executable instructions of storage medium storage expand described initial when being executed by processor Scope of release, comprising:
According to the second of user the input parameter, expand the initial release range;
Alternatively,
Expand parameter according to the range of setting, expands the initial release range.
Optionally, the computer executable instructions of storage medium storage gradually expand when being executed by processor using The mode of big scope of release is gradually issued before the strategy, further includes:
Obtain data on current line, run the strategy in data on the current line, with to it is described strategy into Row trial operation;
Result of trial operation data are detected, determine that the result of trial operation data meet setting according to testing result Result of trial operation condition.
Optionally, the storage medium storage computer executable instructions when being executed by processor, to it is described strategy into The corresponding regulation of row is handled, any one including following manner:
Alarm operation is carried out for the strategy;
It determines the corresponding subsequent operation of the strategy, degrades and execute the subsequent operation;
It determines the corresponding subsequent operation of the strategy, terminates and execute the subsequent operation;
If the strategy is not distributed to corresponding maximum issue range, stop issuing the strategy;
If the policy issue recalls the strategy to corresponding maximum issue range.
In the embodiment of the present application, before policy issue, Utilization strategies are verified model and are carried out to the performance of strategy to be released Verifying during policy issue, is issued if verification result data meets the verification result condition of setting using gradually expanding The mode of range gradually issues the strategy, and after policy issue, the operation result data of the strategy after monitors distribution, if Operation result data are unsatisfactory for the operation result condition of setting, then carry out corresponding regulation processing to the strategy, therefore pass through this Embodiment can run strategy and be safeguarded, to guarantee to compile before policy issue, in policy issue, after policy issue The strategy write being capable of smoothly online and operation.
Storage medium in the embodiment of the present application can be realized each process of tactful O&M method above-mentioned, and reach phase Same effect, is not repeated herein.
In the 1990s, the improvement of a technology can be distinguished clearly be on hardware improvement (for example, Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So And with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit. Designer nearly all obtains corresponding hardware circuit by the way that improved method flow to be programmed into hardware circuit.Cause This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device (Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate Array, FPGA)) it is exactly such a integrated circuit, logic function determines device programming by user.By designer Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, designs and makes without asking chip maker Dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " is patrolled Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development, And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language (Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many kind, such as ABEL (Advanced Boolean Expression Language)、AHDL(Altera Hardware Description Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL (Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby Hardware Description Language) etc., VHDL (Very-High-Speed is most generally used at present Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also answer This understands, it is only necessary to method flow slightly programming in logic and is programmed into integrated circuit with above-mentioned several hardware description languages, The hardware circuit for realizing the logical method process can be readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing The computer for the computer readable program code (such as software or firmware) that device and storage can be executed by (micro-) processor can Read medium, logic gate, switch, specific integrated circuit (Application Specific Integrated Circuit, ASIC), the form of programmable logic controller (PLC) and insertion microcontroller, the example of controller includes but is not limited to following microcontroller Device: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320 are deposited Memory controller is also implemented as a part of the control logic of memory.It is also known in the art that in addition to Pure computer readable program code mode is realized other than controller, can be made completely by the way that method and step is carried out programming in logic Controller is obtained to come in fact in the form of logic gate, switch, specific integrated circuit, programmable logic controller (PLC) and insertion microcontroller etc. Existing identical function.Therefore this controller is considered a kind of hardware component, and to including for realizing various in it The device of function can also be considered as the structure in hardware component.Or even, it can will be regarded for realizing the device of various functions For either the software module of implementation method can be the structure in hardware component again.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity, Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment The combination of equipment.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this The function of each unit can be realized in the same or multiple software and or hardware when application.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more, The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates, Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with In the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal Replacement, improvement etc., should be included within the scope of the claims of this application.

Claims (16)

1. a kind of strategy O&M method characterized by comprising
Utilization strategies are verified model and are verified to the performance of strategy to be released;
If verification result data meets the verification result condition of setting, gradually issued by the way of gradually expanding scope of release The strategy;
The operation result data of the strategy after monitors distribution, if the operation result data are unsatisfactory for the operation result of setting Condition then carries out corresponding regulation processing to the strategy.
2. the method according to claim 1, wherein Utilization strategies verify model to the performance of strategy to be released It is verified, comprising:
Strategy to be released is input to policy validation model;
Using the policy validation model, is obtained from historical data according to the function of the strategy and to be matched with the strategy Target data;
Using the policy validation model, the strategy is run in the target data, is carried out with the performance to the strategy Verifying.
3. the method according to claim 1, wherein gradually issuing institute by the way of gradually expanding scope of release State strategy, comprising:
It determines the corresponding initial release range of the strategy, issues the strategy in the initial release range;
Operation result of the strategy within the scope of the initial release is obtained, and it is specified to judge whether the operation result meets As a result condition;
If satisfied, then expanding the initial release range, and repeats the publication strategy, obtains operation result, judgement fortune The step of row result, until the initial release range is extended to the corresponding maximum issue range of the strategy.
4. according to the method described in claim 3, it is characterized in that, determining the corresponding initial release range of the strategy, comprising:
According to the first of user the input parameter, the corresponding initial release range of the strategy is determined;
Alternatively,
Using the scope of release of setting as the corresponding initial release range of the strategy.
5. according to the method described in claim 3, it is characterized in that, expanding the initial release range, comprising:
According to the second of user the input parameter, expand the initial release range;
Alternatively,
Expand parameter according to the range of setting, expands the initial release range.
6. the method according to claim 1, wherein gradually being issued by the way of gradually expanding scope of release Before the strategy, further includes:
Data on current line are obtained, run the strategy in data on the current line, to try the strategy Operation;
Result of trial operation data are detected, determine that the result of trial operation data meet the test run of setting according to testing result Row result condition.
7. method according to any one of claims 1 to 6, which is characterized in that carried out at corresponding regulation to the strategy It manages, any one including following manner:
Alarm operation is carried out for the strategy;
It determines the corresponding subsequent operation of the strategy, degrades and execute the subsequent operation;
It determines the corresponding subsequent operation of the strategy, terminates and execute the subsequent operation;
If the strategy is not distributed to corresponding maximum issue range, stop issuing the strategy;
If the policy issue recalls the strategy to corresponding maximum issue range.
8. a kind of strategy O&M device characterized by comprising
Authentication unit is verified for performance of the Utilization strategies verifying model to strategy to be released;
Release unit uses if meeting the verification result condition of setting for verification result data and gradually expands scope of release Mode gradually issue the strategy;
Processing unit, for the operation result data of the strategy after monitors distribution, if the operation result data are unsatisfactory for The operation result condition of setting then carries out corresponding regulation processing to the strategy.
9. device according to claim 8, which is characterized in that the authentication unit is specifically used for:
Strategy to be released is input to policy validation model;
Using the policy validation model, is obtained from historical data according to the function of the strategy and to be matched with the strategy Target data;
Using the policy validation model, the strategy is run in the target data, is carried out with the performance to the strategy Verifying.
10. device according to claim 8, which is characterized in that the release unit is specifically used for:
It determines the corresponding initial release range of the strategy, issues the strategy in the initial release range;
Operation result of the strategy within the scope of the initial release is obtained, and it is specified to judge whether the operation result meets As a result condition;
If satisfied, then expanding the initial release range, and repeats the publication strategy, obtains operation result, judgement fortune The step of row result, until the initial release range is extended to the corresponding maximum issue range of the strategy.
11. device according to claim 10, which is characterized in that the release unit also particularly useful for:
According to the first of user the input parameter, the corresponding initial release range of the strategy is determined;
Alternatively,
Using the scope of release of setting as the corresponding initial release range of the strategy.
12. device according to claim 10, which is characterized in that the release unit also particularly useful for:
According to the second of user the input parameter, expand the initial release range;
Alternatively,
Expand parameter according to the range of setting, expands the initial release range.
13. device according to claim 8, which is characterized in that further include trial operation unit, be used for:
Before gradually issuing the strategy by the way of gradually expanding scope of release, data on current line are obtained, in institute It states and runs the strategy on current line in data, to carry out trial operation to the strategy;
Result of trial operation data are detected, determine that the result of trial operation data meet the test run of setting according to testing result Row result condition.
14. according to the described in any item devices of claim 8 to 13, which is characterized in that the processing unit is specifically used for following Any one of mode:
Alarm operation is carried out for the strategy;
It determines the corresponding subsequent operation of the strategy, degrades and execute the subsequent operation;
It determines the corresponding subsequent operation of the strategy, terminates and execute the subsequent operation;
If the strategy is not distributed to corresponding maximum issue range, stop issuing the strategy;
If the policy issue recalls the strategy to corresponding maximum issue range.
15. a kind of strategy O&M equipment characterized by comprising processor;And it is arranged to the executable finger of storage computer The memory of order, the computer executable instructions make the processor realize that the claims 1 to 7 are any when executed The step of tactful O&M method described in item.
16. a kind of storage medium, for storing computer executable instructions, which is characterized in that the computer executable instructions The step of realizing the described in any item tactful O&M methods of the claims 1 to 7 when executed.
CN201811348589.9A 2018-11-13 2018-11-13 Policy operation and maintenance method and device Active CN109598512B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811348589.9A CN109598512B (en) 2018-11-13 2018-11-13 Policy operation and maintenance method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811348589.9A CN109598512B (en) 2018-11-13 2018-11-13 Policy operation and maintenance method and device

Publications (2)

Publication Number Publication Date
CN109598512A true CN109598512A (en) 2019-04-09
CN109598512B CN109598512B (en) 2023-06-02

Family

ID=65957742

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811348589.9A Active CN109598512B (en) 2018-11-13 2018-11-13 Policy operation and maintenance method and device

Country Status (1)

Country Link
CN (1) CN109598512B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112988504A (en) * 2021-02-08 2021-06-18 北京奇艺世纪科技有限公司 Alarm strategy setting method and device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140350993A1 (en) * 2013-05-24 2014-11-27 Hitachi, Ltd. Information management device and method
WO2016122879A1 (en) * 2015-01-28 2016-08-04 Allstate Insurance Company Risk unit based policies
CN107104820A (en) * 2017-03-23 2017-08-29 国网江苏省电力公司信息通信分公司 The daily O&M strategy of dynamic capacity-expanding based on F5 server nodes
CN107632842A (en) * 2017-09-26 2018-01-26 携程旅游信息技术(上海)有限公司 Rule configuration and dissemination method, system, equipment and storage medium
CN107818461A (en) * 2017-10-26 2018-03-20 中国科学院大学 Towards the network payment system and method in market
CN108768728A (en) * 2018-05-31 2018-11-06 康键信息技术(深圳)有限公司 O&M task processing method, device, computer equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140350993A1 (en) * 2013-05-24 2014-11-27 Hitachi, Ltd. Information management device and method
WO2016122879A1 (en) * 2015-01-28 2016-08-04 Allstate Insurance Company Risk unit based policies
CN107104820A (en) * 2017-03-23 2017-08-29 国网江苏省电力公司信息通信分公司 The daily O&M strategy of dynamic capacity-expanding based on F5 server nodes
CN107632842A (en) * 2017-09-26 2018-01-26 携程旅游信息技术(上海)有限公司 Rule configuration and dissemination method, system, equipment and storage medium
CN107818461A (en) * 2017-10-26 2018-03-20 中国科学院大学 Towards the network payment system and method in market
CN108768728A (en) * 2018-05-31 2018-11-06 康键信息技术(深圳)有限公司 O&M task processing method, device, computer equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112988504A (en) * 2021-02-08 2021-06-18 北京奇艺世纪科技有限公司 Alarm strategy setting method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN109598512B (en) 2023-06-02

Similar Documents

Publication Publication Date Title
EP3754571A1 (en) Risk control rule generation method and apparatus
JP6804668B2 (en) Block data validation method and equipment
CN108665143A (en) The appraisal procedure and device of air control model
CN105739956B (en) The method and system of the building intelligent rules model of computer system
CN107679700A (en) Business flow processing method, apparatus and server
CN108845936A (en) A kind of AB test method and system based on mass users
CN109002949A (en) A kind of method and device of air control strategy configuration and business air control
CN109003075A (en) A kind of Risk Identification Method and device
CN108881120A (en) A kind of data processing method and equipment based on block chain
CN111538869B (en) Transaction abnormal group detection method, device and equipment
CN109784013A (en) A kind of method, apparatus and equipment of information identification
CN109003071A (en) Method of payment, device and equipment
CN109508846A (en) A kind of detection method and device of unit data exception fluctuation
CN110020775A (en) A kind of risk trade management-control method and device
CN108984376A (en) A kind of system anomaly detection method, device and equipment
CN108319826A (en) A kind of method, apparatus and equipment of authentication
CN110021150A (en) A kind of data processing method, device and equipment
CN107578338A (en) A kind of service publishing method, device and equipment
CN109739627A (en) Dispatching method, electronic equipment and the medium of task
CN110532755B (en) Computer-implemented risk identification method and device
CN109598512A (en) Tactful O&M method and device
CN110245978A (en) Policy evaluation, policy selection method and device in tactful group
CN109493071A (en) Auth method based on block chain
CN109615423A (en) The processing method and processing device of business
CN109656946A (en) A kind of multilist relation query method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman, British Islands

Applicant after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Applicant before: Alibaba Group Holding Ltd.

GR01 Patent grant
GR01 Patent grant