CN110599130A - Third party authentication management method based on BPM, storage medium and electronic equipment - Google Patents

Third party authentication management method based on BPM, storage medium and electronic equipment Download PDF

Info

Publication number
CN110599130A
CN110599130A CN201910872969.0A CN201910872969A CN110599130A CN 110599130 A CN110599130 A CN 110599130A CN 201910872969 A CN201910872969 A CN 201910872969A CN 110599130 A CN110599130 A CN 110599130A
Authority
CN
China
Prior art keywords
bpm
management method
authentication
party
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910872969.0A
Other languages
Chinese (zh)
Inventor
魏夕瑶
柯栋
黄余军
陈海华
江超
寇建国
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Original Assignee
Gree Electric Appliances Inc of Zhuhai
Zhuhai Lianyun Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Gree Electric Appliances Inc of Zhuhai, Zhuhai Lianyun Technology Co Ltd filed Critical Gree Electric Appliances Inc of Zhuhai
Priority to CN201910872969.0A priority Critical patent/CN110599130A/en
Publication of CN110599130A publication Critical patent/CN110599130A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/08Auctions

Abstract

The invention relates to a third party authentication management method based on BPM, a storage medium and an electronic device, wherein a process file is defined through a persistence service layer and is persisted to a database, the bidding document information of an authentication application created by a user is submitted to a business layer through a client, the business layer analyzes the process file to create a work process of the authentication application, the binding and packaging of a process object and the bidding document information are completed, and meanwhile, the work process is executed according to a processing route defined by the process file in a task driving mode. The invention can implement full-process management and control on the authentication application working process, record authentication data in real time, improve service transparency, and simultaneously, carry out object packaging on the process task nodes, and the same authentication application can be connected with all authentication related information in series through key information, thereby reducing the data error rate and realizing the integrated full-life-cycle management of the authentication application.

Description

Third party authentication management method based on BPM, storage medium and electronic equipment
Technical Field
The invention relates to the technical field of computer application, in particular to a third party authentication management method based on BPM, a storage medium and electronic equipment.
Background
Authentication is an enterprise independent behavior, i.e., there will be corresponding business negotiation and bidding activities with third party organizations. At present, a processing scheme which is specially used for quality authentication work and integrates the whole life cycle of authentication initiation, bid inviting, bidding, bid evaluation, key document delivery, certificate report issuing, price checking, statistical calculation and the like does not exist.
Meanwhile, there are some problems difficult to overcome in the current authentication work, such as: the execution force is generally insufficient. The authentication application information is many and miscellaneous, each single application needs to be interfered with a plurality of different third-party organizations, the process management and control of packaging type and objectification is not provided, the authenticator is easy to generate information confusion, the deviation can cause the authentication efficiency to be low, and the time cost and the labor cost are multiplied.
In addition, at present, the authentication workflow has a long chain, the multiparty interactive communication cost is high, the service transparency is low, the data integration level is low (key data should not be falsified and have version records), the requirements of service, management and control and decision are difficult to meet at the same time, and the information islanding phenomenon is serious. And the evaluation process has more artificial control factors and lacks of flow and specification, thus easily causing the integrity crisis of the authentication work of enterprises and causing the operation risk.
Disclosure of Invention
The invention provides a BPM-based third party authentication management method, a storage medium and electronic equipment, which aim to solve the problem that the existing enterprise authentication management mode cannot realize authentication application full-life-cycle management.
In order to solve the technical problems, the invention provides the following technical scheme:
a third party authentication management method based on BPM comprises the following steps:
the persistence service layer defines a flow file by utilizing a first preset component according to a preset service logic and persists the flow file to a database;
the client submits the bidding document information of the authentication application created by the user through the view layer of the client to the service layer;
and after receiving the bidding document information, the business layer triggers a second preset component to analyze the flow file so as to create the work flow of the authentication application, completes the binding and packaging of the flow object and the bidding document information, and executes the work flow according to the processing route defined by the flow file in a task driving mode.
Further, the workflow comprises a plurality of task nodes, and in the process of executing the workflow, the executor of each task node configures the user role by the executor of the last task node.
Further, the user roles include at least one role of a certifier, an audit administrator, an external agency and an evaluation group.
Further, information related to tasks, running states, process instances and historical data generated in the process of executing the workflow is persisted in the database.
Further, the first preset component is an activti Modeler component.
Further, the second preset component is an Activiti Engine component.
Further, the process file is a bpmn process file.
A computer-readable storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, performs the BPM-based third party authentication management method as described above.
An electronic device comprising a memory and a processor, the memory having stored thereon a computer program, wherein the computer program, when executed by the processor, performs the BPM-based third party authentication management method as described above.
Compared with the prior art, the project document retrieval method, the project document retrieval medium and the electronic equipment based on the project life cycle have the following beneficial effects:
according to the third-party authentication management method based on the BPM, the storage medium and the electronic equipment, the process file is defined through the persistence service layer and is persisted to the database, the label information of the authentication application created by the user is submitted to the business layer through the client, the business layer analyzes the process file to create the work flow of the authentication application, the binding and packaging of the process object and the label information are completed, and meanwhile, the work flow is executed according to the processing route defined by the process file in a task driving mode. The invention can implement full-process management and control on the authentication application working process, record authentication data in real time, improve service transparency, and simultaneously, carry out object packaging on the process task nodes, and the same authentication application can be connected with all authentication related information in series through key information, thereby reducing the data error rate and realizing the integrated full-life-cycle management of the authentication application.
Drawings
The invention will be described in more detail hereinafter on the basis of embodiments and with reference to the accompanying drawings.
Fig. 1 is a flowchart illustrating a third-party authentication management method based on BPM according to an embodiment of the present invention.
Fig. 2 is a schematic diagram of an architecture of software for implementing the BPM-based third party authentication management method shown in fig. 1.
FIG. 3 is a schematic diagram of an authentication workflow using roles.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, embodiments of the present invention will be described in detail below with reference to the accompanying drawings and embodiments, so that how to apply technical means to solve technical problems and achieve the corresponding technical effects can be fully understood and implemented. The embodiments and the features of the embodiments can be combined without conflict, and the technical solutions formed are all within the scope of the present invention.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
Generally, the third-party authentication management method based on BPM (Business Process Modeling) provided by the embodiment of the present invention creates an authentication application bid through a view layer of a foreground client, initiates an authentication application to a bidding Process, document delivery, price verification, account settlement, and statistics, completes encapsulation and binding of bid information and a Process object by a background Business layer, and drives a workflow to advance by a task, thereby implementing integrated full-Process management of the authentication bid, and acting on the full life cycle of the entire authentication application. The invention defines an abstract business process, loads role objects in a configuration mode, and completes information transmission, interaction and background recording among the role objects in the bidding process through process monitoring. And the flow progress is visually tracked in real time, an authentication data path is realized, the service logic is closed-loop, and the refined authentication process management is completed.
Fig. 1 is a schematic flowchart of the third-party authentication management method based on BPM, and fig. 2 is a software architecture for implementing the third-party authentication management method based on BPM shown in fig. 1. With reference to fig. 1 and fig. 2, a specific process of the third-party authentication management method based on BPM includes:
step S1: and the persistence service layer defines the bpmn flow file by utilizing a first preset component according to a preset service logic and persists the bpmn flow file to the database. Persistence is a mechanism for transitioning data between a persistent state and a transient state, i.e., persisting transient data (e.g., data in memory) as persistent data (e.g., persisted to a database) so that it can be persisted for long periods of time for subsequent query access. The data model may be any data structure or object model and the storage model may be a relational model, XML, binary stream, etc. Bpmn (Business Process Modeling and labeling) defines a Business Process map (Business Process map) that is based on a flow chart (flowcharting) designed to create a graphical model of Business Process operations. And a Business Process Model (Business Process Model) refers to a mesh graph composed of graphic objects (graphical objects) including activities (activities) and flow controllers (flowcontrols) for defining the execution order of the activities. In the present invention, the first default component may be an actirti Modeler component.
Step S2: and the client submits the bidding document information of the authentication application created by the user through the view layer of the client to the service layer. The bidding document information is the object bidding document information which is created by the user based on the authentication application at the client side, and in the invention, the user creating the bidding document information is an authenticator.
Step S3: and after receiving the bidding document information, the business layer triggers a second preset component to analyze the flow file so as to create a workflow of the authentication application, completes the binding and packaging of the flow object and the bidding document information, and executes the workflow according to a processing route defined by the flow file in a task driving mode. In the invention, the second preset component can be an activientiEngine component, and the business layer creates the workflow of the authentication application by triggering the activientiEngine component to analyze the flow file.
The third-party authentication management method based on the BPM provided by the invention can implement full-flow management and control on the authentication application working flow, record authentication data in real time, improve the service transparency, and simultaneously, package flow task nodes in an object manner, and connect all authentication related information in series through key information for the same authentication application, thereby reducing the data error rate and realizing the integrated full-life-cycle management of the authentication application.
The work flow comprises a plurality of task nodes, and in the process of executing the work flow, the executor of each task node configures the user role by the executor of the last task node. The user roles comprise four roles of an authenticator, an audit manager, an external mechanism and an evaluation group. And information related to tasks, running states, process instances and historical data generated in the process of executing the workflow is stored in a database in a persistent mode.
On the basis, the invention also provides a computer readable storage medium, wherein a computer program is stored on the computer readable storage medium, and when the computer program is executed by a processor, the third party authentication management method based on the BPM is executed.
Fig. 3 is a schematic diagram of an authentication workflow case according to roles in a BPM-based third party authentication management method according to an embodiment of the present invention. Based on the schematic diagram, the authenticator creates bidding document information for the issued authentication application form, submits the bidding document information to the auditing manager for auditing, after the auditing is passed, the auditing manager sends out bidding invitations to a plurality of external organizations (hereinafter referred to as organizations) with indefinite number, each organization quotes for bidding, each organization fills in the quotation information and relevant details, after the quotation of all organizations is finished, the process flows into the auditing manager, and the auditing manager distributes bidding group members to bid. If the bid-winning mechanism is selected by the bid-evaluating group, the flow flows to the bid-winning mechanism, and the mechanism uploads a quotation; if the bid evaluation group is rejected forcibly (that is, all the quotations of the institutions cannot be collected), the auditing manager has the weight to distribute the bid evaluation group members again. Since the authentication application form increases or decreases the model in the middle of the business, the quotation of the organization changes, and the auditing administrator can judge whether to cancel the quotation at the place as appropriate. Meanwhile, the bid winning organization can upload a new quotation again and change the final amount at the node of uploading the quotation, so as to deal with the situation that the increase and decrease of the models causes the quotation change. After the mechanism uploads the quotation, the quotation is verified and signed and uploaded by the quotation certifier, the rear mechanism enters the opening node to enter engineer information, after the quotation amount changes, the quotation amount can be refuted to the uploading quotation node and is re-signed by the certifier, finally, the process flows into the bid-winning mechanism, the system automatically stores the final bid-winning price, the mechanism side can maintain the related payment expense information at the moment and can open the reconciliation account flow to check the details of the money, after the check is correct, the whole process is ended, and the bidding work is completed.
The logic processing of the account cancellation sub-flow is as follows: and the organization user can inquire all payment records of the voucher number tender and the report according to the obtained paid voucher number on a system account cancellation inquiry interface, namely, the organization user enters an account cancellation node. The organization side can provide text feedback whether the data is wrong or not in the authentication system, if the data is abnormal, the workflow can be transmitted back and forth between the winning organization and the bidding organization, the specific information is fed back, the abnormal data is modified and checked, until the organization confirms that the data is not wrong and fed back, the process is ended, and the system automatically updates and stores the paid information.
On the basis, the invention further provides an electronic device, which comprises a memory and a processor, wherein the memory stores a computer program, and the computer program is executed by the processor to execute the third party authentication management method based on the BPM.
The memory and the processor are electrically connected to each other, directly or indirectly, to enable transmission or interaction of data. For example, the components may be electrically connected to each other via one or more communication buses or signal lines.
The Memory may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like.
The processor may be an integrated circuit chip having signal processing capabilities. The Processor may also be a general-purpose Processor, such as a Central Processing Unit (CPU), a Network Processor (NP), a microprocessor, etc.; but may also be a Digital Signal Processor (DSP)), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components; the processor may also be any conventional processor that may implement or perform the methods, steps, and logic blocks disclosed in embodiments of the present invention.
The electronic device may be, but is not limited to, a mobile phone, a computer, a television, or a tablet computer, and is not specifically limited herein, and may be set according to actual requirements.
Since the electronic device can execute the project document retrieval method based on the project lifecycle, the electronic device has the same or corresponding technical features and can achieve the same or corresponding technical effects as the project document retrieval method based on the project lifecycle, which is not described in detail herein.
In summary, according to the project document retrieval method, medium, and electronic device based on the project lifecycle, provided by the present invention, a project document query request including a query element sent by a user through a client is received, a project to which the user belongs is determined, a project document related to the query element is retrieved from project documents in the lifecycle of the project pre-stored in a database, and the retrieved project document related to the query element is fed back to the client, so that the retrieval of the project document is completed. When the project document is queried, a user does not need to know the project corresponding to the project document in advance, only needs to input the query element through the client, and the system automatically retrieves the project document related to the query element from the project documents in the life cycle of the project prestored in the database and feeds the retrieved project document back to the client.
In the embodiments provided in the present invention, it should be understood that the disclosed system and method can be implemented in other ways. The system and method embodiments described above are merely illustrative.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Although the embodiments of the present invention have been described above, the above descriptions are only for the convenience of understanding the present invention, and are not intended to limit the present invention. It will be understood by those skilled in the art that various changes in form and details may be made therein without departing from the spirit and scope of the invention as defined by the appended claims.

Claims (9)

1. A third party authentication management method based on BPM is characterized by comprising the following steps:
the persistence service layer defines a flow file by utilizing a first preset component according to a preset service logic and persists the flow file to a database;
the client submits the bidding document information of the authentication application created by the user through the view layer of the client to the service layer;
and after receiving the bidding document information, the business layer triggers a second preset component to analyze the flow file so as to create the work flow of the authentication application, completes the binding and packaging of the flow object and the bidding document information, and executes the work flow according to the processing route defined by the flow file in a task driving mode.
2. The BPM-based third party certification management method according to claim 1, wherein the workflow includes task nodes, and during the execution of the workflow, the executor of each task node configures a user role by the executor of the previous task node.
3. The BPM-based third party certification management method according to claim 2, wherein the user role includes at least one of a certifier, an audit administrator, an external authority, and an evaluation group.
4. The BPM-based third party certification management method according to claim 2, wherein the information related to tasks, running states, process instances and historical data generated during the execution of the workflow are persisted in the database.
5. The BPM-based third party certification management method according to claim 1, wherein the first preset component is an activti Modeler component.
6. The BPM-based third party certification management method according to claim 5, wherein the second preset component is an Activiti Engine component.
7. The BPM-based third party authentication management method of claim 1, wherein the process file is a.bpmn process file.
8. A computer-readable storage medium having a computer program stored thereon, wherein the computer program, when executed by a processor, performs the BPM-based third party authentication management method according to any of claims 1 to 7.
9. An electronic device comprising a memory and a processor, the memory having stored thereon a computer program, wherein the computer program, when executed by the processor, performs the BPM-based third party authentication management method according to any of claims 1-7.
CN201910872969.0A 2019-09-16 2019-09-16 Third party authentication management method based on BPM, storage medium and electronic equipment Pending CN110599130A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910872969.0A CN110599130A (en) 2019-09-16 2019-09-16 Third party authentication management method based on BPM, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910872969.0A CN110599130A (en) 2019-09-16 2019-09-16 Third party authentication management method based on BPM, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN110599130A true CN110599130A (en) 2019-12-20

Family

ID=68859808

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910872969.0A Pending CN110599130A (en) 2019-09-16 2019-09-16 Third party authentication management method based on BPM, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN110599130A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111369222A (en) * 2020-03-11 2020-07-03 深圳市天彦通信股份有限公司 Military camp management and control method and related equipment
CN111754207A (en) * 2020-06-30 2020-10-09 深圳壹账通智能科技有限公司 Process instance management method and device, computer equipment and readable storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102222278A (en) * 2011-06-10 2011-10-19 成都勤智数码科技有限公司 Operation process customizing method and device
CN106161462A (en) * 2016-08-29 2016-11-23 无锡华云数据技术服务有限公司 A kind of network security certification method
CN110222996A (en) * 2019-06-13 2019-09-10 北京创鑫旅程网络技术有限公司 Method for allocating tasks and device

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102222278A (en) * 2011-06-10 2011-10-19 成都勤智数码科技有限公司 Operation process customizing method and device
CN106161462A (en) * 2016-08-29 2016-11-23 无锡华云数据技术服务有限公司 A kind of network security certification method
CN110222996A (en) * 2019-06-13 2019-09-10 北京创鑫旅程网络技术有限公司 Method for allocating tasks and device

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
于泳泓著: "《5D管理地图》", 30 September 2016, 中山大学出版社 *
焦鹏珲: "基于SpringBoot和Vue框架的电子招投标系统的设计与实现", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *
赖涵著: "《群体智慧驱动的需求工程 面向业务过程的需求获取与精化》", 31 May 2016 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111369222A (en) * 2020-03-11 2020-07-03 深圳市天彦通信股份有限公司 Military camp management and control method and related equipment
CN111369222B (en) * 2020-03-11 2023-08-08 深圳市天彦通信股份有限公司 Army management and control method and related equipment
CN111754207A (en) * 2020-06-30 2020-10-09 深圳壹账通智能科技有限公司 Process instance management method and device, computer equipment and readable storage medium

Similar Documents

Publication Publication Date Title
Shojaei Exploring applications of blockchain technology in the construction industry
CN105303324B (en) A kind of information system parameter management method and device
US8065214B2 (en) Methods and system for assessing loss severity for commercial loans
CN111506662A (en) Data collection system for enterprise fixed asset arrangement based on block chain
WO2020244387A1 (en) Equipment ledger management method and system
CN104200334A (en) Crowdsourcing project management control system and method based on SaaS mode
CN110990487A (en) Intelligent auditing system, equipment and method based on block chain
US20160004984A1 (en) Service oriented architecture optimization system and method
US20150242971A1 (en) Selecting Deliverables and Publishing Deliverable Checklists
CN102142105A (en) Enterprise cluster distributed cooperative operation system
CN112184012A (en) Enterprise risk early warning method, device, equipment and readable storage medium
CN110599130A (en) Third party authentication management method based on BPM, storage medium and electronic equipment
CN106022706A (en) Holographic presentation system of E-contract main body and correlation execution process information
US20150310390A1 (en) Aggregation and workflow engines for managing project information
Xiao et al. Blockchain and IoT for insurance: a case study and cyberinfrastructure solution on fine-grained transportation insurance
Conteh et al. Implementation challenges of an enterprise system and its advantages over legacy systems
CN113205415B (en) Financial process automation method and system based on RPA and block chain technology
WO2021073096A1 (en) Resource data transfer method and device, and blockchain system
US9734486B2 (en) Integrated temporary labor provisioning and monitoring
CN105023100A (en) Database and middleware non-index quantitative management platform for platform software
Chen et al. Knowing what is going on—A smart contract for modular construction
Badillo et al. Supply chain management from a systems science perspective
Correia et al. Defining and observing the compliance of service level agreements: A model driven approach
CN116029843A (en) Financial reimbursement method and device and electronic equipment
CN112199735B (en) Vertical E-commerce transaction platform based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191220

RJ01 Rejection of invention patent application after publication