CN113568657A - Icon configuration method, icon configuration system, electronic device, and medium - Google Patents

Icon configuration method, icon configuration system, electronic device, and medium Download PDF

Info

Publication number
CN113568657A
CN113568657A CN202110890175.4A CN202110890175A CN113568657A CN 113568657 A CN113568657 A CN 113568657A CN 202110890175 A CN202110890175 A CN 202110890175A CN 113568657 A CN113568657 A CN 113568657A
Authority
CN
China
Prior art keywords
information
icon
identification information
configuration
identification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110890175.4A
Other languages
Chinese (zh)
Inventor
高国峰
赵水潮
弋辛博
潘瑞阁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
ICBC Technology Co Ltd
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
ICBC Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC, ICBC Technology Co Ltd filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202110890175.4A priority Critical patent/CN113568657A/en
Publication of CN113568657A publication Critical patent/CN113568657A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/70Software maintenance or management
    • G06F8/71Version control; Configuration management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/38Creation or generation of source code for implementing user interfaces

Abstract

The present disclosure provides an icon configuring method, an icon configuring system, an electronic device, a computer-readable storage medium, and a computer program. The icon configuration method and the icon configuration system can be used in the technical field of software development. The icon configuration method comprises the following steps: maintaining configuration information of the icons; storing the configuration information to a database; receiving request information from a user system; identifying the request information, and calling the corresponding configuration information from the database according to the request information; and loading the configuration information to a user system to complete icon configuration.

Description

Icon configuration method, icon configuration system, electronic device, and medium
Technical Field
The present disclosure relates to the field of software development technologies, and in particular, to an icon configuration method, an icon configuration system, an electronic device, a computer-readable storage medium, and a computer program.
Background
At present, in most software systems, icon information can be flexibly modified for functional icons in the development process: requirements such as icon position, icon style, function name, and jump path; meanwhile, in order to meet the release requirements of A/B testing, function emergency shielding and the like, the software system can flexibly configure the display state of the function icon and display the user range. However, some software systems currently maintain information such as icon styles and icon positions in static resources on the front end or the mobile end, and the information needs to be updated to perform the icon information maintenance, display or shielding.
Disclosure of Invention
In view of the above, the present disclosure provides a simple, resource-saving, short-time, and efficient icon configuring method, icon configuring system, electronic device, computer-readable storage medium, and computer program.
One aspect of the present disclosure provides an icon configuring method, including: maintaining configuration information of the icons; storing the configuration information to a database; receiving request information from a user system; identifying the request information, and calling the corresponding configuration information from the database according to the request information; and loading the configuration information to a user system to complete icon configuration.
According to the icon configuration method, the problems that the existing system needs to repeatedly code and reissue versions when icon configuration information is updated can be solved, and the repeated coding and reissuing versions are not needed in the icon configuration method, so that the icon configuration time can be shortened, and the manpower and resource consumption brought by configuration information modification is reduced; meanwhile, the method is simple and convenient to operate and takes effect immediately, and therefore working efficiency can be improved.
In addition, system developers and operators do not need to develop codes by operating the relevant configuration information of the icons, so that the requirements on professional technologies of the system developers and the operators can be reduced. Meanwhile, the icon configuration is fast in effect, and the icon can be updated without being sensed, so that the user experience is improved.
In some embodiments, the configuration information includes first identification information, the request information includes second identification information, the identifying the request information, the retrieving the corresponding configuration information from the database according to the request information includes: identifying the second identification information in the request information; matching the first identification information paired with the second identification information in a database; and calling the corresponding configuration information according to the matched first identification information.
In some embodiments, the second identification information comprises a user login area of the user system, the first identification information comprises identification information of whether configuration information is loaded in the user login area, and the matching the first identification information paired with the second identification information in the database comprises: matching the first identification information paired with the user login area in a database, wherein the first identification information paired with the user login area includes: and loading the identification information of the configuration information in the user login area.
In some embodiments, the second identification information includes user login information, the first identification information includes identification information of whether configuration information is loaded in a user system corresponding to the user login information, and the matching the first identification information paired with the second identification information in the database includes: matching the first identification information paired with the user identity information in a database, wherein the first identification information paired with the user identity information includes: and loading the identification information of the configuration information in the user system corresponding to the user login information.
In some embodiments, the identifying the request information, the retrieving the corresponding configuration information from the database according to the request information includes: identifying whether the request information has a unique identification for user login; and when the unique identification of user login exists in the request information, calling the configuration information corresponding to the unique identification from the database according to the unique identification.
In some embodiments, the identifying the request information, and retrieving the corresponding configuration information from the database according to the request information further comprises: and when the unique identification of user login does not exist in the request information, calling the configuration information corresponding to the area parameter from the database according to the area parameter in the request information.
In some embodiments, the configuration information includes at least one of a unique identifier, a function name, a function category, a service description, an icon style, a jump mode, a jump address, a jump parameter, whether a user login is required for a current function, whether a real name is required, a display area, a display arrangement order, and whether an unregistered state is presented.
Another aspect of the present disclosure provides an icon configuring system, including: the information maintenance module is used for maintaining the configuration information of the icons; the information storage module is used for storing the configuration information to a database; the information receiving module is used for receiving request information from a user system; the identification calling module is used for identifying the request information and calling the corresponding configuration information from the database according to the request information; and the icon loading module is used for loading the configuration information to a user system to complete icon configuration.
Another aspect of the present disclosure provides an electronic device comprising one or more processors and one or more memories, wherein the memories are configured to store executable instructions that, when executed by the processors, implement the method as described above.
Another aspect of the present disclosure provides a computer-readable storage medium storing computer-executable instructions for implementing the method as described above when executed
Another aspect of the disclosure provides a computer program comprising computer executable instructions for implementing the method as described above when executed.
Drawings
The above and other objects, features and advantages of the present disclosure will become more apparent from the following description of embodiments of the present disclosure with reference to the accompanying drawings, in which:
fig. 1 schematically illustrates an exemplary system architecture to which the icon configuration method, icon configuration system, may be applied, according to an embodiment of the present disclosure;
FIG. 2 schematically illustrates a flow chart of an icon configuration method according to an embodiment of the disclosure;
FIG. 3 schematically illustrates a flow chart for identifying request information and retrieving corresponding configuration information from a database according to the request information, according to one embodiment of the present disclosure;
FIG. 4 schematically illustrates a flow diagram of matching first identification information paired with second identification information in a database according to one embodiment of the present disclosure;
FIG. 5 schematically illustrates a flow diagram of matching first identification information paired with second identification information in a database according to another embodiment of the present disclosure;
FIG. 6 schematically illustrates a flow diagram for matching first identification information paired with second identification information in a database according to yet another embodiment of the present disclosure;
FIG. 7 schematically illustrates a flow chart for identifying request information and retrieving corresponding configuration information from a database according to the request information, according to another embodiment of the present disclosure;
FIG. 8 schematically illustrates a block diagram of an icon configuration system according to an embodiment of the present disclosure;
fig. 9 schematically shows a block diagram of an electronic device according to an embodiment of the disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure. In the technical scheme of the disclosure, the acquisition, storage, application and the like of the personal information of the related user all accord with the regulations of related laws and regulations, necessary security measures are taken, and the customs of the public order is not violated.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
Where a convention analogous to "A, B or at least one of C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B or C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). The terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, features defined as "first", "second", may explicitly or implicitly include one or more of the described features.
At present, in most software systems, icon information can be flexibly modified for functional icons in the development process: requirements such as icon position, icon style, function name, and jump path; meanwhile, in order to meet the release requirements of A/B testing, function emergency shielding and the like, the software system can flexibly configure the display state of the function icon and display the user range. However, some software systems currently maintain information such as icon styles and icon positions in static resources on the front end or the mobile end, and the information needs to be updated to perform the icon information maintenance, display or shielding.
In order to realize functions such as A/B testing, most software systems are carried out in a gray release mode, namely, a new system and an old system are simultaneously on-line, and requests of different users are forwarded to corresponding systems according to a routing strategy, and the process can be carried out only by consuming higher hardware and human resources. When the icon information needs to be changed, the software system needs to be redeployed, the time period is long, and the operation process is complicated. When the software system needs to perform gray scale release on a new function, the required labor and resource costs are relatively high, and the consumed time is long.
Embodiments of the present disclosure provide an icon configuring method, an icon configuring system, an electronic device, a computer-readable storage medium, and a computer program. The icon configuration method comprises the following steps: maintaining configuration information of the icons; storing the configuration information to a database; receiving request information from a user system; identifying request information, and calling corresponding configuration information from a database according to the request information; and loading the configuration information to the user system to complete the icon configuration.
It should be noted that the icon configuring method, the icon configuring system, the electronic device, the computer readable storage medium, and the computer program of the present disclosure may be used in the field of software development, and may also be used in any field other than the field of software development, such as the financial field, and the field of the present disclosure is not limited herein.
Fig. 1 schematically illustrates an exemplary system architecture 100 to which the icon configuring method, the icon configuring system, the electronic device, the computer-readable storage medium, and the computer program may be applied, according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of a system architecture to which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, and does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, the system architecture 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104 and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have installed thereon various communication client applications, such as shopping-like applications, web browser applications, search-like applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (for example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and perform other processing on the received data such as the user request, and feed back a processing result (e.g., a webpage, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the icon configuring method provided by the embodiment of the present disclosure may be generally executed by the server 105. Accordingly, the icon configuration system provided by the embodiments of the present disclosure may be generally disposed in the server 105. The icon configuration method provided by the embodiment of the present disclosure may also be executed by a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the icon configuration system provided by the embodiment of the present disclosure may also be disposed in a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
The icon configuring method according to the embodiment of the present disclosure will be described in detail below with reference to fig. 2 to 7 based on the scenario described in fig. 1.
Fig. 2 schematically shows a flow chart of an icon configuring method according to an embodiment of the present disclosure.
As shown in fig. 2, the icon configuring method of this embodiment includes operations S210 to S250.
In operation S210, configuration information of the icon is maintained.
In operation S220, the configuration information is stored to a database. It should be noted that the configuration information is a basis of icon configuration, and as some specific examples, the configuration information may include at least one of a unique identifier, a function name, a function category, a service description, an icon style, a jump mode, a jump address, a jump parameter, whether a user login is required for checking a current function, whether a real name is required, a display area, a display arrangement order, and whether an un-logged-in state is shown.
The unique identification can be understood as a unique address of the icon, and each unique identification corresponds to a unique icon; the function name may be understood as a name of a function that the icon has; the function category may be understood as a category to which the function of the icon belongs; the service description may be understood as a detailed description of the functions that the icons have; the icon style can be understood as the display style of the icon; the jump mode can be understood as a mode of icon jump, such as HTML jump or native jump; the jump address can be understood as an address to which the user will jump after clicking the icon; whether the current function requires user login can be checked to be understood as whether the user needs to login after clicking the icon; whether the real name is needed or not can be understood as whether real name authentication is needed or not after the icon is clicked; the display area can be understood as a display area of an icon style; the display arrangement order can be understood as the arrangement order of the icon styles in the display area; whether or not the unregistered state is presented may be understood as whether or not the icon style is presented in the display area in the unregistered state.
Therefore, the configuration information of the icon is maintained and stored in the database, so that basic preparation can be made for icon configuration, and the icon configuration can be completed conveniently.
In operation S230, request information from a user system is received. The request information may be understood as information that the user system requests the icon configuration.
In operation S240, the request information is identified, and corresponding configuration information is called from the database according to the request information. The request information may include second identification information, and the configuration information may also include first identification information. As a possible implementation manner, as shown in fig. 3, the operation S240 of identifying the request information and retrieving the corresponding configuration information from the database according to the request information includes operations S241 to S243.
In operation S241, second identification information in the request information is identified.
In operation S242, first identification information paired with second identification information is matched in a database. It is understood that the first identification information in the configuration information and the second identification information in the request information are corresponding, and the first identification information can be matched according to the identified second identification information.
In operation S243, corresponding configuration information is called according to the matched first identification information. It can be understood that each configuration information includes corresponding first identification information, and the configuration information requested by the user system can be obtained after matching with the first identification information.
In operation S250, configuration information is loaded to the user system to complete the icon configuration.
According to the icon configuration method of the embodiment of the disclosure, through the operation S210-operation S250, the problems that the existing system needs to repeat coding and reissue versions when updating the icon configuration information can be solved, and the icon configuration method does not need to repeat coding and reissue versions, so that the icon configuration time can be reduced, and the manpower and resource consumption brought by configuration information modification is reduced; meanwhile, the method is simple and convenient to operate and takes effect immediately, and therefore working efficiency can be improved.
In addition, system developers and operators do not need to develop codes by operating the relevant configuration information of the icons, so that the requirements on professional technologies of the system developers and the operators can be reduced. Meanwhile, the icon configuration is fast in effect, and the icon can be updated without being sensed, so that the user experience is improved.
The second identification information may include a user login area of the user system, and the first identification information includes identification information of whether the configuration information is loaded in the user login area. In some specific examples, as shown in fig. 4, the operation S242 of matching the first identification information paired with the second identification information in the database includes an operation S2421.
In operation S2421, first identification information paired with a user login area is matched in a database, wherein the first identification information paired with the user login area includes: and loading the identification information of the configuration information in the user login area. It is to be understood that the user login area may be understood as an area where the user logs in, for example, the area may be shanghai, the area may also be beijing, and the like. The first identification information can be understood as identification information of whether configuration information corresponding to the first identification information is loaded to a user system, and if the identification information is positive, the configuration information is loaded on the user system; and if the identification information is not, not loading the configuration information in the user system.
The second identification information may also include user login information, and the first identification information includes identification information of whether the configuration information is loaded in the user system corresponding to the user login information. In other specific examples, as shown in fig. 5, the operation S242 of matching the first identification information paired with the second identification information in the database includes an operation S2422.
In operation S2422, first identification information paired with the user identity information is matched in the database, wherein the first identification information paired with the user identity information includes: and loading the identification information of the configuration information in the user system corresponding to the user login information. It is understood that the user login information may be understood as identity information of the user login, including but not limited to a user name and an identification number. The first identification information can be understood as identification information of whether configuration information corresponding to the first identification information is loaded to a user system, and if the identification information is positive, the configuration information is loaded on the user system; and if the identification information is not, not loading the configuration information in the user system.
The second identification information may further include a user login area and user login information of the user system, the first identification information includes identification information of whether to load the configuration information in the user login area, and the first identification information also includes identification information of whether to load the configuration information in the user system corresponding to the user login information. In still other specific examples, as shown in fig. 6, the matching of the first identification information paired with the second identification information in the database in operation S242 includes operations S2423 to S2424.
In operation S2423, first identification information paired with the user login area is matched in the database, wherein the first identification information paired with the user login area includes: and loading the identification information of the configuration information in the user login area. It is to be understood that the user login area may be understood as an area where the user logs in, for example, the area may be shanghai, the area may also be beijing, and the like. The first identification information can be understood as identification information of whether configuration information corresponding to the first identification information is loaded to a user system, and if the identification information is positive, the configuration information is loaded on the user system; and if the identification information is not, not loading the configuration information in the user system.
In operation S2424, first identification information paired with the user identity information is matched in the database, wherein the first identification information paired with the user identity information includes: and loading the identification information of the configuration information in the user system corresponding to the user login information. It is understood that the user login information may be understood as identity information of the user login, including but not limited to a user name and an identification number. The first identification information can be understood as identification information of whether configuration information corresponding to the first identification information is loaded to a user system, and if the identification information is positive, the configuration information is loaded on the user system; and if the identification information is not, not loading the configuration information in the user system.
It should be noted that operations S2423 and S2424 cannot be understood as an operation sequence, and in some examples, operation S2423 may be performed first, and then operation S2424 may be performed; in other examples, operation S2424 may be performed first, and then operation S2423 may be performed.
Therefore, the icon corresponding to the area can be conveniently loaded in the specific area; in other words, differentiated icon configuration management can be conveniently realized for different areas and/or different user identities, namely certain functions can be opened or shielded for a specific user group in a customized manner, A/B test can be performed to a certain extent to replace gray release, and the problem that the consumption of the existing gray release technology on workload, server resources and the like is large is solved.
As another possible implementation manner, as shown in fig. 7, the operation S240 of identifying the request information and retrieving the corresponding configuration information from the database according to the request information includes operations S244 to S245.
In operation S244, it is identified whether there is a unique identification of the user login in the request information. It is understood that the request message may include a unique identifier of the user login, and the unique identifier of the user login may be understood as unique identity information corresponding to the user, including but not limited to a name and an identification number.
In operation S245, when the unique identifier of the user login exists in the request information, the configuration information corresponding to the unique identifier is retrieved from the database according to the unique identifier. When the unique identifier of the user login exists in the request information, the configuration information corresponding to the unique identifier can be called from the database and loaded into the user system corresponding to the user.
Therefore, the icon corresponding to the user identity can be conveniently loaded in the user system with different user identities, so that the authority management of icon configuration is realized, in other words, the differential icon configuration management can be conveniently realized aiming at different user identities, namely, certain functions can be customized to be opened or shielded for a specific user group, A/B test can be performed to a certain extent to replace gray scale publishing, and the problem that the existing gray scale publishing technology has large consumption on workload, server resources and the like is solved.
Further, as shown in fig. 7, the operation S240 of identifying the request information and retrieving the corresponding configuration information from the database according to the request information further includes an operation S246.
In operation S246, when the unique identifier of the user login does not exist in the request information, the configuration information corresponding to the area parameter is retrieved from the database according to the area parameter in the request information. When the unique identification of the user login does not exist in the request information, the area parameter can be obtained from the request information, and the area parameter can be understood as the area information where the user system sending the request information is located, such as areas in Beijing, Shanghai and the like, and after the area parameter in the request information is identified, the configuration information corresponding to the area parameter is called from the database and loaded into the user system corresponding to the user.
Therefore, the icon corresponding to the specific area can be conveniently loaded in the specific area, so that the authority management of icon configuration is realized, in other words, the differentiated icon configuration management can be conveniently realized aiming at different areas, namely, certain functions can be customized to be opened or shielded for a specific user group, the A/B test can be performed to a certain extent to replace the gray scale distribution, and the problem that the existing gray scale distribution technology has large consumption on workload, server resources and the like is solved.
Based on the icon configuration method, the present disclosure also provides an icon configuration system 10. The icon configuring system 10 will be described in detail below with reference to fig. 8.
Fig. 8 schematically shows a block diagram of the icon configuring system 10 according to an embodiment of the present disclosure.
The icon configuration system 10 comprises an information maintenance module 1, an information storage module 2, an information receiving module 3, an identification calling module 4 and an icon loading module 5.
The information maintenance module 1 is configured to perform operation S210: configuration information for the icons is maintained.
The information storage module 2 is configured to perform operation S220: the configuration information is stored to a database.
The information receiving module 3 is configured to perform operation S230: request information is received from a user system.
The recognition invoking module 4 is configured to perform operation S240: and identifying the request information, and calling corresponding configuration information from the database according to the request information.
The icon loading module 5 is configured to perform operation S250: the configuration information is loaded to the user system to complete the icon configuration.
Since the icon configuring system 10 is configured based on the icon configuring method, the beneficial effects of the icon configuring system 10 are the same as those of the icon configuring method, and are not described herein again.
In addition, according to the embodiment of the present disclosure, any plurality of the information maintenance module 1, the information storage module 2, the information receiving module 3, the identification and retrieval module 4, and the icon loading module 5 may be combined and implemented in one module, or any one of them may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module.
According to the embodiment of the present disclosure, at least one of the information maintenance module 1, the information storage module 2, the information receiving module 3, the identification retrieval module 4, and the icon loading module 5 may be at least partially implemented as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented by hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or implemented by any one of three implementation manners of software, hardware, and firmware, or implemented by a suitable combination of any several of them.
Alternatively, at least one of the information maintenance module 1, the information storage module 2, the information reception module 3, the identification invocation module 4 and the icon loading module 5 may be at least partially implemented as a computer program module, which, when executed, may perform a corresponding function.
The icon configuration system according to the embodiment of the present disclosure is described in detail below, and it is to be understood that the following description is only exemplary and not a specific limitation of the present disclosure.
The embodiment of the disclosure provides an icon configuration system. The system consists of three parts, namely a dynamic loading module, an icon processing module and a background management module.
A background management module: when a user system integrates the disclosed icon configuration system, firstly, the related configuration information of the icon needs to be maintained in an icon management interface of a background management module, and the related configuration information comprises information such as unique identifier of the icon, function name, function category, service description, icon style, skip mode, skip address, skip parameter, checking whether the current function needs user login and needs user real name, and whether a display area, sequential arrangement and a non-login state are displayed. Meanwhile, the relevant configuration information of whether the current function entry icon is displayed or which users are displayed or shielded can be maintained in the icon management interface. And after the parameters are maintained, the background management module automatically maintains the relevant configuration information to the database.
A dynamic loading module: the dynamic loading module is used for sending an icon acquisition request of a user system (front end or mobile end) and automatically loading the acquired icon information to a user system interface. When a user opens a system interface for the first time or refreshes the system interface, the dynamic loading module automatically sends a request containing parameters such as areas, user login information and the like according to the position of the interface where the user is located and the user login state to acquire an icon, and after the icon information is acquired, the dynamic loading module loads the icon according to the returned sequence, style, name, skip mode, login mode, real-name verification mode and the like of the acquired icon information list.
An icon processing module: the module is mainly responsible for reading and processing the maintained icon configuration information data. When a request for acquiring the icon information is received, the module can check whether the unique identification of the user exists in the request parameter, if not, the module can query the database according to the area parameter in the request parameter and return detailed configuration information of all icons which can be displayed when the icons are not logged in the corresponding area, so that a system interface can be loaded and displayed; if the unique identification of the user exists in the request parameter, the icon processing module queries the database to query all icon configuration information of the corresponding area and automatically filters the icon configuration information to screen out the icon information of which the current user has the authority, and finally returns the details of the filtered icon configuration information to the system interface for loading and displaying.
When a user system needs to add, modify, delete and the like icons, only the relevant configuration information needs to be modified on an icon management interface of the background management module, and codes of a front end, a mobile end or a back end do not need to be modified.
Fig. 9 schematically shows a block diagram of an electronic device adapted to implement the icon configuration method according to an embodiment of the present disclosure.
As shown in fig. 9, an electronic apparatus 900 according to an embodiment of the present disclosure includes a processor 901 which can perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)902 or a program loaded from a storage portion 908 into a Random Access Memory (RAM) 903. Processor 901 may comprise, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 901 may also include on-board memory for caching purposes. The processor 901 may comprise a single processing unit or a plurality of processing units for performing the different actions of the method flows according to embodiments of the present disclosure.
In the RAM903, various programs and data necessary for the operation of the electronic apparatus 900 are stored. The processor 901, the ROM 902, and the RAM903 are connected to each other through a bus 904. The processor 901 performs various operations of the method flows according to the embodiments of the present disclosure by executing programs in the ROM 902 and/or the RAM 903. Note that the programs may also be stored in one or more memories other than the ROM 902 and the RAM 903. The processor 901 may also perform various operations of the method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
Electronic device 900 may also include input/output (I/O) interface 905, input/output (I/O) interface 905 also connected to bus 904, according to an embodiment of the present disclosure. The electronic device 900 may also include one or more of the following components connected to the I/O interface 905: an input portion 906 including a keyboard, a mouse, and the like; an output section 907 including components such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage portion 908 including a hard disk and the like; and a communication section 909 including a network interface card such as a LAN card, a modem, or the like. The communication section 909 performs communication processing via a network such as the internet. The driver 910 is also connected to an input/output (I/O) interface 905 as necessary. A removable medium 911 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 910 as necessary, so that a computer program read out therefrom is mounted into the storage section 908 as necessary.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, a computer-readable storage medium may include the ROM 902 and/or the RAM903 described above and/or one or more memories other than the ROM 902 and the RAM 903.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the method illustrated in the flow chart. The program code is for causing a computer system to perform the methods of the embodiments of the disclosure when the computer program product is run on the computer system.
The computer program performs the above-described functions defined in the system/apparatus of the embodiments of the present disclosure when executed by the processor 901. The systems, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In one embodiment, the computer program may be hosted on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed in the form of a signal on a network medium, and downloaded and installed through the communication section 909 and/or installed from the removable medium 911. The computer program containing program code may be transmitted using any suitable network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 909, and/or installed from the removable medium 911. The computer program, when executed by the processor 901, performs the above-described functions defined in the system of the embodiment of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In accordance with embodiments of the present disclosure, program code for executing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, these computer programs may be implemented using high level procedural and/or object oriented programming languages, and/or assembly/machine languages. The programming language includes, but is not limited to, programming languages such as Java, C + +, python, the "C" language, or the like. The program code may execute entirely on the user computing device, partly on the user device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.

Claims (11)

1. An icon configuring method, comprising:
maintaining configuration information of the icons;
storing the configuration information to a database;
receiving request information from a user system;
identifying the request information, and calling the corresponding configuration information from the database according to the request information; and
and loading the configuration information to a user system to complete icon configuration.
2. The method of claim 1, wherein the configuration information comprises first identification information, wherein the request information comprises second identification information, wherein the identifying the request information, and wherein retrieving the corresponding configuration information from the database according to the request information comprises:
identifying the second identification information in the request information;
matching the first identification information paired with the second identification information in a database; and
and calling the corresponding configuration information according to the matched first identification information.
3. The method of claim 2, wherein the second identification information comprises a user login area of the user system, wherein the first identification information comprises identification information of whether configuration information is loaded in the user login area, and wherein matching the first identification information paired with the second identification information in the database comprises:
matching the first identification information paired with the user login area in a database, wherein the first identification information paired with the user login area includes: and loading the identification information of the configuration information in the user login area.
4. The method of claim 2 or 3, wherein the second identification information comprises user login information, the first identification information comprises identification information of whether configuration information is loaded in a user system corresponding to the user login information, and the matching of the first identification information paired with the second identification information in the database comprises:
matching the first identification information paired with the user identity information in a database, wherein the first identification information paired with the user identity information includes: and loading the identification information of the configuration information in the user system corresponding to the user login information.
5. The method of claim 1, wherein the identifying the request information, and the retrieving the corresponding configuration information from the database according to the request information comprises:
identifying whether the request information has a unique identification for user login; and
and when the unique identification of user login exists in the request information, calling the configuration information corresponding to the unique identification from the database according to the unique identification.
6. The method of claim 5, wherein the identifying the request information, and retrieving the corresponding configuration information from the database according to the request information further comprises: and when the unique identification of user login does not exist in the request information, calling the configuration information corresponding to the area parameter from the database according to the area parameter in the request information.
7. The method of claim 1, wherein the configuration information comprises at least one of a unique identifier, a function name, a function category, a service description, an icon style, a jump mode, a jump address, a jump parameter, checking whether a user login is required for a current function, whether a real name is required, a display area, a display arrangement order, and whether an unregistered state is presented.
8. An icon configuring system, comprising:
the information maintenance module is used for maintaining the configuration information of the icons;
the information storage module is used for storing the configuration information to a database;
the information receiving module is used for receiving request information from a user system;
the identification calling module is used for identifying the request information and calling the corresponding configuration information from the database according to the request information; and
an icon loading module to load the configuration information to a user system to complete icon configuration.
9. An electronic device, comprising:
one or more processors;
one or more memories for storing executable instructions that, when executed by the processor, implement the method of any of claims 1-7.
10. A computer-readable storage medium having stored thereon executable instructions that when executed by a processor implement a method according to any one of claims 1 to 7.
11. A computer program, characterized in that it comprises one or more executable instructions which, when executed by a processor, implement the method according to any one of claims 1 to 7.
CN202110890175.4A 2021-08-04 2021-08-04 Icon configuration method, icon configuration system, electronic device, and medium Pending CN113568657A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110890175.4A CN113568657A (en) 2021-08-04 2021-08-04 Icon configuration method, icon configuration system, electronic device, and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110890175.4A CN113568657A (en) 2021-08-04 2021-08-04 Icon configuration method, icon configuration system, electronic device, and medium

Publications (1)

Publication Number Publication Date
CN113568657A true CN113568657A (en) 2021-10-29

Family

ID=78170318

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110890175.4A Pending CN113568657A (en) 2021-08-04 2021-08-04 Icon configuration method, icon configuration system, electronic device, and medium

Country Status (1)

Country Link
CN (1) CN113568657A (en)

Similar Documents

Publication Publication Date Title
CN113946425A (en) Service processing method and device, electronic equipment and computer readable storage medium
CN115587575A (en) Data table creation method, target data query method, device and equipment
CN112463729A (en) Data file storage method and device, electronic equipment and medium
CN114237651A (en) Installation method and device of cloud native application, electronic equipment and medium
CN111859077A (en) Data processing method, device, system and computer readable storage medium
CN113535577A (en) Application testing method and device based on knowledge graph, electronic equipment and medium
US11182144B2 (en) Preventing database package updates to fail customer requests and cause data corruptions
CN115033634A (en) Data acquisition method, data acquisition device, electronic equipment and medium
CN113568657A (en) Icon configuration method, icon configuration system, electronic device, and medium
CN114237765A (en) Functional component processing method and device, electronic equipment and medium
CN115203178A (en) Data quality inspection method and device, electronic equipment and storage medium
CN113032256A (en) Automatic test method, device, computer system and readable storage medium
CN113392311A (en) Field searching method, field searching device, electronic equipment and storage medium
CN113495498A (en) Simulation method, simulator, device, and medium for hardware device
CN116401319B (en) Data synchronization method and device, electronic equipment and computer readable storage medium
CN114285743B (en) Method, device, electronic equipment and storage medium for updating configuration information
CN113535568B (en) Verification method, device, equipment and medium for application deployment version
CN117743353A (en) Data updating method, device, equipment and storage medium
CN114416552A (en) Unit testing method, unit testing device, electronic equipment and storage medium
CN114254621A (en) Document auditing method and device, electronic equipment and storage medium
CN115878901A (en) Code warehouse keyword searching method, device, equipment and storage medium
CN113568838A (en) Test data generation method, device, equipment, storage medium and program product
CN113760835A (en) Log management method, middlebox system, electronic device and storage medium
CN115098391A (en) Page detection method, device, equipment and medium
CN113535153A (en) Method, device, equipment and medium for encoding custom label

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination