CN110888628A - Method, device, equipment and storage medium for generating control tool - Google Patents

Method, device, equipment and storage medium for generating control tool Download PDF

Info

Publication number
CN110888628A
CN110888628A CN201910966748.XA CN201910966748A CN110888628A CN 110888628 A CN110888628 A CN 110888628A CN 201910966748 A CN201910966748 A CN 201910966748A CN 110888628 A CN110888628 A CN 110888628A
Authority
CN
China
Prior art keywords
control
user
function module
function
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910966748.XA
Other languages
Chinese (zh)
Inventor
王智超
何文刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Property and Casualty Insurance Company of China Ltd
Original Assignee
Ping An Property and Casualty Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Property and Casualty Insurance Company of China Ltd filed Critical Ping An Property and Casualty Insurance Company of China Ltd
Priority to CN201910966748.XA priority Critical patent/CN110888628A/en
Publication of CN110888628A publication Critical patent/CN110888628A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/20Software design
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/38Creation or generation of source code for implementing user interfaces

Abstract

The application relates to the field of control, and provides a method, a device, equipment and a storage medium for generating a control tool, wherein the method comprises the following steps: generating a plurality of functional modules according to the functional types of the code modules; when a creation request triggered by a user is received, determining a basic frame and a target function module according to the creation request; acquiring input information of a user, and setting a preset basic control in a basic frame according to the input information of the user; searching an inlet of a target function module through interfaces of a plurality of function modules, finding a corresponding target function module position according to the inlet of the target function module, and embedding the target function module into a corresponding basic control to obtain a functionalized control; and generating a control tool based on the functional control and the basic framework. The interface is for entry of the functional module. So as to reduce the repetitive labor of the bottom layer code development in the development and improve the control effect.

Description

Method, device, equipment and storage medium for generating control tool
Technical Field
The present application relates to the field of control, and in particular, to a method, an apparatus, a device, and a storage medium for generating a control tool.
Background
In the prior art, the development of control platform software is realized by writing codes by developers, which requires the developers to be proficient in programming languages such as Java and the like and program debugging skills, and thus, the development is time-consuming and labor-consuming, the code reuse rate is low, the development task is heavy and the efficiency is low. For a user or an application developer who just enters into contact with a programming language such as Java and the like and a control algorithm just entering into contact, when the user or the application developer requires the control algorithm to be implemented, the implemented algorithm often cannot achieve the target control effect, which is also a big problem in the development of control platform software. In addition, with the increase of control scenes and the increasing complex requirements of more control scenes, the required applicable scenes are larger and larger. So that the requirements on the control effect and the development efficiency of software are more and more focused.
Disclosure of Invention
The application provides a method for generating a control tool, which can solve the problems that in the prior art, the page development efficiency is too low, and quick iteration cannot be performed on versions.
In a first aspect, the present application provides generating a plurality of functional modules according to a functional type of a code module, the plurality of functional modules including at least one common module and at least one dedicated module.
Generating a plurality of functional modules according to the function types of the code modules, wherein the plurality of functional modules comprise at least one common module and at least one special module;
when a creation request triggered by a user is received, determining a basic framework and a target function module according to the creation request, wherein the target function module refers to a part of function modules or all function modules in the plurality of function modules;
acquiring input information of a user, and setting a preset basic control in the basic frame according to the input information of the user, wherein the basic control refers to a visual graphic element placed in interface development, and the basic frame refers to a blank window which does not contain any function and basic control;
searching an inlet of the target function module through interfaces of a plurality of function modules, searching a corresponding target function module position according to the inlet of the target function module, and embedding the target function module into the corresponding basic control to obtain a functionalized control, wherein the functionalized control is used for reading the position of the corresponding target function module and calling the target function module;
generating a control tool based on the functionalized control and the base framework.
In the prior art, access to a system platform needs to be realized through a large amount of underlying codes. In order to solve the problem, a large amount of codes are not needed in the application, and particularly, the access times and the response time of the database can be controlled through an interface of the encapsulation function module.
In some possible designs, after determining the basic frame and the target function module according to the creation request when receiving a creation request triggered by a user, the method obtains input information of the user, and before setting a preset basic control in the basic frame according to the input information of the user, the method further includes:
creating a main queue and a queue-in-queue, wherein the main queue is used for storing one or more access request queues with the estimated occupied idle resources higher than the upper limit of the idle resources, the queue-in-queue is used for storing one or more access request queues with the estimated occupied idle resources lower than the upper limit of the idle resources, the resources comprise at least one of CPU (central processing unit) time length, system memory and network bandwidth, and the CPU time length is the time length spent by completing tasks when the CPU works at full speed;
emptying data generated by creating the main queue and the queue-inserting queue so as to initialize the main queue and the queue-inserting queue;
estimating the size of unused resources occupied by the creation request of the user;
if the unused resource occupied by the user's creation request is greater than a threshold value, placing the user's creation request at the tail of the main queue;
and if the unused resource occupied by the user's creation request is less than or equal to the threshold, placing the user's creation request at the tail of the queue-in-queue.
In some possible designs, the method further includes, after finding an entry of the target function module through an interface of a plurality of function modules, finding a corresponding target function module position according to the entry of the target function module, and embedding the target function module into the corresponding basic control, and after obtaining a functional control, before generating the control tool based on the functional control and the basic framework, the method further includes:
calling the plurality of functional modules from the functional control according to the creation request of the user, and storing the information of the plurality of functional modules into an array to obtain a target array;
inputting the target array into a custom library, and compiling the custom library to obtain an executable file of the target function module, wherein the custom library is a text for storing the control in a text form and providing external modification;
modifying the control attribute data stored in the custom library to obtain an updated executable file;
and modifying the attribute of the functionalized control by executing the updated executable file.
In some possible designs, after determining the base framework and the target function module according to the creation request when the creation request triggered by the user is received, the method further includes:
calling historical access information of the user stored in a database;
inputting the access information of the user to the target function module through the entrance of the target function module;
analyzing the access information of the user through the target function module;
and if the access information of the user has bad access records, determining that the normal access probability of the user is lower than a preset value, and forbidding the user to access.
In some possible designs, if a bad access record occurs in the access information of the user, it is determined that the normal access probability of the user is lower than a preset value, and after the user is prohibited from accessing, the method further includes:
storing the access information to a database for summarizing through the target function module;
summarizing the access information of the user into new information of the user;
and presenting the new information of the user through the monitoring log.
In some possible designs, after the generating the control tool based on the functionalized control and the base framework, the method further comprises:
deploying the control tool on a user terminal, the user terminal comprising an input device;
receiving a touch signal input by a user through the input equipment;
calculating the coordinates of the display equipment corresponding to the touch signals;
judging whether a target control exists in the coordinates of the display equipment or not;
if the target control exists in the coordinates of the display equipment, entering a corresponding preset function module through the target control;
and after entering the corresponding preset function module, executing a corresponding control function, wherein the control function at least comprises one of a Key creating function, a character string length function, a database access time function and a system response time function, the system response time function is used for setting the maximum response time allowed by the system, the character string length function is used for setting the length of the maximum input character string allowed to be received by the system, and the data access time function is used for setting the maximum number of times allowed to be accessed by the system.
In some possible designs, after entering the corresponding preset function module and executing the corresponding control function, the method further includes:
detecting the execution state of the control function through an abnormal mark, wherein the abnormal mark is a 32-bit binary number;
detecting an abnormal state of execution of each control function through each bit of the abnormal mark;
after the detection is finished, if the ith bit is 1, determining that the control function of the (i + 1) th function normally operates;
and if the ith bit is 0, determining that the control function of the (i + 1) th function is abnormal in operation, wherein i is an integer which is greater than or equal to 0 and less than 32.
In a second aspect, the present application provides an apparatus for generating a control tool, having a function of implementing a method corresponding to the platform for generating a control tool provided in the first aspect. The functions can be realized by hardware, and the functions can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules corresponding to the above functions, which may be software and/or hardware.
The apparatus for generating a control tool comprises:
the processing module generates a plurality of functional modules according to the function types of the code modules, wherein the functional modules comprise at least one common module and at least one special module;
the input and output module is used for receiving a creation request triggered by a user;
the processing module is further configured to determine a basic framework and a target function module according to the creation request, where the target function module refers to a part of or all of the plurality of function modules; acquiring input information of a user through the input and output module, and setting a preset basic control in the basic frame according to the input information of the user, wherein the basic control refers to a visual graphic element placed in interface development, and the basic frame refers to a blank window which does not contain any function and basic control; searching an inlet of the target function module through interfaces of a plurality of function modules, finding a corresponding target function module position according to the inlet of the target function module, and embedding the target function module into the corresponding basic control to obtain a functionalized control, wherein the functionalized control is used for reading the position of the corresponding target function module and calling the target function module; generating a control tool based on the functionalized control and the base framework.
In some possible designs, the processing module is further to:
creating a main queue and a queue-in-queue, wherein the main queue is used for storing one or more access request queues with the estimated occupied idle resources higher than the upper limit of the idle resources, the queue-in-queue is used for storing one or more access request queues with the estimated occupied idle resources lower than the upper limit of the idle resources, the resources comprise at least one of CPU (central processing unit) time length, system memory and network bandwidth, and the CPU time length is the time length spent by completing tasks when the CPU works at full speed;
emptying data generated by creating the main queue and the queue-inserting queue so as to initialize the main queue and the queue-inserting queue;
estimating the size of unused resources occupied by the creation request of the user;
if the unused resource occupied by the user's creation request is greater than a threshold value, placing the user's creation request at the tail of the main queue;
and if the unused resource occupied by the user's creation request is less than or equal to the threshold, placing the user's creation request at the tail of the queue-in-queue.
In some possible designs, the processing module is further to:
calling the plurality of functional modules from the functional control according to the creation request of the user, and storing the information of the plurality of functional modules into an array to obtain a target array;
inputting the target array into a custom library, and compiling the custom library to obtain an executable file of the target function module, wherein the custom library is a text for storing the control in a text form and providing external modification;
modifying the control attribute data stored in the custom library to obtain an updated executable file;
and modifying the attribute of the functionalized control by executing the updated executable file.
In some possible designs, the processing module is further to:
calling historical access information of the user stored in a database;
inputting the access information of the user to the target function module through the entrance of the target function module;
analyzing the access information of the user through the target function module;
and if the access information of the user has bad access records, determining that the normal access probability of the user is lower than a preset value, and forbidding the user to access.
In some possible designs, the processing module is further to:
storing the access information to a database for summarizing through the target function module;
summarizing the access information of the user into new information of the user;
and presenting the new information of the user through the monitoring log.
In some possible designs, the processing module is further to:
deploying the control tool on a user terminal, the user terminal comprising an input device;
receiving a touch signal input by a user through the input equipment;
calculating the coordinates of the display equipment corresponding to the touch signals;
judging whether a target control exists in the coordinates of the display equipment or not;
if the target control exists in the coordinates of the display equipment, entering a corresponding preset function module through the target control;
and after entering the corresponding preset function module, executing a corresponding control function, wherein the control function at least comprises one of a Key creating function, a character string length function, a database access time function and a system response time function, the system response time function is used for setting the maximum response time allowed by the system, the character string length function is used for setting the length of the maximum input character string allowed to be received by the system, and the data access time function is used for setting the maximum number of times allowed to be accessed by the system.
In some possible designs, the processing module is further to:
detecting the execution state of the control function through an abnormal mark, wherein the abnormal mark is a 32-bit binary number;
detecting an abnormal state of execution of each control function through each bit of the abnormal mark;
after the detection is finished, if the ith bit is 1, determining that the control function of the (i + 1) th function normally operates;
and if the ith bit is 0, determining that the control function of the (i + 1) th function is abnormal in operation, wherein i is an integer which is greater than or equal to 0 and less than 32.
In yet another aspect, the present application provides a device for generating a control tool, which includes at least one connected processor, a memory, and an input/output unit, wherein the memory is used for storing program codes, and the processor is used for calling the program codes in the memory to execute the method of the above aspects.
Yet another aspect of the present application provides a computer storage medium comprising instructions which, when executed on a computer, cause the computer to perform the method of the above-described aspects.
Drawings
FIG. 1 is a schematic flow chart of a method for generating a control tool according to an embodiment of the present application;
FIG. 2 is a schematic structural diagram of an apparatus for generating a control tool according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a computer device in an embodiment of the present application.
The implementation, functional features and advantages of the objectives of the present application will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. The terms "first," "second," and the like in the description and in the claims, as well as in the drawings, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It will be appreciated that the data so used may be interchanged under appropriate circumstances such that the embodiments described herein may be practiced otherwise than as specifically illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or modules is not necessarily limited to those steps or modules explicitly listed, but may include other steps or modules not explicitly listed or inherent to such process, method, article, or apparatus, and the division of modules presented herein is merely a logical division that may be implemented in a practical application in a different manner, such that multiple modules may be combined or integrated into another system, or some features may be omitted, or may not be implemented.
The application provides a method, a device, equipment and a storage medium for generating a control tool, which can be used for generating the control tool.
Referring to fig. 1, a method for generating a control tool according to the present application is illustrated, and the method includes:
101. and generating a plurality of functional modules according to the function types of the code modules, wherein the plurality of functional modules comprise at least one common module and at least one special module.
For example, the sharing module comprises an entrance module, a common parameter control module, a setting module and a function execution state monitoring module. A specialized module refers to a functional module that is unique to the tool. Taking tool a and tool B as an example, both tool a and tool B include a control module and a setting module, but tool a has a control function of pre-estimating occupation of server access resources according to an access request, and tool B does not have this function, and this function module is used as a dedicated module for tool a.
102. When a creation request triggered by a user is received, determining a basic framework and a target function module according to the creation request, wherein the target function module refers to a part of function modules or all function modules in the plurality of function modules.
For example, the control function of the system response time needs to be realized in the tool a, a system response time control module in the tool B is called by a common interface, and the module is combined with other function modules of the tool a, so that the multiplexing of codes in different items is realized.
For example, the tool A and the tool B both need to control the access times of the server, the tool A needs to control the access times of the server, the tool B needs to control the access times of the server, a code module of the control server of the tool A generates a function module for controlling the access times of the server, and the tool B calls the function module generated by the tool A through an interface to complete the function of controlling the access times of the server, so that the multiplexing of the function of controlling the access times of the server by the tool A is realized.
103. The method comprises the steps of obtaining input information of a user, and setting a preset basic control in a basic frame according to the input information of the user, wherein the basic control refers to a visual graphic element placed in interface development, and the basic frame refers to a blank window which does not contain any function and basic control.
The control tool comprises a control tool frame and a control part, the control frame is a carrier for carrying the control part (such as a desktop of a computer), the control part is a carrier for carrying a function (such as an icon of the desktop of the computer), and the function module inlet is used for indicating the code position of the function module (double-clicking the icon to find the position of corresponding software and executing the corresponding software).
104. Searching the entrance of the target function module through the interfaces of the plurality of function modules, finding the corresponding position of the target function module according to the entrance of the target function module, embedding the target function module into the corresponding basic control piece, and obtaining a functionalized control piece, wherein the functionalized control piece is used for reading the position of the corresponding target function module and calling the target function module.
When the tool is generated, the combination of different functional modules can be called through different interfaces, and personalized customization is completed for different project requirements. For example, the interface a provides a function module of character string length and a function module of database access times, and the interface B provides a function module of database access times and a function module of system response time.
105. Generating the control tool based on the control and the framework of the control tool.
In the prior art, access to a system platform needs to be realized through a large amount of underlying codes. In order to solve the problem, a large amount of codes are not needed in the application, and particularly, the access times and the response time of the database can be controlled through an interface of the encapsulation function module.
In some embodiments, after the base frame and the target function module are determined according to the creation request when the creation request triggered by the user is received, the input information of the user is obtained, and before the preset base control is set in the base frame according to the input information of the user, the method further includes:
creating a main queue and a queue-in-queue, wherein the main queue is used for storing one or more access request queues with the estimated occupied idle resources higher than the upper limit of the idle resources, the queue-in-queue is used for storing one or more access request queues with the estimated occupied idle resources lower than the upper limit of the idle resources, the resources comprise at least one of CPU (central processing unit) time length, system memory and network bandwidth, and the CPU time length is the time length spent by completing tasks when the CPU works at full speed;
emptying data generated by creating the main queue and the queue-inserting queue so as to initialize the main queue and the queue-inserting queue;
estimating the size of unused resources occupied by the creation request of the user;
if the unused resource occupied by the user's creation request is greater than a threshold value, placing the user's creation request at the tail of the main queue;
and if the unused resource occupied by the user's creation request is less than or equal to the threshold, placing the user's creation request at the tail of the queue-in-queue.
In the above embodiment, since the queue is created in the memory, the data in the created queue memory is emptied by initializing the main queue and the queue insertion queue, so that the data stored in the memory is prevented from interfering with the storage of the data stored in the queue. Through the double-queue method, the waiting time of the user is reduced, and the system resources are more reasonably distributed.
In some embodiments, after the finding the entry of the target function module through the interfaces of the plurality of function modules, finding the corresponding target function module position according to the entry of the target function module, and embedding the target function module into the corresponding base control, and obtaining a functional control, and before the generating the control tool based on the functional control and the base framework, the method further includes:
calling the plurality of functional modules from the functional control according to the creation request of the user, and storing the information of the plurality of functional modules into an array to obtain a target array;
inputting the target array into a custom library, and compiling the custom library to obtain an executable file of the target function module, wherein the custom library is a text for storing the control in a text form and providing external modification;
modifying the control attribute data stored in the custom library to obtain an updated executable file;
and modifying the attribute of the functionalized control by executing the updated executable file.
In the above embodiment, the control attribute information is loaded to the control tool, and an executable file corresponding to the control tool is generated.
In some embodiments, after determining the base framework and the target function module according to the creation request when the creation request triggered by the user is received, the method further includes:
calling historical access information of the user stored in a database;
inputting the access information of the user to the target function module through the entrance of the target function module;
analyzing the access information of the user through the target function module;
and if the access information of the user has bad access records, determining that the normal access probability of the user is lower than a preset value, and forbidding the user to access.
In the above embodiment, it can be determined in advance whether the user is a normal user, so as to reduce the system abnormal probability.
In some embodiments, if the access information of the user has a bad access record, it is determined that the normal access probability of the user is lower than a preset value, and after the user is prohibited from accessing, the method further includes:
storing the access information to a database for summarizing through the target function module;
summarizing the access information of the user into new information of the user;
and presenting the new information of the user through the monitoring log.
For example, the function parameter setting keeps the log within 30 days, and the system automatically cleans the monitoring log before 30 days and only keeps the log within 30 days. And displaying the abnormity and the errors recorded in the monitoring log in a statistical chart mode.
In some embodiments, after the generating the control tool based on the functionalized control and the base framework, the method further comprises:
deploying the control tool on a user terminal, the user terminal comprising an input device;
receiving a touch signal input by a user through the input equipment;
calculating the coordinates of the display equipment corresponding to the touch signals;
judging whether a target control exists in the coordinates of the display equipment or not;
if the target control exists in the coordinates of the display equipment, entering a corresponding preset function module through the target control;
and after entering the corresponding preset function module, executing a corresponding control function, wherein the control function at least comprises one of a Key creating function, a character string length function, a database access time function and a system response time function, the system response time function is used for setting the maximum response time allowed by the system, the character string length function is used for setting the length of the maximum input character string allowed to be received by the system, and the data access time function is used for setting the maximum number of times allowed to be accessed by the system.
For example, when the access amount is controlled by the database access time function parameter, the maximum time or the upper limit value of the interface being called in a period of time may be set, and the longest response time of the system may be preset by the system response time function parameter. Taking the development of the database access tool a as an example, the preset duration is set to be 1min through a system response time function, and the maximum number of times is set to be 300 through a database access time function, that is, the system can only call the seal platform interface for 300 times at most within one minute. The method comprises the steps that a database access frequency function is used for setting that a system can only call seal platform interfaces for 300 times at most in preset duration, a Key with the validity period of 1 minute is set through time function parameters in system response, when the Key exists, the count is increased by 1, and when the Key does not exist, the Key is created and the expiration time is set. The response time and the access times of the stamp platform are configured through parameters of the function.
In some embodiments, after entering the corresponding preset function module and executing the corresponding control function, the method further includes:
detecting the execution state of the control function through an abnormal mark, wherein the abnormal mark is a 32-bit binary number;
detecting an abnormal state of execution of each control function through each bit of the abnormal mark;
after the detection is finished, if the ith bit is 1, determining that the control function of the (i + 1) th function normally operates;
and if the ith bit is 0, determining that the control function of the (i + 1) th function is abnormal in operation, wherein i is an integer which is greater than or equal to 0 and less than 32.
Fig. 2 is a schematic structural diagram of an apparatus 20 for generating a control tool, which can be applied to generate a control tool. The apparatus for generating a control tool in the embodiment of the present application can implement the steps corresponding to the method for generating a control tool performed in the embodiment corresponding to fig. 1. The functions performed by the means 20 for generating a control facility can be implemented by hardware, or by hardware executing corresponding software. The hardware or software includes one or more modules corresponding to the above functions, which may be software and/or hardware. The generation control tool may include an input/output module 201 and a processing module 202, and the processing module 202 and the input/output module 201 may refer to operations executed in the embodiment corresponding to fig. 1, which are not described herein again. The input-output module 201 may be used to control input, output, and acquisition operations of the input-output module 201.
In some embodiments, the processing module 202 may be configured to generate a plurality of functional modules according to the function type of the code module, where the plurality of functional modules includes at least one common module and at least one dedicated module;
the input and output module 201 may be configured to receive a creation request triggered by a user;
the processing module 202 may determine a basic framework and a target function module according to the creation request, where the target function module refers to a part of or all of the plurality of function modules; acquiring input information of a user through the input and output module, and setting a preset basic control in the basic frame according to the input information of the user, wherein the basic control refers to a visual graphic element placed in interface development, and the basic frame refers to a blank window which does not contain any function and basic control; searching an inlet of the target function module through interfaces of a plurality of function modules, finding a corresponding target function module position according to the inlet of the target function module, and embedding the target function module into the corresponding basic control to obtain a functionalized control, wherein the functionalized control is used for reading the position of the corresponding target function module and calling the target function module; generating a control tool based on the functionalized control and the base framework.
In some possible designs, the processing module 202 is further configured to:
creating a main queue and a queue-in-queue, wherein the main queue is used for storing one or more access request queues with the estimated occupied idle resources higher than the upper limit of the idle resources, the queue-in-queue is used for storing one or more access request queues with the estimated occupied idle resources lower than the upper limit of the idle resources, the resources comprise at least one of CPU (central processing unit) time length, system memory and network bandwidth, and the CPU time length is the time length spent by completing tasks when the CPU works at full speed;
emptying data generated by creating the main queue and the queue-inserting queue so as to initialize the main queue and the queue-inserting queue;
estimating the size of unused resources occupied by the creation request of the user;
if the unused resource occupied by the user's creation request is greater than a threshold value, placing the user's creation request at the tail of the main queue;
and if the unused resource occupied by the user's creation request is less than or equal to the threshold, placing the user's creation request at the tail of the queue-in-queue.
In some possible designs, the processing module 202 is further configured to:
calling the plurality of functional modules from the functional control according to the creation request of the user, and storing the information of the plurality of functional modules into an array to obtain a target array;
inputting the target array into a custom library, and compiling the custom library to obtain an executable file of the target function module, wherein the custom library is a text for storing the control in a text form and providing external modification;
modifying the control attribute data stored in the custom library to obtain an updated executable file;
and modifying the attribute of the functionalized control by executing the updated executable file.
In some possible designs, the processing module 202 is further configured to:
calling historical access information of the user stored in a database;
inputting the access information of the user to the target function module through the entrance of the target function module;
analyzing the access information of the user through the target function module;
and if the access information of the user has bad access records, determining that the normal access probability of the user is lower than a preset value, and forbidding the user to access.
In some possible designs, the processing module 202 is further configured to:
storing the access information to a database for summarizing through the target function module;
summarizing the access information of the user into new information of the user;
and presenting the new information of the user through the monitoring log.
In some possible designs, the processing module 202 is further configured to:
deploying the control tool on a user terminal, the user terminal comprising an input device;
receiving a touch signal input by a user through the input equipment;
calculating the coordinates of the display equipment corresponding to the touch signals;
judging whether a target control exists in the coordinates of the display equipment or not;
if the target control exists in the coordinates of the display equipment, entering a corresponding preset function module through the target control;
and after entering the corresponding preset function module, executing a corresponding control function, wherein the control function at least comprises one of a Key creating function, a character string length function, a database access time function and a system response time function, the system response time function is used for setting the maximum response time allowed by the system, the character string length function is used for setting the length of the maximum input character string allowed to be received by the system, and the data access time function is used for setting the maximum number of times allowed to be accessed by the system.
In some possible designs, the processing module 202 is further configured to:
detecting the execution state of the control function through an abnormal mark, wherein the abnormal mark is a 32-bit binary number;
detecting an abnormal state of execution of each control function through each bit of the abnormal mark;
after the detection is finished, if the ith bit is 1, determining that the control function of the (i + 1) th function normally operates;
and if the ith bit is 0, determining that the control function of the (i + 1) th function is abnormal in operation, wherein i is an integer which is greater than or equal to 0 and less than 32.
The creating apparatus in the embodiment of the present application is described above from the perspective of the modular functional entity, and the following describes a computer device from the perspective of hardware, as shown in fig. 3, which includes: a processor, a memory, an input-output unit (which may also be a transceiver, not identified in fig. 3), and a computer program stored in the memory and executable on the processor. For example, the computer program may be a program corresponding to the method for generating the control tool in the embodiment corresponding to fig. 1. For example, when the computer device implements the functions of the generation control tool 20 shown in fig. 2, the processor executes the computer program to implement the steps of the method for generating a control tool executed by the generation control tool 20 in the embodiment corresponding to fig. 2. Alternatively, the processor implements the functions of the modules in the control tool generating apparatus 20 according to the embodiment corresponding to fig. 2 when executing the computer program. For another example, the computer program may be a program corresponding to a method for generating a control tool in the embodiment corresponding to fig. 1.
The Processor may be a Central Processing Unit (CPU), or may be other general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field-Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware component, or the like. The general purpose processor may be a microprocessor or the processor may be any conventional processor or the like which is the control center of the computer device and which connects the various parts of the overall computer device using various interfaces and lines.
The memory may be used to store the computer programs and/or modules, and the processor may implement various functions of the computer apparatus by running or executing the computer programs and/or modules stored in the memory and calling data stored in the memory. The memory may mainly include a storage program area and a storage data area, wherein the storage program area may store an operating system, an application program required for at least one function (such as a sound playing function, an image playing function, etc.), and the like. The storage data area may store data (such as audio data, video data, etc.) created according to the use of the cellular phone, etc. In addition, the memory may include high speed random access memory, and may also include non-volatile memory, such as a hard disk, a memory, a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), at least one magnetic disk storage device, a Flash memory device, or other volatile solid state storage device.
The input-output unit may also be replaced by a receiver and a transmitter, which may be the same or different physical entities. When they are the same physical entity, they may be collectively referred to as an input-output unit. The input and output may be a transceiver.
The memory may be integrated in the processor or may be provided separately from the processor.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application may be essentially or partially implemented in the form of a software product, which is stored in a storage medium (e.g. ROM/RAM) and includes several instructions for enabling a terminal (e.g. a mobile phone, a computer, a server or a network device, etc.) to execute the method according to the embodiments of the present application.
While the present embodiments have been described with reference to the accompanying drawings, the present disclosure is not limited to the above embodiments, which are only illustrative and not restrictive, and various changes and modifications which can be made by persons skilled in the art in the light of the teachings of the present disclosure and the appended claims, and which are intended to be protected by the present disclosure, may be made without departing from the spirit and scope of the disclosure as defined by the following claims.

Claims (10)

1. A method of generating a control tool, the method comprising:
generating a plurality of functional modules according to the function types of the code modules, wherein the plurality of functional modules comprise at least one common module and at least one special module;
when a creation request triggered by a user is received, determining a basic framework and a target function module according to the creation request, wherein the target function module refers to a part of function modules or all function modules in the plurality of function modules;
acquiring input information of a user, and setting a preset basic control in the basic frame according to the input information of the user, wherein the basic control refers to a visual graphic element placed in interface development, and the basic frame refers to a blank window which does not contain any function and basic control;
searching an inlet of the target function module through interfaces of a plurality of function modules, finding a corresponding target function module position according to the inlet of the target function module, and embedding the target function module into the corresponding basic control to obtain a functionalized control, wherein the functionalized control is used for reading the position of the corresponding target function module and calling the target function module;
generating a control tool based on the functionalized control and the base framework.
2. The method according to claim 1, wherein after determining the basic frame and the target function module according to the creation request when receiving a creation request triggered by a user, the method obtains input information of the user, and before setting a preset basic control in the basic frame according to the input information of the user, the method further comprises:
creating a main queue and a queue-in-queue, wherein the main queue is used for storing one or more access request queues with the estimated occupied idle resources higher than the upper limit of the idle resources, the queue-in-queue is used for storing one or more access request queues with the estimated occupied idle resources lower than the upper limit of the idle resources, the resources comprise at least one of CPU (central processing unit) time length, system memory and network bandwidth, and the CPU time length is the time length spent by completing tasks when the CPU works at full speed;
emptying data generated by creating the main queue and the queue-inserting queue so as to initialize the main queue and the queue-inserting queue;
estimating the size of unused resources occupied by the creation request of the user;
if the unused resource occupied by the user's creation request is greater than a threshold value, placing the user's creation request at the tail of the main queue;
and if the unused resource occupied by the user's creation request is less than or equal to the threshold, placing the user's creation request at the tail of the queue-in-queue.
3. The method of claim 1, wherein after finding the entry of the target function module through the interfaces of the plurality of function modules, finding the corresponding target function module position according to the entry of the target function module, and embedding the target function module into the corresponding base control, and after obtaining a functionalized control, before generating the control tool based on the functionalized control and the base framework, the method further comprises:
calling the plurality of functional modules from the functional control according to the creation request of the user, and storing the information of the plurality of functional modules into an array to obtain a target array;
inputting the target array into a custom library, and compiling the custom library to obtain an executable file of the target function module, wherein the custom library is a text for storing the control in a text form and providing external modification;
modifying the control attribute data stored in the custom library to obtain an updated executable file;
and modifying the attribute of the functionalized control by executing the updated executable file.
4. The method of claim 1, wherein after determining the base framework and the target function module according to the creation request when the creation request triggered by the user is received, the method further comprises:
calling historical access information of the user stored in a database;
inputting the access information of the user to the target function module through the entrance of the target function module;
analyzing the access information of the user through the target function module;
and if the access information of the user has bad access records, determining that the normal access probability of the user is lower than a preset value, and forbidding the user to access.
5. The method according to claim 4, wherein if the access information of the user has a bad access record, the method further comprises the steps of determining that the normal access probability of the user is lower than a preset value, and after the user is prohibited from accessing the user:
storing the access information to a database for summarizing through the target function module;
summarizing the access information of the user into new information of the user;
and presenting the new information of the user through the monitoring log.
6. The method of any of claims 1-5, wherein after the generating the control tool based on the functionalized control and the base framework, the method further comprises:
deploying the control tool on a user terminal, the user terminal comprising an input device;
receiving a touch signal input by a user through the input equipment;
calculating the coordinates of the display equipment corresponding to the touch signals;
judging whether a target control exists in the coordinates of the display equipment or not;
if the target control exists in the coordinates of the display equipment, entering a corresponding preset function module through the target control;
and after entering the corresponding preset function module, executing a corresponding control function, wherein the control function at least comprises one of a Key creating function, a character string length function, a database access time function and a system response time function, the system response time function is used for setting the maximum response time allowed by the system, the character string length function is used for setting the length of the maximum input character string allowed to be received by the system, and the data access time function is used for setting the maximum number of times allowed to be accessed by the system.
7. The method of claim 6, wherein after entering the corresponding preset function module and executing the corresponding control function, the method further comprises:
detecting the execution state of the control function through an abnormal mark, wherein the abnormal mark is a 32-bit binary number;
detecting an abnormal state of execution of each control function through each bit of the abnormal mark;
after the detection is finished, if the ith bit is 1, determining that the control function of the (i + 1) th function normally operates;
and if the ith bit is 0, determining that the control function of the (i + 1) th function is abnormal in operation, wherein i is an integer which is greater than or equal to 0 and less than 32.
8. An apparatus for generating a control tool, the apparatus comprising:
the processing module is used for generating a plurality of functional modules according to the function types of the code modules, and the functional modules comprise at least one common module and at least one special module;
the input and output module is used for receiving a creation request triggered by a user;
the processing module is further configured to determine a basic framework and a target function module according to the creation request, where the target function module refers to a part of or all of the plurality of function modules; acquiring input information of a user through the input and output module, and setting a preset basic control in the basic frame according to the input information of the user, wherein the basic control refers to a visual graphic element placed in interface development, and the basic frame refers to a blank window which does not contain any function and basic control;
searching an inlet of the target function module through interfaces of a plurality of function modules, finding a corresponding target function module position according to the inlet of the target function module, and embedding the target function module into the corresponding basic control to obtain a functionalized control, wherein the functionalized control is used for reading the position of the corresponding target function module and calling the target function module; generating a control tool based on the functionalized control and the base framework.
9. An apparatus for generating a control tool, the computer apparatus comprising:
at least one processor, a memory, and an input-output unit;
wherein the memory is configured to store program code and the processor is configured to invoke the program code stored in the memory to perform the method of any of claims 1-7.
10. A computer storage medium comprising instructions which, when run on a computer, cause the computer to perform the method of any one of claims 1-7.
CN201910966748.XA 2019-10-12 2019-10-12 Method, device, equipment and storage medium for generating control tool Pending CN110888628A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910966748.XA CN110888628A (en) 2019-10-12 2019-10-12 Method, device, equipment and storage medium for generating control tool

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910966748.XA CN110888628A (en) 2019-10-12 2019-10-12 Method, device, equipment and storage medium for generating control tool

Publications (1)

Publication Number Publication Date
CN110888628A true CN110888628A (en) 2020-03-17

Family

ID=69746046

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910966748.XA Pending CN110888628A (en) 2019-10-12 2019-10-12 Method, device, equipment and storage medium for generating control tool

Country Status (1)

Country Link
CN (1) CN110888628A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112364273A (en) * 2020-09-18 2021-02-12 上海泛微软件有限公司 Method, device and equipment for generating portal page and computer readable storage medium
CN112965697A (en) * 2021-03-25 2021-06-15 北京奇艺世纪科技有限公司 Code file generation method and device and electronic equipment
CN117420808A (en) * 2023-12-18 2024-01-19 中国科学院近代物理研究所 Modular control method and system, electronic equipment and storage medium

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160350133A1 (en) * 2015-05-25 2016-12-01 Fujitsu Limited Information processing apparatus and electronic equipment
CN108270693A (en) * 2017-12-29 2018-07-10 珠海国芯云科技有限公司 The adaptive optimization leading method and device of website visiting
CN109271157A (en) * 2018-09-07 2019-01-25 深圳市东微智能科技股份有限公司 Software development methodology, equipment and computer readable storage medium
CN109725901A (en) * 2018-05-31 2019-05-07 中国平安人寿保险股份有限公司 Development approach, device, equipment and the computer storage medium of front-end code
CN109766097A (en) * 2018-12-15 2019-05-17 中国平安人寿保险股份有限公司 UI generation method, device, electronic equipment and computer readable storage medium

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160350133A1 (en) * 2015-05-25 2016-12-01 Fujitsu Limited Information processing apparatus and electronic equipment
CN108270693A (en) * 2017-12-29 2018-07-10 珠海国芯云科技有限公司 The adaptive optimization leading method and device of website visiting
CN109725901A (en) * 2018-05-31 2019-05-07 中国平安人寿保险股份有限公司 Development approach, device, equipment and the computer storage medium of front-end code
CN109271157A (en) * 2018-09-07 2019-01-25 深圳市东微智能科技股份有限公司 Software development methodology, equipment and computer readable storage medium
CN109766097A (en) * 2018-12-15 2019-05-17 中国平安人寿保险股份有限公司 UI generation method, device, electronic equipment and computer readable storage medium

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112364273A (en) * 2020-09-18 2021-02-12 上海泛微软件有限公司 Method, device and equipment for generating portal page and computer readable storage medium
CN112965697A (en) * 2021-03-25 2021-06-15 北京奇艺世纪科技有限公司 Code file generation method and device and electronic equipment
CN112965697B (en) * 2021-03-25 2023-07-25 北京奇艺世纪科技有限公司 Code file generation method and device and electronic equipment
CN117420808A (en) * 2023-12-18 2024-01-19 中国科学院近代物理研究所 Modular control method and system, electronic equipment and storage medium
CN117420808B (en) * 2023-12-18 2024-03-08 中国科学院近代物理研究所 Modular control method and system, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
US7398469B2 (en) Automated test system for testing an application running in a windows-based environment and related methods
US8719784B2 (en) Assigning runtime artifacts to software components
CN110888628A (en) Method, device, equipment and storage medium for generating control tool
CN107609004B (en) Application program embedding method and device, computer equipment and storage medium
CN107608609B (en) Event object sending method and device
CN110716866A (en) Code quality scanning method and device, computer equipment and storage medium
CN110221952B (en) Service data processing method and device and service data processing system
CN111459774A (en) Method, device and equipment for acquiring flow of application program and storage medium
CN114356290A (en) Data processing method and device and computer readable storage medium
CN112287643B (en) Message monitoring method, device, equipment and computer readable storage medium
CN115129809A (en) Method and device for determining user activity, electronic equipment and storage medium
CN114911541A (en) Configuration information processing method and device, electronic equipment and storage medium
CN114510300A (en) Method and equipment for embedding target object in derived class
CN110262856B (en) Application program data acquisition method, device, terminal and storage medium
CN113343189A (en) Method and device for preventing malicious swiping of short message verification code
CN111124627A (en) Method, device, terminal and storage medium for determining application program caller
CN109343871A (en) Method, apparatus, equipment and the storage medium that application program is packaged
CN113946333B (en) Mobile terminal logic script execution method and device
CN115757302B (en) Data analysis method, device, equipment and storage medium
CN112528291B (en) Code auditing method and device based on knowledge graph
US20230342226A1 (en) Event handling based on tracing execution paths
US10691521B2 (en) Using telemetry to drive high impact accessibility issues
US10198342B1 (en) Advanced binary instrumentation for debugging and performance enhancement
CN115827412A (en) Bury-point-free statistical method and system based on Android system
CN114020263A (en) Interface configuration generation method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination