Specific embodiment
In order to make those skilled in the art better understand the technical solutions in the application, below in conjunction with the application reality
The attached drawing in example is applied, the technical scheme in the embodiment of the application is clearly and completely described, it is clear that described implementation
Example is merely a part but not all of the embodiments of the present application.Based on the embodiment in the application, this field is common
The application protection all should belong in technical staff's every other embodiment obtained without creative efforts
Range.
The embodiment of the present application provides a kind of tactful O&M method and device, with before policy issue, in policy issue, plan
After slightly issuing, strategy is runed and is safeguarded.Tactful O&M method in the embodiment of the present application can be applied in tactful O&M
In equipment, executed by tactful O&M equipment.
Fig. 1 is the flow diagram for the tactful O&M method that one embodiment of the application provides, as shown in Figure 1, this method packet
It includes:
Step S102, Utilization strategies are verified model and are verified to the performance of strategy to be released;
Step S104 is used if verification result data meets the verification result condition of setting and is gradually expanded scope of release
Mode gradually issue the strategy;
Step S106, the operation result data of the strategy after monitors distribution, if operation result data are unsatisfactory for setting
Operation result condition then carries out corresponding regulation processing to the strategy.
In the embodiment of the present application, before policy issue, Utilization strategies are verified model and are carried out to the performance of strategy to be released
Verifying during policy issue, is issued if verification result data meets the verification result condition of setting using gradually expanding
The mode of range gradually issues the strategy, and after policy issue, the operation result data of the strategy after monitors distribution, if
Operation result data are unsatisfactory for the operation result condition of setting, then carry out corresponding regulation processing to the strategy, therefore pass through this
Embodiment can run strategy and be safeguarded, to guarantee to compile before policy issue, in policy issue, after policy issue
The strategy write being capable of smoothly online and operation.
In above-mentioned steps S102, Utilization strategies are verified model and are verified to the performance of strategy to be released, specifically can be with
Are as follows: strategy to be released is input to policy validation model, Utilization strategies verify model, according to the function of the strategy from history number
According to the target data that middle acquisition matches with the strategy, Utilization strategies verify model, run the strategy, in target data with right
The performance of the strategy is verified.
Policy validation model is properly termed as simulation laboratory again.In the present embodiment, strategy to be released is input to first
Policy validation model, Utilization strategies are verified model, can be obtained from historical data according to the function of the strategy and the strategy phase
Matched target data, and the strategy is run in target data, it is verified with the performance to the strategy.
Specifically, policy validation model can determine the function of the strategy, for example the function of the strategy is that identification has quilt
The account for stealing risk, alternatively, the function of the strategy is to judge whether the account of user is stolen.Policy validation model is determining the plan
After function slightly, according to the function of the strategy, the target data to match with the strategy is obtained from historical data.Historical data
Can according to user historical operation generate data, for example, the history of the historical trading data of user account, user account
Security settings data etc., target data are located in historical data, match with the strategy, for example, if the function of the strategy is to sentence
Whether the account of disconnected user is stolen, then target data can be the historical trading data of user account, if the function of the strategy is
Identify the account with stolen risk, then target data can be the history security settings data of user account.
Next, policy validation model runs above-mentioned strategy in target data, verified with the performance to the strategy.
For example, above-mentioned strategy is run in the history security settings data of user account, there is stolen wind by above-mentioned strategy identification
The account of danger for another example runs above-mentioned strategy in the historical trading data of user account, to judge user's by above-mentioned strategy
Whether account is stolen.
In the present embodiment, Utilization strategies verify model, above-mentioned strategy is run in target data, with to strategy performance into
After row verifying, result data can be verified.Verification result data may include each finger target value of the strategy.
For example, the function of the strategy is the account that identification has stolen risk, then the strategy has two indices, and one is
It is determined as the first quantitative proportion of the account with stolen risk in whole user accounts, the other is in whole user accounts
In be determined as the second quantitative proportion for not having the account of stolen risk, the first quantitative proportion is exemplified as 30%, the second quantity ratio
Example is exemplified as 20%.For another example, the function of the strategy is to judge whether the account of user is stolen, then the strategy has two indices,
One is the quantitative proportion for being determined as stolen account in whole user accounts, the other is determining in whole user accounts
Another two quantitative proportion for the account not being stolen.
In the present embodiment, it is provided with verification result condition, which can be each finger target value of above-mentioned strategy each
In self-corresponding threshold range, for example, the value of above-mentioned first quantitative proportion is between 15% to 30%, above-mentioned second quantitative proportion
Value between 10% to 30%.
In the present embodiment, after Utilization strategies verifying model verifies the performance of strategy to be released, verifying knot is judged
Whether whether fruit data meet the verification result condition of setting, that is, judging each finger target value of the strategy respectively right
In the threshold range answered, if, it is determined that verification result data meets the verification result condition of setting, if it exists times of the strategy
It anticipates one and refers to target value not in corresponding threshold range, it is determined that verification result data is unsatisfactory for the verification result item of setting
Part.
In above-mentioned steps S104, if verification result data meets the verification result condition of setting, sent out using gradually expanding
The mode of cloth range gradually issues the strategy.In addition, being needed if verification result data is unsatisfactory for the verification result condition of setting
The operation maintenance personnel of strategy is prompted, to prompt whether operation maintenance personnel inspection policy writes correctly.
In above-mentioned steps S104, the gradually publishing policy by the way of gradually expanding scope of release, specifically:
(a1) the corresponding initial release range of strategy, the publishing policy in initial release range are determined;
(a2) operation result of the acquisition strategy within the scope of initial release, and judge whether operation result meets designated result
Condition;
(a3) it if satisfied, then expanding initial release range, and repeats publishing policy, obtain operation result, judgement fortune
The step of row result, until initial release range is extended to the corresponding maximum issue range of strategy.
Firstly, in above-mentioned movement (a1), the corresponding initial release range of strategy is determined, it can be with are as follows: according to the first of user
Parameter is inputted, determines the corresponding initial release range of strategy, alternatively, first being originated using the scope of release of setting as strategy is corresponding
Cloth range.
For example, the first input parameter is first user's serial number and second user serial number, then by user's serial number in the first user
User between serial number and second user serial number, as the corresponding initial release range of strategy, for example, first user's serial number
10, second user serial number 1000, then the user by user's serial number between 10 and 1000 (including 10 and 1000), as strategy
Corresponding initial release range.
Alternatively, the first input parameter is percent A, then preceding hundred after whole users sorting from small to large according to user's serial number
The user of/A, as the corresponding initial release range of strategy.For example, the first input parameter is 10%, then whole users are pressed
Preceding 10 user after sorting from small to large according to user's serial number, as the corresponding initial release range of strategy.
For another example, the user that the scope of release set is user's serial number between third user serial number and fourth user serial number,
Then the user using user's serial number between third user serial number and fourth user serial number is as the corresponding initial release range of strategy.
The user of the scope of release set preceding percent B as after whole users sort from small to large according to user's serial number, then by this hundred
The user of/B is as the corresponding initial release range of strategy.
In above-mentioned movement (a1), the corresponding initial release range of strategy is being determined, the publishing policy in initial release range,
For example, issuing the strategy in preceding 10 user after whole users sort from small to large according to user's serial number.
In above-mentioned movement (a2), operation result of the acquisition strategy within the scope of initial release, and whether judge operation result
Meet designated result condition.In the present embodiment, operation result of the strategy within the scope of initial release may include each of the strategy
A finger target value.Such as the example above, the function of the strategy is the account that identification has stolen risk, then there are two strategy tools
Index, one is the first quantitative proportion for being determined as the account with stolen risk in whole user accounts, the other is
It is determined as the second quantitative proportion for not having the account of stolen risk in whole user accounts, the value of the first quantitative proportion is exemplified as
30%, the value of the second quantitative proportion is exemplified as 20%.
In the present embodiment, it is provided with designated result condition, which can be each finger target value of above-mentioned strategy each
In self-corresponding threshold range, for example, the value of above-mentioned first quantitative proportion is between 15% to 30%, above-mentioned second quantitative proportion
Value between 10% to 30%.
In the present embodiment, operation result of the acquisition strategy within the scope of initial release, and judge whether operation result meets
Designated result condition, that is, judge each finger target value of the strategy whether in corresponding threshold range, if,
Then determine that operation result meets designated result condition, any one of the strategy refers to target value not in corresponding threshold value model if it exists
In enclosing, it is determined that operation result is unsatisfactory for designated result condition.
In above-mentioned movement (a3), if satisfied, then expanding initial release range.Expanding initial release range specifically may is that
According to the second of user input parameter, expand the initial release range, alternatively, alternatively, according to the range of setting expand parameter,
Expand initial release range.In addition, needing to carry out the operation maintenance personnel of strategy if operation result is unsatisfactory for designated result condition
Prompt, to prompt whether operation maintenance personnel inspection policy writes correctly.
For example, the second input parameter is the 5th user's serial number and the 6th user's serial number, then by user's serial number in the 5th user
User between serial number and the 6th user's serial number, as the initial release range after expansion.Wherein, if the first input parameter is the
One user's serial number and second user serial number, then the 5th user's serial number is less than or equal to first user's serial number, and the 6th user's serial number is greater than
Equal to second user serial number.
Alternatively, the second input parameter is percent C, then preceding hundred after whole users sorting from small to large according to user's serial number
The user of/C, as the initial release range after expansion.Wherein, if the first input parameter is percent A, the value of A is less than
The value of C.
For another example, the range set expands user number of the parameter to set and increases then on the basis of initial release range
The user number of the setting is just originated using the initial release range after increase as the initial release range after expanding with expanding
Cloth range.
After expanding initial release range, above-mentioned publishing policy is repeated, operation result is obtained, judges operation result
The step of, until initial release range is extended to the corresponding maximum issue range of strategy.In the present embodiment, initial release range refers to
Be user scope on line, maximum issue may range from whole user groups on line.
Fig. 2 is the flow diagram for the publishing policy that one embodiment of the application provides, as shown in Fig. 2, the process includes:
Step S202 determines the corresponding initial release range of strategy.
Step S204, the publishing policy in initial release range.
Step S206, operation result of the acquisition strategy within the scope of initial release.
Step S208, judges whether the operation result obtained meets designated result condition.
If satisfied, executing step S210, otherwise, step S212 is executed.
Step S210 judges whether initial release range is maximum issue range.
If so, terminating process, otherwise, step S214 is executed.
Step S212, prompts whether operation maintenance personnel inspection policy writes correctly.
Step S214 expands initial release range, and return step S204.
It in step S212, can stop issuing the strategy, the strategy of publication can also be recalled.
As it can be seen that through this embodiment, can in using progressive manner on line user group gradually publishing policy, and
The operation result of concern strategy in real time, to guarantee the smooth publication of strategy, avoiding disposably will be in policy issue to whole lines
After user group, if strategy is operating abnormally the problem of causing a large amount of abnormal conditions to concentrate outburst.
It after policy issue, for example is published in initial release range, or is published to the initial release range after expanding
In after, S106, monitors the operation result data of the strategy through the above steps, if operation result data be unsatisfactory for setting operation
As a result condition then carries out corresponding regulation processing to the strategy.
In the present embodiment, operation result data may include each finger target value of the strategy.Such as the example above, the plan
Function slightly is the account that identification has stolen risk, then the strategy has two indices, and one is in whole user accounts
It is determined as the first quantitative proportion of the account with stolen risk, the other is being determined as not having quilt in whole user accounts
The second quantitative proportion of the account of risk is stolen, the value of the first quantitative proportion is exemplified as 30%, and the value of the second quantitative proportion is exemplified as
20%.
In the present embodiment, it is provided with operation result condition, which can be each finger target value of above-mentioned strategy each
In self-corresponding threshold range, for example, the value of above-mentioned first quantitative proportion is between 15% to 30%, above-mentioned second quantitative proportion
Value between 10% to 30%.
In the present embodiment, the operation result data of the strategy are monitored, judge whether operation result data meet the fortune of setting
Row result condition, that is, judge each finger target value of the strategy whether in corresponding threshold range, if,
Determine that operation result data meet the operation result condition of setting, any one of the strategy refers to target value not in correspondence if it exists
Threshold range in, it is determined that operation result data be unsatisfactory for setting operation result condition.
If satisfied, then continuing to be monitored the operation result data of strategy, if not satisfied, then carrying out strategy corresponding
Regulation processing, specifically includes any one of following manner:
(b1) alarm operation is carried out for strategy;
(b2) it determines the corresponding subsequent operation of strategy, degrades and execute the subsequent operation;
(b3) it determines the corresponding subsequent operation of strategy, terminates and execute the subsequent operation;
(b4) if strategy is not distributed to corresponding maximum issue range, stop issuing the strategy;
(b5) if policy issue recalls the strategy to corresponding maximum issue range.
Specifically, if operation result data are unsatisfactory for the operation result condition of setting, alarm operation is carried out for strategy.
For example, there is abnormal prompt information in the operation result data for exporting the strategy, it is different to prompt operation maintenance personnel to pay close attention to and solve this
Often.
In the case of another, it can determine the corresponding subsequent operation of strategy, degrade and execute the subsequent operation, for example, at this
A sub-operation is selected to execute in multiple sub-operations that subsequent operation includes, alternatively, the subsequent operation is replaced with predetermined
Specified operation.
For example, the function of strategy is the account that identification has stolen risk, the corresponding subsequent operation of the strategy is to identify
When the account with stolen risk out is traded, it is desirable that user carries out two kinds of identification sides of recognition of face and fingerprint recognition
Formula.Then in this case, it can be to select one in multiple sub-operations that the subsequent operation includes that degradation, which executes the subsequent operation,
Sub-operation executes, for example, a kind of this mode of fingerprint recognition is only provided, to (will such as not have in tactful operation result data exception
There is the account of stolen risk to be mistakenly identified as the account with stolen risk), avoid subsequent operation for the interference of user's bring.
For example, the function of strategy is to judge whether the account of user is stolen, the corresponding subsequent operation of the strategy is in determination
When the account of user is stolen, freeze the account.Then in this case, the degradation execution subsequent operation can be, by the subsequent operation
Predetermined specified operation is replaced with, for example, the operation of Frozen Account is replaced with to the operation of the short-message verification account, thus
(account not being stolen such as is mistakenly identified as to stolen account) in tactful operation result data exception, avoids the subsequent operation from being
The interference of user's bring.
In the case of another, it can determine the corresponding subsequent operation of strategy, terminate and execute the subsequent operation.
For example, the function of strategy is the account that identification has stolen risk, the corresponding subsequent operation of the strategy is to identify
When the account with stolen risk out is traded, it is desirable that user carries out two kinds of identification sides of recognition of face and fingerprint recognition
Formula.Then in this case, it can be that user is not forced to carry out recognition of face and fingerprint recognition, user that termination, which executes the subsequent operation,
Identification method can be voluntarily selected, to (such as will accidentally know without being stolen the account of risk in tactful operation result data exception
Wei not be with the account of stolen risk), avoid subsequent operation for the interference of user's bring.
For example, the function of strategy is to judge whether the account of user is stolen, the corresponding subsequent operation of the strategy is in determination
When the account of user is stolen, freeze the account.Then in this case, it can be not freeze to identify that termination, which executes the subsequent operation,
The stolen account come, so that (account not being stolen such as be mistakenly identified as to stolen account in tactful operation result data exception
Family), avoid subsequent operation for the interference of user's bring.
In another case, judge whether the strategy is distributed to corresponding maximum issue range, maximum issue range can be with
For whole user groups on line.If the strategy is not distributed to corresponding maximum issue range, stop issuing the strategy, thus
In tactful operation result data exception, avoidance strategy is continued to run as the interference of user's bring.It in this case, can also be
It has issued and has recalled the strategy in the scope of release of the strategy.
In another case, judge whether the strategy is distributed to corresponding maximum issue range, maximum issue range can be with
For whole user groups on line.If the policy issue, which to corresponding maximum issue range, is recalled, issues the strategy, thus
When tactful operation result data exception, avoidance strategy is continued to run as the interference of user's bring.
In one embodiment, the operation result data of acquisition strategy, by the history of the data and the strategy of identical function
Operation result data are compared, and determine difference size between the two, are more than difference allowed band, then if the difference is excessive
Can carrying out degradation to the corresponding subsequent operation of strategy, perhaps termination degrades or termination may be collectively referred to as at fusing
Reason.
In one embodiment, the operation result data of acquisition strategy transport the data and the history of identical function strategy
Row result data is compared, and determines difference size between the two, and, which is compared with the index of setting,
Determine difference size between the two, it, can be with countermeasure if above-mentioned two difference is more than corresponding difference allowed band
Slightly corresponding subsequent operation carries out degradation, and perhaps termination degrades or termination may be collectively referred to as fusing processing.
It, can be with if the operation result data of strategy are unsatisfactory for the operation result condition of setting as it can be seen that in the present embodiment
Corresponding regulation processing is carried out to the strategy, to alleviate the strategy for the interference of user's bring, so that operation maintenance personnel is repaired in time
The multiple strategy.
In the present embodiment, can be with by the way of gradually expanding scope of release gradually before publishing policy: acquisition be worked as
Data on preceding line run the strategy on current line in data, to carry out trial operation to the strategy, to result of trial operation number
According to being detected, determine that result of trial operation data meet the result of trial operation condition of setting according to testing result.
Specifically, before gradually publishing policy, it is full to the verification result data of the performance of strategy that Utilization strategies verify model
The verification result condition set enough, then data on available current line, run the strategy on current line in data, with
Trial operation is carried out to the strategy.Wherein, data can operate on line on current line for the active user obtained from network
The data generated in real time afterwards, such as customer transaction data on the front, when the user behavior data on front.Then, it obtains
Result of trial operation data, and result of trial operation data are detected, to judge whether result of trial operation data meet setting
Result of trial operation condition.
Result of trial operation data may include each finger target value of the strategy.Such as the example above, the function of the strategy
There can be the account of stolen risk for identification, then the strategy has two indices, and one is determined as in whole user accounts
First quantitative proportion of the account with stolen risk, the other is being determined as not having stolen risk in whole user accounts
Account the second quantitative proportion, the value of the first quantitative proportion is exemplified as 30%, and the value of the second quantitative proportion is exemplified as 20%.
In the present embodiment, it is provided with result of trial operation condition, which can exist for each finger target value of above-mentioned strategy
In corresponding threshold range, for example, the value of above-mentioned first quantitative proportion is between 15% to 30%, above-mentioned second quantity ratio
The value of example is between 10% to 30%.
In the present embodiment, result of trial operation data are detected, judge whether result of trial operation data meet setting
Result of trial operation condition, that is, each finger target value of the strategy is judged whether in corresponding threshold range, if inspection
Surveying result is to meet the result of trial operation condition of setting in, it is determined that result of trial operation data, if testing result is that there are the plans
Slightly any one refers to target value not in corresponding threshold range, it is determined that result of trial operation data are unsatisfactory for the test run of setting
Row result condition.If result of trial operation data meet the result of trial operation condition of setting, using gradually expansion scope of release
Mode gradually issues the strategy.
Fig. 3 is the flow diagram for the publishing policy that another embodiment of the application provides, as shown in figure 3, the process includes:
Step S302, Utilization strategies are verified model and are verified to the performance of strategy to be released;
Step S304, judges whether verification result data meets the verification result condition of setting;
If so, executing step S306, otherwise, step S312 is executed.
Step S306 obtains data on current line, runs the strategy in data on current line, with to the strategy into
Row trial operation;
Step S308, judges whether result of trial operation data meet the result of trial operation condition of setting.
If satisfied, executing step S310, otherwise, step S312 is executed.
Step S310 gradually issues the strategy by the way of gradually expanding scope of release.
Step S312, the prompt information of output policy exception, to prompt operation maintenance personnel adjustable strategies.
Step S314, the operation result data of the strategy after monitors distribution, judges whether operation result data meet setting
Operation result condition.
If satisfied, otherwise circulation step S314 executes step S316.
Step S316 carries out corresponding regulation processing to the strategy.
In method flow shown in Fig. 3, after policy issue to initial release range, so that it may to the operation result number of strategy
According to being monitored, according to monitored results, alarm operation can be carried out, degrading executes subsequent operation, terminate execution subsequent operation, stop
Only at least one of publishing policy and revocation policies.In a specific embodiment, start to be distributed in strategy and just originate
After cloth range, strategy is monitored in real time, thus first time discovery strategy operation result exception and handled.
To sum up, through this embodiment in tactful O&M method, at least can achieve following technical effect:
(1) before policy issue, in policy issue, after policy issue, strategy is runed and is safeguarded, to guarantee to compile
The strategy write can be smoothly online and be run, and the O&M efficiency of strategy is greatly improved.
(2) strategy can be monitored in real time after strategy starts publication, meets the requirement of real-time of policy monitor;
When tactful operation result data exception, regulation processing is carried out to strategy automatically, is guaranteed once strategy is operating abnormally, it can be first
Time is handled, and solving the problems, such as can only artificial treatment after original exception occurs.
(3) by policy validation model, crawl historical data that can be more intelligent verifies strategy, improves verifying
Efficiency and accuracy.
For above-mentioned tactful O&M method, the embodiment of the present application provides a kind of tactful O&M device, and Fig. 4 is the application
The module composition schematic diagram for the tactful O&M device that one embodiment provides, as shown in figure 4, the device includes:
Authentication unit 41 is verified for performance of the Utilization strategies verifying model to strategy to be released;
Release unit 42 is sent out if meeting the verification result condition of setting for verification result data using gradually expanding
The mode of cloth range gradually issues the strategy;
Processing unit 43, for the operation result data of the strategy after monitors distribution, if the operation result data
It is unsatisfactory for the operation result condition of setting, then corresponding regulation processing is carried out to the strategy.
Optionally, the authentication unit 41 is specifically used for:
Strategy to be released is input to policy validation model;
Using the policy validation model, obtained from historical data and the tactful phase according to the function of the strategy
The target data matched;
Using the policy validation model, the strategy is run in the target data, with the performance to the strategy
It is verified.
Optionally, the release unit 42 is specifically used for:
It determines the corresponding initial release range of the strategy, issues the strategy in the initial release range;
Operation result of the strategy within the scope of the initial release is obtained, and judges whether the operation result meets
Designated result condition;
If satisfied, then expanding the initial release range, and the publication strategy is repeated, operation result is obtained, sentences
The step of disconnected operation result, until the initial release range is extended to the corresponding maximum issue range of the strategy.
Optionally, the release unit 42 also particularly useful for:
According to the first of user the input parameter, the corresponding initial release range of the strategy is determined;
Alternatively,
Using the scope of release of setting as the corresponding initial release range of the strategy.
Optionally, the release unit 42 also particularly useful for:
According to the second of user the input parameter, expand the initial release range;
Alternatively,
Expand parameter according to the range of setting, expands the initial release range.
Optionally, further include trial operation unit, be used for:
Before gradually issuing the strategy by the way of gradually expanding scope of release, data on current line are obtained,
The strategy is run in data on the current line, to carry out trial operation to the strategy;
Result of trial operation data are detected, determine that the result of trial operation data meet setting according to testing result
Result of trial operation condition.
Optionally, the processing unit 43 is specifically used for any one of following manner:
Alarm operation is carried out for the strategy;
It determines the corresponding subsequent operation of the strategy, degrades and execute the subsequent operation;
It determines the corresponding subsequent operation of the strategy, terminates and execute the subsequent operation;
If the strategy is not distributed to corresponding maximum issue range, stop issuing the strategy;
If the policy issue recalls the strategy to corresponding maximum issue range.
In the embodiment of the present application, before policy issue, Utilization strategies are verified model and are carried out to the performance of strategy to be released
Verifying during policy issue, is issued if verification result data meets the verification result condition of setting using gradually expanding
The mode of range gradually issues the strategy, and after policy issue, the operation result data of the strategy after monitors distribution, if
Operation result data are unsatisfactory for the operation result condition of setting, then carry out corresponding regulation processing to the strategy, therefore pass through this
Embodiment can run strategy and be safeguarded, to guarantee to compile before policy issue, in policy issue, after policy issue
The strategy write being capable of smoothly online and operation.
Tactful O&M device in the embodiment of the present application can be realized each process of tactful O&M method above-mentioned, and reach
To identical effect, it is not repeated herein.
Further, the embodiment of the present application also provides a kind of tactful O&M equipment, Fig. 5 provides for one embodiment of the application
Tactful O&M equipment structural schematic diagram, as shown in figure 5, tactful O&M equipment can generate and compare because configuration or performance are different
Big difference may include one or more processor 901 and memory 902, can store one in memory 902
A or more than one storage application program or data.Wherein, memory 902 can be of short duration storage or persistent storage.It is stored in
The application program of memory 902 may include one or more modules (diagram is not shown), and each module may include pair
Series of computation machine executable instruction in tactful O&M equipment.Further, processor 901 can be set to and memory
902 communications execute the series of computation machine executable instruction in memory 902 in tactful O&M equipment.Tactful O&M equipment
Can also include one or more power supplys 903, one or more wired or wireless network interfaces 904, one or one
A above input/output interface 905, one or more keyboards 906 etc..
In a specific embodiment, tactful O&M equipment includes memory and one or more journey
Sequence, perhaps more than one program is stored in memory and one or more than one program may include one for one of them
Or more than one module, and each module may include to the series of computation machine executable instruction in tactful O&M equipment, and
Be configured to be executed this by one or more than one processor or more than one program include by carry out it is following based on
Calculation machine executable instruction:
Utilization strategies are verified model and are verified to the performance of strategy to be released;
If verification result data meets the verification result condition of setting, by the way of gradually expanding scope of release gradually
Issue the strategy;
The operation result data of the strategy after monitors distribution, if the operation result data are unsatisfactory for the operation of setting
As a result condition then carries out corresponding regulation processing to the strategy.
Optionally, when executed, Utilization strategies verify model to the property of strategy to be released to computer executable instructions
It can be carried out verifying, comprising:
Strategy to be released is input to policy validation model;
Using the policy validation model, obtained from historical data and the tactful phase according to the function of the strategy
The target data matched;
Using the policy validation model, the strategy is run in the target data, with the performance to the strategy
It is verified.
Optionally, computer executable instructions when executed, are gradually issued by the way of gradually expanding scope of release
The strategy, comprising:
It determines the corresponding initial release range of the strategy, issues the strategy in the initial release range;
Operation result of the strategy within the scope of the initial release is obtained, and judges whether the operation result meets
Designated result condition;
If satisfied, then expanding the initial release range, and the publication strategy is repeated, operation result is obtained, sentences
The step of disconnected operation result, until the initial release range is extended to the corresponding maximum issue range of the strategy.
Optionally, computer executable instructions when executed, determine the corresponding initial release range of the strategy, packet
It includes:
According to the first of user the input parameter, the corresponding initial release range of the strategy is determined;
Alternatively,
Using the scope of release of setting as the corresponding initial release range of the strategy.
Optionally, computer executable instructions when executed, expand the initial release range, comprising:
According to the second of user the input parameter, expand the initial release range;
Alternatively,
Expand parameter according to the range of setting, expands the initial release range.
Optionally, computer executable instructions when executed, are gradually sent out by the way of gradually expanding scope of release
Before strategy described in cloth, further includes:
Obtain data on current line, run the strategy in data on the current line, with to it is described strategy into
Row trial operation;
Result of trial operation data are detected, determine that the result of trial operation data meet setting according to testing result
Result of trial operation condition.
Optionally, computer executable instructions when executed, carry out corresponding regulation processing to the strategy, including with
Any one of under type:
Alarm operation is carried out for the strategy;
It determines the corresponding subsequent operation of the strategy, degrades and execute the subsequent operation;
It determines the corresponding subsequent operation of the strategy, terminates and execute the subsequent operation;
If the strategy is not distributed to corresponding maximum issue range, stop issuing the strategy;
If the policy issue recalls the strategy to corresponding maximum issue range.
In the embodiment of the present application, before policy issue, Utilization strategies are verified model and are carried out to the performance of strategy to be released
Verifying during policy issue, is issued if verification result data meets the verification result condition of setting using gradually expanding
The mode of range gradually issues the strategy, and after policy issue, the operation result data of the strategy after monitors distribution, if
Operation result data are unsatisfactory for the operation result condition of setting, then carry out corresponding regulation processing to the strategy, therefore pass through this
Embodiment can run strategy and be safeguarded, to guarantee to compile before policy issue, in policy issue, after policy issue
The strategy write being capable of smoothly online and operation.
Tactful O&M equipment in the embodiment of the present application can be realized each process of tactful O&M method above-mentioned, and reach
To identical effect, it is not repeated herein.
Further, the embodiment of the present application also provides a kind of storage medium, for storing computer executable instructions, one
In kind specific embodiment, which can be USB flash disk, CD, hard disk etc., and the computer of storage medium storage is executable
Instruction is able to achieve following below scheme when being executed by processor:
Utilization strategies are verified model and are verified to the performance of strategy to be released;
If verification result data meets the verification result condition of setting, by the way of gradually expanding scope of release gradually
Issue the strategy;
The operation result data of the strategy after monitors distribution, if the operation result data are unsatisfactory for the operation of setting
As a result condition then carries out corresponding regulation processing to the strategy.
Optionally, the computer executable instructions of storage medium storage are when being executed by processor, Utilization strategies verifying
Model verifies the performance of strategy to be released, comprising:
Strategy to be released is input to policy validation model;
Using the policy validation model, obtained from historical data and the tactful phase according to the function of the strategy
The target data matched;
Using the policy validation model, the strategy is run in the target data, with the performance to the strategy
It is verified.
Optionally, the computer executable instructions of storage medium storage are when being executed by processor, using gradually expanding
The mode of scope of release gradually issues the strategy, comprising:
It determines the corresponding initial release range of the strategy, issues the strategy in the initial release range;
Operation result of the strategy within the scope of the initial release is obtained, and judges whether the operation result meets
Designated result condition;
If satisfied, then expanding the initial release range, and the publication strategy is repeated, operation result is obtained, sentences
The step of disconnected operation result, until the initial release range is extended to the corresponding maximum issue range of the strategy.
Optionally, the computer executable instructions of storage medium storage determine the strategy when being executed by processor
Corresponding initial release range, comprising:
According to the first of user the input parameter, the corresponding initial release range of the strategy is determined;
Alternatively,
Using the scope of release of setting as the corresponding initial release range of the strategy.
Optionally, the computer executable instructions of storage medium storage expand described initial when being executed by processor
Scope of release, comprising:
According to the second of user the input parameter, expand the initial release range;
Alternatively,
Expand parameter according to the range of setting, expands the initial release range.
Optionally, the computer executable instructions of storage medium storage gradually expand when being executed by processor using
The mode of big scope of release is gradually issued before the strategy, further includes:
Obtain data on current line, run the strategy in data on the current line, with to it is described strategy into
Row trial operation;
Result of trial operation data are detected, determine that the result of trial operation data meet setting according to testing result
Result of trial operation condition.
Optionally, the storage medium storage computer executable instructions when being executed by processor, to it is described strategy into
The corresponding regulation of row is handled, any one including following manner:
Alarm operation is carried out for the strategy;
It determines the corresponding subsequent operation of the strategy, degrades and execute the subsequent operation;
It determines the corresponding subsequent operation of the strategy, terminates and execute the subsequent operation;
If the strategy is not distributed to corresponding maximum issue range, stop issuing the strategy;
If the policy issue recalls the strategy to corresponding maximum issue range.
In the embodiment of the present application, before policy issue, Utilization strategies are verified model and are carried out to the performance of strategy to be released
Verifying during policy issue, is issued if verification result data meets the verification result condition of setting using gradually expanding
The mode of range gradually issues the strategy, and after policy issue, the operation result data of the strategy after monitors distribution, if
Operation result data are unsatisfactory for the operation result condition of setting, then carry out corresponding regulation processing to the strategy, therefore pass through this
Embodiment can run strategy and be safeguarded, to guarantee to compile before policy issue, in policy issue, after policy issue
The strategy write being capable of smoothly online and operation.
Storage medium in the embodiment of the present application can be realized each process of tactful O&M method above-mentioned, and reach phase
Same effect, is not repeated herein.
In the 1990s, the improvement of a technology can be distinguished clearly be on hardware improvement (for example,
Improvement to circuit structures such as diode, transistor, switches) or software on improvement (improvement for method flow).So
And with the development of technology, the improvement of current many method flows can be considered as directly improving for hardware circuit.
Designer nearly all obtains corresponding hardware circuit by the way that improved method flow to be programmed into hardware circuit.Cause
This, it cannot be said that the improvement of a method flow cannot be realized with hardware entities module.For example, programmable logic device
(Programmable Logic Device, PLD) (such as field programmable gate array (Field Programmable Gate
Array, FPGA)) it is exactly such a integrated circuit, logic function determines device programming by user.By designer
Voluntarily programming comes a digital display circuit " integrated " on a piece of PLD, designs and makes without asking chip maker
Dedicated IC chip.Moreover, nowadays, substitution manually makes IC chip, this programming is also used instead mostly " is patrolled
Volume compiler (logic compiler) " software realizes that software compiler used is similar when it writes with program development,
And the source code before compiling also write by handy specific programming language, this is referred to as hardware description language
(Hardware Description Language, HDL), and HDL is also not only a kind of, but there are many kind, such as ABEL
(Advanced Boolean Expression Language)、AHDL(Altera Hardware Description
Language)、Confluence、CUPL(Cornell University Programming Language)、HDCal、JHDL
(Java Hardware Description Language)、Lava、Lola、MyHDL、PALASM、RHDL(Ruby
Hardware Description Language) etc., VHDL (Very-High-Speed is most generally used at present
Integrated Circuit Hardware Description Language) and Verilog.Those skilled in the art also answer
This understands, it is only necessary to method flow slightly programming in logic and is programmed into integrated circuit with above-mentioned several hardware description languages,
The hardware circuit for realizing the logical method process can be readily available.
Controller can be implemented in any suitable manner, for example, controller can take such as microprocessor or processing
The computer for the computer readable program code (such as software or firmware) that device and storage can be executed by (micro-) processor can
Read medium, logic gate, switch, specific integrated circuit (Application Specific Integrated Circuit,
ASIC), the form of programmable logic controller (PLC) and insertion microcontroller, the example of controller includes but is not limited to following microcontroller
Device: ARC 625D, Atmel AT91SAM, Microchip PIC18F26K20 and Silicone Labs C8051F320 are deposited
Memory controller is also implemented as a part of the control logic of memory.It is also known in the art that in addition to
Pure computer readable program code mode is realized other than controller, can be made completely by the way that method and step is carried out programming in logic
Controller is obtained to come in fact in the form of logic gate, switch, specific integrated circuit, programmable logic controller (PLC) and insertion microcontroller etc.
Existing identical function.Therefore this controller is considered a kind of hardware component, and to including for realizing various in it
The device of function can also be considered as the structure in hardware component.Or even, it can will be regarded for realizing the device of various functions
For either the software module of implementation method can be the structure in hardware component again.
System, device, module or the unit that above-described embodiment illustrates can specifically realize by computer chip or entity,
Or it is realized by the product with certain function.It is a kind of typically to realize that equipment is computer.Specifically, computer for example may be used
Think personal computer, laptop computer, cellular phone, camera phone, smart phone, personal digital assistant, media play
It is any in device, navigation equipment, electronic mail equipment, game console, tablet computer, wearable device or these equipment
The combination of equipment.
For convenience of description, it is divided into various units when description apparatus above with function to describe respectively.Certainly, implementing this
The function of each unit can be realized in the same or multiple software and or hardware when application.
It should be understood by those skilled in the art that, embodiments herein can provide as method, system or computer program
Product.Therefore, complete hardware embodiment, complete software embodiment or reality combining software and hardware aspects can be used in the application
Apply the form of example.Moreover, it wherein includes the computer of computer usable program code that the application, which can be used in one or more,
The computer program implemented in usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) produces
The form of product.
The application is referring to method, the process of equipment (system) and computer program product according to the embodiment of the present application
Figure and/or block diagram describe.It should be understood that every one stream in flowchart and/or the block diagram can be realized by computer program instructions
The combination of process and/or box in journey and/or box and flowchart and/or the block diagram.It can provide these computer programs
Instruct the processor of general purpose computer, special purpose computer, Embedded Processor or other programmable data processing devices to produce
A raw machine, so that being generated by the instruction that computer or the processor of other programmable data processing devices execute for real
The device for the function of being specified in present one or more flows of the flowchart and/or one or more blocks of the block diagram.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing devices with spy
Determine in the computer-readable memory that mode works, so that it includes referring to that instruction stored in the computer readable memory, which generates,
Enable the manufacture of device, the command device realize in one box of one or more flows of the flowchart and/or block diagram or
The function of being specified in multiple boxes.
These computer program instructions also can be loaded onto a computer or other programmable data processing device, so that counting
Series of operation steps are executed on calculation machine or other programmable devices to generate computer implemented processing, thus in computer or
The instruction executed on other programmable devices is provided for realizing in one or more flows of the flowchart and/or block diagram one
The step of function of being specified in a box or multiple boxes.
In a typical configuration, calculating equipment includes one or more processors (CPU), input/output interface, net
Network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices
Or any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, it calculates
Machine readable medium does not include temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
It should also be noted that, the terms "include", "comprise" or its any other variant are intended to nonexcludability
It include so that the process, method, commodity or the equipment that include a series of elements not only include those elements, but also to wrap
Include other elements that are not explicitly listed, or further include for this process, method, commodity or equipment intrinsic want
Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including described want
There is also other identical elements in the process, method of element, commodity or equipment.
It will be understood by those skilled in the art that embodiments herein can provide as method, system or computer program product.
Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application
Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code
The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.)
Formula.
The application can describe in the general context of computer-executable instructions executed by a computer, such as program
Module.Generally, program module includes routines performing specific tasks or implementing specific abstract data types, programs, objects, group
Part, data structure etc..The application can also be practiced in a distributed computing environment, in these distributed computing environments, by
Task is executed by the connected remote processing devices of communication network.In a distributed computing environment, program module can be with
In the local and remote computer storage media including storage equipment.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment
Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for system reality
For applying example, since it is substantially similar to the method embodiment, so being described relatively simple, related place is referring to embodiment of the method
Part explanation.
The above description is only an example of the present application, is not intended to limit this application.For those skilled in the art
For, various changes and changes are possible in this application.All any modifications made within the spirit and principles of the present application are equal
Replacement, improvement etc., should be included within the scope of the claims of this application.