CN113094270A - Project automation verification method and device - Google Patents

Project automation verification method and device Download PDF

Info

Publication number
CN113094270A
CN113094270A CN202110392865.7A CN202110392865A CN113094270A CN 113094270 A CN113094270 A CN 113094270A CN 202110392865 A CN202110392865 A CN 202110392865A CN 113094270 A CN113094270 A CN 113094270A
Authority
CN
China
Prior art keywords
project
verification
risk
preset
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110392865.7A
Other languages
Chinese (zh)
Other versions
CN113094270B (en
Inventor
梁广会
王培君
许淑容
袁甲
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202110392865.7A priority Critical patent/CN113094270B/en
Publication of CN113094270A publication Critical patent/CN113094270A/en
Application granted granted Critical
Publication of CN113094270B publication Critical patent/CN113094270B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3664Environments for testing or debugging software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/242Query formulation
    • G06F16/2433Query languages
    • G06F16/2445Data retrieval commands; View definitions
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/03Credit; Loans; Processing thereof

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Quality & Reliability (AREA)
  • Computer Hardware Design (AREA)
  • Economics (AREA)
  • General Business, Economics & Management (AREA)
  • Technology Law (AREA)
  • Strategic Management (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Software Systems (AREA)
  • Mathematical Physics (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application provides a project automation verification method and a device, which can also be used in the financial field, and the method comprises the following steps: receiving a project risk verification triggering instruction, and analyzing a corresponding project according to the project risk verification triggering instruction; performing risk verification operation on the analyzed project according to a preset fixed risk point verification rule and a preset customized risk point verification rule to obtain a risk verification result of the project; the method and the device can effectively process multi-class technical verification in risk point verification after the project is on-line, can realize a customizable verification method except for a fixed type, improve efficiency and reduce operation and maintenance cost.

Description

Project automation verification method and device
Technical Field
The application relates to the field of data processing and can also be used in the field of finance, in particular to a project automatic verification method and device.
Background
Most of the existing verification aiming at project version online services and technologies are online risk point verification in a manual intervention mode, risk verification contents are prepared in advance through a verification type set by a fixed rule, and then the project is manually executed and result verification is carried out after the project is online. The online manual verification of the risk points of the project can verify the services and technologies after the project is online, but when the volume of the project is large and the online risk points required to be verified are many, the manual verification efficiency is not very high, and the accuracy problem also exists.
The inventor finds that the manual verification in the prior art depends on poor compatibility of technical templates, insufficient use range, clear environment configuration and insufficient automation rate. Operation and maintenance manpower is wasted, and the cost of risk point verification is increased while the effectiveness and the accuracy of automatic verification are lost.
Disclosure of Invention
Aiming at the problems in the prior art, the application provides a project automatic verification method and a project automatic verification device, which can effectively process multi-class technical verification in risk point verification after a project is on line, can realize a customizable verification method except for a fixed type, improve efficiency and reduce operation and maintenance cost.
In order to solve at least one of the above problems, the present application provides the following technical solutions:
in a first aspect, the present application provides a project automation verification method, including:
receiving a project risk verification triggering instruction, and analyzing a corresponding project according to the project risk verification triggering instruction;
and carrying out risk verification operation on the analyzed project according to a preset fixed risk point verification rule and a preset customized risk point verification rule to obtain a risk verification result of the project.
Further, the performing risk verification operation on the analyzed project according to a preset fixed risk point verification rule to obtain a risk verification result of the project includes:
judging whether the project file feature information obtained after the project is analyzed is consistent with a preset file feature expected value, if so, judging that the project file feature information of the project passes verification, wherein the project file feature information comprises a directory attribute, a file variable value and file content;
judging whether the project operation result information obtained after the project is analyzed is consistent with a preset operation result expected value, if so, judging that the project operation result information of the project passes verification, wherein the project operation result information comprises result data output to a specified database after the project is operated;
and judging whether the project operation process information obtained after the project is analyzed is consistent with a preset operation process expected value, if so, judging that the project operation process information of the project passes verification, wherein the project operation process information comprises log data and context node data generated during the project operation.
Further, the performing risk verification operation on the analyzed project according to a preset customized risk point verification rule to obtain a risk verification result of the project includes:
reading a preset customized risk point verification module file and carrying out file serialization processing to obtain a project operation environment risk point verification rule;
and acquiring project operation environment data of the corresponding checking source of the project according to the project operation environment risk point verification rule, judging whether the project operation environment data is within a preset operation environment expected value range, and if so, judging that the project operation environment data of the project passes verification.
Further, before the receiving the item risk verification triggering instruction, the method includes:
and generating a project risk verification trigger instruction after monitoring that the project is deployed online or generating the project risk verification trigger instruction when a preset timer reaches a set time.
In a second aspect, the present application provides an automated project verification apparatus, comprising:
the project analysis module is used for receiving a project risk verification triggering instruction and analyzing a corresponding project according to the project risk verification triggering instruction;
and the risk verification module is used for performing risk verification operation on the analyzed project according to a preset fixed risk point verification rule and a preset customized risk point verification rule to obtain a risk verification result of the project.
Further, the risk verification module includes:
the project file feature information verification unit is used for judging whether project file feature information obtained after the project is analyzed is consistent with a preset file feature expected value or not, and if yes, judging that the project file feature information of the project passes verification, wherein the project file feature information comprises a directory attribute, a file variable value and file content;
the project operation result information verification unit is used for judging whether project operation result information obtained after the project is analyzed is consistent with a preset operation result expected value or not, if yes, the project operation result information of the project is judged to pass verification, wherein the project operation result information comprises result data output to a specified database after the project is operated;
and the item operation process information verification unit is used for judging whether the item operation process information obtained after the item is analyzed is consistent with a preset operation process expected value or not, and if so, judging that the item operation process information of the item passes verification, wherein the item operation process information comprises log data and context node data generated during the operation of the item.
Further, the risk verification module includes:
the customized template serialization unit is used for reading a preset customized risk point verification module file and carrying out file serialization processing to obtain a project operation environment risk point verification rule;
and the project operation environment data verification unit is used for acquiring the project operation environment data of the corresponding checking source of the project according to the project operation environment risk point verification rule, judging whether the project operation environment data are in a preset operation environment expected value range, and judging that the project operation environment data of the project pass verification if the project operation environment data of the project pass verification.
Further, still include:
and the verification triggering unit is used for generating a project risk verification triggering instruction after monitoring that the project is deployed online or generating the project risk verification triggering instruction when a preset timer reaches a set time.
In a third aspect, the present application provides an electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the steps of the project autoverification method when executing the program.
In a fourth aspect, the present application provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the project autoverification method described.
According to the technical scheme, the method and the device for the project automatic verification are embedded into the project, the risk verification operation of the project is automatically executed, the manual participation degree of the project on line is reduced, the risk point verification time is shortened, the verification efficiency is improved, meanwhile, the fixed risk point verification rule and the customized risk point verification rule can comprehensively and flexibly perform risk verification on the project, and the operation and maintenance cost is effectively reduced.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a flow chart of a project autoverification method in an embodiment of the present application;
FIG. 2 is a second flowchart of a project automatic verification method according to an embodiment of the present application;
FIG. 3 is a third flowchart of a project automatic verification method in an embodiment of the present application;
FIG. 4 is a block diagram of an automated project verification system according to an embodiment of the present application;
FIG. 5 is a second block diagram of an automated project verification apparatus according to an embodiment of the present application;
FIG. 6 is a third block diagram of an automated project verification apparatus according to an embodiment of the present application;
FIG. 7 is a flow diagram illustrating a method for project auto-verification in accordance with an embodiment of the present application;
fig. 8 is a schematic structural diagram of an electronic device in an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In consideration of the problems that the technical templates depended on by manual verification in the prior art are poor in compatibility, insufficient in application range, required to be clearly configured in an environment and insufficient in automation rate, the method and the device for automatically verifying the project are embedded into the project, the risk verification operation of the project is automatically executed, the manual participation degree of the project on line is reduced, the risk point verification time is shortened, the verification efficiency is improved, meanwhile, the fixed risk point verification rule and the customized risk point verification rule can be comprehensively and flexibly used for performing risk verification on the project, and the operation and maintenance cost is effectively reduced.
In order to effectively handle multiple types of technical verification in risk point verification after a project is online, and to implement a customizable verification method except for a fixed type, improve efficiency, and reduce operation and maintenance costs, the present application provides an embodiment of a project automation verification method, which specifically includes the following contents, with reference to fig. 1 and 7:
step S101: and receiving a project risk verification triggering instruction, and analyzing the corresponding project according to the project risk verification triggering instruction.
Optionally, the program/system/virtual module for executing the method of the present application may be embedded in the target project, or may be set independently from the target project.
Optionally, after receiving the project risk verification trigger instruction, the method may first analyze the corresponding project according to the project risk verification trigger instruction, so as to obtain data in the project for performing risk verification operation, where obtaining the data in the project for performing risk verification operation may be analyzing a project program, obtaining a code of the project program, or obtaining data in a database corresponding to the project, that is, data output by the project during or after the operation is finished.
Step S102: and carrying out risk verification operation on the analyzed project according to a preset fixed risk point verification rule and a preset customized risk point verification rule to obtain a risk verification result of the project.
Optionally, after the above-mentioned risk verification operation to the project is triggered automatically, this application can also carry out the risk verification operation to the project after the analysis according to predetermineeing fixed risk point validation rule and predetermineeing customized risk point validation rule, wherein, predetermine fixed risk point validation rule and predetermine customized risk point validation rule and be used for carrying out the risk verification to the project from different dimensions, specifically, fixed risk point validation rule is used for carrying out the risk verification according to project internal information, customized risk point validation rule is used for carrying out the risk verification according to project external information.
Optionally, the preset fixed risk point validation rule and the preset customized risk point validation rule may be predefined for an administrator, where the predefined fixed risk point validation rule and the preset customized risk point validation rule include a check source, a specific judgment rule, and a judgment standard value (i.e., an expected value) that needs to be obtained from a project.
In other embodiments of the present application, the preset customized risk point verification rule may flexibly determine the inspection source in the project according to the determination rule actually included therein.
From the above description, the project automatic verification method provided by the embodiment of the application can automatically execute the risk verification operation of the project by embedding the method in the project, reduce the manual participation degree of the project online, shorten the risk point verification time, improve the verification efficiency, and meanwhile, by adopting the fixed risk point verification rule and the customized risk point verification rule of the application, the risk verification can be comprehensively and flexibly performed on the project, so that the operation and maintenance cost is effectively reduced.
In order to verify the risk inside the project, in an embodiment of the project automatic verification method of the present application, referring to fig. 2, the step S102 may further include the following steps:
step S201: and judging whether the project file characteristic information obtained after the project is analyzed is consistent with a preset file characteristic expected value, if so, judging that the project file characteristic information of the project passes verification, wherein the project file characteristic information comprises a directory attribute, a file variable value and file content.
Specifically, the method and the device can verify the item file characteristic information of the directory attribute obtained after the item is analyzed, for example, if the expected value is yes or no, and verify whether the configured directory exists and has user authority. And the system commands to execute, checks the existence of the checking content and determines the directory, then judges the directory authority, returns the actual value 'yes' if all the contents are met, and otherwise, judges that the checking does not pass the return 'no', and records the output result description.
Meanwhile, the method and the device can also verify the characteristic information of the project file of the file attribute obtained after the project is analyzed, for example, the expected value is 'yes' or 'no', and whether the configured file exists or not is verified and has authority. And the system commands to execute, checks the existence of the checking content and determines that the checking content is a file, then judges the file authority, returns the actual value of yes if all the checking content is satisfied, and otherwise, judges that the checking content does not pass the return of no, and records the output result description.
In addition, the file variable value obtained by analyzing the project can be verified for the project file characteristic information, for example, the expected value is configured according to the actual situation. And verifying whether the actual values of the variables in the configured file are consistent with the expected values, wherein the type verification is not suitable for xml text verification. The verification content in the rule template is configured as a file variable name, and the system command is directly matched with the variable name to obtain the variable value of the file and returns the variable value as an actual value.
Then, the application may also perform verification of the project file feature information on the file content obtained by parsing the project, for example, the expected value is "yes" or "no". To check whether there is some content in the file. And the system commands to inquire whether the verification content exists in the file or not, if so, the yes is returned, and if not, the no is returned. Can be used as a means for verifying the production log.
Step S202: judging whether the project operation result information obtained after the project is analyzed is consistent with a preset operation result expected value, if so, judging that the project operation result information of the project passes verification, wherein the project operation result information comprises result data output to a specified database after the project is operated.
Specifically, the project file feature information can be verified according to the project operation result information obtained by analyzing the project, and it can be understood that the project operation result information is usually stored in a designated database, for example, the expected value of the project operation result information is configured according to the actual situation. And verifying whether the query result of the configured sql query statement is consistent with the expectation or not, wherein the verification environment does not allow other modification commands and is only applicable to the select statement. And reading the database environment configuration in the system, then executing the sql command, and returning the execution result as an actual value.
Step S203: and judging whether the project operation process information obtained after the project is analyzed is consistent with a preset operation process expected value, if so, judging that the project operation process information of the project passes verification, wherein the project operation process information comprises log data and context node data generated during the project operation.
Specifically, the project operation process information obtained by analyzing the project may be verified according to the project file feature information, and it may be understood that the project operation process information may be log data (stored in a setting database) and context node data (for example, xml and json node contents) generated during the project operation, for example, an expected value of the project operation process information configures a node value according to an actual situation. The function can verify that a certain node value in the case of a multilayer node is a function which has been customized. It is necessary to write in the verification contents which child node under which parent node needs to be verified. Returned is the node value of the designated node.
In order to verify the risk outside the project, in an embodiment of the project automatic verification method of the present application, referring to fig. 3, the step S102 may further include the following steps:
step S301: and reading a preset customized risk point verification module file and carrying out file serialization processing to obtain a project operation environment risk point verification rule.
Step S302: and acquiring project operation environment data of the corresponding checking source of the project according to the project operation environment risk point verification rule, judging whether the project operation environment data is within a preset operation environment expected value range, and if so, judging that the project operation environment data of the project passes verification.
Understandably, the project runs environment data such as resource occupancy, etc.
Specifically, at the time point when the resource occupancy of the operating environment needs to be checked, an automatic task is set, and automatic verification is executed. And displaying the real-time use condition of the system resource through a top command. Firstly, the resource occupation conditions of all current running tasks, including current time, system running duration, current login user, system load conditions (including average values in 1 minute, 5 minutes and 15 minutes), process running conditions, space occupation rates, cache use conditions and the like, are processed and output according to the contents needing to be verified; secondly, the occupation condition of a certain running task can be fuzzy to inquire the task command name, and process id, father process id, owner, priority, cpu occupation rate, memory occupation rate, command name, state and the like are inquired, verified contents are processed and output according to needs. Both of the above cases can be controlled by the top command parameter. In the processing process, system resource occupancy data are output to the log, and the log file is checked under the condition to be verified.
In order to start the risk verification in time, in an embodiment of the project automatic verification method of the present application, the following may be further included:
and generating a project risk verification trigger instruction after monitoring that the project is deployed online or generating the project risk verification trigger instruction when a preset timer reaches a set time.
In order to effectively handle multiple types of technical verification in risk point verification after a project is online, and to implement a customizable verification method except for a fixed type, improve efficiency, and reduce operation and maintenance costs, the present application provides an embodiment of a project automation verification apparatus for implementing all or part of the contents of the project automation verification method, and referring to fig. 4, the project automation verification apparatus specifically includes the following contents:
and the project analysis module 10 is used for receiving the project risk verification triggering instruction and analyzing the corresponding project according to the project risk verification triggering instruction.
And the risk verification module 20 is configured to perform risk verification operation on the analyzed project according to a preset fixed risk point verification rule and a preset customized risk point verification rule to obtain a risk verification result of the project.
From the above description, the project automation verification device provided by the embodiment of the application can automatically execute the risk verification operation of the project by embedding the method in the project, reduce the manual participation degree of the project online, shorten the risk point verification time, and improve the verification efficiency.
In order to perform risk verification on the inside of a project, in an embodiment of the project automation verification apparatus of the present application, referring to fig. 5, the risk verification module 20 includes:
and the item file characteristic information verification unit 21 is configured to determine whether item file characteristic information obtained by analyzing the item is consistent with a preset file characteristic expected value, and if so, determine that the item file characteristic information of the item passes verification, where the item file characteristic information includes a directory attribute, a file variable value, and a file content.
And the project operation result information verification unit 22 is configured to determine whether project operation result information obtained by analyzing the project is consistent with a preset operation result expected value, and if so, determine that the project operation result information of the project passes verification, where the project operation result information includes result data output to a specified database after the project is operated.
And the item operation process information verification unit 23 is configured to determine whether item operation process information obtained by analyzing the item is consistent with a preset operation process expected value, and if so, determine that the item operation process information of the item passes verification, where the item operation process information includes log data and context node data generated during the operation of the item.
In order to perform risk verification on the outside of the project, in an embodiment of the project automation verification apparatus of the present application, referring to fig. 6, the risk verification module 20 includes:
and the customized template serialization unit 24 is used for reading the preset customized risk point verification module file and carrying out file serialization processing to obtain the project operation environment risk point verification rule.
And the project operation environment data verification unit 25 is used for acquiring the project operation environment data of the corresponding checking source of the project according to the project operation environment risk point verification rule, judging whether the project operation environment data is in a preset operation environment expected value range, and if so, judging that the project operation environment data of the project passes verification.
In order to start the risk verification in time, an embodiment of the automatic project verification apparatus of the present application further includes the following components:
and the verification triggering unit is used for generating a project risk verification triggering instruction after monitoring that the project is deployed online or generating the project risk verification triggering instruction when a preset timer reaches a set time.
In order to effectively process multiple types of technical verifications in risk point verification after a project is online from a hardware level, and to realize a customizable verification method except for a fixed type, improve efficiency, and reduce operation and maintenance costs, the application provides an embodiment of an electronic device for realizing all or part of contents in the project automatic verification method, wherein the electronic device specifically comprises the following contents:
a processor (processor), a memory (memory), a communication Interface (Communications Interface), and a bus; the processor, the memory and the communication interface complete mutual communication through the bus; the communication interface is used for realizing information transmission between the project automatic verification device and relevant equipment such as a core business system, a user terminal, a relevant database and the like; the logic controller may be a desktop computer, a tablet computer, a mobile terminal, and the like, but the embodiment is not limited thereto. In this embodiment, the logic controller may be implemented with reference to the embodiments of the project automation verification method and the project automation verification apparatus in the embodiments, and the contents thereof are incorporated herein, and repeated descriptions are omitted.
It is understood that the user terminal may include a smart phone, a tablet electronic device, a network set-top box, a portable computer, a desktop computer, a Personal Digital Assistant (PDA), an in-vehicle device, a smart wearable device, and the like. Wherein, intelligence wearing equipment can include intelligent glasses, intelligent wrist-watch, intelligent bracelet etc..
In practical applications, part of the project automatic verification method may be performed on the electronic device side as described above, or all operations may be performed in the client device. The selection may be specifically performed according to the processing capability of the client device, the limitation of the user usage scenario, and the like. This is not a limitation of the present application. The client device may further include a processor if all operations are performed in the client device.
The client device may have a communication module (i.e., a communication unit), and may be communicatively connected to a remote server to implement data transmission with the server. The server may include a server on the task scheduling center side, and in other implementation scenarios, the server may also include a server on an intermediate platform, for example, a server on a third-party server platform that is communicatively linked to the task scheduling center server. The server may include a single computer device, or may include a server cluster formed by a plurality of servers, or a server structure of a distributed apparatus.
Fig. 8 is a schematic block diagram of a system configuration of an electronic device 9600 according to an embodiment of the present application. As shown in fig. 8, the electronic device 9600 can include a central processor 9100 and a memory 9140; the memory 9140 is coupled to the central processor 9100. Notably, this FIG. 8 is exemplary; other types of structures may also be used in addition to or in place of the structure to implement telecommunications or other functions.
In one embodiment, the project autoverification method functionality may be integrated into the central processor 9100. The central processor 9100 may be configured to control as follows:
step S101: and receiving a project risk verification triggering instruction, and analyzing the corresponding project according to the project risk verification triggering instruction.
Step S102: and carrying out risk verification operation on the analyzed project according to a preset fixed risk point verification rule and a preset customized risk point verification rule to obtain a risk verification result of the project.
According to the above description, the electronic device provided by the embodiment of the application, by embedding the method in the project, automatically executes the risk verification operation of the project, reduces the manual participation degree of the project on line, shortens the risk point verification time, and improves the verification efficiency.
In another embodiment, the project automation verification apparatus may be configured separately from the central processor 9100, for example, the project automation verification apparatus may be configured as a chip connected to the central processor 9100, and the project automation verification method function may be implemented by the control of the central processor.
As shown in fig. 8, the electronic device 9600 may further include: a communication module 9110, an input unit 9120, an audio processor 9130, a display 9160, and a power supply 9170. It is noted that the electronic device 9600 also does not necessarily include all of the components shown in fig. 8; further, the electronic device 9600 may further include components not shown in fig. 8, which may be referred to in the art.
As shown in fig. 8, a central processor 9100, sometimes referred to as a controller or operational control, can include a microprocessor or other processor device and/or logic device, which central processor 9100 receives input and controls the operation of the various components of the electronic device 9600.
The memory 9140 can be, for example, one or more of a buffer, a flash memory, a hard drive, a removable media, a volatile memory, a non-volatile memory, or other suitable device. The information relating to the failure may be stored, and a program for executing the information may be stored. And the central processing unit 9100 can execute the program stored in the memory 9140 to realize information storage or processing, or the like.
The input unit 9120 provides input to the central processor 9100. The input unit 9120 is, for example, a key or a touch input device. Power supply 9170 is used to provide power to electronic device 9600. The display 9160 is used for displaying display objects such as images and characters. The display may be, for example, an LCD display, but is not limited thereto.
The memory 9140 can be a solid state memory, e.g., Read Only Memory (ROM), Random Access Memory (RAM), a SIM card, or the like. There may also be a memory that holds information even when power is off, can be selectively erased, and is provided with more data, an example of which is sometimes called an EPROM or the like. The memory 9140 could also be some other type of device. Memory 9140 includes a buffer memory 9141 (sometimes referred to as a buffer). The memory 9140 may include an application/function storage portion 9142, the application/function storage portion 9142 being used for storing application programs and function programs or for executing a flow of operations of the electronic device 9600 by the central processor 9100.
The memory 9140 can also include a data store 9143, the data store 9143 being used to store data, such as contacts, digital data, pictures, sounds, and/or any other data used by an electronic device. The driver storage portion 9144 of the memory 9140 may include various drivers for the electronic device for communication functions and/or for performing other functions of the electronic device (e.g., messaging applications, contact book applications, etc.).
The communication module 9110 is a transmitter/receiver 9110 that transmits and receives signals via an antenna 9111. The communication module (transmitter/receiver) 9110 is coupled to the central processor 9100 to provide input signals and receive output signals, which may be the same as in the case of a conventional mobile communication terminal.
Based on different communication technologies, a plurality of communication modules 9110, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be provided in the same electronic device. The communication module (transmitter/receiver) 9110 is also coupled to a speaker 9131 and a microphone 9132 via an audio processor 9130 to provide audio output via the speaker 9131 and receive audio input from the microphone 9132, thereby implementing ordinary telecommunications functions. The audio processor 9130 may include any suitable buffers, decoders, amplifiers and so forth. In addition, the audio processor 9130 is also coupled to the central processor 9100, thereby enabling recording locally through the microphone 9132 and enabling locally stored sounds to be played through the speaker 9131.
An embodiment of the present application further provides a computer-readable storage medium capable of implementing all the steps in the project automatic verification method in which the execution subject is the server or the client in the above embodiments, where the computer-readable storage medium stores a computer program, and the computer program, when executed by a processor, implements all the steps in the project automatic verification method in which the execution subject is the server or the client, for example, when the processor executes the computer program, the processor implements the following steps:
step S101: and receiving a project risk verification triggering instruction, and analyzing the corresponding project according to the project risk verification triggering instruction.
Step S102: and carrying out risk verification operation on the analyzed project according to a preset fixed risk point verification rule and a preset customized risk point verification rule to obtain a risk verification result of the project.
As can be seen from the above description, the computer-readable storage medium provided in the embodiment of the present application, by embedding the method in a project, automatically performs a risk verification operation on the project, reduces manual participation on the project, shortens a risk point verification time, and improves verification efficiency.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, apparatus, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (devices), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
The principle and the implementation mode of the invention are explained by applying specific embodiments in the invention, and the description of the embodiments is only used for helping to understand the method and the core idea of the invention; meanwhile, for a person skilled in the art, according to the idea of the present invention, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present invention.

Claims (10)

1. A method of project automation verification, the method comprising:
receiving a project risk verification triggering instruction, and analyzing a corresponding project according to the project risk verification triggering instruction;
and carrying out risk verification operation on the analyzed project according to a preset fixed risk point verification rule and a preset customized risk point verification rule to obtain a risk verification result of the project.
2. The method for automatically verifying a project according to claim 1, wherein the performing a risk verification operation on the parsed project according to a preset fixed risk point verification rule to obtain a risk verification result of the project includes:
judging whether the project file feature information obtained after the project is analyzed is consistent with a preset file feature expected value, if so, judging that the project file feature information of the project passes verification, wherein the project file feature information comprises a directory attribute, a file variable value and file content;
judging whether the project operation result information obtained after the project is analyzed is consistent with a preset operation result expected value, if so, judging that the project operation result information of the project passes verification, wherein the project operation result information comprises result data output to a specified database after the project is operated;
and judging whether the project operation process information obtained after the project is analyzed is consistent with a preset operation process expected value, if so, judging that the project operation process information of the project passes verification, wherein the project operation process information comprises log data and context node data generated during the project operation.
3. The method for automatically verifying a project according to claim 1, wherein the performing a risk verification operation on the parsed project according to a preset customized risk point verification rule to obtain a risk verification result of the project includes:
reading a preset customized risk point verification module file and carrying out file serialization processing to obtain a project operation environment risk point verification rule;
and acquiring project operation environment data of the corresponding checking source of the project according to the project operation environment risk point verification rule, judging whether the project operation environment data is within a preset operation environment expected value range, and if so, judging that the project operation environment data of the project passes verification.
4. The project automation verification method of claim 1, prior to said receiving project risk verification trigger instructions, comprising:
and generating a project risk verification trigger instruction after monitoring that the project is deployed online or generating the project risk verification trigger instruction when a preset timer reaches a set time.
5. An automated item verification device, comprising:
the project analysis module is used for receiving a project risk verification triggering instruction and analyzing a corresponding project according to the project risk verification triggering instruction;
and the risk verification module is used for performing risk verification operation on the analyzed project according to a preset fixed risk point verification rule and a preset customized risk point verification rule to obtain a risk verification result of the project.
6. The automated item verification device of claim 5, wherein the risk verification module comprises:
the project file feature information verification unit is used for judging whether project file feature information obtained after the project is analyzed is consistent with a preset file feature expected value or not, and if yes, judging that the project file feature information of the project passes verification, wherein the project file feature information comprises a directory attribute, a file variable value and file content;
the project operation result information verification unit is used for judging whether project operation result information obtained after the project is analyzed is consistent with a preset operation result expected value or not, if yes, the project operation result information of the project is judged to pass verification, wherein the project operation result information comprises result data output to a specified database after the project is operated;
and the item operation process information verification unit is used for judging whether the item operation process information obtained after the item is analyzed is consistent with a preset operation process expected value or not, and if so, judging that the item operation process information of the item passes verification, wherein the item operation process information comprises log data and context node data generated during the operation of the item.
7. The automated item verification device of claim 5, wherein the risk verification module comprises:
the customized template serialization unit is used for reading a preset customized risk point verification module file and carrying out file serialization processing to obtain a project operation environment risk point verification rule;
and the project operation environment data verification unit is used for acquiring the project operation environment data of the corresponding checking source of the project according to the project operation environment risk point verification rule, judging whether the project operation environment data are in a preset operation environment expected value range, and judging that the project operation environment data of the project pass verification if the project operation environment data of the project pass verification.
8. The automated item verification device of claim 5, further comprising:
and the verification triggering unit is used for generating a project risk verification triggering instruction after monitoring that the project is deployed online or generating the project risk verification triggering instruction when a preset timer reaches a set time.
9. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the steps of the method of automatically verifying a project as claimed in any one of claims 1 to 4 are carried out when the program is executed by the processor.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method for automated verification of a project according to any one of claims 1 to 4.
CN202110392865.7A 2021-04-13 2021-04-13 Project automatic verification method and device Active CN113094270B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110392865.7A CN113094270B (en) 2021-04-13 2021-04-13 Project automatic verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110392865.7A CN113094270B (en) 2021-04-13 2021-04-13 Project automatic verification method and device

Publications (2)

Publication Number Publication Date
CN113094270A true CN113094270A (en) 2021-07-09
CN113094270B CN113094270B (en) 2024-03-26

Family

ID=76676548

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110392865.7A Active CN113094270B (en) 2021-04-13 2021-04-13 Project automatic verification method and device

Country Status (1)

Country Link
CN (1) CN113094270B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050283751A1 (en) * 2004-06-18 2005-12-22 International Business Machines Corporation Method and apparatus for automated risk assessment in software projects
CN109273061A (en) * 2018-09-04 2019-01-25 广西金域医学检验实验室有限公司 Regular correctness verification method and device, the computer readable storage medium of medical inspection project
CN109615211A (en) * 2018-12-05 2019-04-12 南方电网科学研究院有限责任公司 A kind of Project Risk Assessment system, method and a kind of storage medium
CN109816221A (en) * 2019-01-07 2019-05-28 平安科技(深圳)有限公司 Decision of Project Risk method, apparatus, computer equipment and storage medium
CN110119882A (en) * 2019-04-12 2019-08-13 国家计算机网络与信息安全管理中心 A kind of platform risk monitoring and control method, apparatus, equipment and storage medium
CN111105150A (en) * 2019-12-10 2020-05-05 广州电力工程监理有限公司 Project risk analysis system
CN111680855A (en) * 2019-07-01 2020-09-18 国网信息通信产业集团有限公司 Automatic risk detection and early warning method and system for whole process of project

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050283751A1 (en) * 2004-06-18 2005-12-22 International Business Machines Corporation Method and apparatus for automated risk assessment in software projects
CN109273061A (en) * 2018-09-04 2019-01-25 广西金域医学检验实验室有限公司 Regular correctness verification method and device, the computer readable storage medium of medical inspection project
CN109615211A (en) * 2018-12-05 2019-04-12 南方电网科学研究院有限责任公司 A kind of Project Risk Assessment system, method and a kind of storage medium
CN109816221A (en) * 2019-01-07 2019-05-28 平安科技(深圳)有限公司 Decision of Project Risk method, apparatus, computer equipment and storage medium
CN110119882A (en) * 2019-04-12 2019-08-13 国家计算机网络与信息安全管理中心 A kind of platform risk monitoring and control method, apparatus, equipment and storage medium
CN111680855A (en) * 2019-07-01 2020-09-18 国网信息通信产业集团有限公司 Automatic risk detection and early warning method and system for whole process of project
CN111105150A (en) * 2019-12-10 2020-05-05 广州电力工程监理有限公司 Project risk analysis system

Also Published As

Publication number Publication date
CN113094270B (en) 2024-03-26

Similar Documents

Publication Publication Date Title
CN110908875B (en) Inspection method and device based on operation terminal
CN108683679B (en) Multi-account login method, device, equipment and storage medium of Web APP
CN110956956A (en) Voice recognition method and device based on policy rules
CN112784112A (en) Message checking method and device
CN111078506A (en) Business data batch running task monitoring method and device
CN112035676B (en) User operation behavior knowledge graph construction method and device
CN111367561B (en) Remote development method and device for software program
CN111262747B (en) Internet of things-based equipment network access control method and Internet of things platform
CN111767558A (en) Data access monitoring method, device and system
CN113094270B (en) Project automatic verification method and device
CN114285657B (en) Firewall security policy change verification method and device
CN113515447A (en) System automation test method and device
CN114840421A (en) Log data processing method and device
CN113377385A (en) Client automatic deployment method and device
CN113791984A (en) Automatic interface testing method and device
CN111953847A (en) Client message risk reminding method, device and system
CN113158259A (en) Block chain integrity verification method and device
CN113127370A (en) Report system smoking test method, RPA robot and system
CN112101810A (en) Risk event control method, device and system
CN111158744B (en) Cross-platform heterogeneous data integration method and device
CN112766827A (en) Automatic processing method and device for asset inventory data
CN113342501B (en) System fault processing method and device
CN114880229A (en) Batch file testing method and device
CN113609017A (en) Interface test case generation method and device
CN113050943A (en) Code verification method and device based on local development environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant