CN110310080B - Data streaming method, device, computer equipment and storage medium - Google Patents

Data streaming method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN110310080B
CN110310080B CN201910430203.7A CN201910430203A CN110310080B CN 110310080 B CN110310080 B CN 110310080B CN 201910430203 A CN201910430203 A CN 201910430203A CN 110310080 B CN110310080 B CN 110310080B
Authority
CN
China
Prior art keywords
node
information
flow
user
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910430203.7A
Other languages
Chinese (zh)
Other versions
CN110310080A (en
Inventor
刘中雄
赵莫言
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Technology Shenzhen Co Ltd
Original Assignee
Ping An Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Technology Shenzhen Co Ltd filed Critical Ping An Technology Shenzhen Co Ltd
Priority to CN201910430203.7A priority Critical patent/CN110310080B/en
Publication of CN110310080A publication Critical patent/CN110310080A/en
Application granted granted Critical
Publication of CN110310080B publication Critical patent/CN110310080B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Abstract

The invention discloses a data streaming method, a data streaming device, computer equipment and a storage medium. The method comprises the following steps: acquiring user information and circulation information contained in a data circulation request; performing authority verification on the user according to the user information; if the verification result shows that the authority of the user is legal, acquiring flow data from a preset flow database, and extracting node attribute information of a current node and node attribute information of K circulation nodes corresponding to the current node from the flow data; the priority ranking is carried out on the K circulation nodes, and node attribute information of the ranked K circulation nodes is sent to a client; and carrying out circulation processing on the data to be processed contained in the circulation information according to the node identification and the executor identification of the target node returned by the client. The technical scheme of the invention effectively improves the flexibility of the business process and greatly improves the processing efficiency of the business process.

Description

Data streaming method, device, computer equipment and storage medium
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a data streaming method, a data streaming device, a computer device, and a storage medium.
Background
At present, with the continuous development of electronics, many enterprises adopt electronic office systems to process various business processes.
In the conventional method, the business processes of the electronic office system are all pre-configured fixed processes and can only be executed according to the fixed processes, for example, the processes are a (initiating process) -B (master approval) -C (master approval) -D (initiator transacting), but in practical application, the execution line of the business processes often needs to be changed according to the specific condition of the business, so that the fixed business processes cannot meet the flexible requirements in practice, and the flexibility of the business processes is low.
Disclosure of Invention
The embodiment of the invention provides a data streaming method, a data streaming device, computer equipment and a storage medium, which are used for solving the problems of low flexibility and low processing efficiency of a business process caused by the existing fixed business process.
A data streaming method, comprising:
if a data flow request of a user sent by a client is received, acquiring user information and flow information contained in the data flow request;
Performing authority verification on the user according to the user information to obtain a verification result;
if the verification result is that the authority of the user is legal, acquiring a flow identifier and a node identifier of a current node from the circulation information;
acquiring flow data corresponding to the flow identifier from a preset flow database, and extracting node attribute information of the current node and node attribute information of K circulation nodes corresponding to the current node from the flow data according to the node identifier of the current node, wherein K is zero or a positive integer;
according to the historical circulation records corresponding to the flow identifications stored in the flow database, priority ordering is carried out on K circulation nodes, and node attribute information of the K circulation nodes after ordering is sent to the client so that the user can select a target node and an executor identification corresponding to the target node from the K circulation nodes at the client;
and receiving the node identification and the executor identification of the target node returned by the client, and performing circulation processing on the data to be processed contained in the circulation information according to the node identification and the executor identification of the target node.
A data flow device, comprising:
the information acquisition module is used for acquiring user information and circulation information contained in a data circulation request if the data circulation request of a user sent by a client is received;
the permission verification module is used for performing permission verification on the user according to the user information to obtain a verification result;
the permission legal module is used for acquiring a flow identifier and a node identifier of a current node from the circulation information if the verification result is that the permission of the user is legal;
the data extraction module is used for acquiring flow data corresponding to the flow identifier from a preset flow database, and extracting node attribute information of the current node and node attribute information of K circulation nodes corresponding to the current node from the flow data according to the node identifier of the current node, wherein K is zero or a positive integer;
the sequencing forwarding module is used for sequencing the priorities of the K circulation nodes according to the history circulation records corresponding to the flow identifiers stored in the flow database, and sending the node attribute information of the K sequenced circulation nodes to the client so that the user can select a target node and an executor identifier corresponding to the target node from the K circulation nodes at the client;
And the data transfer module is used for receiving the node identification of the target node and the executor identification returned by the client, and carrying out transfer processing on the data to be processed contained in the transfer information according to the node identification of the target node and the executor identification.
A computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, the processor implementing the steps of the data flow method described above when the computer program is executed.
A computer readable storage medium storing a computer program which, when executed by a processor, performs the steps of the data flow method described above.
In the data flow method, the device, the computer equipment and the storage medium, when the server receives the data flow request of the user sent by the client, user information and flow information are acquired from the data flow request, and under the condition that authority verification of the user information is successful, flow data corresponding to the flow identifier is acquired from a flow database according to the flow identifier in the flow information, and flow processing is carried out on to-be-processed data contained in the flow information according to the node identifier of the current node in the flow information, node attribute information of the current node and node attribute information of K flow nodes corresponding to the current node are extracted from the flow data, then priority ordering is carried out on the K flow nodes according to historical flow records corresponding to the flow identifiers stored in the flow database, the node attribute information of the K flow nodes after ordering is sent to the client, so that the user can freely select a target node to be circulated and an executor identifier corresponding to the target node from the K flow nodes in the client, the server can flexibly control the flow data according to the received node identifier and the executor identifier of the target node returned by the client, the service can not really limit the actual flow service in a specific flow configuration range, thereby the service can be flexibly controlled in a real and flexibly-controlled manner, the service is flexibly and flexibly realized in a flow-specific flow-to-flow-required service-flow-switching range is realized, and the processing efficiency of the business process is greatly improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the description of the embodiments of the present invention will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present invention, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of an application environment of a data transfer method according to an embodiment of the invention;
FIG. 2 is a flow chart of a data transfer method according to an embodiment of the invention;
FIG. 3 is a flowchart of step S2 in the data stream method according to an embodiment of the present invention;
FIG. 4 is a flow chart of configuration and storage of process data in a data streaming method according to an embodiment of the present invention;
FIG. 5 is a flowchart of step S72 in the data streaming method according to an embodiment of the present invention;
FIG. 6 is a flowchart of a method for data streaming in an embodiment of the present invention, in which node attribute information of K sequenced streaming nodes is sent to a client in step S5;
FIG. 7 is a schematic diagram of a data transfer device according to an embodiment of the invention;
FIG. 8 is a schematic diagram of a computer device in accordance with an embodiment of the invention.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are some, but not all embodiments of the application. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
The data circulation method provided by the application can be applied to an application environment shown in fig. 1, wherein the application environment comprises a server and a client, the clients of the server are connected through a network, the network can be a wired network or a wireless network, the clients specifically comprise but not limited to various personal computers, notebook computers, smart phones, tablet computers and portable wearable devices, and the server can be specifically realized by using an independent server or a server cluster formed by a plurality of servers. The client sends the data stream request of the user to the server and displays the optional stream node to the user, the server completes the authority verification of the user, and the stream processing of the data to be processed is completed according to the stream attribute information and the target node.
In an embodiment, as shown in fig. 2, a data flow method is provided, and the method is applied to the server in fig. 1, and specifically includes steps S1 to S6, which are described in detail as follows:
s1: and if the data flow request of the user sent by the client is received, acquiring the user information and the flow information contained in the data flow request.
Specifically, when a user starts a service flow in an office system or receives a processing link of a certain service flow, and after the current link is processed, the service flow needs to be transferred to a next link for processing, a data transfer request is sent to a server through a client, wherein the data transfer request comprises user information of the user and transfer information for transferring the service flow to the next link.
The user information may include identity information of the user, where the identity information may specifically be a login account number and a login password of the user logging into the office system.
The circulation information may specifically include, but is not limited to: the method comprises the steps of a flow identifier for uniquely identifying a business flow, a current node identifier of a current link processed by a user, data to be processed which needs to flow to the next link, and the like.
S2: and carrying out authority verification on the user according to the user information to obtain a verification result.
Specifically, the server performs authority verification on the user according to the user information acquired in step S1, where the authority verification may include verification on an identity of the user and verification on a configuration authority of the user, and determines whether the user is a legal user of the office system by verifying the identity of the user, and determines whether the user has authority to perform flow configuration on the service flow by verifying the configuration authority of the user.
When the user belongs to a legal user of the office system and has the right for carrying out circulation configuration on the business process, the verification result is that the right of the user is legal, and when the user does not belong to the legal user of the office system or does not have the right for carrying out circulation configuration on the business process, the verification result is that the right of the user is illegal.
It should be noted that, the authority of performing flow configuration on the service flow refers to that the user can freely select and configure the data flow of the service flow from the preset flow range configuration data according to the actual service requirement.
Further, when the verification result is that the authority of the user is illegal, if the user does not belong to the legal user of the office system, the server refuses any processing of the current office flow by the user, if the user does not have the authority for carrying out flow configuration on the business flow, the user cannot freely select the next link for continuing to flow the business flow, and at the moment, the server carries out data flow according to the preset fixed flow of the business flow.
S3: if the verification result is that the authority of the user is legal, acquiring a flow identifier and a node identifier of the current node from the circulation information.
Specifically, if the verification result obtained in the step S2 is that the authority of the user is legal, the server obtains the flow identifier and the node identifier of the current node from the circulation information.
The process identifier is used to uniquely identify the service process, and the process identifier may specifically be a serial number (Identification (ID) of the service process.
The business process is composed of a plurality of nodes, various circulation relations exist among different nodes, each node corresponds to a node identifier, the node identifier has global uniqueness in the business process, and the node identifier is used for uniquely identifying the node in the business process. The node identification of the current node is the node identification of the node being processed by the user.
S4: acquiring flow data corresponding to a flow identifier from a preset flow database, and extracting node attribute information of a current node and node attribute information of K circulation nodes corresponding to the current node from the flow data according to the node identifier of the current node, wherein K is zero or a positive integer.
In this embodiment, a preset flow database stores a flow identifier of each service flow and corresponding flow data thereof, and a history flow record of each service flow in a preset time period.
The flow data comprises node identifiers of each node in the business flow and corresponding node attribute information thereof, and a circulation relation between each node and the next node corresponding to the node, wherein the circulation relation can be represented by a mapping relation between the node identifiers. The node attribute information of the node may include an executor identifier for processing the node, and the executor identifier may be one or more than one executor identifier.
Specifically, the server side queries flow data corresponding to the flow identifier from a preset flow database according to the flow identifier in the flow information obtained in the step S3, obtains node attribute information corresponding to the node identifier of the current node from the flow data, obtains node identifiers of each next node which can be circulated and corresponds to the node identifier of the current node, namely node identifiers of K circulation nodes, according to the mapping relation between the node identifiers in the circulation relation, and obtains node attribute information corresponding to the node identifiers of each circulation node.
Wherein, K is zero or a positive integer, it can be understood that when K is zero, the current node has no corresponding circulation node, namely the current node is the last node of the business flow; when K is 1, the current node has a corresponding circulation node; when K is greater than 1, the current node has a plurality of corresponding circulation nodes, namely, the current node can circulate to one of the K circulation nodes or can circulate to several or all of the K circulation nodes at the same time.
S5: and according to the historical circulation records corresponding to the flow identifications stored in the flow database, carrying out priority sequencing on the K circulation nodes, and sending node attribute information of the K sequenced circulation nodes to the client so that a user can select a target node and an executor identification corresponding to the target node from the K circulation nodes at the client.
Specifically, after obtaining node attribute information of K circulation nodes corresponding to a current node, the server obtains a history circulation record corresponding to a flow identifier from a flow database, where the history circulation record keeps a circulation record of each node when a business flow corresponding to the flow identifier is executed each time in a preset time period. The server analyzes the total times of the current node flowing to each flowing node in a preset time period according to the history flowing record, and ranks the priorities of the K flowing nodes according to the sequence from high to low of the total times, namely the higher the total times are, the higher the priority of the flowing node is, the reverse is performed, and the lower the total times are, the lower the priority of the flowing node is.
And the server side sends the node attribute information of the K flow nodes sequenced according to the priority from high to low to the client side.
The client side displays K circulation nodes and node attribute information thereof to the user according to the order of priority from high to low, the user can select a needed circulation node from the K circulation nodes in a clicking mode, and a proper executor identifier is selected from the node attribute information of the selected circulation node.
The client takes the circulation node selected by the user as a target node, takes the executor identifier selected by the user as an executor identifier corresponding to the target node, and sends the node identifier of the target node and the executor identifier corresponding to the target node to the server.
S6: and receiving the node identification and the executor identification of the target node returned by the client, and performing circulation processing on the data to be processed contained in the circulation information according to the node identification and the executor identification of the target node.
Specifically, after receiving a node identifier of a target node and an executor identifier corresponding to the target node sent by a client, the server flows a current processing link of a service flow to the target node, and sends a flow processing message to the client where the executor identifier corresponding to the target node is located, wherein the flow processing message contains data to be processed in the flow information.
The sending mode of the flow processing message may be specifically a mail mode, that is, a reminding mail containing the data to be processed is sent to a mailbox address corresponding to the executor identifier.
In this embodiment, when the server receives a data flow request of a user sent by the client, user information and flow information are obtained from the data flow request, and in the case that authority verification of the user information is successful, flow data corresponding to the flow identifier is obtained from a flow database according to the flow identifier in the flow information, and according to the node identifier of the current node in the flow information, node attribute information of the current node and node attribute information of K flow nodes corresponding to the current node are extracted from the flow data, then priority ordering is performed on the K flow nodes according to historical flow records corresponding to the flow identifiers stored in the flow database, the node attribute information of the K flow nodes after ordering is sent to the client, so that the user can freely select a target node and an executor identifier corresponding to the target node which need to flow from the K flow nodes, and the server performs flow processing on to-be-processed data contained in the flow information according to the received node identifier and executor identifier of the target node returned by the client.
In one embodiment, as shown in fig. 3, in step S2, authority verification is performed on the user according to the user information, so as to obtain a verification result, which specifically includes steps S21 to S24, and is described in detail as follows:
s21: and checking the user information according to legal login information in a preset registered user information database to obtain an identity check result.
Specifically, the preset registered user information database stores legal login information of legal users who are successfully registered in the office system, and the legal login information specifically can include an effective login account number of the office system and a corresponding effective login password.
The user information comprises a login account number and a login password of the user, the server side inquires the login account number of the user in the stored effective login account number in the registered user information database, and if the inquiry fails, namely the login account number of the user is not inquired in the stored effective login account number in the registered user information database, the user is confirmed to be not successfully registered in an office system, namely the identity verification result is verification failure.
If the inquiry is successful, that is, the server inquires the login account of the user in the saved effective login account in the registered user information database, the login password of the user is further matched with the effective login password corresponding to the effective login account inquired in the registered user information database, if the matching is successful, the identity of the user is confirmed to be legal, that is, the identity verification result is verification passing, and if the matching is failed, the identity verification result is verification failure.
If the identity verification result is that the verification is passed, the step S22 is continuously executed, and if the identity verification result is that the verification is failed, the flow jumps to the step S24 to continuously execute.
S22: if the identity verification result is that verification is passed, confirming that the user is a legal registered user, and acquiring position information corresponding to the user information from a preset user attribute database according to the user information.
Specifically, the server confirms that the user is a legal registered user according to the identity verification result obtained in the step S21, if the identity verification result is verification passing, at this time, further according to the user information, the position information corresponding to the user information is obtained in a preset user attribute database.
The preset user attribute database stores user information of each user and attribute information corresponding to the user information, and the attribute information can be queried according to the user information, wherein the attribute information specifically can comprise position information, department attribution information and the like of the user, the position information is used for identifying position grades of the user, and for example, the position information can be a common employee, a department manager, a general manager, a board manager and the like.
S23: and if the position information meets the preset position grade requirement, the verification result is that the authority of the user is legal.
Specifically, the server verifies the configuration authority of the user by judging whether the position information acquired in the step S22 meets the preset position level requirement, if the position information meets the preset position level requirement, the user is confirmed to have the authority to perform the circulation configuration on the service flow, and meanwhile, the identity verification result obtained in the step S21 is verification passing, so that the server confirms that the verification result is that the authority of the user is legal.
The preset job level requirements are used for limiting the configuration permission of the user to the service flow, the job level requirements corresponding to different types of service flows can be the same or different, and the setting can be specifically performed according to the actual application requirements.
For example, if the preset job level requirement is the department manager level or more, the server judges that the job information does not meet the preset job level requirement when the job information is the common man-hour, and judges that the job information meets the preset job level requirement when the job information is the department man-hour.
S24: if the identity verification result is that the verification fails or the position information does not meet the preset position grade requirement, the verification result is that the authority of the user is illegal.
Specifically, if the identity verification result obtained in step S21 is verification failure, or the identity verification result is verification passing, but the position information obtained in step S22 does not meet the preset position level requirement, the server confirms that the verification result is that the authority of the user is illegal.
In this embodiment, the user information is checked according to the legal login information in the preset registered user information database, whether the user is a legal registered user of the office system is judged, an identity check result is obtained, position information corresponding to the user information is obtained in the preset user attribute database, whether the user has permission to transfer and configure the service flow is judged according to whether the position information meets the preset position level requirement, when the identity check result is that the check is passed and the position information meets the preset position level requirement, the verification result is confirmed to be that the user's permission is legal, otherwise, the verification result is that the user's permission is illegal, the purpose that the user's permission is comprehensively limited from two dimensions of the legal registered user and the transfer and configuration permission is achieved, the service flow can be freely transferred within a certain permission range is ensured, the condition that the illegal use of fire or the user with low position level without the transfer and configuration permission is randomly transferred to the service flow is avoided, the risk of confusion and the service related loss is caused, and the basic safety and stability of the service flow are improved.
In one embodiment, as shown in fig. 4, the configuration and storage of the flow data may be further performed before step S1, specifically including steps S71 to S73, which are described in detail below:
s71: and receiving the flow range configuration data sent by the client.
Specifically, the service manager can set the flow range configuration data through the client, and the client sends the set flow range configuration data to the server.
The flow range configuration data is used for configuring nodes of the business flow and possible circulation relations between any two nodes, and specifically may include node identifiers of each node of the business flow and node attribute information corresponding to the node identifiers, and circulation relations between each node and a next node corresponding to the node, where the circulation relations may be represented by mapping relations between the node identifiers.
For example, for a certain business process a, the corresponding process range configuration data may include the nodes involved in the business process a, including node 1, node 2, node 3 and node 4, and possible flow relationships between any two nodes, including that node 1 may flow to node 2 or node 3, node 2 may flow to node 1, node 3 or node 4, node 3 may flow to node 2 or node 4, and node 4 may not have a flow relationship with other nodes.
S72: and carrying out validity check on the configuration data of the flow range to obtain a check result.
Specifically, since the flow range configuration data does not include a fixed flow from the start node to the end node of the service flow, only a possible flow relation between any two nodes is limited, and therefore validity check needs to be performed on the flow range configuration data to verify whether the flow relation can be continuously transferred from each node to the end node through the configured flow relation.
If all the nodes can be continuously switched to finally reach the end node according to the switching relation, the verification result of the validity verification is verification passing, otherwise, if one node exists and cannot be finally switched to the end node, the verification result of the validity verification is verification failing.
If the verification result of the validity verification is that the verification is not passed, the server side returns prompt information that the validity verification is not passed to the client side, wherein the prompt information can comprise node identification of a node which cannot be finally streamed to an ending node and related stream relation of the node, so that service management personnel can modify and update stream range configuration data according to the prompt information.
S73: if the verification result is that the verification is passed, the flow range configuration data is used as flow data, flow identification information is distributed for the flow data, and the flow identification information and the flow data are correspondingly stored in a flow database.
Specifically, if the verification result obtained in step S72 is that the verification is passed, the flow range configuration data received in step S71 is used as flow data, and flow identification information with global uniqueness is allocated to the flow data, and the flow identification information and the flow data are correspondingly stored in a flow database.
The flow identification information may be a serial number, and the unique identification information uniquely identifies the business flow corresponding to the flow data.
In this embodiment, after receiving the flow range configuration data sent by the client, validity check is performed on the flow range configuration data to ensure rationality and executable performance of the flow range configuration data, the checked flow range configuration data is used as flow data, flow identification information is allocated to the flow data, and the flow identification information and the flow data are correspondingly stored in a flow database, so that a reasonable and effective data basis is provided for data circulation according to the flow data.
In an embodiment, the flow range configuration data includes N nodes and K circulation nodes corresponding to each node, where N is a positive integer. The streaming node is one of N nodes.
For example, taking the business process a in step S71 as an example, the corresponding process range configuration data includes 4 nodes, which are respectively node 1, node 2, node 3 and node 4, wherein node 1 corresponds to 2 circulation nodes, which are respectively node 2 and node 3, node 2 corresponds to 3 circulation nodes, which are respectively node 1, node 3 and node 4, node 3 corresponds to 2 process transitions, which are respectively node 2 and node 4, and node 4 corresponds to 0 circulation nodes.
Further, as shown in fig. 5, in step S72, validity verification is performed on the flow range configuration data to obtain a verification result, which specifically includes steps S721 to S722, and is described in detail as follows:
s721: and forming a node set by N nodes, and marking the node corresponding to the node without the stream as an ending node.
Specifically, the server side composes N nodes contained in the flow range configuration data into a node set, and marks nodes with the number of 0 corresponding to the circulation nodes as end nodes according to the number of the circulation nodes corresponding to each node.
S722: if the K circulation nodes corresponding to each node belong to the node set, and each circulation node corresponding to each node is used as a starting point to circulate, and can circulate to the ending node, the verification result is confirmed to be verification passing.
Specifically, the server traverses each node in the node set, acquires K circulation nodes corresponding to the node from the flow range configuration data for each node, and checks whether the K circulation nodes all belong to the nodes in the node set.
In a specific embodiment, the server side forms the node identifier of each node in the node set into an identifier set, and for each node, the server side obtains the node identifiers of the K circulation nodes corresponding to the node, forms the node identifiers of the K circulation nodes into an identifier subset, and if the identifier subset belongs to the identifier set, confirms that the K circulation nodes belong to the node set.
If the K circulation nodes corresponding to each node belong to the node set, continuously circulating according to each circulation node corresponding to the node set by taking each node in the node set as a starting point, and finally confirming that the verification result is verification passing if all circulation nodes can circulate to the end node, and confirming that the verification result is not verification passing if at least one circulation node can not circulate to the end node finally.
Taking the service flow a in step S71 as an example, the corresponding flow range configuration data includes 4 nodes, which are respectively node 1, node 2, node 3 and node 4, where node 1 corresponds to node 2 and node 3, node 2 corresponds to node 1, node 3 and node 4, respectively node 3 corresponds to node 2 and node 4, and node 4 corresponds to 0 flow nodes, and it is known that each flow node corresponding to each node belongs to a node set formed by node 1, node 2, node 3 and node 4, and, with each node as a starting point, according to each flow node corresponding to the node, continuous flow can be performed, and all flow can flow to an end node, that is, node 4, and with node 2 as an example, node 2 can flow to node 1-node 3-node 4, node 2 can also flow to node 3-node 4, and node 2 can also flow to node 4, so that the verification result of the flow range configuration data corresponding to the service flow a is verified.
In this embodiment, N nodes are formed into a node set, a node corresponding to no flow node is marked as an end node, then whether K flow nodes corresponding to each node all belong to the node set is determined, if K flow nodes corresponding to each node all belong to the node set, each flow node corresponding to each node is used as a starting point, and all flows can be transferred to the end node according to each flow node corresponding to the node, and a check result is confirmed to be a check pass, so that the validity of the flow range configuration data is quasi-checked, the rationality and the executable of the flow range configuration data are ensured, and a reasonable and effective data basis is provided for the subsequent data flow according to the flow data.
In one embodiment, the node attribute information further includes a node sponsor role. The node manager role is used to identify the user role of the node, and the node manager role may be a post name of the user, for example, a secret, a salesman, a developer, a department leader, etc.
Further, as shown in fig. 6, in step S5, node attribute information of the K ordered flow nodes is sent to the client, specifically including steps S51 to S53, which are described in detail as follows:
s51: and acquiring department attribution information corresponding to the user information from a preset user attribute database according to the user information.
Specifically, the preset user attribute database stores user information of each user and attribute information corresponding to the user information, and the attribute information corresponding to the user information can be queried according to the user information, where the attribute information specifically includes job position information, department attribution information, and the like of the user, and the department attribution information is used for identifying a minimum department where the user is located, for example, the department attribution information specifically includes a research and development part, and a development part.
S52: and matching the department attribution information with the node manager roles of the current node to obtain a matching result.
Specifically, the server matches the department attribution information obtained in step S51 with the node sponsor role in the node attribute information of the current node, that is, judges whether the node sponsor role in the node attribute information of the current node belongs to the post of the minimum department where the user of the current node is located, if the node sponsor role belongs to the post of the minimum department where the user of the current node is located, the matching result is successful, otherwise, if the node sponsor role does not belong to the post of the minimum department where the user of the current node is located, the matching result is failed.
For example, if the node manager role in the node attribute information of the current node is a salesman and the department attribution information of the user of the current node is a part of research and development, the salesman does not belong to a post of research and development, that is, the matching result is a matching failure.
If the matching result is successful, the step S53 is continuously executed, and if the matching result is failed, the server stops the continuous circulation processing of the business process, and returns a prompt message of failed matching to the client.
S53: and if the matching result is that the matching is successful, the node attribute information of the K sequenced circulation nodes is sent to the client.
Specifically, if the matching result obtained in step S52 is that the matching is successful, the server confirms that the department attribution information of the user of the current node is matched with the node sponsor role of the current node, and the server sends the node attribute information of the K sequenced circulation nodes to the client.
In this embodiment, by matching the department attribution information with the node manager role of the current node, it is determined whether the node manager role of the current node belongs to the position of the minimum department where the user of the current node is located, so that the position of the user of the current node and the node manager role of the current node are ensured to be identical, and the user of the non-node manager role is prevented from processing the business process data of the current node in an illegal manner, thereby effectively improving the processing security of the business process.
It should be understood that the sequence number of each step in the foregoing embodiment does not mean that the execution sequence of each process should be determined by the function and the internal logic, and should not limit the implementation process of the embodiment of the present invention.
In an embodiment, a data transfer device is provided, where the data transfer device corresponds to the data transfer method in the foregoing embodiment one by one. As shown in fig. 7, the data transfer device includes: an information acquisition module 10, a right verification module 20, a right legal module 30, a data extraction module 40, a sequencing forwarding module 50 and a data circulation module 60. The functional modules are described in detail as follows:
The information acquisition module 10 is configured to acquire user information and circulation information included in a data circulation request if the data circulation request of a user sent by a client is received;
the permission verification module 20 is used for performing permission verification on the user according to the user information to obtain a verification result;
the permission legal module 30 is configured to obtain a flow identifier and a node identifier of a current node from the circulation information if the verification result indicates that the permission of the user is legal;
the data extraction module 40 is configured to obtain flow data corresponding to a flow identifier from a preset flow database, and extract node attribute information of a current node and node attribute information of K circulation nodes corresponding to the current node from the flow data according to a node identifier of the current node, where K is zero or a positive integer;
the ordering and forwarding module 50 is configured to order the priorities of the K circulation nodes according to the history circulation records corresponding to the flow identifiers stored in the flow database, and send node attribute information of the K circulation nodes after the ordering to the client, so that the user selects the target node and the executor identifier corresponding to the target node from the K circulation nodes at the client;
The data transfer module 60 is configured to receive the node identifier and the executor identifier of the target node returned by the client, and perform transfer processing on the data to be processed included in the transfer information according to the node identifier and the executor identifier of the target node.
Further, the rights verification module 20 includes:
the identity verification sub-module 201 is configured to verify the user information according to legal login information in a preset registered user information database, so as to obtain an identity verification result;
the job position obtaining sub-module 202 is configured to confirm that the user is a legal registered user if the identity verification result is verification, and obtain job position information corresponding to the user information in a preset user attribute database according to the user information;
a verification success sub-module 203, configured to, if the job information meets a preset job level requirement, verify that the authority of the user is legal;
the verification failure sub-module 204 is configured to, if the identity verification result is that the verification fails or the job information does not meet the preset job level requirement, verify that the authority of the user is illegal.
Further, the data flow device further includes:
a configuration receiving module 70, configured to receive flow range configuration data sent by the client;
The legal verification module 80 is configured to perform validity verification on the flow range configuration data to obtain a verification result;
the configuration storage module 90 is configured to use the flow range configuration data as flow data if the verification result is that the verification is passed, allocate flow identification information to the flow data, and store the flow identification information and the flow data in the flow database correspondingly.
Further, the flow range configuration data includes N nodes and K circulation nodes corresponding to each node, where N is a positive integer, and the legal verification module 80 includes:
a set marking sub-module 801, configured to form a node set from N nodes, and mark a node corresponding to a node without a stream as an end node;
and the flow verification sub-module 802 is configured to confirm that the verification result is verification pass if the K flow nodes corresponding to each node all belong to the node set, and each node is used as a starting point to perform flow according to each flow node corresponding to the node, and all the flow can be transferred to an ending node.
Further, the node attribute information includes a node sponsor role, and the order forwarding module 50 includes:
the attribution inquiry sub-module 501 is configured to obtain department attribution information corresponding to user information from a preset user attribute database according to the user information;
The role matching sub-module 502 is configured to match the department attribution information with a node manager role of the current node, so as to obtain a matching result;
and the matching success sub-module 503 is configured to send the node information of the K ordered circulation nodes to the client if the matching result is that the matching is successful.
For specific limitations of the data transfer device, reference may be made to the above limitation of the data transfer method, and no further description is given here. The modules in the data flow device may be implemented in whole or in part by software, hardware, or a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a server, and the internal structure of which may be as shown in fig. 8. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, computer programs, and a database. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a data streaming method.
In an embodiment, a computer device is provided, including a memory, a processor, and a computer program stored on the memory and executable on the processor, where the processor executes the computer program to implement the steps of the data transfer method in the above embodiment, such as steps S1 to S6 shown in fig. 2. Alternatively, the processor, when executing the computer program, implements the functions of the modules/units of the data flow device in the above embodiments, such as the functions of the modules 10 to 60 shown in fig. 7. To avoid repetition, no further description is provided here.
In an embodiment, a computer readable storage medium is provided, on which a computer program is stored, which when executed by a processor implements the data transfer method in the method embodiment described above, or which when executed by a processor implements the functions of the modules/units in the data transfer device in the device embodiment described above. To avoid repetition, no further description is provided here.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in embodiments provided herein may include non-volatile and/or volatile memory. The nonvolatile memory can include Read Only Memory (ROM), programmable ROM (PROM), electrically Programmable ROM (EPROM), electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), memory bus direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), among others.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions.
The above embodiments are only for illustrating the technical solution of the present invention, and not for limiting the same; although the invention has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present invention, and are intended to be included in the scope of the present invention.

Claims (8)

1. A data streaming method, the data streaming method comprising:
if a data flow request of a user sent by a client is received, acquiring user information and flow information contained in the data flow request;
Performing authority verification on the user according to the user information to obtain a verification result;
if the verification result is that the authority of the user is legal, acquiring a flow identifier and a node identifier of a current node from the circulation information;
acquiring flow data corresponding to the flow identifier from a preset flow database, and extracting node attribute information of the current node and node attribute information of K circulation nodes corresponding to the current node from the flow data according to the node identifier of the current node, wherein K is zero or a positive integer;
according to the historical circulation records corresponding to the flow identifications stored in the flow database, priority ordering is carried out on K circulation nodes, and node attribute information of the K circulation nodes after ordering is sent to the client so that the user can select a target node and an executor identification corresponding to the target node from the K circulation nodes at the client;
receiving the node identification and the executor identification of the target node returned by the client, and performing circulation processing on the data to be processed contained in the circulation information according to the node identification and the executor identification of the target node;
Performing authority verification on the user according to the user information, and obtaining a verification result comprises:
checking the user information according to legal login information in a preset registered user information database to obtain an identity check result;
if the identity verification result is that verification is passed, confirming that the user is a legal registered user, and acquiring position information corresponding to the user information from a preset user attribute database according to the user information;
if the job information meets the preset job level requirement, the verification result is that the authority of the user is legal;
if the identity verification result is that verification fails or the job information does not meet the preset job level requirement, the verification result is that the authority of the user is illegal;
the node attribute information includes a node manager role, and the sending the node attribute information of the K sequenced circulation nodes to the client includes:
acquiring department attribution information corresponding to the user information from the preset user attribute database according to the user information;
matching the department attribution information with the node management roles of the current node to obtain a matching result;
And if the matching result is that the matching is successful, sending the node information of the K sequenced circulation nodes to the client.
2. The data streaming method according to claim 1, wherein before the user information and the streaming information included in the data streaming request are obtained if the data streaming request of the user sent by the client is received, the data streaming method further includes:
receiving flow range configuration data sent by the client;
carrying out validity check on the flow range configuration data to obtain a check result;
and if the verification result is that the verification is passed, using the flow range configuration data as the flow data, distributing the flow identification information for the flow data, and correspondingly storing the flow identification information and the flow data into the flow database.
3. The data flow method as claimed in claim 2, wherein the flow range configuration data includes N nodes and K flow nodes corresponding to each node, where N is a positive integer, and the performing validity check on the flow range configuration data to obtain a check result includes:
Forming N nodes into a node set, and marking the nodes which do not correspond to the circulation nodes as ending nodes;
and if the K circulation nodes corresponding to each node belong to the node set, and each circulation node corresponding to each node is used as a starting point to circulate, and can circulate to the ending node, confirming that the verification result is verification passing.
4. A data transfer device, wherein the data transfer device comprises:
the information acquisition module is used for acquiring user information and circulation information contained in a data circulation request if the data circulation request of a user sent by a client is received;
the permission verification module is used for performing permission verification on the user according to the user information to obtain a verification result;
the permission legal module is used for acquiring a flow identifier and a node identifier of a current node from the circulation information if the verification result is that the permission of the user is legal;
the data extraction module is used for acquiring flow data corresponding to the flow identifier from a preset flow database, and extracting node attribute information of the current node and node attribute information of K circulation nodes corresponding to the current node from the flow data according to the node identifier of the current node, wherein K is zero or a positive integer;
The sequencing forwarding module is used for sequencing the priorities of the K circulation nodes according to the history circulation records corresponding to the flow identifiers stored in the flow database, and sending the node attribute information of the K sequenced circulation nodes to the client so that the user can select a target node and an executor identifier corresponding to the target node from the K circulation nodes at the client;
the data transfer module is used for receiving the node identification of the target node and the executor identification returned by the client, and performing transfer processing on the data to be processed contained in the transfer information according to the node identification of the target node and the executor identification;
performing authority verification on the user according to the user information, wherein obtaining a verification result comprises:
checking the user information according to legal login information in a preset registered user information database to obtain an identity check result;
if the identity verification result is that verification is passed, confirming that the user is a legal registered user, and acquiring position information corresponding to the user information from a preset user attribute database according to the user information;
If the job information meets the preset job level requirement, the verification result is that the authority of the user is legal;
if the identity verification result is that verification fails or the job information does not meet the preset job level requirement, the verification result is that the authority of the user is illegal;
the node attribute information includes a node manager role, and the sending the node attribute information of the K sequenced circulation nodes to the client includes:
acquiring department attribution information corresponding to the user information from the preset user attribute database according to the user information;
matching the department attribution information with the node management roles of the current node to obtain a matching result;
and if the matching result is that the matching is successful, sending the node information of the K sequenced circulation nodes to the client.
5. The data flow device of claim 4, wherein the rights verification module comprises:
the identity verification sub-module is used for verifying the user information according to legal login information in a preset registered user information database to obtain an identity verification result;
The job position acquisition sub-module is used for confirming that the user is a legal registered user if the identity verification result is verification passing, and acquiring job position information corresponding to the user information from a preset user attribute database according to the user information;
a verification success sub-module, configured to, if the job information meets a preset job level requirement, verify that the authority of the user is legal;
and the verification failure sub-module is used for verifying that the authority of the user is illegal if the identity verification result is that the verification fails or the job information does not meet the preset job level requirement.
6. The data transfer device of claim 4, wherein the data transfer device further comprises:
the configuration receiving module is used for receiving the flow range configuration data sent by the client;
the legal verification module is used for carrying out legal verification on the flow range configuration data to obtain a verification result;
and the configuration storage module is used for taking the flow range configuration data as the flow data if the verification result is that the verification is passed, distributing the flow identification information for the flow data, and correspondingly storing the flow identification information and the flow data into the flow database.
7. A computer device comprising a memory, a processor and a computer program stored in the memory and executable on the processor, characterized in that the processor implements the data transfer method according to any of claims 1 to 3 when executing the computer program.
8. A computer readable storage medium storing a computer program, characterized in that the computer program, when executed by a processor, implements a data transfer method according to any one of claims 1 to 3.
CN201910430203.7A 2019-05-22 2019-05-22 Data streaming method, device, computer equipment and storage medium Active CN110310080B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910430203.7A CN110310080B (en) 2019-05-22 2019-05-22 Data streaming method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910430203.7A CN110310080B (en) 2019-05-22 2019-05-22 Data streaming method, device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110310080A CN110310080A (en) 2019-10-08
CN110310080B true CN110310080B (en) 2023-10-17

Family

ID=68075011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910430203.7A Active CN110310080B (en) 2019-05-22 2019-05-22 Data streaming method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110310080B (en)

Families Citing this family (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110852720A (en) * 2019-11-14 2020-02-28 北京字节跳动网络技术有限公司 Document processing method, device, equipment and storage medium
CN111222845A (en) * 2019-12-27 2020-06-02 北京健康之家科技有限公司 Resource transfer method, device, equipment and readable storage medium
CN111652580B (en) * 2020-05-29 2023-02-14 深圳平安医疗健康科技服务有限公司 Method and device for processing data of nodes
CN111966454A (en) * 2020-07-31 2020-11-20 上海泛微网络科技股份有限公司 Flow prediction method and device
CN112686580B (en) * 2021-01-31 2023-05-16 重庆渝高科技产业(集团)股份有限公司 Workflow definition method and system capable of customizing flow
CN112988709A (en) * 2021-03-15 2021-06-18 成都乐动信息技术有限公司 Data sorting method and device, electronic equipment and storage medium
CN113435859A (en) * 2021-07-12 2021-09-24 建信金融科技有限责任公司 Letter processing method and device, electronic equipment and computer readable medium
CN113656095B (en) * 2021-08-06 2023-08-04 北京数码大方科技股份有限公司 Processing method and device for configuration data
CN114500654B (en) * 2022-02-23 2024-03-22 石家庄通合电子科技股份有限公司 Data forwarding device, power module and data forwarding method

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105404269A (en) * 2015-10-23 2016-03-16 江苏省电力公司南京供电公司 Three-remote signal acceptance system of intelligent transformer station
CN106686023A (en) * 2015-11-05 2017-05-17 中兴通讯股份有限公司 Flow designing method, client machine, server side apparatus and system
CN109087054A (en) * 2018-06-01 2018-12-25 平安科技(深圳)有限公司 Synergetic office work data flow processing method, device, computer equipment and storage medium
CN109298926A (en) * 2018-09-29 2019-02-01 阿里巴巴集团控股有限公司 Resource transfers side enters the method, apparatus and electronic equipment of resource transfers platform

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105404269A (en) * 2015-10-23 2016-03-16 江苏省电力公司南京供电公司 Three-remote signal acceptance system of intelligent transformer station
CN106686023A (en) * 2015-11-05 2017-05-17 中兴通讯股份有限公司 Flow designing method, client machine, server side apparatus and system
CN109087054A (en) * 2018-06-01 2018-12-25 平安科技(深圳)有限公司 Synergetic office work data flow processing method, device, computer equipment and storage medium
CN109298926A (en) * 2018-09-29 2019-02-01 阿里巴巴集团控股有限公司 Resource transfers side enters the method, apparatus and electronic equipment of resource transfers platform

Also Published As

Publication number Publication date
CN110310080A (en) 2019-10-08

Similar Documents

Publication Publication Date Title
CN110310080B (en) Data streaming method, device, computer equipment and storage medium
CN108573371B (en) Data approval method, device, computer equipment and storage medium
CN110602239B (en) Block chain information storage method and related equipment
CN108470298B (en) Method, device and system for transferring resource numerical value
WO2020050943A4 (en) Methods for requesting and authenticating photographic image data
CN109359994B (en) Service processing method, device and system based on block chain
CN111343142A (en) Data processing method and device based on block chain network and storage medium
CN111008069A (en) Service processing method, device, computer equipment and storage medium
CN108446172B (en) Data calling method and device, computer equipment and storage medium
CN110597673B (en) Disaster recovery method, device and equipment of storage system and computer readable storage medium
CN111488372A (en) Data processing method, device and storage medium
CN110555769A (en) Block chain transaction data processing method and device, computer equipment and storage medium
CN105119886A (en) Account ownership determination method and device
CN110599267A (en) Electronic invoice billing method and device, computer readable storage medium and computer equipment
CN113239398A (en) Service processing method and device
CN114239060A (en) Data acquisition method and device, electronic equipment and storage medium
CN110855688B (en) Block chain information processing method and related equipment
CN109766316A (en) File acquisition method, device, computer equipment and storage medium
CN105072608B (en) A kind of method and device of administrative authentication token
CN110011796B (en) Certificate updating method and device, computer equipment and storage medium
CN111260475A (en) Data processing method, block chain node point equipment and storage medium
CN108389124B (en) Data processing method, data processing device, computer equipment and storage medium
CN112040015B (en) Consensus node list generation method and related device
CN112541820B (en) Digital asset management method, device, computer equipment and readable storage medium
CN111339130A (en) Data query method, related equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant