CN114266547A - Method, device, equipment, medium and program product for identifying business processing strategy - Google Patents

Method, device, equipment, medium and program product for identifying business processing strategy Download PDF

Info

Publication number
CN114266547A
CN114266547A CN202111593056.9A CN202111593056A CN114266547A CN 114266547 A CN114266547 A CN 114266547A CN 202111593056 A CN202111593056 A CN 202111593056A CN 114266547 A CN114266547 A CN 114266547A
Authority
CN
China
Prior art keywords
processing strategy
service processing
information
input item
matching
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111593056.9A
Other languages
Chinese (zh)
Inventor
郑志超
李保仓
胡赞华
袁刚
李源
董全立
雷传涛
赵龙
徐志轩
周振朝
韩亚辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp filed Critical China Construction Bank Corp
Priority to CN202111593056.9A priority Critical patent/CN114266547A/en
Publication of CN114266547A publication Critical patent/CN114266547A/en
Pending legal-status Critical Current

Links

Images

Abstract

The disclosure provides a method for identifying a business processing strategy, which can be applied to the technical field of big data. The identification method of the business processing strategy comprises the following steps: generating a first matching parameter corresponding to the user input data through an input item constraint rule set corresponding to the user input data; when the first matching parameter is matched with a second matching parameter corresponding to the preset service processing strategy configuration, determining service processing strategy information corresponding to user input data; and analyzing the business process policy information to identify the business process policy. The disclosure also provides a device, an apparatus, a storage medium and a program product for identifying a business processing policy.

Description

Method, device, equipment, medium and program product for identifying business processing strategy
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method, an apparatus, a device, a medium, and a program product for identifying a service processing policy.
Background
When the information system processes input data/information, different business processing strategies are generally adopted according to different business requirements, and the differentiated processing strategies for various users of the system, such as how to process data, what data to output, what form to output data, and the like, are determined, so that various users of the system can better benefit from the construction and use of the information system. In practical applications, the correspondence between the user and the business process policy will explicitly reflect the functionality of the information system, and determine which services the system can provide for the user, and how to provide those services. Particularly, in the current big data era with mass information, a business processing strategy corresponding to user behaviors is accurately identified, which is a premise that an information system provides better service for users. In order to ensure that the information system can provide service functions meeting the expectations of users for different users, the information system needs to accurately identify service processing strategies corresponding to various users to meet the service needs of the users. Different data inputs of the same user correspond to different business processing strategies, and the same data inputs of different users may also correspond to different business processing strategies. In order to determine the business processing strategy of the user in the system, the system developer needs to identify various business processing strategies in a hard coding mode so as to determine how the system processes the user input and how to output the response.
Disclosure of Invention
In order to solve at least one of technical problems existing in the service processing strategy identification process corresponding to user behaviors in the prior art, the present disclosure provides a service processing strategy identification method, apparatus, device, medium, and program product, which can automatically match rules to realize high-precision identification of service processing strategies and improve development efficiency and maintainability of an information system.
According to a first aspect of the present disclosure, there is provided a method for identifying a business processing policy, including: generating a first matching parameter corresponding to the user input data through an input item constraint rule set corresponding to the user input data; when the first matching parameter is matched with a second matching parameter corresponding to the preset service processing strategy configuration, determining service processing strategy information corresponding to user input data; and analyzing the business process policy information to identify the business process policy.
According to an embodiment of the present disclosure, constraining a rule set by an entry corresponding to user input data includes: generating an input item set according to user input data; testing and matching constraint rule configuration information matched with the input item set to generate an input item constraint rule set corresponding to the input item set; and generating a first matching parameter by the input item constraint rule set.
According to an embodiment of the present disclosure, in generating a set of input items from user input data, includes: the user input data is analyzed to generate a plurality of input items in a key-value pair form, and the plurality of input items form an input item set.
According to the embodiment of the present disclosure, in performing test matching on configuration information according to a constraint rule matched with an input item set, and generating an input item constraint rule set corresponding to the input item set, the method includes: reading constraint rule configuration data of each input item in the input item set through the constraint rule configuration information; and performing test matching according to the method path of the constraint rule configuration data of each input item, generating input item constraint rules of the input items passing the test matching, and forming an input item constraint rule set corresponding to the input item constraint rules of the plurality of input items.
According to the embodiment of the present disclosure, in generating the first matching parameter by the entry constraint rule set, the method includes: and extracting the constraint rule code of each input item constraint rule in the input item constraint rule set to generate a first matching parameter.
According to the embodiment of the present disclosure, before determining the service processing policy information corresponding to the user input data when the first matching parameter matches with the second matching parameter corresponding to the preset service processing policy configuration, the method further includes: extracting a preset constraint rule code corresponding to each preset input item according to a preset constraint rule set corresponding to the preset service processing strategy configuration; and coding and generating a second matching parameter according to the extracted preset constraint rule.
According to the embodiment of the present disclosure, when the first matching parameter is matched with the second matching parameter corresponding to the preset service processing policy configuration, determining the service processing policy information corresponding to the user input data includes: matching the first matching parameter with the second matching parameter, and determining the service processing strategy configuration in the preset service processing strategy configuration corresponding to the second matching parameter; extracting a service processing strategy code configured by a service processing strategy; and retrieving the service processing strategy information according to the service processing strategy code.
According to an embodiment of the present disclosure, in analyzing the traffic handling policy information to identify the traffic handling policy, the method includes: and analyzing the service processing strategy information and identifying the service processing strategy corresponding to the user input data.
A second aspect of the present disclosure provides an apparatus for identifying a business process policy, including a parameter generation module, an information determination module, and a policy identification module. The parameter generation module is used for generating a first matching parameter corresponding to the user input data through an input item constraint rule set corresponding to the user input data; the information determining module is used for determining the service processing strategy information corresponding to the user input data when the first matching parameter is matched with a second matching parameter corresponding to the preset service processing strategy configuration; and the strategy identification module is used for analyzing the service processing strategy information to identify the service processing strategy.
A third aspect of the present disclosure provides an electronic device, comprising: one or more processors; a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the above-described method of identifying a business process policy.
The fourth aspect of the present disclosure also provides a computer-readable storage medium having stored thereon executable instructions, which when executed by a processor, cause the processor to perform the above-mentioned method for identifying a traffic handling policy.
The fifth aspect of the present disclosure also provides a computer program product comprising a computer program which, when executed by a processor, implements the above-mentioned method for identifying a traffic handling policy.
Drawings
The foregoing and other objects, features and advantages of the disclosure will be apparent from the following description of embodiments of the disclosure, which proceeds with reference to the accompanying drawings, in which:
fig. 1 schematically illustrates an application scenario diagram of a method, apparatus, device, medium and program product for identifying a traffic handling policy according to an embodiment of the present disclosure;
FIG. 2 schematically illustrates a flow chart of a method of identifying a traffic handling policy according to an embodiment of the present disclosure;
FIG. 3 schematically illustrates another flow diagram of a method of identifying a traffic handling policy according to an embodiment of the present disclosure;
FIG. 4 schematically illustrates yet another flow diagram of a method of identifying a traffic handling policy according to an embodiment of the present disclosure;
fig. 5 schematically shows a block diagram of the structure of a traffic handling policy identifying apparatus according to an embodiment of the present disclosure; and
fig. 6 schematically shows a block diagram of an electronic device adapted to implement the identification method of a traffic handling policy according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is illustrative only and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
An information system generally refers to a human-machine integrated system composed of computer hardware, network and communication equipment, computer software, information resources, information users, and regulations for the purpose of processing information streams. In short, an information system is a system that inputs data \ information and generates information through processing. The task of the information system is to utilize modern computers and network communication technology to enhance the information management of enterprises, to establish correct data through investigation and understanding of resources owned by the enterprises, such as manpower, material resources, financial resources, equipment, technology and the like, to process, compile and provide various information data to various users of the system in time, so as to provide services for various users of the system better and continuously improve the management level, service level and economic benefit of the enterprises.
In practical applications, the correspondence between the user and the business process policy will explicitly reflect the functionality of the information system, and determine which services the system can provide for the user, and how to provide those services. Particularly, in the current big data era with mass information, a business processing strategy corresponding to user behaviors is accurately identified, which is a premise that an information system provides better service for users.
In the existing information system construction, in order to ensure that the information system can provide service functions meeting user expectations for different users, the information system needs to accurately identify service processing strategies corresponding to various users to meet the service needs of the users. In order to determine the business processing strategy of a user in a system, currently, a system developer often processes input data of the user in a hard coding mode, confirms which business conditions are respectively met by user input items 1 to input items N through condition judgment codes, and then identifies various business processing strategies by combining the condition hard coding to determine how the system processes user input and how to perform response output. In other words, in order to identify the service needs of the user, hard codes corresponding to the input data need to be matched according to the input data of the user, and the identification of the service flow corresponding to the input data is realized through the hard codes.
However, the method for identifying the service processing policy by hard coding mainly has the following two significant problems: (1) when the system service types are more, hard coding parts for identifying various service processing strategies are more and more, the complexity of a code system is increased, and the maintainability and the readability of the code are greatly reduced; (2) the service processing strategy for newly adding the requirement to the system needs to be encoded and developed again, and the service requirement of the user cannot be responded in time. Therefore, the service processing strategy identification method in the prior art reduces the development efficiency of information system developers or operation and maintenance personnel and the maintainability of the system, and cannot adapt to the condition that services are more and the system is changed in the current big data environment and the development trend of the information system of rapid iteration.
In order to solve at least one of the above technical problems in the identification process of the business processing strategy in the prior art by means of hard coding, the present disclosure provides a method, an apparatus, a device, a medium, and a program product for identifying the business processing strategy.
It should be noted that the method and apparatus for identifying a business processing policy disclosed in the present disclosure may be used in the field of big data technology and artificial intelligence technology, and may also be used in any field other than the financial field and financial field.
In the technical scheme of the disclosure, the related processes of collecting, storing, using, processing, transmitting, providing, disclosing and applying the data including the personal information of the user are all in accordance with the regulations of related laws and regulations, necessary confidentiality measures are taken, and the public order and good custom are not violated. Wherein, before the personal information of the user is obtained or collected, the authorization or the consent of the user is obtained.
The embodiment of the disclosure provides a method for identifying a service processing policy, which includes: generating a first matching parameter corresponding to user input data; when the first matching parameter is matched with a second matching parameter corresponding to the preset service processing strategy configuration, determining service processing strategy information corresponding to user input data; and analyzing the business process policy information to identify the business process policy.
Fig. 1 schematically illustrates an application scenario diagram of a method, an apparatus, a device, a medium, and a program product for identifying a traffic handling policy according to an embodiment of the present disclosure.
As shown in fig. 1, the application scenario 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 serves as a medium for providing communication links between the terminal devices 101, 102, 103 and the server 105. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few.
The user may use the terminal devices 101, 102, 103 to interact with the server 105 via the network 104 to receive or send messages or the like. The terminal devices 101, 102, 103 may have installed thereon various communication client applications, such as shopping-like applications, web browser applications, search-like applications, instant messaging tools, mailbox clients, social platform software, etc. (by way of example only).
The terminal devices 101, 102, 103 may be various electronic devices having a display screen and supporting web browsing, including but not limited to smart phones, tablet computers, laptop portable computers, desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (for example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and perform other processing on the received data such as the user request, and feed back a processing result (e.g., a webpage, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the identification method of the business process policy provided by the embodiment of the present disclosure may be generally executed by the server 105. Accordingly, the identifying means of the business process policy provided by the embodiments of the present disclosure may be generally disposed in the server 105. The identification method of the service processing policy provided by the embodiment of the present disclosure may also be performed by a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Correspondingly, the identification device of the traffic handling policy provided by the embodiment of the present disclosure may also be disposed in a server or a server cluster different from the server 105 and capable of communicating with the terminal devices 101, 102, 103 and/or the server 105.
It should be understood that the number of terminal devices, networks, and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
The method for identifying a traffic handling policy of the disclosed embodiment will be described in detail below with reference to fig. 2 to 6 based on the scenario described in fig. 1.
Fig. 2 schematically shows a flow chart of a method of identifying a traffic handling policy according to an embodiment of the present disclosure.
As shown in fig. 2, the method for identifying a traffic processing policy of this embodiment includes operations S201 to S203.
Generating a first matching parameter corresponding to the user input data through an entry constraint rule set corresponding to the user input data in operation S201;
in operation S202, when the first matching parameter matches a second matching parameter corresponding to a preset service processing policy configuration, determining service processing policy information corresponding to user input data; and
in operation S203, the traffic processing policy information is analyzed to identify a traffic processing policy.
The business processing strategy is business processing flow information and processing configuration information required in the process of business processing corresponding to a business flow scene when the business processing strategy is required by user business or user service processing requirements, and the business requirements and the service processing requirements of users can be completed according to the business processing flow information and the processing configuration information.
The user input data is data which is generated in response to the input operation of the user on the terminal equipment and is related to business processing, is used for defining business processing needs or service processing needs of the user, and reflects business scenes of the user, such as business processing scenes of adding assets with deduction value preparation and accumulation depreciation. The first matching parameter is a parameter for identifying a service scenario corresponding to the user input data, and may specifically be a numerical value or a code. The first matching parameter may uniquely define a service processing scenario corresponding to the user input data. The input item constraint rule set is a set of constraint rules corresponding to the input business items in the user input data. The input item can be a conversion data item of the service item, so as to match corresponding constraint rules for different service directions.
The preset service processing strategy configuration is service processing strategy configuration information which is preset in a database and corresponds to different service processing scenes, for example, the set asset adding service processing strategy configuration information with the subtraction value preparation. The business processing strategy configuration information can be configured with at least one kind of business processing strategy information correspondingly, different kinds of business processing strategy information correspond to different business processing strategies, the business processing strategy information is strategy configuration information of the business processing strategies, and the strategy configuration information is used for matching business processing flow and processing configuration of the business processing strategies in the process of identifying the business processing strategies. The second matching parameter is a parameter identifying at least one service processing policy information configured by the preset service processing policy configuration, and may specifically be a numerical value or a code. The second matching parameter may uniquely define the business process or process configuration to which the business process policy information matches. Therefore, at least one type of service processing policy information may be configured corresponding to the preset service processing policy configuration, and each type of service processing policy information may correspond to one second matching parameter.
Therefore, when the first matching parameter and the second matching parameter are matched with each other, the service processing policy information corresponding to the identified preset service processing policy configuration can be determined according to the second matching parameter.
Analyzing the business processing strategy information, and acquiring information or data such as corresponding business processing flow and flow processing configuration, thereby defining a business flow scene corresponding to the user input data and completing the identification of the business processing strategy.
Therefore, the method for identifying the business processing policy is completed by directly determining the business processing policy information through the first matching parameter matched with the user input data and the second matching parameter matched with the preset business processing policy configuration, the traditional technology for processing the user input data in a hard coding mode can be abandoned, the complexity of a code system is greatly reduced, and the maintainability and readability of the code are enhanced; in addition, for a newly added service flow scene, different service processing strategy configuration information is only required to be set corresponding to the preset service processing strategy configuration, the recoding development work is avoided, and the service requirement of a user can be responded in time, so that the development efficiency and maintainability of the information system can be improved, the actual situation that the service is more and more in the current big data environment is facilitated to be adapted, and the development trend of the rapidly iterative information system is met.
Fig. 3 schematically illustrates another flow chart of a method of identifying a traffic handling policy according to an embodiment of the present disclosure.
According to an embodiment of the present disclosure, in the operation S201 of generating the first matching parameter corresponding to the user input data by the entry constraint rule set corresponding to the user input data, operations S301 to S303 are included
In operation S301, generating an input item set according to user input data;
in operation S302, performing test matching on the constraint rule configuration information matched with the input item set, and generating an input item constraint rule set corresponding to the input item set; and
in operation S303, a first matching parameter is generated by an entry constraint rule set.
The user can execute corresponding input operation according to the user input interface of the terminal equipment and the service indication information pushed by the system through the user input interface. And according to the input operation of the user, responding to the business instruction, and generating user input data related to the business requirements of the user, such as business requirement data of account book names, asset types, original values, reduced value preparations, responsibility centers, traceability, residual value types, residual value rates and the like. The input item is processing conversion data of the service item corresponding to the service demand data, and data processing is facilitated. The above account book name corresponding to a certain business requirement data is a corresponding business item in the business process scenario. The plurality of input items of the user input data corresponding to one business process scenario may constitute the input item set.
The different input item sets correspond to different constraint rule configuration information, the constraint rule configuration information is a constraint condition corresponding to the input item set and is used for constraining the configuration information of the input items, so that the constraint rule corresponding to each input item in the input item set is determined, and the input item constraint rules of all the input items form the input item constraint rule set. Specifically, the input item set needs to be tested and matched according to the constraint rule configuration information corresponding to the input item set, the process of testing and matching is to respectively test the constraint condition of each input item in the input item set, and if the test is passed, the constraint condition and the constraint rule configuration information matched with the constraint condition can be determined, so that the input item constraint rule of the input item is determined.
And respectively extracting all the input item constraint rules of all the input items in the input item constraint rule set, and generating a first matching parameter by taking the extracted data as a basis.
Therefore, the first matching parameters can be accurately acquired, so that the first matching parameters can correspond to the business process scenes corresponding to the user input data, hard coding processing on the business process information corresponding to the user input data is avoided, the complexity of a code system is reduced, the work of recoding development is avoided, and the business requirements are responded in time.
According to an embodiment of the present disclosure, generating a set of input items according to user input data in operation S301 includes:
the user input data is analyzed to generate a plurality of input items in a key-value pair form, and the plurality of input items form an input item set.
A plurality of input items in a key-value pair form (i.e., < K: V > form) may be generated by performing a business data parsing operation on user input data, for example, a business item is an account book name, and a corresponding input item is < bookmark name: XX _ account book >, the corresponding entry for which the business entry is an asset category is < cgyEcd: 01010101>, the corresponding entry with the service entry as the original value is < cost: 10000>, the corresponding entry for the traffic item to prepare for the subtraction value is < devialreserve: 200> and the corresponding input item with the service item as the responsibility center is < rspcnId: 754368>, the corresponding entry whether the service item is traced or not is < traceFlag: y >, the corresponding input item with the service item as the residual value type is < salvageType: 0>, the corresponding entry with the service entry as the residual value rate is < salvageRate: 0.01>, and the input items jointly form an input item set of the business process scene corresponding to the input data of the user.
Therefore, data conversion of the business items corresponding to the user input data can be realized, the data processing efficiency is improved, and meanwhile, the accuracy of the user input data and the corresponding business process can be ensured.
According to the embodiment of the present disclosure, in operation S302, performing test matching on the constraint rule configuration information matched with the input item set, and generating an input item constraint rule set corresponding to the input item set, includes:
reading constraint rule configuration data of each input item in the input item set through the constraint rule configuration information;
and performing test matching according to the method path of the constraint rule configuration data of each input item, generating input item constraint rules of the input items passing the test matching, and forming an input item constraint rule set corresponding to the input item constraint rules of the plurality of input items.
Different business items corresponding to one input item can be matched with corresponding constraint rule configuration data. Wherein the constraint rule configuration data is configuration data of a constraint condition related to a specific business process of the business item. For example, for the entry of the book name < bookmark name: XX _ account book >, whose corresponding constraint rule configuration data may include: and (3) constraint rule coding: BOOK _ RULE _001, constraint term name: account book rule 001, constraint item description: checking whether the account book is empty or not, and testing the type: method, method path: com.fac.rule.common.utils.isnotnull, expected results: 0, etc.; for the original value entry < cost: 10000> the constraint rule configuration data may include: and (3) constraint rule coding: COST _ RULE _001, constraint term name: original value rule 001, constraint item description: checking that the original value is larger than 0, and testing types are as follows: expression, expression value: cost > 0, expected result: 0, etc. That is, constraints such as constraint rule encodings, constraint term names, constraint term descriptions, test types, and expected effects, and their corresponding values or contents, may constitute the constraint rule configuration data.
And reading the constraint rule configuration information of each input item of all the input item sets, and determining the constraint rule configuration data of the corresponding input item. And then, aiming at each constraint rule configuration data, carrying out test matching according to a method path of a test type in the constraint rule configuration data corresponding to the input item, and taking the constraint conditions passing the test and corresponding numerical values or contents as the constraint rules of the input item corresponding to the input item. For example, for an input item of a business item of an account book name, a method path com.fac.rule.common.utility.isnotnull of data may be configured according to a constraint rule thereof, whether the account book name is null or not may be tested based on a test type of the method, and it may be defined that the account book name is null as a test failure and not null as a test failure. Therefore, an entry constraint rule with an account book name that is not empty can be obtained.
By analogy, for the input items corresponding to the business items such as the account book name, the asset type, the original value, the reduced value preparation, the responsibility center and the like, input item constraint rules such as the account book name not being empty, the asset type not being empty, the original value being greater than 0, the reduced value preparation being greater than 0, the responsibility center not being empty and the like can be generated through test matching respectively, and the input item constraint rules form an input item constraint rule set of the plurality of input items. Each input item constraint rule in the input item constraint rule set corresponds to one input item respectively and is used for describing the constraint rule or condition of the business item corresponding to the business processing flow of the input item.
Obviously, through the test matching process of the constraint rule configuration data, the generated constraint rule of the input item can be more matched with the constraint of the input item, and the business process scene corresponding to the input item can be more combined.
According to an embodiment of the present disclosure, generating the first matching parameter by the entry constraint rule set in operation S303 includes:
and extracting the constraint rule code of each input item constraint rule in the input item constraint rule set to generate a first matching parameter.
Corresponding to each input item, extracting the constraint rules of the input items from the constraint rule set of the input items, and obtaining the constraint rule codes of the constraint rule set of the input items corresponding to each input item, wherein the constraint rule codes are used for identifying the constraint rules of the input items and can be used as the reference codes of the constraint conditions of the input items. Further, encoding all the obtained multiple constraint rules corresponding to the constraint rule of the input item, the encoding processing tool such as MD5 can generate a first matching parameter uniquely referring to the constraint set of the input item, and specifically, the parameter form of the first matching parameter can be the form of HASH code.
Therefore, the business processing strategy of the user input data corresponding to the input item constraint rule set can be identified through the first matching parameter, and the identification code of the business processing strategy is formed.
Fig. 4 schematically illustrates yet another flowchart of a method of identifying a traffic handling policy according to an embodiment of the present disclosure.
According to the embodiment of the present disclosure, before determining the service processing policy information corresponding to the user input data when the first matching parameter is matched with the second matching parameter corresponding to the preset service processing policy configuration in operation S202, operation S401 to operation S402 are further included.
In operation S401, extracting a preset constraint rule code corresponding to each preset input item according to a preset constraint rule set corresponding to a preset service processing policy configuration;
in operation S402, a second matching parameter is encoded according to the extracted preset constraint rule.
The preset constraint rule of the input item can be extracted through the preset service processing strategy configuration in the database and through the relation between the input item defined in the preset service processing strategy configuration and the preset constraint rule set. Each preset constraint rule in the preset constraint rule set is used for describing the constraint condition of the input item, and is similar to the input item constraint rule. The preset business processing strategy configuration can configure all preset constraint rules of known input items, so that the preset constraint rules of the preset input items can be ensured.
Further, the preset constraint rule codes of the constraint configuration data in the corresponding preset constraint rule of each preset input item are extracted, all the preset constraint rule codes of the preset input items are freely combined and processed by the above coding processing tool such as MD5, so as to generate a plurality of matching parameters, wherein each matching parameter may correspond to a different business processing policy. Wherein the second matching parameter may be one of these matching parameters, corresponding to the business processing policy of the user input data of the embodiment of the present disclosure. For example, the constraint rule set of the preset input items corresponding to the second matching parameter may be configured such that the account book is not empty, the asset class is not empty, the original value is greater than 0, the reduction preparation is greater than 0, the responsibility center is not empty, and the like, and the parameter form of the second matching parameter is the same as the parameter form of the first matching parameter, or may be in the form of a HASH code.
Therefore, the business processing strategy can be preset by presetting business processing strategy configuration, the input item constraint rules can be flexibly configured aiming at different business processing strategies, the accurate identification of the processing strategy can be realized by automatically matching the rules, the development efficiency and the maintainability of an information system are improved, the change of the business processing strategy caused by the newly increased and changed business requirements can be realized by only establishing different combinations of the input item constraint rules, the identification response speed of the business processing strategy is improved, the code redundancy is reduced, and the maintenance is easier.
According to the embodiment of the present disclosure, when the first matching parameter is matched with the second matching parameter corresponding to the preset service processing policy configuration in operation S202, it is determined that the service processing policy information corresponding to the user input data includes operations S304 to S306.
In operation S304, the first matching parameter and the second matching parameter are matched, and a service processing policy configuration in the preset service processing policy configuration corresponding to the second matching parameter is determined;
in operation S305, extracting a service processing policy code configured by the service processing policy;
in operation S306, the service processing policy information is retrieved according to the service processing policy encoding.
The preset business processing policy configuration may be used to define the relationship between the input item and the preset constraint rule set, and may also describe the relationship between the input item and the corresponding business processing policy configuration. Different service processing policy configurations may be used to correspond to the service processing policy information, where the service processing policy information is policy information related to the service requirement of the service flow scenario, and the service processing policy configuration is configuration information of the service processing policy information.
When the first matching parameter and the second matching parameter are matched with each other, the corresponding service processing policy configuration may be obtained according to the second matching parameter, and specifically, when the HASH code of the first matching parameter is set to be equal to the HASH code of the second matching parameter, the matching may be defined as being matched with each other, otherwise, the matching is not matched. Wherein the business process policy configuration may be configuration data of an add-asset business process policy, such as with decrementing preparation.
Each service processing strategy configuration can extract a corresponding service processing strategy code, and the service processing strategy code is used for identifying the service processing strategy configuration and can also be used as a matching parameter of service processing strategy information corresponding to the service processing strategy configuration.
Therefore, the service processing strategy code configured according to the service processing strategy can retrieve the service processing strategy information corresponding to the service flow scene of the user input data from the database of the service processing strategy information, and the service processing strategy information can be, for example, an asset adding service processing strategy with the value reduction preparation.
The service processing strategy information is directly related to the service flow scene of the user input data, so that the service requirement of the user can be defined, and the accurate identification of the service processing strategy is facilitated.
According to an embodiment of the present disclosure, analyzing the traffic processing policy information to identify the traffic processing policy in operation S203 includes:
and analyzing the service processing strategy information and identifying the service processing strategy corresponding to the user input data.
Each business process scene corresponds to a plurality of different business events, the business events form a business event set, and the business event set of each business process scene is matched with the business processing strategy information thereof.
Therefore, the service event set defined in the service processing policy information, for example, the service event set defined by the service processing policy information of the asset adding service with decrementing preparation includes creating an asset card, generating entry information, sending auditing by an auditing center, and other service events, can be obtained according to the analysis result of the service processing policy information.
Each business event can correspond to a business process of the business processing strategy, and the business event set can be used for defining the business process scene of the business processing strategy, so that the identification process of the business processing strategy corresponding to the user input data is completed. When executing the business processing strategy, the business processing can be carried out according to the business event set obtained by processing the user input data, the execution of the user business processing strategy is completed, and the business service requirement of the user is met.
In summary, the corresponding business processing strategy is automatically identified by matching the input item constraint rule combination generated by test matching with the business processing strategy constraint rule combination configuration. Aiming at the requirements of different user requirements on the business processing strategy, the information system can automatically identify the business processing strategy according to the user input by configuring the business processing strategy and the input item constraint rule combination data so as to provide accurate service for the user.
Therefore, the method of the embodiment of the present disclosure can implement that a hard coding mode is abandoned in the service processing policy identification process, a set of processing flows of service processing policy configuration and input item constraint rules are established by analyzing and processing user input data, and then service processing policies under different scenes can be identified by matching corresponding service processing policy configuration with an input item constraint rule set; in addition, different business processing strategies are defined by configuring specific input item constraint rule combinations thereof, and the new and changed business requirements cause the change of the business processing strategies only by establishing different combinations of the input item constraint rules. Obviously, different business processing strategies can be flexibly configured through the input item constraint rules, the automatic matching rules are realized for identifying the business processing strategies, the development efficiency and maintainability of an information system are improved, the traditional hard-coded identification mode is avoided, the problems of slow response, code redundancy and difficult maintenance of the business processing strategies based on hard-coded identification under the scene that the business processing strategies in the information system are complex and changeable are solved, and the identification efficiency and the accuracy are improved.
Therefore, the method of the embodiment of the disclosure can be well applied to the general information system computing field and the business fields with many other business scenes, complex user data input, and high requirements on complexity and variability of business processing strategies.
Based on the identification method of the business processing strategy, the disclosure also provides an identification device of the business processing strategy. The apparatus will be described in detail below with reference to fig. 5.
Fig. 5 schematically shows a block diagram of a structure of a traffic handling policy identifying apparatus according to an embodiment of the present disclosure.
As shown in fig. 5, the identification apparatus 800 of the traffic processing policy of this embodiment includes a parameter generation module 510, an information determination module 520, and a policy identification module 530.
The parameter generating module 510 is configured to generate a first matching parameter corresponding to the user input data. In an embodiment, the parameter generating module 510 may be configured to perform the operation S201 described above, which is not described herein again.
The information determining module 520 is configured to determine the service processing policy information corresponding to the user input data when the first matching parameter matches a second matching parameter corresponding to the preset service processing policy configuration. In an embodiment, the information determining module 520 may be configured to perform the operation S202 described above, which is not described herein again.
The policy identification module 530 is configured to analyze the traffic handling policy information to identify a traffic handling policy. In an embodiment, the policy identifying module 530 may be configured to perform the operation S203 described above, which is not described herein again.
According to an embodiment of the present disclosure, any plurality of the parameter generation module 510, the information determination module 520, and the policy identification module 530 may be combined and implemented in one module, or any one of them may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the parameter generation module 510, the information determination module 520, and the policy identification module 530 may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or in any one of or a suitable combination of software, hardware, and firmware. Alternatively, at least one of the parameter generation module 510, the information determination module 520 and the policy identification module 530 may be at least partially implemented as a computer program module, which when executed, may perform a corresponding function.
Fig. 6 schematically shows a block diagram of an electronic device adapted to implement the identification method of a traffic handling policy according to an embodiment of the present disclosure.
As shown in fig. 6, an electronic device 600 according to an embodiment of the present disclosure includes a processor 601, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)602 or a program loaded from a storage section 608 into a Random Access Memory (RAM) 603. Processor 601 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 601 may also include onboard memory for caching purposes. Processor 601 may include a single processing unit or multiple processing units for performing different actions of a method flow according to embodiments of the disclosure.
In the RAM 603, various programs and data necessary for the operation of the electronic apparatus 600 are stored. The processor 601, the ROM 602, and the RAM 603 are connected to each other via a bus 604. The processor 601 performs various operations of the method flows according to the embodiments of the present disclosure by executing programs in the ROM 602 and/or RAM 603. It is to be noted that the programs may also be stored in one or more memories other than the ROM 602 and RAM 603. The processor 601 may also perform various operations of the method flows according to embodiments of the present disclosure by executing programs stored in the one or more memories.
Electronic device 600 may also include input/output (I/O) interface 605, input/output (I/O) interface 605 also connected to bus 604, according to an embodiment of the disclosure. The electronic device 600 may also include one or more of the following components connected to the I/O interface 605: an input portion 606 including a keyboard, a mouse, and the like; an output portion 607 including a display such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, and a speaker; a storage section 608 including a hard disk and the like; and a communication section 609 including a network interface card such as a LAN card, a modem, or the like. The communication section 609 performs communication processing via a network such as the internet. The driver 610 is also connected to the I/O interface 605 as needed. A removable medium 611 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 610 as necessary, so that a computer program read out therefrom is mounted in the storage section 608 as necessary.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, a computer-readable storage medium may include the ROM 602 and/or RAM 603 described above and/or one or more memories other than the ROM 602 and RAM 603.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the method illustrated in the flow chart. When the computer program product runs in a computer system, the program code is used for causing the computer system to realize the method provided by the embodiment of the disclosure.
The computer program performs the above-described functions defined in the system/apparatus of the embodiments of the present disclosure when executed by the processor 601. The systems, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In one embodiment, the computer program may be hosted on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed in the form of a signal on a network medium, downloaded and installed through the communication section 609, and/or installed from the removable medium 611. The computer program containing program code may be transmitted using any suitable network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In such an embodiment, the computer program may be downloaded and installed from a network through the communication section 609, and/or installed from the removable medium 611. The computer program, when executed by the processor 601, performs the above-described functions defined in the system of the embodiments of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In accordance with embodiments of the present disclosure, program code for executing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, these computer programs may be implemented using high level procedural and/or object oriented programming languages, and/or assembly/machine languages. The programming language includes, but is not limited to, programming languages such as Java, C + +, python, the "C" language, or the like. The program code may execute entirely on the user computing device, partly on the user device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Those skilled in the art will appreciate that various combinations and/or combinations of features recited in the various embodiments and/or claims of the present disclosure can be made, even if such combinations or combinations are not expressly recited in the present disclosure. In particular, various combinations and/or combinations of the features recited in the various embodiments and/or claims of the present disclosure may be made without departing from the spirit or teaching of the present disclosure. All such combinations and/or associations are within the scope of the present disclosure.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described separately above, this does not mean that the measures in the embodiments cannot be used in advantageous combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.

Claims (12)

1. A method for identifying a business processing strategy comprises the following steps:
generating a first matching parameter corresponding to the user input data through an input item constraint rule set corresponding to the user input data;
when the first matching parameter is matched with a second matching parameter corresponding to a preset service processing strategy configuration, determining service processing strategy information corresponding to the user input data; and
analyzing the business process policy information to identify the business process policy.
2. The method of claim 1, wherein generating the first matching parameters for the user input data by the set of entry constraint rules corresponding to the user input data comprises:
generating an input item set according to the user input data;
testing and matching constraint rule configuration information matched with the input item set to generate an input item constraint rule set corresponding to the input item set; and
generating the first matching parameter by the set of entry constraint rules.
3. The method of claim 2, wherein in the generating a set of input items from the user input data comprises:
and analyzing the user input data to generate a plurality of input items in a key-value pair form, wherein the plurality of input items form the input item set.
4. The method of claim 2, wherein generating the set of constraint rules for the input items according to the test matching of the constraint rule configuration information matched with the set of input items comprises:
reading constraint rule configuration data of each input item in the input item set through the constraint rule configuration information;
and performing test matching according to the method path of the constraint rule configuration data of each input item, generating input item constraint rules of the input items passing the test matching, and forming the input item constraint rule set according to the input item constraint rules of the plurality of input items.
5. The method of claim 2, wherein in the generating the first matching parameters by the set of entry constraint rules comprises:
and extracting the constraint rule code of each input item constraint rule in the input item constraint rule set to generate the first matching parameter.
6. The method of claim 1, wherein before determining the traffic handling policy information corresponding to the user input data when the first matching parameter matches a second matching parameter corresponding to a preset traffic handling policy configuration, further comprising:
extracting a preset constraint rule code corresponding to each preset input item according to a preset constraint rule set corresponding to the preset service processing strategy configuration;
and coding and generating the second matching parameter according to the extracted preset constraint rule.
7. The method of claim 6, wherein determining the traffic handling policy information corresponding to the user input data when the first matching parameter matches a second matching parameter corresponding to a preset traffic handling policy configuration comprises:
matching the first matching parameter with the second matching parameter, and determining the service processing strategy configuration in the preset service processing strategy configuration corresponding to the second matching parameter;
extracting a service processing strategy code configured by the service processing strategy;
and retrieving the service processing strategy information according to the service processing strategy code.
8. The method of claim 1, wherein, in the analyzing the traffic handling policy information to identify the traffic handling policy, comprises:
and analyzing the service processing strategy information and identifying the service processing strategy corresponding to the user input data.
9. An apparatus for identifying a traffic handling policy, comprising:
the parameter generating module is used for generating a first matching parameter corresponding to the user input data through an input item constraint rule set corresponding to the user input data;
the information determining module is used for determining the service processing strategy information corresponding to the user input data when the first matching parameter is matched with a second matching parameter corresponding to a preset service processing strategy configuration; and
a policy identification module to analyze the traffic processing policy information to identify the traffic processing policy.
10. An electronic device, comprising:
one or more processors;
a storage device for storing one or more programs,
wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to perform the method of any of claims 1-8.
11. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to perform the method of any one of claims 1 to 8.
12. A computer program product comprising a computer program which, when executed by a processor, implements a method according to any one of claims 1 to 8.
CN202111593056.9A 2021-12-23 2021-12-23 Method, device, equipment, medium and program product for identifying business processing strategy Pending CN114266547A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111593056.9A CN114266547A (en) 2021-12-23 2021-12-23 Method, device, equipment, medium and program product for identifying business processing strategy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111593056.9A CN114266547A (en) 2021-12-23 2021-12-23 Method, device, equipment, medium and program product for identifying business processing strategy

Publications (1)

Publication Number Publication Date
CN114266547A true CN114266547A (en) 2022-04-01

Family

ID=80829333

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111593056.9A Pending CN114266547A (en) 2021-12-23 2021-12-23 Method, device, equipment, medium and program product for identifying business processing strategy

Country Status (1)

Country Link
CN (1) CN114266547A (en)

Similar Documents

Publication Publication Date Title
US11449379B2 (en) Root cause and predictive analyses for technical issues of a computing environment
CN115587575A (en) Data table creation method, target data query method, device and equipment
CN113535565B (en) Interface use case generation method, device, equipment and medium
CN114780807A (en) Service detection method, device, computer system and readable storage medium
CN115033574A (en) Information generation method, information generation device, electronic device, and storage medium
CN111405060B (en) Service influence range determining method, device, tool and electronic equipment
CN114816361A (en) Method, device, equipment, medium and program product for generating splicing project
CN113918525A (en) Data exchange scheduling method, system, electronic device, medium, and program product
CN114116509A (en) Program analysis method, program analysis device, electronic device, and storage medium
CN114780361A (en) Log generation method, device, computer system and readable storage medium
CN114281586A (en) Fault determination method and device, electronic equipment and computer readable storage medium
CN115203178A (en) Data quality inspection method and device, electronic equipment and storage medium
CN113032256A (en) Automatic test method, device, computer system and readable storage medium
CN114266547A (en) Method, device, equipment, medium and program product for identifying business processing strategy
CN113515271A (en) Service code generation method and device, electronic equipment and readable storage medium
CN112506781A (en) Test monitoring method, test monitoring device, electronic device, storage medium, and program product
CN115190008B (en) Fault processing method, fault processing device, electronic equipment and storage medium
CN116975200A (en) Method, device, equipment and medium for controlling working state of server
CN114817073A (en) Automated testing method, apparatus, device, medium, and program product
CN113392014A (en) Test case generation method and device, electronic equipment and medium
CN114254621A (en) Document auditing method and device, electronic equipment and storage medium
CN115760013A (en) Operation and maintenance model construction method and device, electronic equipment and storage medium
CN114253852A (en) Automatic testing method, device, equipment and medium
CN117785336A (en) Task processing method, system, equipment and medium based on generalized linear model
CN114117449A (en) Hidden parameter mining-based test method and device, electronic equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination