CN110059491A - Data import monitoring method, device, equipment and readable storage medium storing program for executing - Google Patents

Data import monitoring method, device, equipment and readable storage medium storing program for executing Download PDF

Info

Publication number
CN110059491A
CN110059491A CN201910200499.3A CN201910200499A CN110059491A CN 110059491 A CN110059491 A CN 110059491A CN 201910200499 A CN201910200499 A CN 201910200499A CN 110059491 A CN110059491 A CN 110059491A
Authority
CN
China
Prior art keywords
data
user
configuration
user data
import
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910200499.3A
Other languages
Chinese (zh)
Inventor
陈梅
杜涵
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Urban Construction Technology Shenzhen Co Ltd
Original Assignee
Ping An Urban Construction Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Urban Construction Technology Shenzhen Co Ltd filed Critical Ping An Urban Construction Technology Shenzhen Co Ltd
Priority to CN201910200499.3A priority Critical patent/CN110059491A/en
Publication of CN110059491A publication Critical patent/CN110059491A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/604Tools and structures for managing or administering access control systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention provides a kind of data importing monitoring method, comprising: whether correct the user data for obtaining importing detects the user data;If correct, the permission of user is configured based on preset configuration template and the user data, and generate configuration file;The configuration file is compared with the original in the user data, determines whether the configuration file matches with the original based on the default mapping relations in the configuration template;If mismatching, prompting message is sent to treatment people, to remind treatment people to search reason.The present invention also provides a kind of data to import monitoring device, equipment and readable storage medium storing program for executing.It is realized the present invention is based on system data monitoring and carries out matching to postpone matching configuration file with original in user data, and treatment people is reminded to search reason when configuration file and original are inconsistent, supervisory function bit is played to the configuration of user data, and then ensure that the accuracy that data import after preceding and importing.

Description

Data import monitoring method, device, equipment and readable storage medium storing program for executing
Technical field
The present invention relates to Internet technical field more particularly to a kind of data to import monitoring method, device, equipment and readable Storage medium.
Background technique
Currently, the type of data-storage system is more and more, although each system is only responsible for the data of processing oneself, It is that these storage systems are not independent from each other in some cases, many times, staff is according to the demand need of business It to import data to from different storage systems into same storage system, so, how to ensure the accuracy after data import It is problem to be solved.
Summary of the invention
The main purpose of the present invention is to provide a kind of data to import monitoring method, device, equipment and readable storage medium storing program for executing, Aim to ensure that the accuracy after data import.
To achieve the above object, the present invention provides a kind of data importing monitoring method, and the data import monitoring method packet Include following steps:
The user data imported is obtained, whether correct detects the user data;
If correct, the permission of user is configured based on preset configuration template and the user data, and generates Configuration file;
The configuration file is compared with the original in the user data, based on pre- in the configuration template If mapping relations determine whether the configuration file matches with the original;
If mismatching, prompting message is sent to treatment people, to remind treatment people to search reason.
Optionally, the whether correct step of the detection user data includes:
The first data that the first system receives and the second data that second system receives are obtained, and described first is counted According to and second data be compared, determine whether first data and second data consistent;
If consistent, second data are compared with the user data, determine second data with it is described Whether user data is consistent;
If consistent, it is determined that the user data is correct.
Optionally, the whether correct step of the detection user data includes:
Call preset text processor using the exception rules in exception information library, detect in the user data whether There are exception fields;
If exception field is not present in the user data, it is determined that the user data is correct.
Optionally, if it is described correct, the permission of user is carried out based on preset configuration template and the user data Configuration, and the step of generating configuration file includes:
If correct, the user data is mapped as by target data based on the configuration template, and generate text to be configured Part;
The user identifier in the user data is obtained, history configuration record is searched based on the user identifier, determines institute It states in history configuration record with the presence or absence of the corresponding history profile of the user identifier;
If it exists, then detect whether the history profile conflicts with the file to be configured;
If conflict, deletes the history profile, using the file to be configured as the configuration file, and is based on The configuration file configures the permission of user.
Optionally, described to be compared the configuration file with the original in the user data, matched based on described Set the importing after the default mapping relations in template determine the step of whether configuration file matches with the original Monitoring method further include:
If matching, the first keyword in the user data is grabbed using preset script information, and by described the One keyword is matched with the configuration template, determines whether each first keyword exists in the configuration template Mapping relations;
If it is not, then obtaining the second keyword that mapping relations are not present in the configuration template, establishes described second and close The new mappings relationship of key word.
Optionally, described if it is not, then obtain in the configuration template be not present mapping relations the second keyword, establish The step of new mappings relationship of second keyword includes:
If it is not, then obtaining the second keyword that mapping relations are not present in the configuration template, closed based on described second Key word sends prompting message to treatment people, and determines the addition instruction that treatment people whether is received in preset time period;
If receiving the addition instruction for the treatment of people in preset time period, instructed based on the addition in the configuration mould New mappings relationship is established in plate.
Optionally, described if it is not, then obtain in the configuration template be not present mapping relations the second keyword, be based on Second keyword sends prompting message to treatment people, and determines in preset time period whether receive adding for treatment people After the step of adding instruction, the data import monitoring method further include:
If not receiving the addition instruction for the treatment of people in preset time period, second keyword and described the are deleted The corresponding customer attribute information of two keywords.
In addition, to achieve the above object, the present invention also provides a kind of data to import monitoring device, the data import monitoring Device includes:
Module is obtained, for obtaining the user data imported, whether correct detects the user data;
Configuration module, if for correct, based on preset configuration template and the user data to the permission of user into Row configuration, and generate configuration file;
Monitoring module, for the configuration file to be compared with the original in the user data, based on described Default mapping relations in configuration template determine whether the configuration file matches with the original;
Cue module, if sending prompting message to treatment people, to remind treatment people to search original for mismatching Cause.
In addition, to achieve the above object, the present invention also provides a kind of data to import monitoring device, the data import monitoring Equipment includes processor, memory and is stored on the memory and can import prison by the data that the processor executes Program is controlled, wherein realizing that above-mentioned data such as import monitoring side when data importing monitoring programme is executed by the processor The step of method.
In addition, to achieve the above object, the present invention also provides a kind of readable storage medium storing program for executing, being deposited on the readable storage medium storing program for executing It contains data and imports monitoring programme, wherein realizing such as above-mentioned data when data importing monitoring programme is executed by processor The step of importing monitoring method.
The present invention, which provides a kind of data and imports monitoring method, device, equipment and readable storage medium storing program for executing, the present invention, passes through acquisition Whether correct the user data of importing detects the user data, if then correct, based on preset configuration template and described User data configures the permission of user, and generates configuration file, then by the configuration file and the user data In original be compared, determine the configuration file and the original text based on the default mapping relations in the configuration template Whether part matches, if last mismatch, sends prompting message to treatment people, to remind treatment people to search reason;It realizes Match configuration file with original with postponing in user data, and when configuration file is inconsistent with original It reminds treatment people to search reason, supervisory function bit is played to the configuration of user data, and then ensure that the standard after data importing True property.
Detailed description of the invention
Fig. 1 is the hardware structural diagram that the data that various embodiments of the present invention are related to import monitoring device;
Fig. 2 is the flow diagram that data of the present invention import monitoring method first embodiment;
Fig. 3 is the flow diagram that data of the present invention import monitoring method second embodiment;
Fig. 4 is the flow diagram that data of the present invention import monitoring method 3rd embodiment;
Fig. 5 is the functional block diagram that data of the present invention import monitoring device first embodiment.
The embodiments will be further described with reference to the accompanying drawings for the realization, the function and the advantages of the object of the present invention.
Specific embodiment
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
The present embodiments relate to data import monitoring method and be mainly used in data and import monitoring device, which leads Entering monitoring device can be PC (personal computer personal computer), portable computer, mobile terminal etc. with display With the equipment of processing function.
Referring to Fig.1, Fig. 1 is the hardware configuration signal that data involved in the embodiment of the present invention import monitoring device Figure.In the embodiment of the present invention, it may include (such as the central processing unit Central of processor 1001 that data, which import monitoring device, Processing Unit, CPU), communication bus 1002, user interface 1003, network interface 1004, memory 1005.Wherein, Communication bus 1002 is for realizing the connection communication between these components;User interface 1003 may include display screen (Display), input unit such as keyboard (Keyboard);Network interface 1004 optionally may include that the wired of standard connects Mouth, wireless interface (such as WI-FI interface);Memory 1005 can be high speed RAM memory, be also possible to stable memory (non-volatile memory), such as magnetic disk storage, memory 1005 optionally can also be independently of aforementioned processor 1001 storage device.It will be understood by those skilled in the art that hardware configuration shown in Fig. 1 is not constituted to limit of the invention It is fixed, it may include perhaps combining certain components or different component layouts than illustrating more or fewer components.
With continued reference to Fig. 1, the memory 1005 in Fig. 1 as a kind of readable storage medium storing program for executing may include operating system, net Network communication module and data import monitoring programme.In Fig. 1, network communication module is mainly used for connecting server, with service Device carries out data communication;And processor 1001 can call the data stored in memory 1005 to import monitoring programme, and execute Data provided in an embodiment of the present invention import monitoring method.
The embodiment of the invention provides a kind of data to import monitoring method.
It is the flow diagram that data of the present invention import monitoring method first embodiment referring to Fig. 2, Fig. 2.
In the present embodiment, it is that data import monitoring system which, which imports the executing subject of monitoring method, and data import Monitoring system can monitoring data import it is whether correct, data import it is incorrect when remind relevant treatment people finder reason, Wherein, the data import monitoring system include data import monitoring device, the data import monitoring device can be mobile phone, PC, The terminal devices such as palm PC and tablet computer, are chosen as equipment shown in FIG. 1.It includes following step that the data, which import monitoring method, It is rapid:
Step S10 obtains the user data of importing, whether correct detects the user data;
In the present embodiment, which includes the identity information of user and the organizational structure information of affiliated company etc., Whether detection user data correctly includes the user data come in detection user data with the presence or absence of exception field, importing and leads Whether the data before entering are consistent.
Specifically, the whether correct step of the detection user data includes:
Step S11 obtains the first data for receiving of the first system and the second data that second system receives, and by institute It states the first data and second data is compared, determine whether first data and second data are consistent;
In the present embodiment, the first system includes number storehouse system, and second system includes XRM (Any Relationship Any relation management of Management) system, the data of importing will successively pass through number storehouse, XRM, data importing monitoring system, first Whether the importing data that first testing number storehouse system receives and the importing data that XRM system receives are consistent, if unanimously, then it is assumed that It imports data and mistake is not present, data transmission to data will be imported and import monitoring system, if inconsistent, illustrate that importing data deposits In mistake, prompting message will be sent with predetermined manner to treatment people, with notifier processes people finder's error reason, this is preset and mentions The mode of showing includes mail, short message etc..Wherein, the importing that the importing data and XRM system that number storehouse system receives receive Data are inconsistent, the data no there are XRM system in the importing data received including several storehouse systems, alternatively, system receives To the specifying information of importing data that receives of importing data and XRM system it is inconsistent.
Step S12 determines second number if unanimously, second data are compared with the user data According to whether consistent with the user data;
In the present embodiment, the data of importing can import monitoring by XRM system transmission most intimate friend's data after XRM system System, data import monitoring system and are compared the user data received with the importing data that XRM system receives, and determine It is whether consistent, if unanimously, illustrating that importing data are correct, if inconsistent, illustrate to import data there are mistake, data import prison Control system will be sent imports request to XRM system again, and XRM system imports data to data again and imports monitoring system, again It is compared, in this way, if when sending the importing request of preset times, data or inconsistent then send prompt to alignment processing Personnel, to notify related technical personnel to carry out lookup reason.
Step S13, if unanimously, it is determined that the user data is correct.
In the present embodiment, data, which import monitoring system for the user data received, is led with what XRM system received Enter data to be compared, if unanimously, it is determined that user data imports correct, wherein data import the use that monitoring system receives User data is inconsistent with the importing data that XRM system receives to include, and imports monitoring system there are data in XRM system and receives User data in the data that do not have, alternatively, data import what the importings data that monitoring system receives were received with XRM system The specifying information for importing data is inconsistent.
Further, after step S10, further includes:
Step 20, if correctly, being configured based on preset configuration template and the user data to the permission of user, And generate configuration file;
In the present embodiment, when detecting that user data is correct, then obtain preset configuration template, to user data into Row analysis, including analyzing the identity information of personnel, organizational structure information of affiliated company etc. in user data, for example, Name, gender, age, company, department, group, leading body at a higher level's name etc. are analyzed.It include user in preset configuration template The mapping relations of the attribute and objective attribute target attribute of user will be in user data according to the middle mapping relations of configuration template in data Attribute is mapped as objective attribute target attribute, and searches the corresponding property rights of the objective attribute target attribute, assigns user's property rights, for example, will Role, service line, post, organizational structure of external company etc. are mapped as the role of our company's system, service line, post, tissue Framework etc. configures different permissions according to different organizational structures and different posies etc., and generates configuration file.
Further, there may be the configured permissions excessively of user in the user data of importing, for example, a certain employee of company Post or role can change, then can import the employee data when, it will detect the configured information of the employee, this When, it needs to judge that information to be configured whether there is with configured information and conflicts.
Specifically, if it is described correct, the permission of user is carried out based on preset configuration template and the user data Configuration, and the step of generating configuration file includes:
Step S21, if correctly, the user data is mapped as target data based on the configuration template, and generate File to be configured;
In the present embodiment, user data is mapped as target data using the mapping relations in configuration template, including will The service line of external company is mapped as our company's service line, is our company role by the role mapping of external company, will be external public The post of department is mapped as our company post etc..And generate file to be configured, the file to be configured be used for configuration when according to this to Configuration file configures user right, without searching corresponding mapping relations into configuration template again.
Step S22 obtains the user identifier in the user data, searches history configuration note based on the user identifier Record determines in the history configuration record with the presence or absence of the corresponding history profile of the user identifier;
It in the present embodiment, include the user identifier of user in user data, which includes user's name, user ID, Customs Assigned Number etc. using the user identifier of preset crawl script crawl user, and configure in history according to user identifier and remember Corresponding history profile is searched in record, is determined in historical record with the presence or absence of the corresponding history configuration text of the user identifier Part.
Step S23, and if it exists, then detect whether the history profile conflicts with the file to be configured;
In the present embodiment, whether detection history configuration file conflicts with file to be configured including detecting in file to be configured User property value whether be greater than the user property value in history profile, the user property value detected in file to be configured is Whether whether the no user property value with history profile belongs to same category, detect incidentally to delete in file to be configured and go through Mark information in history configuration file.Wherein, user property value includes the attribute values such as customer service line, position, post, role, For example, then the user property value of file to be configured will be greater than the user property value in history profile when employee promotes, when When being transferred to a new position at the same administrative level as a former one, the user property value in file to be configured belongs to a different category with the user property value in history profile, It is of course also possible to which the mark information of history profile, system are inserted and deleted in the user data of importing when importing data Deletion instruction, deleting history configuration file can be triggered by detecting high mark information then.
Step S24, if conflict, deletes the history profile, using the file to be configured as the configuration text Part, and configured based on permission of the configuration file to user.
In the present embodiment, if detect that history profile does not conflict with file to be configured, by file to be configured As configuration file, user right is configured according to the mapping relations in configuration file, if detect file to be configured with Configured information is then deleted in history profile conflict, is configured according to information to be configured, that is, is realized and updated to configuration, It is of course also possible to which sending prompting message verify by treatment people the configuration information of the personnel to treatment people, and carry out hand Dynamic configuration.If not conflicting, according to the permission of file configuration user to be configured, then the permission that the user possesses is file to be configured In permission and history profile in permission.
Further, after step S20, further includes:
The configuration file is compared by step S30 with the original in the user data, is based on the configuration mould Default mapping relations in plate determine whether the configuration file matches with the original;
In the present embodiment, the configuration file be include having configured between the user data of completion and target user data Mapping relations, configuration file is compared with original, specifically, detect original in user property value whether with match Whether the user property value set in file matches, while detecting the corresponding attribute information of user property value is matching, user property Value includes the title with identity information and organizational structure, for example, " name ", " age ", " post ", " position ", user property letter Breath includes the particular content of identity information and organizational structure title, for example, Zhang San, 23, the post A, C position, second-hand house service line Deng for example, for example, name: Zhang San, post: the post A is then mapped as according to the mapping relations in configuration template, name: Zhang San, Post: the post B, wherein name, post are user property value, and Zhang San, the post A are attribute information, then according in configuration template Mapping relations detect whether user property value is consistent, and whether the post A and the post B form mapping relations.
Step S40 sends prompting message to treatment people, people finder's reason for processing if mismatching.
In the present embodiment, prompting mode includes mail, short message, third-party application prompting etc., if detecting configuration File and former configuration file mismatch, then relevant treatment people will be reminded by preset prompting mode, to remind processing people Member searches reason, and treatment people can modify the mapping relations in configuration template.
The data that the present embodiment proposes import monitoring method, by obtaining the user data imported, detect the number of users According to whether correctly, if then correct, the permission of user is configured based on preset configuration template and the user data, And configuration file is generated, the configuration file is compared with the original in the user data then, is matched based on described The default mapping relations set in template determine whether the configuration file matches with the original, if last mismatch, send out Send prompting message to treatment people, to remind treatment people to search reason;It realizes match in user data and postpone to configuration File is matched with original, and reminds treatment people to search reason when configuration file and original are inconsistent, to user The configuration of data plays supervisory function bit, and then ensure that the accuracy after data importing.
Based on first embodiment, propose that data of the present invention import the second embodiment of monitoring method, referring to Fig. 3, this implementation In example, step S10 further include:
Step S14 calls preset text processor using the exception rules in exception information library, detects the number of users It whether there is exception field in;
It in the present embodiment, include multiple exception rules in exception information library, exception information library is independent one layer, is not had to Program is modified, new rule or the existing rule of deletion/modification are directly configured in exception information library, does not have to test program, It can be carried out the monitoring of user data.This article present processor refers to the regular expression using scripting language, being capable of basis The exception rules configured in exception information library carry out the lookup and processing of text, extract exception information.Text processor is to be based on Exception information library parses user data using the text regular expression and Shell file process function of Python.
Come in since user data is imported from different systems, so there may be data when data import The data exceptions such as loss, error in data, system carry out abnormality detection the data of importing, for example, user address with "? " or Spcial characters such as " * " replace, and the birthday is replaced with nonumeric type, specifically, can use the exception rules in exception information library Text processor is called, detects and whether there is exception field in user data.
Step S15, if exception field is not present in the user data, it is determined that the user data is correct.
In the present embodiment, if there are exception fields into user data for system detection, illustrate the user data of importing In there are the data exceptions such as loss of data or error in data, then will send prompting message to treatment people, personnel for processing Reason is searched, if exception field is not present into user data for system detection, illustrates that user data is correct.
The data that the present embodiment proposes import monitoring method, default by being called using the exception rules in exception information library Text processor, detect in the user data with the presence or absence of exception field, if then there is no different in the user data Normal field, it is determined that the user data is correct;It realizes and is detected in user data by text processor with the presence or absence of abnormal Field, so that the accuracy to user data is verified, and then the accuracy of the user data guaranteed.
Based on second embodiment, propose that data of the present invention import the 3rd embodiment of monitoring method, referring to Fig. 4, this implementation In example, after step S30, further includes:
Step S50, if matching, grabs the first keyword in the user data using preset script information, and The keyword is matched with the configuration template, determines whether each first keyword is equal in the configuration template There are mapping relations;
In the present embodiment, if configuration file is matched with original, can also detect in the user data of importing whether There are the user property value not having in preset mapping relations, i.e., preset mapping relations can not be by all numbers in user data According to being mapped, for example, a certain post of certain external company or a certain role are not present in our company's system, while pre- If mapping relations in also can not find the post or the corresponding data of role.Specifically, it can use preset script information First keyword of the crawl in data, first keyword refer to the title of the user property value in user data, pass through by First keyword is matched with configuration template, determines the first keyword with the presence or absence of there are mapping relations in configuration template.
Step S60 establishes institute if it is not, then obtaining the second keyword that mapping relations are not present in the configuration template State the new mappings relationship of the second keyword.
In the present embodiment, if there are the second keywords not to have corresponding mapping to close in configuration template in the first keyword System then illustrates there is the user property value that can not be mapped according to preset mapping relations in user data, obtain this second Keyword, and establish the new mappings relationship of second keyword.
Wherein, described if it is not, then obtain in the configuration template be not present mapping relations the second keyword, establish institute The step of stating the new mappings relationship of the second keyword include:
Step S61 is based on institute if it is not, then obtaining the second keyword that mapping relations are not present in the configuration template It states the second keyword and sends prompting message to treatment people, and the addition for whether receiving treatment people in preset time period determined Instruction;
In the present embodiment, if detecting, corresponding mapping relations are not present in the second keyword in configuration template, will Prompting message is sent to treatment people, to remind treatment people to establish new mappings relationship according to the second keyword, treatment people can To add new mappings relationship in configuration template, system will detect whether the addition for receiving treatment people within a preset period of time Instruction.
Step S62 is instructed based on the addition in institute if receiving the addition instruction for the treatment of people in preset time period It states and establishes new mappings relationship in configuration template.
In the present embodiment, treatment people can trigger addition instruction by preset control, will setting according to addition instruction Good new mappings relationship is added to configuration template, to establish new mappings relationship in configuration template, which includes A user property value is reset, the second keyword and the user property value are associated storage and form mapping relations, alternatively, Second keyword is added to existing mapping relations in configuration documentation, it is of course also possible to directly using the second keyword as reflecting User property value after penetrating.For example, when the position for importing external associate in data is not deposited in our company's personnel's position In mapping relations, then the position of external company personnel can be added in existing mapping relations in systems and form new mappings Relationship, alternatively, newly a new mapping relations are established, so that the position of external company personnel to be mapped as to the position of our company. And then all data in user data can be mapped, it avoids and maps incomplete happen.
Further, after step S61, further includes:
Step S63 deletes second keyword if not receiving the addition instruction for the treatment of people in preset time period And the corresponding attribute information of second keyword.
In the present embodiment, whether system detection receives the addition instruction for the treatment of people within a preset period of time, if place Reason personnel do not establish new mappings relationship within a preset period of time, then system default is the mapping for ignoring second keyword, can Second keyword and the corresponding attribute information of the second keyword to be deleted, wherein the second keyword is user data In user property value, for user property value there are corresponding customer attribute information, user property value includes using identity information and group The title of stretching frame structure, for example, " name ", " age ", " post ", " position ", customer attribute information includes identity information and tissue The particular content of framework title, for example, Zhang San, 23, the post A, C position, second-hand house service line etc..
The data that the present embodiment proposes import monitoring method, if grabbing institute using preset script information by matching The first keyword in user data is stated, and first keyword is matched with the configuration template, is determined each described Whether the first keyword in the configuration template has mapping relations, does not deposit in the configuration template if it is not, then obtaining In the second keyword of mapping relations, the new mappings relationship of second keyword is established;It is incomplete so as to avoid mapping It happens, supports the foundation of new mappings relationship.
In addition, the embodiment of the present invention also provides a kind of data importing monitoring device.
It is the functional block diagram that data of the present invention import monitoring device first embodiment referring to Fig. 5, Fig. 5.
It is virtual bench that data of the present invention, which import monitoring device, is stored in the storage that data shown in Fig. 1 import monitoring device In device 1005, for realizing data import monitoring programme it is functional: obtain the user data of importing, detect the number of users According to whether correct;If correct, the permission of user is configured based on preset configuration template and the user data, and raw At configuration file;The configuration file is compared with the original in the user data, based in the configuration template Default mapping relations determine whether the configuration file matches with the original;If mismatching, prompting message is sent extremely Treatment people, to remind treatment people to search reason.
Specifically, the data import monitoring device and include: in the present embodiment
Module 101 is obtained, for obtaining the user data imported, whether correct detects the user data;
Configuration module 102, if for correct, based on preset configuration template and the user data to the permission of user It is configured, and generates configuration file;
Monitoring module 103 is based on institute for the configuration file to be compared with the original in the user data The default mapping relations stated in configuration template determine whether the configuration file matches with the original;
Cue module 104, if sending prompting message to treatment people, to remind treatment people to search for mismatching Reason.
Further, module 101 is obtained to be also used to:
The first data that the first system receives and the second data that second system receives are obtained, and described first is counted According to and second data be compared, determine whether first data and second data consistent;
If consistent, second data are compared with the user data, determine second data with it is described Whether user data is consistent;
If consistent, it is determined that the user data is correct.
Further, module 101 is obtained to be also used to:
Call preset text processor using the exception rules in exception information library, detect in the user data whether There are exception fields;
If exception field is not present in the user data, it is determined that the user data is correct.
Further, configuration module 102 is also used to:
If correct, the user data is mapped as by target data based on the configuration template, and generate text to be configured Part;
The user identifier in the user data is obtained, history configuration record is searched based on the user identifier, determines institute It states in history configuration record with the presence or absence of the corresponding history profile of the user identifier;
If it exists, then detect whether the history profile conflicts with the file to be configured;
If conflict, deletes the history profile, using the file to be configured as the configuration file, and is based on The configuration file configures the permission of user.
Further, monitoring module 103 is also used to:
If matching, the first keyword in the user data is grabbed using preset script information, and by described the One keyword is matched with the configuration template, determines whether each first keyword exists in the configuration template Mapping relations;
If it is not, then obtaining the second keyword that mapping relations are not present in the configuration template, establishes described second and close The new mappings relationship of key word.
Further, monitoring module 103 is also used to:
If it is not, then obtaining the second keyword that mapping relations are not present in the configuration template, closed based on described second Key word sends prompting message to treatment people, and determines the addition instruction that treatment people whether is received in preset time period;
If receiving the addition instruction for the treatment of people in preset time period, instructed based on the addition in the configuration mould New mappings relationship is established in plate.
Further, monitoring module 103 is also used to:
If not receiving the addition instruction for the treatment of people in preset time period, second keyword and described the are deleted The corresponding customer attribute information of two keywords.
Wherein, the function that above-mentioned data import modules in monitoring device, which is realized, imports monitoring method reality with above-mentioned data It is corresponding to apply each step in example, function and realization process no longer repeat one by one here.
In addition, the embodiment of the present invention also provides a kind of readable storage medium storing program for executing.
It is stored with data on readable storage medium storing program for executing of the present invention and imports monitoring programme, wherein the data import monitoring programme quilt When processor executes, the step of importing monitoring method such as above-mentioned data is realized.
Wherein, data importing monitoring programme, which is performed realized method, can refer to data importing monitoring method of the present invention Each embodiment, details are not described herein again.
It should be noted that, in this document, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that the process, method, article or the system that include a series of elements not only include those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or system institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including being somebody's turn to do There is also other identical elements in the process, method of element, article or system.
The serial number of the above embodiments of the invention is only for description, does not represent the advantages or disadvantages of the embodiments.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can be realized by means of software and necessary general hardware platform, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical solution of the present invention substantially in other words does the prior art The part contributed out can be embodied in the form of software products, which is stored in one as described above In storage medium (such as ROM/RAM, magnetic disk, CD), including some instructions are used so that terminal device (it can be mobile phone, Computer, server, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The above is only a preferred embodiment of the present invention, is not intended to limit the scope of the invention, all to utilize this hair Equivalent structure or equivalent flow shift made by bright specification and accompanying drawing content is applied directly or indirectly in other relevant skills Art field, is included within the scope of the present invention.

Claims (10)

1. a kind of data import monitoring method, which is characterized in that the data import monitoring method the following steps are included:
The user data imported is obtained, whether correct detects the user data;
If correct, the permission of user is configured based on preset configuration template and the user data, and generate configuration File;
The configuration file is compared with the original in the user data, is reflected based on default in the configuration template The relationship of penetrating determines whether the configuration file matches with the original;
If mismatching, prompting message is sent to treatment people, to remind treatment people to search reason.
2. data as described in claim 1 import monitoring method, which is characterized in that just whether the detection user data True step includes:
Obtain the first data for receiving of the first system and the second data that second system receives, and by first data and Second data are compared, and determine whether first data and second data are consistent;
If consistent, second data are compared with the user data, determine second data and the user Whether data are consistent;
If consistent, it is determined that the user data is correct.
3. data as described in claim 1 import monitoring method, which is characterized in that just whether the detection user data True step includes:
Preset text processor is called using the exception rules in exception information library, detecting whether there is in the user data Exception field;
If exception field is not present in the user data, it is determined that the user data is correct.
4. data as claimed in claim 3 import monitoring method, which is characterized in that if described correct, matched based on preset It sets template and the user data configures the permission of user, and the step of generating configuration file includes:
If correct, the user data is mapped as by target data based on the configuration template, and generate file to be configured;
Obtain the user identifier in the user data, based on the user identifier search history configuration record, determine described in go through It whether there is the corresponding history profile of the user identifier in history configuration record;
If it exists, then detect whether the history profile conflicts with the file to be configured;
If conflict, deletes the history profile, using the file to be configured as the configuration file, and based on described Configuration file configures the permission of user.
5. data as claimed in claim 3 import monitoring method, which is characterized in that described by the configuration file and the use Original in user data is compared, and determines the configuration file and institute based on the default mapping relations in the configuration template After stating the step of whether original matches, the importing monitoring method further include:
If matching, grabs the first keyword in the user data using preset script information, and described first is closed Key word is matched with the configuration template, determines whether each first keyword has mapping in the configuration template Relationship;
If it is not, then obtaining the second keyword that mapping relations are not present in the configuration template, second keyword is established New mappings relationship.
6. data as claimed in claim 4 import monitoring method, which is characterized in that described if it is not, then obtaining in the configuration The second keyword of mapping relations is not present in template, the step of establishing the new mappings relationship of second keyword includes:
If it is not, then obtaining the second keyword that mapping relations are not present in the configuration template, it is based on second keyword Prompting message is sent to treatment people, and the addition instruction for whether receiving treatment people in preset time period determined;
If the addition instruction for the treatment of people is received in preset time period, based on addition instruction in the configuration template Establish new mappings relationship.
7. data as claimed in claim 6 import monitoring method, which is characterized in that described if it is not, then obtaining in the configuration The second keyword of mapping relations is not present in template, based on second keyword transmission prompting message to treatment people, and After the step of determining the addition instruction for whether receiving treatment people in preset time period, the data import monitoring method also Include:
If not receiving the addition instruction for the treatment of people in preset time period, second keyword and second pass are deleted The corresponding customer attribute information of key word.
8. a kind of data import monitoring device, which is characterized in that the data import monitoring device and include:
Module is obtained, for obtaining the user data imported, whether correct detects the user data;
Configuration module, if being matched based on preset configuration template and the user data to the permission of user for correct It sets, and generates configuration file;
Monitoring module is based on the configuration for the configuration file to be compared with the original in the user data Default mapping relations in template determine whether the configuration file matches with the original;
Cue module, if sending prompting message to treatment people, to remind treatment people to search reason for mismatching.
9. a kind of data import monitoring device, which is characterized in that the data import monitoring device include processor, memory, And be stored on the memory and monitoring programme can be imported by the data that the processor executes, wherein the data import When monitoring programme is executed by the processor, realize the data as described in any one of claims 1 to 7 import monitoring method Step.
10. a kind of readable storage medium storing program for executing, which is characterized in that it is stored with data on the readable storage medium storing program for executing and imports monitoring programme, When wherein the data importing monitoring programme is executed by processor, realize that the data as described in any one of claims 1 to 7 are led The step of entering monitoring method.
CN201910200499.3A 2019-03-16 2019-03-16 Data import monitoring method, device, equipment and readable storage medium storing program for executing Pending CN110059491A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910200499.3A CN110059491A (en) 2019-03-16 2019-03-16 Data import monitoring method, device, equipment and readable storage medium storing program for executing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910200499.3A CN110059491A (en) 2019-03-16 2019-03-16 Data import monitoring method, device, equipment and readable storage medium storing program for executing

Publications (1)

Publication Number Publication Date
CN110059491A true CN110059491A (en) 2019-07-26

Family

ID=67316158

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910200499.3A Pending CN110059491A (en) 2019-03-16 2019-03-16 Data import monitoring method, device, equipment and readable storage medium storing program for executing

Country Status (1)

Country Link
CN (1) CN110059491A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110781231A (en) * 2019-09-19 2020-02-11 平安科技(深圳)有限公司 Batch import method, device, equipment and storage medium based on database
CN114070737A (en) * 2021-11-26 2022-02-18 中国工商银行股份有限公司 Method and device for checking configuration data of equipment, storage medium and electronic equipment

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105740121A (en) * 2016-01-26 2016-07-06 中国银行股份有限公司 Log text monitoring and early-warning method and apparatus
CN106484716A (en) * 2015-08-27 2017-03-08 腾讯科技(北京)有限公司 Organizational structure method of adjustment and system
CN107301115A (en) * 2017-06-26 2017-10-27 中国铁道科学研究院电子计算技术研究所 Application exception is monitored and restoration methods and equipment
CN108881108A (en) * 2017-05-09 2018-11-23 北京京东尚科信息技术有限公司 The method and apparatus of rights management

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106484716A (en) * 2015-08-27 2017-03-08 腾讯科技(北京)有限公司 Organizational structure method of adjustment and system
CN105740121A (en) * 2016-01-26 2016-07-06 中国银行股份有限公司 Log text monitoring and early-warning method and apparatus
CN108881108A (en) * 2017-05-09 2018-11-23 北京京东尚科信息技术有限公司 The method and apparatus of rights management
CN107301115A (en) * 2017-06-26 2017-10-27 中国铁道科学研究院电子计算技术研究所 Application exception is monitored and restoration methods and equipment

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110781231A (en) * 2019-09-19 2020-02-11 平安科技(深圳)有限公司 Batch import method, device, equipment and storage medium based on database
CN110781231B (en) * 2019-09-19 2023-07-21 平安科技(深圳)有限公司 Database-based batch import method, device, equipment and storage medium
CN114070737A (en) * 2021-11-26 2022-02-18 中国工商银行股份有限公司 Method and device for checking configuration data of equipment, storage medium and electronic equipment
CN114070737B (en) * 2021-11-26 2024-03-08 中国工商银行股份有限公司 Method and device for checking configuration data of equipment, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
US11023533B2 (en) Node task data display method and apparatus, storage medium and computer equipment
CN109479061B (en) Compliance violation detection
US20170279840A1 (en) Automated event id field analysis on heterogeneous logs
US12074860B2 (en) Delegated authorization for isolated collections
CN110221982B (en) Performance test method, device and equipment of business system and readable storage medium
CN103280217B (en) A kind of audio recognition method of mobile terminal and device thereof
BR112021002704A2 (en) computer-implemented method of locating and classifying personal information and a data source, and system
US20160241589A1 (en) Method and apparatus for identifying malicious website
CN109360550A (en) Test method, device, equipment and the storage medium of voice interactive system
CN105592343A (en) Display Apparatus And Method For Question And Answer
CN103220352B (en) Terminal, server, file storage system and file storage method
TW201737072A (en) Application program project evaluation method and system
WO2012079836A1 (en) Method and system for creating and processing a data rule, data processing program, and computer program product
US11423232B2 (en) Systems and methods for deploying computerized conversational agents
US9823922B1 (en) Source code mapping through context specific key word indexes and fingerprinting
CN107832217A (en) A kind of automated testing method and device
US10514854B2 (en) Conditional authorization for isolated collections
CN111711529B (en) Group operation processing method, device, system, equipment and storage medium
CN112487150A (en) File management method, system, storage medium and electronic equipment
CN108491326A (en) Behavioral test recombination method, device and storage medium
WO2018121266A1 (en) Method and device for obtaining application and terminal device
CN110059491A (en) Data import monitoring method, device, equipment and readable storage medium storing program for executing
CN106095948A (en) The querying method of form, device and equipment
US20220414341A1 (en) Intent addition for a chatbot
CN109711656B (en) Multisystem association early warning method, device, equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination