CN110348805A - A kind of list leakage inspection method, device, electronic equipment and storage medium - Google Patents

A kind of list leakage inspection method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN110348805A
CN110348805A CN201910543648.6A CN201910543648A CN110348805A CN 110348805 A CN110348805 A CN 110348805A CN 201910543648 A CN201910543648 A CN 201910543648A CN 110348805 A CN110348805 A CN 110348805A
Authority
CN
China
Prior art keywords
list data
information
data
identity information
list
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910543648.6A
Other languages
Chinese (zh)
Other versions
CN110348805B (en
Inventor
历高歌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Da Jia Ying Information Technology Co Ltd
Original Assignee
Suzhou Da Jia Ying Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Da Jia Ying Information Technology Co Ltd filed Critical Suzhou Da Jia Ying Information Technology Co Ltd
Priority to CN201910543648.6A priority Critical patent/CN110348805B/en
Publication of CN110348805A publication Critical patent/CN110348805A/en
Application granted granted Critical
Publication of CN110348805B publication Critical patent/CN110348805B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/105Human resources
    • G06Q10/1053Employment or hiring

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Economics (AREA)
  • Operations Research (AREA)
  • Marketing (AREA)
  • Educational Administration (AREA)
  • Data Mining & Analysis (AREA)
  • Development Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • Software Systems (AREA)
  • Fuzzy Systems (AREA)
  • Mathematical Physics (AREA)
  • Probability & Statistics with Applications (AREA)
  • General Engineering & Computer Science (AREA)
  • Computational Linguistics (AREA)
  • Databases & Information Systems (AREA)
  • Game Theory and Decision Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The present invention relates to technical field of data administration, specifically a kind of list leakage inspection method includes: to receive pre-selection period corresponding first list data, and first place forms data includes the first identity information;Obtained corresponding second list data of the upper period for preselecting the period and corresponding staff attendance data, wherein second place forms data includes: the second identity information, and staff attendance data include: tiers e'tat information;The second identity information in the second list data is updated according to the tiers e'tat information in staff attendance data, and generates third list data;Identity information in third list data is compared with the first identity information in the first list data, and determines the identity information omitted in the first list data.It detects that current period labor service is leaked to the data omitted in leaving office list by this method, reduces a possibility that the case where member does not get money sends, provide science, reliable list leakage detection means for business administration.

Description

A kind of list leakage inspection method, device, electronic equipment and storage medium
Technical field
The present invention relates to technical field of data administration, in particular to a kind of list leakage inspection method, device, electronic equipment and deposit Storage media.
Background technique
With the fast development of computer and Internet technology, terminal is largely popularized, and the dependence of user customer is more next Higher, part company has used client to check card and pay wages.But when company upload leaving office list omit when, can make It is got at user and in turn results in a series of subsequent consumption for linking up cost less than corresponding wages, both brought client to user Experience sense it is poor, and the dependence of client is caused to reduce.
Therefore, it is urgent to provide a kind of is verified or is found out in leaving office list to what company uploaded before wages granting It is omitted present in leaving office list, can be improved the accuracy and timeliness of wages granting, solve to cause to use due to wages leakage hair The problem of increased costs, is linked up at family.
Summary of the invention
In view of the above problems in the prior art, the purpose of the present invention is to provide a kind of list leakage inspection methods, device, electronics Equipment and storage medium can be improved the accuracy and timeliness of wages granting, solve to cause user to link up due to wages leakage hair The problem of increased costs.
To solve the above-mentioned problems, the present invention provides a kind of list leakage inspection method, comprising:
Pre-selection period corresponding first list data is received, the first place forms data includes the first identity information;
Corresponding second list data of the upper period for preselecting the period and corresponding staff attendance data were obtained, In, the second place forms data includes: the second identity information, and the staff attendance data include: tiers e'tat information;
According to the tiers e'tat information in the staff attendance data to described in second list data Two identity informations are updated, and generate third list data;
By first identity information in the identity information and first list data in the third list data It compares, and determines the identity information omitted in first list data.
Another aspect of the present invention provides a kind of list leak detection device, comprising:
First list data receiving module, for receiving pre-selection period corresponding first list data, first list Data include the first identity information;
Second list data obtains module, for obtaining corresponding second list data of the upper period in the pre-selection period With corresponding staff attendance data, wherein the second place forms data includes: the second identity information, the staff attendance data It include: tiers e'tat information;
Third list data generation module, for according in the staff attendance data the tiers e'tat information and institute Second identity information in the second list data is stated, second list data is updated, and generate third list Data, the third forms data include second place forms data;
Missing data determining module, for by the third list data identity information and first list data In first identity information compare, determine the identity information omitted in first list data.
Another aspect of the present invention provides a kind of electronic equipment, and the electronic equipment includes: terminal and server, the terminal Or server includes processor and memory, and at least one instruction, at least a Duan Chengxu, code are stored in the memory Collection or instruction set, at least one instruction, an at least Duan Chengxu, the code set or instruction set are added by the processor It carries and executes to realize such as above-mentioned list leakage inspection method.
Another aspect of the present invention provides a kind of computer readable storage medium, is stored at least one in the storage medium Instruction, at least a Duan Chengxu, code set or instruction set, at least one instruction, an at least Duan Chengxu, the code set Or instruction set is loaded by processor and is executed to realize such as above-mentioned list leakage inspection method.
Due to above-mentioned technical proposal, the invention has the following advantages:
A kind of list leakage inspection method of the invention has the advantages that and can not only effectively prevent in attendance management Human factor, fully demonstrated the just of attendance management, avoided unnecessary occurrences in human life dispute, and can also detect pre-selection week Phase labor service is leaked to the data omitted in leaving office list, and a possibility that the case where member does not get money sends is reduced, and is business administration Science, reliable list leakage detection means are provided, are that an enterprise embodies its modern management, saves manpower, improve efficiency, prevent The necessary technological means of loophole.
Detailed description of the invention
It, below will be to required in embodiment or description of the prior art in order to illustrate more clearly of technical solution of the present invention The attached drawing used is briefly described.It should be evident that drawings in the following description are only some embodiments of the invention, it is right For those of ordinary skill in the art, without creative efforts, it can also be obtained according to these attached drawings Its attached drawing.
Fig. 1 is implementation environment schematic diagram provided in an embodiment of the present invention;
Fig. 2 is a kind of flow chart of list leakage inspection method provided in an embodiment of the present invention;
Fig. 3 is a kind of block diagram of list leakage inspection method device provided in an embodiment of the present invention;
Fig. 4 is the structural schematic diagram of terminal provided in an embodiment of the present invention;
Fig. 5 is the structural schematic diagram of server provided in an embodiment of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, those of ordinary skill in the art without making creative work it is obtained it is all its His embodiment, shall fall within the protection scope of the present invention.
It should be noted that description and claims of this specification and term " first " in above-mentioned attached drawing, " Two " etc. be to be used to distinguish similar objects, without being used to describe a particular order or precedence order.It should be understood that using in this way Data be interchangeable under appropriate circumstances, so as to the embodiment of the present invention described herein can in addition to illustrating herein or Sequence other than those of description is implemented.In addition, term " includes " and " having " and their any deformation, it is intended that cover Covering non-exclusive includes to be not necessarily limited to for example, containing the process, method of a series of steps or units, device, product or equipment Step or unit those of is clearly listed, but may include be not clearly listed or for these process, methods, product Or other step or units that equipment is intrinsic.
Figure of description 1 is please referred to, it illustrates implementation environment schematic diagrames provided in an embodiment of the present invention, as shown in Figure 1, The implementation environment can include at least user terminal 110 and server 120.
Operation has client in user terminal 110.User terminal 110 can be one or more smart phone, plate electricity Brain, E-book reader, pocket computer on knee and desktop computer etc..The client can be supplied to for service provider The application program of user, or service provider is supplied to the Webpage of user.
The server 120 can be an independently operated server, be also possible to consist of several servers Server cluster or a cloud computing service center.The server 120 may include network communication unit, processor With memory etc..The server 120 can establish communication link by wireless or cable network and the user terminal 110 It connects.The second server can be established with the server 120 by wireless or cable network and the user terminal 110 Communication connection.
In embodiments of the present invention, the client, which can be, any provides the client of service for user.For example, described Client can be payment class applications client, recruitment class client and shopping class client etc..
A kind of list leakage inspection method of the invention introduced below, please refers to Figure of description 2, and it illustrates the present invention to implement A kind of process for list leakage inspection method that example provides.Wherein, the application program has been installed on user terminal 110, this method Executing subject is electronic equipment.As shown in Figure 2, which comprises
S102: receiving pre-selection period corresponding first list data, and the first place forms data includes the first identity information.
Specifically, electronic equipment can receive pre-selection period corresponding first list data, the first list data be can wrap It includes: at least one first identity information, first work unit's information corresponding with the first identity information and the first identity information pair The third work state information answered, the working condition change time, post, personal document type, bank's card number, personal pay sheet, Work the information such as number of days.
S104: corresponding second list data of the upper period and corresponding staff attendance number in the pre-selection period were obtained According to, wherein the second place forms data includes: the second identity information, and the staff attendance data include: tiers e'tat information;
Specifically, corresponding second list data of the upper period and the corresponding member in electronic equipment available pre-selection period Work attendance data, wherein the second list data may include: at least one second identity information, corresponding with the second identity information Second work unit's information, the first work state information corresponding with the second identity information, working condition change time, duty The information such as business, personal document type, bank's card number, personal pay sheet, work number of days.Staff attendance data may include: third Identity information, time of checking card corresponding with tiers e'tat information, position of checking card, third work unit information etc..Wherein, the first work It may include: unknown state information, on-job status information, status information of leaving office and status information of becoming a full member as status information.It needs Illustrate, unknown state information can be employee and interview and pass through in corresponding company, but uncertain either with or without next Working, certain second list data also have time (i.e. interview time) corresponding with unknown state information, on-job status information It can be employee to be formally on duty, leaving office status information and status information of becoming a full member all can be the employee and can not use client End pay out wages, wherein status information of becoming a full member can indicate that the employee is that correspondence is found a job and become by the client The formal employee of work unit's information.
It should be noted that the first identity information, the second identity information and tiers e'tat information may each be following any Information: name and unique and effective passport NO., the unique identification of name and electronic equipment distribution, unique and effective certificate The unique identification that number, electronic equipment distribute.Wherein, unique and effective passport NO. can be identity card, social security card, the registered permanent residence Originally, the certificate that passport and/or driver's license etc. uniquely and are effectively identified containing user.Unique identification can be number such as phone number The composition of code, number and/or character, for example, A-ffsg931,12952434 or ASKJDAS.The pre-selection period can be specified A cycle in period, such as current period or history cycle.The time span in period is not done in this specification embodiment It is specific to limit, preferred one day, one week, two weeks or one month.
S106: according to the tiers e'tat information in the staff attendance data to the institute in second list data It states the second identity information to be updated, and generates third list data.
Specifically, can be according to preset rules according to tiers e'tat information to described in the second list data Two identity informations are updated, and generate third list data, and wherein third list data can be updated second list Data.Third list data can be with WORD, EXCEL, TXT, PDF etc. read-write form storage in the electronic device.Wherein Preset rule can be one of addition, deletion, change or a variety of.
Exemplary, when tiers e'tat information is A, and the second identity information is A ', electronic equipment can be by A and A ' compare It is right, if A and A ' be not identical, A can be added in the second list data, and then generate third list data.
In a possible embodiment, the tiers e'tat information according in the staff attendance data is to institute Second identity information stated in the second list data is updated, and generates third list data, comprising:
The tiers e'tat information and second identity information are compared, will be compared with all second identity informations The unsanctioned tiers e'tat information is added in second list data, and generates third list data, and described Three list datas include: the second list data and the unsanctioned tiers e'tat information of comparison.
Specifically, tiers e'tat information and the second identity information are compared, will be compared not with all second identity informations By tiers e'tat information be added in the second list data, and generate third list data.
In a possible embodiment, described to compare the tiers e'tat information and second identity information, it will The unsanctioned tiers e'tat information is compared with all second identity informations to be added in second list data, Include:
The tiers e'tat information is all different with all second identity informations if it exists, then determines to compare and not lead to It crosses, and the unsanctioned tiers e'tat information of the comparison is added in second list data, generate third list data;
If it exists any identity information in the tiers e'tat information with the second identity information phase described at least one Together, then determine to compare and pass through, and confirm that the identity information is not required to be added in second list data;
It is exemplary, by the third work unit information G in staff attendance data and the in the second list data second work Unit information G ' is compared, if G is identical as G ', then by tiers e'tat information SS compared with the second identity information SS ' pair, if SS And SS ' is not identical, then SS is added in the second list data, if SS and SS ' are identical, is not required to SS being added to second place In forms data.
List leakage inspection method provided in this embodiment is by presetting comparison method, by tiers e'tat information and the second body Part information comparison, and third list data is generated, links efficiency during information flow can be improved, increased at information Rate is managed, reduces artificial nucleus to cost.
S108: by first identity in the identity information and first list data in the third list data Information comparison, and determine the identity information omitted in first list data.
Specifically, electronic equipment can be by described in the identity information and the first list data in third list data One identity information comparison, and determine the identity information omitted in first list data.
In a possible embodiment, by the identity information and first list data in the third list data In first identity information compare, and determine the identity information omitted in first list data, comprising:
Rejecting the first work state information described in the third list data according to preset single-row constraint rule is institute State the data of leaving office status information and status information of becoming a full member, third list data after being screened.
By first body in the identity information and first list data in third list data after the screening Part information comparison, if identity information and first body all in first list data in the third list data Part information comparison does not pass through, then determines that first list data omits the identity information.
Specifically, first according to preset single-row constraint rule, using vertex coloring algorithm to the third odd number of input According to handled screened after third list data.Wherein, single-row constraint rule indicates that each column are all in third list data The rule for needing to meet, specially which kind of rule are not especially limited, and should be made according to the actual situation by those skilled in the art Corresponding setting.It of courses, the gauge outfit of row and column is also predetermined, such as predefining list head is date, row gauge outfit For tiers e'tat information;It is the date that row gauge outfit, which can also be predefined, and list head is tiers e'tat information.It is day for list head Phase, row gauge outfit are tiers e'tat information such case, and single-row constraint rule can be the same third list in one cycle The tiers e'tat information of data cannot repeat.Type in period is not especially limited at this, it should be by those skilled in the art's root Corresponding setting is made according to actual conditions, such as the period can be Monday to week seven, can also be the beginning of the month to the moon of every month End.
So-called vertex coloring algorithm is one of graph-theoretical algorithm greedy algorithm, i.e., are as follows: a given non-directed graph G=(V, E), wherein V is vertex set, and E is line set, and map colouring problem is divide V for K color group, and each group formation one only Vertical collection optimizes version and is desirable to obtain the smallest K value that is, without adjacent vertex.Now non-directed graph G is coloured, Meeting any associated two vertex has different colours, to keep total chromatic number minimum.Vertex Coloring Problem is that a NP is complete Problem, vertex coloring algorithm are to solve for a kind of effective approximate algorithm of the problem.Third list data at least may be used after wherein screening To include former second list data and the identity information after addition.
Correspondingly, by first identity in the identity information and the first list data after screening in third list data Information comparison, if the identity information in third list data is compared with first identity information all in the first list data Do not pass through, then determines that first list data omits the identity information.
By vertex coloring algorithm or other can satisfy and reject the first working condition described in the third list data Information is the data of the leaving office status information, and then third list data after being screened, and is reduced in third list data Information ownership, improve the operational efficiency of electronic equipment, while also ensuring the accuracy of information.
In a possible embodiment, the identity information by the third list data and first list First identity information in data compares, and determines the identity information omitted in first list data, further includes:
If any identity information in the third list data is identical as the first identity information described at least one, Determine to compare and pass through, and confirms that first list data does not omit the identity information;
If it exists all described first in the identity information in the third list data and first list data Identity information is all different, then determines that comparison does not pass through, and confirm that first list data omits the identity information.
It is exemplary, by any identity information SF in third list data and the first identity information in the first list data SF ' is compared, if SF and SF ' be not identical, can be confirmed that SF is the identity information omitted in the first list data, if SF with SF ' is identical, then can be confirmed and do not omit the identity information in the first list data.
The technical solution that this specification embodiment provides can not only effectively prevent the human factor in attendance management, fill Divide and embody the just of attendance management, avoid unnecessary occurrences in human life dispute, effectively prevents guaranteeing attendance for the behavior checked card Validity realizes the monitoring to behavior in the employee work time, carries out to more detailed working condition of the employee in unit Objectively record effectively realizes the attendance management to employee, and can also detect that current period labor service is leaked in leaving office list The data of omission reduce a possibility that the case where member does not get money sends, and provide science for business administration, reliable list is looked into Leakage means are that an enterprise embodies its modern management, saves manpower, improve efficiency, prevent the necessary technological means of loophole.
On the basis of the above embodiments, in this specification one embodiment, the method also includes:
S202: the identity information of the omission is added in first list data, and is obtained and the omission The corresponding association identity information of identity information.
Specifically, the identity information that will confirm that the first list data is omitted is added in the first list data, and obtain visitor Family end or non-customer end association identity information corresponding with the identity information of the omission.
Wherein association identity information may include corresponding with the identity information of omission below one or more any Combination: the second work state information, working condition corresponding with second working condition change time, post, personal document Type, bank's card number, personal pay sheet, work number of days, work unit's information.
By by the identity information of omission with to the corresponding identity information that is associated be added in the first list data so that First list data is more perfect, ensure that the accuracy of data to timely update with data, more list leakage detection mentions next time It is supported for data.
On the basis of the above embodiments, in this specification one embodiment, the method also includes:
S902: the working time of employee in the identity information of the omission, and determining and institute are determined according to the time of checking card State time of checking card corresponding employee compensation.
Specifically, electronic equipment can according to after addition the first list data and employee corresponding with the first list data The working time of the employee in attendance information is that the employee issues corresponding wage.
It is exemplary,
Receive the first list data of current period, as shown in table 1 below;
1: the first list data of table
Second list data (as shown in table 2 below) in a upper period for the current period that will acquire and corresponding employee examine Diligent data (as shown in table 3 below), by the third work unit information in staff attendance data and the in the second list data Two work unit's information comparisons, then by tiers e'tat information compared with the second identity information pair, as seen from the above table, tiers e'tat letter Breath, which compares for the employee of E with second identity information, not to be passed through, then the employee that tiers e'tat information is E is added to second place Forms data generates third list data, as shown in table 4 below;
2: the second list data of table
Table 3: staff attendance data corresponding with the second list person
Table 4: third list data
Third list data is screened, weeding out the first work state information is leaving office status information and state of becoming a full member The employee of information screened after third list data;Such as the following table 5: the third list data after screening.
Table 5: the third list data after screening
By the first identity information in any identity information and the first list data in the third list data after screening It compares, then the identity information for omitting that identity information is D and E in the first list data can be confirmed;
D and E are added in the first list data, and the difference D that will acquire corresponding with E first is associated with identity information It is added in the first list data, the first list data after forming addition, as shown in table 6 below.
Table 6: the first list data after addition
Further according to table 7: corresponding to (the day of checking card of checking card the time of employee in staff attendance data corresponding with the first list person Number) issue the corresponding wages of this period employee.
Table 7: staff attendance data corresponding with the first list person
It should be noted that above table is for the clearer statement present invention, not representing above data is only table Case form exists, and can also exist otherwise.
Corresponding employee compensation is determined by the time of checking card, and reduces artificial nucleus to cost, the time for the granting that increases wage is quasi- True property and amount of money accuracy.It avoids causing unnecessary communication cost and waste of time due to manual errors.
The embodiment of the present invention also provides a kind of list leak detection device 300, as shown in figure 3, described device 300 includes:
First list data receiving module 310, for receiving pre-selection period corresponding first list data, the first place Forms data includes the first identity information;
Second list data obtains module 320, for obtaining corresponding second list of the upper period in the pre-selection period Data and corresponding staff attendance data, wherein the second place forms data includes: the second identity information, the staff attendance Data include: tiers e'tat information;
Third list data generation module 330, for according to the tiers e'tat information in the staff attendance data Second identity information in second list data, is updated second list data, and generate third List data, the third forms data include second place forms data;
Missing data determining module 340, for by the third list data identity information and first list First identity information in data compares, and determines the identity information omitted in first list data.
On the basis of the above embodiments, in this specification one embodiment, described device further include:
Adding module 350, for the identity information of the omission to be added in first list data, and obtain with The corresponding association identity information of the identity information of the omission.
On the basis of the above embodiments, in this specification one embodiment, the third list data generation module 330 It is specifically used for:
The tiers e'tat information and second identity information are compared, will be compared with all second identity informations The unsanctioned tiers e'tat information is added in second list data, and generates third list data, and described Three list datas include: the second list data and the unsanctioned tiers e'tat information of comparison.
On the basis of the above embodiments, in this specification one embodiment, the missing data determining module 340 is specific For:
Rejecting the first work state information described in the third list data according to preset single-row constraint rule is institute The data for stating leaving office status information, third list data after being screened;
By described first in the identity information and first list data in the third list data after the screening Identity information compares, if all described first in identity information in the third list data and first list data Identity information comparison does not pass through, then determines that first list data omits the identity information.
On the basis of the above embodiments, in this specification one embodiment, described device further include:
Paying out wages module, when for determining the work of employee in the identity information of the omission according to the time of checking card Between, and determine employee compensation corresponding with the time of checking card.
It should be noted that device provided by the above embodiment, when realizing its function, only with above-mentioned each functional module It divides and carries out for example, can according to need in practical application and be completed by different functional modules above-mentioned function distribution, The internal structure of equipment is divided into different functional modules, to complete all or part of the functions described above.In addition, Apparatus and method embodiment provided by the above embodiment belongs to same design, and specific implementation process is detailed in embodiment of the method, this In repeat no more.
The embodiment of the invention also provides a kind of electronic equipment, the electronic equipment includes: terminal and server, the end End and server include processor and memory, and at least one instruction, at least a Duan Chengxu, generation are stored in the memory Code collection or instruction set, at least one instruction, an at least Duan Chengxu, the code set or instruction set are by the processor It loads and executes to realize the list leakage inspection method as described in aforementioned.
The embodiment of the invention also provides a kind of terminal, the terminal includes processor and memory, is deposited in the memory Contain at least one instruction, at least a Duan Chengxu, code set or instruction set, at least one instruction, an at least Duan Chengxu, The code set or instruction set are loaded as the processor and are executed to realize the list leakage detection side as provided by above method embodiment Method.
In a specific embodiment, as shown in figure 4, it illustrates the structures of terminal provided in an embodiment of the present invention to show It is intended to.The terminal 800 may include one or more computer readable storage mediums memory 810, one or Processor 820, input unit 830, display unit 840, the radio frequency (Radio Frequency, RF) of more than one processing core Circuit 850, Wireless Fidelity (wireless fidelity, WiFi) components such as module 860 and power supply 870.Those skilled in the art Member it is appreciated that terminal structure not structure paired terminal 800 shown in Fig. 4 restriction, may include more or more than illustrating Few component perhaps combines certain components or different component layouts.Wherein:
The memory 810 can be used for storing software program and module, and the processor 820 is deposited by operation or execution The software program and module in the memory 810 are stored up, and calls the data being stored in memory 810, thereby executing Various function application and data processing.The memory 810 can mainly include storing program area and storage data area, wherein Storing program area can application program needed for storage program area, at least one function etc.;Storage data area can be stored according to institute That states terminal uses created data etc..In addition, memory 810 may include high-speed random access memory, can also wrap Include nonvolatile memory, such as hard disk, memory, plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), peace Digital (Secure Digital, SD) card, flash card (Flash Card), at least one disk memory, flush memory device, Or other volatile solid-state parts.Correspondingly, memory 810 can also include Memory Controller, to provide processor The access of 820 pairs of memories 810.
The processor 820 is the control centre of terminal 800, utilizes each of various interfaces and the entire terminal of connection Part by running or execute the software program and/or module that are stored in memory 810, and calls and is stored in memory Data in 810 execute the various functions and processing data of terminal 800, to carry out integral monitoring to terminal 800.The place Reason device 820 can be central processing unit (Central Processing Unit, CPU), can also be other general processors, Digital signal processor (Digital Signal Processor, DSP), specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) either other programmable logic device, discrete gate or transistor logic, discrete hardware components etc..It is logical It can be microprocessor with processor or the processor be also possible to any conventional processor etc..
The input unit 830 can be used for receiving the number or character information of input, and generate with user setting and The related keyboard of function control, mouse, operating stick, optics or trackball signal input.Specifically, input unit 830 can wrap Include image input device 831 and other input equipments 832.Image input device 831 can be camera, be also possible to photoelectricity Scanning device.In addition to image input device 831, input unit 830 can also include other input equipments 832.Specifically, other Input equipment 832 can include but is not limited to physical keyboard, function key (such as volume control button, switch key etc.), track One of ball, mouse, operating stick etc. are a variety of.
The display unit 840 can be used for showing information input by user or the information and terminal that are supplied to user Various graphical user interface, these graphical user interface can be made of figure, text, icon, video and any combination thereof. Display unit 840 may include display panel 841, optionally, can use liquid crystal display (Liquid Crystal Display, LCD), the forms such as Organic Light Emitting Diode (Organic Light-Emitting Diode, OLED) it is aobvious to configure Show panel 841.
The RF circuit 850 can be used for receiving and sending messages or communication process in, signal sends and receivees, particularly, by base After the downlink information stood receives, one or the processing of more than one processor 820 are transferred to;In addition, the data for being related to uplink are sent out Give base station.In general, RF circuit 850 includes but is not limited to antenna, at least one amplifier, tuner, one or more oscillations Device, subscriber identity module (SIM) card, transceiver, coupler, low-noise amplifier (Low Noise Amplifier, LNA), Duplexer etc..In addition, RF circuit 850 can also be communicated with network and other equipment by wireless communication.The wireless communication can To use any communication standard or agreement, including but not limited to global system for mobile communications (Global System of Mobile Communication, GSM), general packet radio service (General Packet Radio Service, GPRS), code it is point more Location (Code Division Multiple Access, CDMA), wideband code division multiple access (Wideband Code Division Multiple Access, WCDMA), long term evolution (Long Term Evolution, LTE), Email, short message service (Short Messaging Service, SMS) etc..
WiFi belongs to short range wireless transmission technology, and terminal 800 can help user's transceiver electronics by WiFi module 860 Mail, browsing webpage and access streaming video etc., it provides wireless broadband internet access for user.Although Fig. 4 is shown WiFi module 860, but it is understood that, and it is not belonging to must be configured into for terminal 800, it can according to need completely Do not change in the range of the essence of invention and omits.
The terminal 800 further includes the power supply 870 (such as battery) powered to all parts, it is preferred that power supply can lead to Cross power-supply management system and processor 820 be logically contiguous, thus by power-supply management system realize management charging, electric discharge and The functions such as power managed.Power supply 870 can also include one or more direct current or AC power source, recharging system, electricity The random components such as source fault detection circuit, power adapter or inverter, power supply status indicator.
It should be noted that the terminal 800 can also be including bluetooth module etc., and details are not described herein although being not shown.
One embodiment of the invention also provides a kind of server, and the server includes processor and memory, described to deposit Be stored at least one instruction, at least a Duan Chengxu, code set or instruction set in reservoir, at least one instruction, it is described extremely A few Duan Chengxu, the code set or instruction set are loaded as the processor and are executed to realize as described in above method embodiment List leakage inspection method.
Memory can be used for storing software program and module, and processor is stored in the software program of memory by operation And module, thereby executing various function application and data processing.Memory can mainly include storing program area and storage number According to area, wherein storing program area can application program needed for storage program area, function etc.;Storage data area can store basis The equipment uses created data etc..In addition, memory may include high-speed random access memory, can also include Nonvolatile memory, for example, at least a disk memory, flush memory device or other volatile solid-state parts.Phase Ying Di, memory can also include Memory Controller, to provide access of the processor to memory.
In a specific embodiment, as shown in figure 5, it illustrates the structures of server provided in an embodiment of the present invention Schematic diagram.The list leakage inspection method for the server side that the server is used to implement to provide in above-described embodiment.The server 900 can Bigger difference is generated because configuration or performance are different, may include one or more central processing units (CPU) 910 (for example, one or more processors) and memory 930, one or more storage application programs 923 or data 922 Storage medium 920 (such as one or more mass memory units).Wherein, memory 930 and storage medium 920 can be with It is of short duration storage or persistent storage.The program for being stored in storage medium 920 may include one or more modules, Mei Gemo Block may include to the series of instructions operation in server.Further, central processing unit 910 can be set to and store Medium 920 communicates, and the series of instructions operation in storage medium 920 is executed on server 900.Server 900 can also wrap One or more power supplys 960 are included, one or more wired or wireless network interfaces 950, one or more are defeated Enter output interface 940, and/or, one or more operating systems 921, such as Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
The embodiment of the invention also provides a kind of storage medium, at least one instruction, extremely is stored in the storage medium A few Duan Chengxu, code set or instruction set, at least one instruction, an at least Duan Chengxu, the code set or the instruction set can It is executed by the processor of terminal to complete each step of 110 side of user terminal in above method embodiment, or by server Processor execute to complete each step of server side in above method embodiment.
Optionally, in embodiments of the present invention, above-mentioned storage medium can include but is not limited to: USB flash disk, read-only memory (Read-Only Memory, ROM), random access memory (Random Access Memory, RAM), mobile hard disk, magnetic disk Or the various media that can store program code such as CD.
It should be understood that embodiments of the present invention sequencing is for illustration only, do not represent the advantages or disadvantages of the embodiments. And above-mentioned this specification specific embodiment is described.Other embodiments are within the scope of the appended claims.One In a little situations, the movement recorded in detail in the claims or step can be executed according to the sequence being different from embodiment and Still desired result may be implemented.In addition, process depicted in the drawing not necessarily requires the particular order shown or company Continuous sequence is just able to achieve desired result.In some embodiments, multitasking and parallel processing it is also possible or It may be advantageous.
All the embodiments in this specification are described in a progressive manner, same and similar portion between each embodiment Dividing may refer to each other, and each embodiment focuses on the differences from other embodiments.Especially for device, For terminal and server embodiment, since it is substantially similar to the method embodiment, so being described relatively simple, related place Illustrate referring to the part of embodiment of the method.
Those of ordinary skill in the art will appreciate that realizing that all or part of the steps of above-described embodiment can pass through hardware It completes, relevant hardware can also be instructed to complete by program, the program can store in a kind of computer-readable In storage medium, storage medium mentioned above can be read-only memory, disk or CD etc..
The foregoing is merely presently preferred embodiments of the present invention, is not intended to limit the invention, it is all in spirit of the invention and Within principle, any modification, equivalent replacement, improvement and so on be should all be included in the protection scope of the present invention.

Claims (12)

1. a kind of list leakage inspection method characterized by comprising
Pre-selection period corresponding first list data is received, the first place forms data includes the first identity information;
Obtained corresponding second list data of the upper period for preselecting the period and corresponding staff attendance data, wherein institute Stating second place forms data includes: the second identity information, and the staff attendance data include: tiers e'tat information;
According to the tiers e'tat information in the staff attendance data to second body in second list data Part information is updated, and generates third list data;
Identity information in the third list data is compared with first identity information in first list data, And determine the identity information omitted in first list data.
2. the method according to claim 1, wherein the method also includes:
The identity information of the omission is added in first list data, and obtains the identity information pair with the omission The association identity information answered.
3. the method according to claim 1, wherein second list data further include: with second body Corresponding first work state information of part information, wherein first work state information includes: unknown state information, on-job shape State information and leaving office status information.
4. according to the method described in claim 3, it is characterized in that, the third according in the staff attendance data Identity information is updated second identity information in second list data, and generates third list data, packet It includes:
The tiers e'tat information and second identity information are compared, will be compared not with all second identity informations By the tiers e'tat information be added in second list data, and generate third list data, the third Forms data includes: the second list data and the unsanctioned tiers e'tat information of comparison.
5. according to the method described in claim 4, it is characterized in that,
Correspondingly, first identity in the identity information and first list data in the third list data is believed Breath compares, and determines the identity information omitted in first list data, comprising:
According to preset single-row constraint rule reject the first work state information described in the third list data be it is described from The data of duty status information, third list data after being screened;
By first identity in the identity information and first list data in the third list data after the screening Information comparison, if identity information and first identity all in first list data in the third list data Information comparison does not pass through, then determines that first list data omits the identity information.
6. method according to claim 1 or 5, which is characterized in that the identity by the third list data is believed Breath is compared with first identity information in first list data, determines the body omitted in first list data Part information, further includes:
If any identity information in the third list data is identical as the first identity information described at least one, determine Comparison passes through, and confirms that first list data does not omit the identity information;
Identity information in the third list data and first identity all in first list data if it exists Information is all different, then determines that comparison does not pass through, and confirm that first list data omits the identity information.
7. according to the method described in claim 4, it is characterized in that, described by the tiers e'tat information and second identity Information comparison will compare the unsanctioned tiers e'tat information with all second identity informations and be added to described second In list data, comprising:
The tiers e'tat information is all different with all second identity informations if it exists, then determines that comparison does not pass through, And the unsanctioned tiers e'tat information of the comparison is added in second list data, generate third list data.
8. according to the method described in claim 2, it is characterized in that, the association identity information includes the identity with the omission The corresponding one or more any combination below of information:
Second work state information, working condition corresponding with second working condition change time, post, personal document class Type, bank's card number, personal pay sheet, work number of days, work unit's information.
9. the method according to claim 1, wherein the staff attendance data further include and the tiers e'tat Corresponding one or more any combination below of information: time of checking card, position of checking card, work unit's information;
Correspondingly, the method also includes: when determining the work of employee in the identity information of the omission according to the time of checking card Between, and determine employee compensation corresponding with the time of checking card.
10. a kind of list leak detection device characterized by comprising
First list data receiving module, for receiving pre-selection period corresponding first list data, first list data Including the first identity information;
Second list data obtains module, for obtaining pre-selection corresponding second list data of the upper period in period and right The staff attendance data answered, wherein the second place forms data includes: the second identity information, and the staff attendance data include: Tiers e'tat information;
Third list data generation module, for according to the tiers e'tat information and described in the staff attendance data Second identity information in two list datas, is updated second list data, and generate third list data, The third forms data includes second place forms data;
Missing data determining module, for by the third list data identity information and first list data in First identity information compares, and determines the identity information omitted in first list data.
11. a kind of electronic equipment, which is characterized in that the electronic equipment includes processor and memory, is deposited in the memory Contain at least one instruction, at least a Duan Chengxu, code set or instruction set, at least one instruction, an at least Duan Cheng Sequence, the code set or instruction set are loaded by the processor and are executed to realize the list as described in claim 1-9 is any Leakage inspection method.
12. a kind of computer readable storage medium, which is characterized in that be stored at least one instruction, extremely in the storage medium A few Duan Chengxu, code set or instruction set, at least one instruction, an at least Duan Chengxu, the code set or instruction Collection is loaded by processor and is executed to realize the list leakage inspection method as described in claim 1-9 is any.
CN201910543648.6A 2019-06-21 2019-06-21 Method and device for checking leakage of name ticket, electronic equipment and storage medium Active CN110348805B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910543648.6A CN110348805B (en) 2019-06-21 2019-06-21 Method and device for checking leakage of name ticket, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910543648.6A CN110348805B (en) 2019-06-21 2019-06-21 Method and device for checking leakage of name ticket, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110348805A true CN110348805A (en) 2019-10-18
CN110348805B CN110348805B (en) 2022-04-26

Family

ID=68182691

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910543648.6A Active CN110348805B (en) 2019-06-21 2019-06-21 Method and device for checking leakage of name ticket, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110348805B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112488856A (en) * 2020-11-23 2021-03-12 中国人寿保险股份有限公司 Information classification method, equipment, electronic equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103886651A (en) * 2014-04-11 2014-06-25 北京极科极客科技有限公司 Attendance method based on router and attendance router
CN103955969A (en) * 2014-05-07 2014-07-30 天津师范大学 Student classroom attendance statistical system
CN106708794A (en) * 2016-12-06 2017-05-24 厦门中控生物识别信息技术有限公司 Attendance statement processing method and device
CN107248042A (en) * 2017-06-14 2017-10-13 深圳市卡卡信息科技有限公司 Work attendance method, device and server
CN107967555A (en) * 2017-11-15 2018-04-27 平安科技(深圳)有限公司 Employee individual's attendance management-control method, application server and computer-readable recording medium
CN109558408A (en) * 2018-11-27 2019-04-02 北京微播视界科技有限公司 Update method, apparatus, electronic equipment and the readable storage medium storing program for executing of list
CN109726973A (en) * 2018-04-08 2019-05-07 中国平安人寿保险股份有限公司 Attendance data verification method, device, equipment and computer storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103886651A (en) * 2014-04-11 2014-06-25 北京极科极客科技有限公司 Attendance method based on router and attendance router
CN103955969A (en) * 2014-05-07 2014-07-30 天津师范大学 Student classroom attendance statistical system
CN106708794A (en) * 2016-12-06 2017-05-24 厦门中控生物识别信息技术有限公司 Attendance statement processing method and device
CN107248042A (en) * 2017-06-14 2017-10-13 深圳市卡卡信息科技有限公司 Work attendance method, device and server
CN107967555A (en) * 2017-11-15 2018-04-27 平安科技(深圳)有限公司 Employee individual's attendance management-control method, application server and computer-readable recording medium
CN109726973A (en) * 2018-04-08 2019-05-07 中国平安人寿保险股份有限公司 Attendance data verification method, device, equipment and computer storage medium
CN109558408A (en) * 2018-11-27 2019-04-02 北京微播视界科技有限公司 Update method, apparatus, electronic equipment and the readable storage medium storing program for executing of list

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112488856A (en) * 2020-11-23 2021-03-12 中国人寿保险股份有限公司 Information classification method, equipment, electronic equipment and storage medium
CN112488856B (en) * 2020-11-23 2024-05-28 中国人寿保险股份有限公司 Information classification method, equipment, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN110348805B (en) 2022-04-26

Similar Documents

Publication Publication Date Title
CN109783581A (en) Right management method, device, electronic equipment and storage medium
CN103959857B (en) Manage the mobile device application in wireless network
CN104954383A (en) Application program login method and system
US9942779B1 (en) Method and system for using customer analytics to detect network events
US11516164B2 (en) Establishing social network connections
CN104219326A (en) Resource sharing device and method in cleaning service information management system
US11521289B2 (en) Graphical user interface (GUI) for implementing controls for geographic conveyance
CN108335215A (en) Case Claims Resolution method, server and computer readable storage medium
US20150067072A1 (en) Maintaining and updating notification registration information
CN105117902A (en) Patent fee withholding system and method thereof
US20150012921A1 (en) Systems, methods, and computer program products for processing sets of instructions for mobile devices
CN109710689A (en) Enterprise's monitoring and managing method, system, device, equipment and readable storage medium storing program for executing
CN103856568A (en) Terminal and system for prompting safety state of user terminal and implementation method
CN110348805A (en) A kind of list leakage inspection method, device, electronic equipment and storage medium
CN108335078A (en) Referrer promotes control method, device, equipment and storage medium
CN110738536A (en) data processing method, device and storage medium based on block chain network
CN110827155A (en) Information processing method, information processing device, electronic equipment and storage medium
US20150264189A1 (en) System and method for telecommunications expense management
Hu et al. A hybrid client/server and browser/server mode-based universal mobile ticketing system
Rosen et al. Mapping global mobile performance trends with Mobilyzer and MobiPerf
US8538993B2 (en) Outsourced options management
US20190385111A1 (en) System and method for providing performance evaluation
US20190005451A1 (en) Method and apparatus for extended workforce management
CN105260976A (en) Android-based mobile phone community correction management system
CN113810192B (en) Information processing method, system and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant