CN110348805B - Method and device for checking leakage of name ticket, electronic equipment and storage medium - Google Patents

Method and device for checking leakage of name ticket, electronic equipment and storage medium Download PDF

Info

Publication number
CN110348805B
CN110348805B CN201910543648.6A CN201910543648A CN110348805B CN 110348805 B CN110348805 B CN 110348805B CN 201910543648 A CN201910543648 A CN 201910543648A CN 110348805 B CN110348805 B CN 110348805B
Authority
CN
China
Prior art keywords
identity information
list data
data
list
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910543648.6A
Other languages
Chinese (zh)
Other versions
CN110348805A (en
Inventor
历高歌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Dajiaying Information Technology Co Ltd
Original Assignee
Suzhou Dajiaying Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Dajiaying Information Technology Co Ltd filed Critical Suzhou Dajiaying Information Technology Co Ltd
Priority to CN201910543648.6A priority Critical patent/CN110348805B/en
Publication of CN110348805A publication Critical patent/CN110348805A/en
Application granted granted Critical
Publication of CN110348805B publication Critical patent/CN110348805B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2458Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0639Performance analysis of employees; Performance analysis of enterprise or organisation operations
    • G06Q10/06393Score-carding, benchmarking or key performance indicator [KPI] analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/105Human resources
    • G06Q10/1053Employment or hiring

Abstract

The invention relates to the technical field of data management, in particular to a method for checking leakage of a famous list, which comprises the following steps: receiving first list data corresponding to a preselected period, wherein the first list data comprises first identity information; acquiring second list data corresponding to the previous period of the preselected period and corresponding employee attendance data, wherein the second list data comprises: the second identity information and the staff attendance data comprise: third identity information; updating the second identity information in the second list data according to the third identity information in the staff attendance data, and generating third list data; and comparing the identity information in the third list data with the first identity information in the first list data, and determining the identity information missing from the first list data. The method detects the data missed by the labor service in the current period to the leaving list, reduces the possibility of sending the data under the condition that the member can not take the money, and provides a scientific and reliable list missing checking means for enterprise management.

Description

Method and device for checking leakage of name ticket, electronic equipment and storage medium
Technical Field
The invention relates to the technical field of data management, in particular to a method and a device for checking leakage of a business form, electronic equipment and a storage medium.
Background
With the rapid development of computer and internet technologies, terminals are widely popularized, users have higher and higher dependence on clients, and some companies have adopted client card punching and pay. However, when the leave list uploaded by the company is omitted, the user cannot get corresponding salaries, and then a series of subsequent communication costs are consumed, which not only brings poor experience of the client to the user, but also reduces the dependency of the client.
Therefore, it is highly desirable to provide a method for checking the leave list uploaded by companies or finding out the omission existing in the leave list before salary distribution, which can improve the accuracy and timeliness of salary distribution and solve the problem of increased user communication cost caused by salary missing.
Disclosure of Invention
In view of the above problems in the prior art, an object of the present invention is to provide a method and an apparatus for checking missed call tickets, an electronic device and a storage medium, which can improve the accuracy and timeliness of salary issuance and solve the problem of increased user communication cost caused by missed salary issuance.
In order to solve the above problems, the present invention provides a method for checking leakage of a business form, comprising:
receiving first list data corresponding to a preselected period, wherein the first list data comprises first identity information;
acquiring second list data corresponding to the previous period of the preselected period and corresponding employee attendance data, wherein the second list data comprises: the second identity information, the staff attendance data includes: third identity information;
updating the second identity information in the second list data according to the third identity information in the staff attendance data, and generating third list data;
and comparing the identity information in the third list data with the first identity information in the first list data, and determining the identity information missing from the first list data.
Another aspect of the present invention provides a leakage checking device for a business form, comprising:
the first list data receiving module is used for receiving first list data corresponding to a preselected period, and the first list data comprises first identity information;
a second list data obtaining module, configured to obtain second list data corresponding to a previous cycle of the preselection cycle and corresponding employee attendance data, where the second list data includes: the second identity information, the staff attendance data includes: third identity information;
the third list data generation module is used for updating the second list data according to the third identity information in the employee attendance data and the second identity information in the second list data, and generating third list data, wherein the third list data comprises the second list data;
and the missing data determining module is used for comparing the identity information in the third list data with the first identity information in the first list data to determine the missing identity information in the first list data.
Another aspect of the present invention provides an electronic device, including: a terminal and a server, each comprising a processor and a memory, the memory having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, the at least one instruction, the at least one program, the set of codes, or the set of instructions being loaded and executed by the processor to implement a roster omission method as described above.
Another aspect of the present invention provides a computer readable storage medium having stored therein at least one instruction, at least one program, set of codes, or set of instructions, which is loaded and executed by a processor to implement a roster omission method as described above.
Due to the technical scheme, the invention has the following beneficial effects:
the method for checking the leakage of the famous tickets has the following beneficial effects: the method not only can effectively put an end to human factors in attendance management, fully embody the justice of attendance management, avoid unnecessary personnel disputes, but also can detect data missed by labor in a preselected period to a leaving list, reduce the possibility of sending the condition that a member cannot take money, provide a scientific and reliable list missing checking means for enterprise management, and be a necessary technical means for an enterprise to embody the modernization management, save manpower, improve efficiency and stop the loopholes.
Drawings
In order to more clearly illustrate the technical solution of the present invention, the drawings used in the description of the embodiment or the prior art will be briefly described below. It is obvious that the drawings in the following description are only some embodiments of the invention, and that for a person skilled in the art, other drawings can be derived from them without inventive effort.
FIG. 1 is a schematic diagram of an implementation environment provided by an embodiment of the invention;
FIG. 2 is a flow chart of a method for leak finding a ticket according to an embodiment of the present invention;
FIG. 3 is a block diagram of a method and apparatus for leakage checking of a business form according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a terminal according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of a server according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, apparatus, article, or device that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or device.
Referring to fig. 1 of the specification, a schematic diagram of an implementation environment provided by an embodiment of the present invention is shown, and as shown in fig. 1, the implementation environment may include at least a user terminal 110 and a server 120.
A client is operated in the user terminal 110. The user terminal 110 may be one or more smart phones, tablet computers, e-book readers, laptop portable computers, desktop computers, and the like. The client can be an application program provided for the user by the service provider, and can also be a webpage provided for the user by the service provider.
The server 120 may be a server operating independently, a server cluster composed of a plurality of servers, or a cloud computing service center. The server 120 may include a network communication unit, a processor, a memory, and the like. The server 120 may establish a communication connection with the user terminal 110 through a wireless or wired network. The second server may establish a communication connection with the server 120 and the user terminal 110 through a wireless or wired network.
In the embodiment of the present invention, the client may be any client providing a service for a user. For example, the clients may be payment-type application clients, recruitment-type clients, shopping-type clients, and the like.
Referring to fig. 2 in the following description, a flow of a leakage checking method for a business form according to an embodiment of the present invention is shown. Wherein, the application program is installed in the user terminal 110, and the execution subject of the method is the electronic device. As shown in fig. 2, the method includes:
s102: receiving first list data corresponding to a preselected period, wherein the first list data comprises first identity information.
Specifically, the electronic device may receive first list data corresponding to a preselected period, where the first list data may include: at least one first identity information, first work unit information corresponding to the first identity information, third work state information corresponding to the first identity information, work state change time, job title, personal certificate type, bank card number, personal payroll, work days and other information.
S104: acquiring second list data corresponding to the previous period of the preselected period and corresponding employee attendance data, wherein the second list data comprises: the second identity information, the staff attendance data includes: third identity information;
specifically, the electronic device may obtain second list data corresponding to a previous cycle of the preselected cycle and corresponding employee attendance data, where the second list data may include: at least one second identity information, second working unit information corresponding to the second identity information, first working state information corresponding to the second identity information, working state change time, job title, personal certificate type, bank card number, personal payroll, working days and other information. Employee attendance data may include: third identity information, time of card punching, position of card punching, third work unit information and the like corresponding to the third identity information. Wherein the first operating state information may include: unknown status information, on-duty status information, off-duty status information, and correction status information. It should be noted that the unknown status information may be that the employee has performed an interview and passed through the corresponding company, but is not certain to go to work, and of course, the second list data may also have time (i.e., interview time) corresponding to the unknown status information, the on-duty status information may be that the employee has officially gone on duty, and both the off-duty status information and the correction status information may be that the employee has already issued salary without using the client, where the correction status information may indicate that the employee has found work through the client and becomes an official employee of the corresponding work unit information.
It should be noted that the first identity information, the second identity information, and the third identity information may be any of the following information: name and unique and valid credential number, name and electronic device assigned unique identification, unique and valid credential number, electronic device assigned unique identification. The unique and valid certificate number may be a certificate containing a unique and valid identifier of the user, such as an identification card, a social security card, a house account book, a passport and/or a driving license. The unique identifier may be a composition of digits, such as a telephone number, digits, and/or characters, for example, a-ffsg931, 12952434, or ASKJDAS. The preselected period may be a specified period, such as a current period or one of the historical periods, etc. The time length of the period is not particularly limited in the examples of the present specification, and is preferably one day, one week, one half month, or one month.
S106: and updating the second identity information in the second list data according to the third identity information in the staff attendance data, and generating third list data.
Specifically, the second identity information in the second list data may be updated according to a preset rule and third identity information, and third list data is generated, where the third list data may be the updated second list data. The third list data may be stored in the electronic device in a readable and writable form of WORD, EXCEL, TXT, PDF, etc. The preset rule can be one or more of adding, deleting and changing.
For example, when the third identity information is a and the second identity information is a ', the electronic device may compare a with a ', and if a is different from a ', a may be added to the second list data, so as to generate the third list data.
In a possible embodiment, the updating the second identity information in the second list data according to the third identity information in the employee attendance data and generating third list data includes:
comparing the third identity information with the second identity information, adding the third identity information which does not pass the comparison with all the second identity information into the second list data, and generating third list data, wherein the third list data comprises: and comparing the second list data with the third identity information which fails in comparison.
Specifically, the third identity information is compared with the second identity information, the third identity information which does not pass the comparison with all the second identity information is added into the second list data, and the third list data is generated.
In a possible embodiment, the comparing the third identity information with the second identity information, and adding the third identity information that fails in comparison with all the second identity information to the second list data includes:
if the third identity information is different from all the second identity information, judging that the comparison is failed, and adding the third identity information which is failed in the comparison into the second list data to generate third list data;
if any identity information in the third identity information is the same as at least one second identity information, judging that the comparison is passed, and confirming that the identity information does not need to be added into the second list data;
in an example, third work unit information G in the employee attendance data is compared with second work unit information G ' in the second list data, if G is the same as G ', third identity information SS is compared with second identity information SS ', if SS is different from SS ', SS is added to the second list data, and if SS is the same as SS ', SS does not need to be added to the second list data.
According to the list omission checking method provided by the embodiment, the third identity information is compared with the second identity information through the preset comparison method, and the third list data is generated, so that the efficiency of each link in the information circulation process can be improved, the information processing rate is increased, and the manual checking cost is reduced.
S108: and comparing the identity information in the third list data with the first identity information in the first list data, and determining the identity information missing from the first list data.
Specifically, the electronic device may compare the identity information in the third list data with the first identity information in the first list data, and determine the identity information missing from the first list data.
In a possible embodiment, comparing the identity information in the third list data with the first identity information in the first list data, and determining missing identity information in the first list data includes:
and eliminating the data of which the first working state information is the departure state information and the correction state information in the third list data according to a preset single-column constraint rule to obtain the screened third list data.
Comparing the identity information in the screened third list data with the first identity information in the first list data, and if the identity information in the third list data does not pass the comparison with all the first identity information in the first list data, judging that the identity information is missed by the first list data.
Specifically, firstly, according to a preset single-list constraint rule, processing input third list data by using a vertex coloring algorithm to obtain screened third list data. The single-column constraint rule represents a rule that each column in the third list data needs to conform to, and a specific rule is not specifically limited, and a person skilled in the art should make a corresponding setting according to an actual situation. Of course, the header of the row and the column is also predetermined, for example, the header of the column is predetermined as the date, and the header of the row is the third identity information; it may also be predetermined that the row header is a date and the column header is the third identity information. For the case that the list header is the date and the row header is the third identity information, the single-column constraint rule may be that the third identity information of the same third list data cannot be repeated in one cycle. The kind of the period is not particularly limited, and the period can be set by those skilled in the art according to the actual situation, for example, the period can be monday to seventy days, or can be from the beginning of each month to the end of each month.
The vertex coloring algorithm is a greedy algorithm in graph theory algorithm, and is as follows: given an undirected graph G ═ V, E, where V is a set of vertices and E is a set of edges, the graph coloring problem is to divide V into K color groups, each group forming an independent set, i.e., where there are no adjacent vertices, whose optimized version is desired to obtain the minimum value of K. Now the undirected graph G is colored, satisfying that any associated two vertices have different colors, thereby minimizing the total number of colors. The vertex shading problem is an NP-complete problem and the vertex shading algorithm is an efficient approximation algorithm to solve the problem. The screened third list data at least may include the original second list data and the added identity information.
Correspondingly, comparing the identity information in the screened third list data with the first identity information in the first list data, and if the identity information in the third list data does not pass the comparison with all the first identity information in the first list data, judging that the identity information is missed by the first list data.
And eliminating the first working state information in the third list data as the data of the departure state information through a vertex coloring algorithm or other data which can meet the requirement, so that the screened third list data is obtained, the information holding amount in the third list data is reduced, the operating efficiency of the electronic equipment is improved, and meanwhile, the accuracy of the information is also ensured.
In a possible embodiment, the comparing the identity information in the third list data with the first identity information in the first list data to determine the identity information missing in the first list data further includes:
if any identity information in the third list data is the same as at least one first identity information, judging that the comparison is passed, and confirming that the identity information is not missed by the first list data;
if the identity information in the third list data is different from all the first identity information in the first list data, judging that the comparison is failed, and confirming that the identity information is missed by the first list data.
For example, any identity information SF in the third list data is compared with the first identity information SF ' in the first list data, if the SF and the SF ' are not the same, the SF may be determined as the identity information omitted in the first list data, and if the SF and the SF ' are the same, the identity information may not be omitted in the first list data.
The technical scheme provided by the embodiment of the specification can effectively put an end to human factors in attendance management, fully embody the justice of attendance management, avoid unnecessary personnel dispute, effectively avoid the behavior of substitute card punching, ensure the validity of attendance, realize the monitoring of the behavior of staff in the working time, objectively record the more detailed working condition of the staff in a unit, effectively realize the attendance management of the staff, detect the data missed by the labor duty in the current period to the off-duty list, reduce the possibility of sending the condition that the member cannot take money, provide scientific and reliable list leak checking means for enterprise management, and is a technical means for an enterprise to embody the modernization management, save manpower, improve efficiency and avoid necessary leaks.
On the basis of the above embodiment, in an embodiment of the present specification, the method further includes:
s202, adding the missing identity information into the first list data, and acquiring associated identity information corresponding to the missing identity information.
Specifically, identity information for confirming that the first list data is missing is added to the first list data, and associated identity information corresponding to the missing identity information is obtained from a client or a non-client.
Wherein the associated identity information may comprise any combination of one or more of the following corresponding to the missing identity information: second working state information, working state change time corresponding to the second working state, jobs, personal certificate types, bank card numbers, personal payroll, working days and working unit information.
The missed identity information and the associated identity information corresponding to the missed identity information are added into the first list data, so that the first list data are more perfect, the timely updating of the data and the accuracy of the data are guaranteed, and data support is provided for the next list leak detection.
On the basis of the above embodiment, in an embodiment of the present specification, the method further includes:
s902: and determining the working time of the staff in the missed identity information according to the time of punching the card, and determining the salary of the staff corresponding to the time of punching the card.
Specifically, the electronic device may issue corresponding wages for the employee according to the added first list data and the working time of the employee in the employee attendance information corresponding to the first list data.
As an example of this, it is possible to provide,
accepting the first list data of the current period, as shown in the following table 1;
table 1: first list data
Figure BDA0002103332080000081
Figure BDA0002103332080000091
Comparing third work unit information in the staff attendance data with second work unit information in the second list data (shown in table 2 below) and corresponding staff attendance data (shown in table 3 below) in the last cycle of the obtained current cycle, comparing third identity information with the second identity information, and if the staff with the third identity information of E fails to pass the comparison, adding the staff with the third identity information of E to the second list data to generate third list data (shown in table 4 below);
table 2: second list data
Figure BDA0002103332080000092
Table 3: employee attendance data corresponding to a second roster
Figure BDA0002103332080000093
Table 4: third list data
Figure BDA0002103332080000094
Screening the third list data, and eliminating the staff of which the first working state information is the departure state information and the correction state information to obtain the screened third list data; as in table 5 below: and screening the third list data.
Table 5: filtered third list data
Figure BDA0002103332080000101
Comparing any identity information in the screened third list data with the first identity information in the first list data, and then confirming that the missing identity information in the first list data is identity information D and E;
adding D and E to the first list data, and adding the acquired first associated identity information corresponding to D and E, respectively, to the first list data to form added first list data, as shown in table 6 below.
Table 6: added first list data
Figure BDA0002103332080000102
Again according to table 7: and issuing salaries corresponding to the employees in the period by the time for punching the card (namely the number of the card punching days) of the corresponding employees in the employee attendance data corresponding to the first roster.
Table 7: employee attendance data corresponding to a first roster
Figure BDA0002103332080000103
Figure BDA0002103332080000111
The above table is for the purpose of more clearly describing the present invention, and does not mean that the above data is only in the form of a table, but may be in other forms.
The corresponding staff wages are determined through the time of checking the card, the manual checking cost is reduced, and the time accuracy and the money amount accuracy of wage distribution are improved. Avoiding unnecessary communication cost and time waste caused by manual errors.
An embodiment of the present invention further provides a leakage checking device 300 for a business form, as shown in fig. 3, the device 300 includes:
a first list data receiving module 310, configured to receive first list data corresponding to a preselected period, where the first list data includes first identity information;
a second list data obtaining module 320, configured to obtain second list data corresponding to a previous cycle of the preselection cycle and corresponding employee attendance data, where the second list data includes: the second identity information, the staff attendance data includes: third identity information;
a third list data generating module 330, configured to update the second list data according to the third identity information in the employee attendance data and the second identity information in the second list data, and generate third list data, where the third list data includes the second list data;
a missing data determining module 340, configured to compare the identity information in the third list data with the first identity information in the first list data, and determine the missing identity information in the first list data.
On the basis of the above embodiment, in an embodiment of the present specification, the apparatus further includes:
an adding module 350, configured to add the missing identity information to the first list data, and obtain associated identity information corresponding to the missing identity information.
On the basis of the foregoing embodiment, in an embodiment of this specification, the third list data generating module 330 is specifically configured to:
comparing the third identity information with the second identity information, adding the third identity information which does not pass the comparison with all the second identity information into the second list data, and generating third list data, wherein the third list data comprises: and comparing the second list data with the third identity information which fails in comparison.
On the basis of the foregoing embodiment, in an embodiment of the present specification, the missing data determining module 340 is specifically configured to:
removing the data of which the first working state information is the departure state information in the third list data according to a preset single-column constraint rule to obtain screened third list data;
comparing the identity information in the screened third list data with the first identity information in the first list data, and if the identity information in the third list data does not pass the comparison with all the first identity information in the first list data, judging that the identity information is missed by the first list data.
On the basis of the above embodiment, in an embodiment of the present specification, the apparatus further includes:
and the wage issuing module is used for determining the working time of the staff in the missed identity information according to the time of punching the card and determining the wage of the staff corresponding to the time of punching the card.
It should be noted that, when the apparatus provided in the foregoing embodiment implements the functions thereof, only the division of the functional modules is illustrated, and in practical applications, the functions may be distributed by different functional modules according to needs, that is, the internal structure of the apparatus may be divided into different functional modules to implement all or part of the functions described above. In addition, the apparatus and method embodiments provided by the above embodiments belong to the same concept, and specific implementation processes thereof are described in the method embodiments for details, which are not described herein again.
An embodiment of the present invention further provides an electronic device, where the electronic device includes: a terminal and a server, each comprising a processor and a memory, the memory having stored therein at least one instruction, at least one program, set of codes, or set of instructions, the at least one instruction, the at least one program, the set of codes, or the set of instructions being loaded and executed by the processor to implement the roster omission method as set forth above.
The embodiment of the present invention further provides a terminal, where the terminal includes a processor and a memory, where the memory stores at least one instruction, at least one program, a code set, or an instruction set, and the at least one instruction, the at least one program, the code set, or the instruction set is loaded and executed by the processor to implement the method for checking missing lists provided in the foregoing method embodiments.
In a specific embodiment, as shown in fig. 4, a schematic structural diagram of a terminal provided in an embodiment of the present invention is shown. The terminal 800 may include components such as memory 810 for one or more computer-readable storage media, a processor 820 for one or more processing cores, an input unit 830, a display unit 840, Radio Frequency (RF) circuitry 850, a wireless fidelity (WiFi) module 860, and a power supply 870. Those skilled in the art will appreciate that the terminal structure shown in fig. 4 is not intended to be limiting of terminal 800 and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components. Wherein:
the memory 810 may be used to store software programs and modules, and the processor 820 executes various functional applications and data processing by operating or executing the software programs and modules stored in the memory 810 and calling data stored in the memory 810. The memory 810 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required for at least one function, and the like; the storage data area may store data created according to the use of the terminal, and the like. Further, the memory 810 may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device. Accordingly, memory 810 may also include a memory controller to provide processor 820 with access to memory 810.
The processor 820 is a control center of the terminal 800, connects various parts of the entire terminal using various interfaces and lines, performs various functions of the terminal 800 and processes data by operating or executing software programs and/or modules stored in the memory 810 and calling data stored in the memory 810, thereby monitoring the entire terminal 800. The Processor 820 may be a Central Processing Unit (CPU), other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), an off-the-shelf Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, etc. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The input unit 830 may be used to receive input numeric or character information and generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control. Specifically, the input unit 830 may include an image input device 831 and other input devices 832. The image input device 831 may be a camera or a photoelectric scanning device. The input unit 830 may include other input devices 832 in addition to the image input device 831. In particular, other input devices 832 may include, but are not limited to, one or more of a physical keyboard, function keys (such as volume control keys, switch keys, etc.), a trackball, a mouse, a joystick, and the like.
The display unit 840 may be used to display information input by or provided to a user and various graphical user interfaces of a terminal, which may be composed of graphics, text, icons, video, and any combination thereof. The Display unit 840 may include a Display panel 841, and the Display panel 841 may be configured in the form of a Liquid Crystal Display (LCD), an Organic Light-Emitting Diode (OLED), or the like, as an option.
The RF circuit 850 may be used for receiving and transmitting signals during a message transmission or communication process, and in particular, for receiving downlink messages from a base station and then processing the received downlink messages by the one or more processors 820; in addition, data relating to uplink is transmitted to the base station. In general, the RF circuitry 850 includes, but is not limited to, an antenna, at least one Amplifier, a tuner, one or more oscillators, a Subscriber Identity Module (SIM) card, a transceiver, a coupler, a Low Noise Amplifier (LNA), a duplexer, and the like. In addition, the RF circuit 850 may also communicate with networks and other devices via wireless communications. The wireless communication may use any communication standard or protocol, including but not limited to Global System for Mobile communication (GSM), General Packet Radio Service (GPRS), Code Division Multiple Access (CDMA), Wideband Code Division Multiple Access (WCDMA), Long Term Evolution (LTE), email, Short Messaging Service (SMS), and the like.
WiFi belongs to short-distance wireless transmission technology, and the terminal 800 can help the user send and receive e-mail, browse web pages, access streaming media, etc. through the WiFi module 860, and it provides the user with wireless broadband internet access. Although fig. 4 shows the WiFi module 860, it is understood that it does not belong to the essential constitution of the terminal 800, and may be omitted entirely within the scope not changing the essence of the invention as needed.
The terminal 800 further includes a power source 870 (e.g., a battery) for providing power to the various components, which may preferably be logically coupled to the processor 820 via a power management system to manage charging, discharging, and power consumption via the power management system. The power source 870 may also include any component of one or more dc or ac power sources, recharging systems, power failure detection circuitry, power converters or inverters, power status indicators, and the like.
It should be noted that, although not shown, the terminal 800 may further include a bluetooth module, and the like, which is not described herein again.
An embodiment of the present invention further provides a server, which includes a processor and a memory, where the memory stores at least one instruction, at least one program, a set of codes, or a set of instructions, and the at least one instruction, the at least one program, the set of codes, or the set of instructions is loaded and executed by the processor to implement the roster omission checking method according to the above method embodiment.
The memory may be used to store software programs and modules, and the processor may execute various functional applications and data processing by operating the software programs and modules stored in the memory. The memory can mainly comprise a program storage area and a data storage area, wherein the program storage area can store an operating system, application programs needed by functions and the like; the storage data area may store data created according to use of the apparatus, and the like. Further, the memory may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory may also include a memory controller to provide the processor access to the memory.
In a specific embodiment, as shown in fig. 5, it shows a schematic structural diagram of a server provided in an embodiment of the present invention. The server is configured to implement the server-side list leak checking method provided in the foregoing embodiment. The server 900 may vary widely in configuration or performance and may include one or more Central Processing Units (CPUs) 910 (e.g., one or more processors) and memory 930, one or more storage media 920 (e.g., one or more mass storage devices) storing applications 923 or data 922. Memory 930 and storage media 920 may be, among other things, transient or persistent storage. The program stored in the storage medium 920 may include one or more modules, each of which may include a series of instruction operations in a server. Still further, the central processor 910 may be configured to communicate with the storage medium 920, and execute a series of instruction operations in the storage medium 920 on the server 900. The server 900 may also include one or more power supplies 960, one or more wired or wireless network interfaces 950, one or more input-output interfaces 940, and/or one or more operating systems 921, such as Windows Server, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM, and so forth.
An embodiment of the present invention further provides a storage medium, where at least one instruction, at least one program, a code set, or an instruction set is stored in the storage medium, and the at least one instruction, the at least one program, the code set, or the instruction set may be executed by a processor of a terminal to complete each step on the user terminal 110 side in the foregoing method embodiment, or executed by a processor of a server to complete each step on the server side in the foregoing method embodiment.
Optionally, in an embodiment of the present invention, the storage medium may include, but is not limited to: various media capable of storing program codes, such as a usb disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic disk, or an optical disk.
It should be noted that: the precedence order of the above embodiments of the present invention is only for description, and does not represent the merits of the embodiments. And specific embodiments thereof have been described above. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, as for the device, terminal and server embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and for the relevant points, reference may be made to the partial description of the method embodiments.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the above-mentioned storage medium may be a read-only memory, a magnetic disk or an optical disk, etc.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents, improvements and the like that fall within the spirit and principle of the present invention are intended to be included therein.

Claims (12)

1. A method for leak finding a business form, comprising:
receiving first list data corresponding to a preselected period, wherein the first list data comprises first identity information;
acquiring second list data corresponding to the previous period of the preselected period and corresponding employee attendance data, wherein the second list data comprises: the second identity information, the staff attendance data includes: third identity information;
updating the second identity information in the second list data corresponding to the previous period according to the third identity information in the employee attendance data corresponding to the previous period, and generating third list data;
comparing the identity information in the third list data with the first identity information in the first list data, and determining the identity information missing from the first list data;
wherein the updating the second identity information in the second list data corresponding to the previous period according to the third identity information in the employee attendance data corresponding to the previous period and generating third list data includes: comparing the third identity information with the second identity information, adding the third identity information which does not pass the comparison with all the second identity information into the second list data, and generating third list data.
2. The method of claim 1, further comprising:
and adding the missing identity information into the first list data, and acquiring associated identity information corresponding to the missing identity information.
3. The method of claim 1, wherein the second roster data further comprises: first operating state information corresponding to the second identity information, wherein the first operating state information includes: unknown status information, on-duty status information, and off-duty status information.
4. The method of claim 1, wherein the third list data comprises: and comparing the second list data with the third identity information which fails in comparison.
5. The method of claim 1,
correspondingly, comparing the identity information in the third list data with the first identity information in the first list data, and determining the identity information missing from the first list data, including:
removing data with first working state information as the departure state information in the third list data according to a preset single-column constraint rule, and obtaining screened third list data;
comparing the identity information in the screened third list data with the first identity information in the first list data, and if the identity information in the third list data does not pass the comparison with all the first identity information in the first list data, judging that the identity information is missed by the first list data.
6. The method of claim 1 or 5, wherein the comparing the identity information in the third list data with the first identity information in the first list data to determine missing identity information in the first list data further comprises:
if any identity information in the third list data is the same as at least one first identity information, judging that the comparison is passed, and confirming that the identity information is not missed by the first list data;
if the identity information in the third list data is different from all the first identity information in the first list data, judging that the comparison is failed, and confirming that the identity information is missed by the first list data.
7. The method of claim 1, wherein the comparing the third identity information with the second identity information, and the adding the third identity information that fails to be compared with all the second identity information to the second list data comprises:
if the third identity information is different from all the second identity information, judging that the comparison is failed, and adding the third identity information which is failed in the comparison into the second list data to generate third list data.
8. The method of claim 2, wherein the associated identity information comprises any combination of one or more of the following corresponding to the missing identity information:
second working state information, working state change time corresponding to the second working state, jobs, personal certificate types, bank card numbers, personal payroll, working days and working unit information.
9. The method of claim 1, wherein the employee attendance data further comprises any combination of one or more of the following corresponding to the third identity information: time of punching card, position of punching card, information of working unit;
accordingly, the method further comprises: and determining the working time of the staff in the missed identity information according to the time of punching the card, and determining the salary of the staff corresponding to the time of punching the card.
10. A ticket leak detection device, comprising:
the first list data receiving module is used for receiving first list data corresponding to a preselected period, and the first list data comprises first identity information;
a second list data obtaining module, configured to obtain second list data corresponding to a previous cycle of the preselection cycle and corresponding employee attendance data, where the second list data includes: the second identity information, the staff attendance data includes: third identity information;
a third list data generation module, configured to update the second list data according to the third identity information in the employee attendance data corresponding to the previous period and the second identity information in the second list data corresponding to the previous period, and generate third list data, where the third list data includes the second list data;
a missing data determination module, configured to compare the identity information in the third list data with the first identity information in the first list data, and determine the missing identity information in the first list data;
the third list data generation module is configured to compare the third identity information with the second identity information, add the third identity information that fails in comparison with all the second identity information to the second list data, and generate third list data.
11. An electronic device comprising a processor and a memory, the memory having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, the at least one instruction, the at least one program, the set of codes, or the set of instructions being loaded and executed by the processor to implement the shortlist omission method of any one of claims 1-9.
12. A computer readable storage medium having stored therein at least one instruction, at least one program, a set of codes, or a set of instructions, which is loaded and executed by a processor to implement the roster omission method of any one of claims 1-9.
CN201910543648.6A 2019-06-21 2019-06-21 Method and device for checking leakage of name ticket, electronic equipment and storage medium Active CN110348805B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910543648.6A CN110348805B (en) 2019-06-21 2019-06-21 Method and device for checking leakage of name ticket, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910543648.6A CN110348805B (en) 2019-06-21 2019-06-21 Method and device for checking leakage of name ticket, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110348805A CN110348805A (en) 2019-10-18
CN110348805B true CN110348805B (en) 2022-04-26

Family

ID=68182691

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910543648.6A Active CN110348805B (en) 2019-06-21 2019-06-21 Method and device for checking leakage of name ticket, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110348805B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112488856A (en) * 2020-11-23 2021-03-12 中国人寿保险股份有限公司 Information classification method, equipment, electronic equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103886651A (en) * 2014-04-11 2014-06-25 北京极科极客科技有限公司 Attendance method based on router and attendance router
CN103955969A (en) * 2014-05-07 2014-07-30 天津师范大学 Student classroom attendance statistical system
CN106708794A (en) * 2016-12-06 2017-05-24 厦门中控生物识别信息技术有限公司 Attendance statement processing method and device
CN107248042A (en) * 2017-06-14 2017-10-13 深圳市卡卡信息科技有限公司 Work attendance method, device and server
CN107967555A (en) * 2017-11-15 2018-04-27 平安科技(深圳)有限公司 Employee individual's attendance management-control method, application server and computer-readable recording medium
CN109558408A (en) * 2018-11-27 2019-04-02 北京微播视界科技有限公司 Update method, apparatus, electronic equipment and the readable storage medium storing program for executing of list
CN109726973A (en) * 2018-04-08 2019-05-07 中国平安人寿保险股份有限公司 Attendance data verification method, device, equipment and computer storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103886651A (en) * 2014-04-11 2014-06-25 北京极科极客科技有限公司 Attendance method based on router and attendance router
CN103955969A (en) * 2014-05-07 2014-07-30 天津师范大学 Student classroom attendance statistical system
CN106708794A (en) * 2016-12-06 2017-05-24 厦门中控生物识别信息技术有限公司 Attendance statement processing method and device
CN107248042A (en) * 2017-06-14 2017-10-13 深圳市卡卡信息科技有限公司 Work attendance method, device and server
CN107967555A (en) * 2017-11-15 2018-04-27 平安科技(深圳)有限公司 Employee individual's attendance management-control method, application server and computer-readable recording medium
CN109726973A (en) * 2018-04-08 2019-05-07 中国平安人寿保险股份有限公司 Attendance data verification method, device, equipment and computer storage medium
CN109558408A (en) * 2018-11-27 2019-04-02 北京微播视界科技有限公司 Update method, apparatus, electronic equipment and the readable storage medium storing program for executing of list

Also Published As

Publication number Publication date
CN110348805A (en) 2019-10-18

Similar Documents

Publication Publication Date Title
US20210365421A1 (en) Data analysis method, computer device and storage medium
CN109196544A (en) order management system and program
US10530726B2 (en) Email notifications
US20160226972A1 (en) Mechanism for facilitating dynamic storage management for mobile computing devices
CN105205174A (en) File processing method and device for distributed system
CN112988362B (en) Task processing method and device, electronic equipment and storage medium
CN101794466A (en) Electronic check-in method and system
CN104133765B (en) The test case sending method of network activity and test case server
CN107528912A (en) A kind of automatic method, system and relevant apparatus for realizing distributing real time system
CN106021512A (en) Page refresh method and apparatus
CN111400488B (en) Online document information processing method and device, electronic equipment and readable medium
CN112308590B (en) Parameter processing method and device, computing equipment and storage medium
CN110348805B (en) Method and device for checking leakage of name ticket, electronic equipment and storage medium
EP3016044A1 (en) Method, system and apparatus for network management based on business relationship information
CN103646210A (en) Method and device for calling system function
CN109391658B (en) Account data synchronization method and equipment, storage medium and terminal thereof
CN105446812A (en) Multitask scheduling configuration method
CN104168362A (en) Terminal, two-dimensional management apparatus, and electronic card management method
CN108052521B (en) Coordinated data display method, application server and storage medium
CN111669466B (en) Intelligent outbound system configuration method, device and computer readable storage medium
CN114254958A (en) Energy and carbon data report processing device and storage medium
CN107909382A (en) User grouping management method, server and storage medium
CN104572240A (en) Control method and electronic equipment
CN108965472A (en) A kind of method and apparatus of account information push
US20100161740A1 (en) Batch Size Opitmization

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant