CN115509930A - Method and related device for checking data exception caused by tissue architecture change - Google Patents

Method and related device for checking data exception caused by tissue architecture change Download PDF

Info

Publication number
CN115509930A
CN115509930A CN202211243278.2A CN202211243278A CN115509930A CN 115509930 A CN115509930 A CN 115509930A CN 202211243278 A CN202211243278 A CN 202211243278A CN 115509930 A CN115509930 A CN 115509930A
Authority
CN
China
Prior art keywords
user
terminal
organizational structure
character string
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211243278.2A
Other languages
Chinese (zh)
Inventor
牛煜超
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Bank Co Ltd
Original Assignee
Ping An Bank Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Bank Co Ltd filed Critical Ping An Bank Co Ltd
Priority to CN202211243278.2A priority Critical patent/CN115509930A/en
Publication of CN115509930A publication Critical patent/CN115509930A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • G06F16/3331Query processing
    • G06F16/334Query execution

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Computational Linguistics (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a method for checking data abnormity caused by tissue architecture change and a related device, wherein the method comprises the following steps: the method comprises the steps that a first terminal responds to click operation of a first user to obtain a calling interface, and the calling interface is used for obtaining an organization structure character string; the organizational structure character string is associated with authentication information of the first user; the second terminal responds to a comparison instruction of a second user, acquires the authentication information and acquires current organization structure data corresponding to the first user according to the authentication information; and the second terminal compares the current organization structure data with the organization structure character string to obtain a troubleshooting result. By the scheme, the detection efficiency of the data can be improved when the organization architecture data are compared.

Description

Method and related device for checking data exception caused by change of tissue architecture
Technical Field
The present application relates to the field of artificial intelligence technology, and in particular, to a method and related apparatus for troubleshooting data anomalies caused by tissue architecture changes.
Background
Due to the fact that data between front-end personnel and back-end development are unequal, when the back-end data changes, if the back-end data is not updated in time, the front-end personnel cannot obtain the updated data in time, and the back-end development is needed to solve the problem. The existing checking mode is to check according to a specified flow, so that the data checking efficiency is low.
Disclosure of Invention
The application at least provides a method and a related device for checking data abnormity caused by organization structure change, which are used for solving the problem of low data checking efficiency in related technologies such as financial science and technology.
The application provides a method for checking data exception caused by tissue architecture change in a first aspect, which comprises the following steps:
the method comprises the steps that a first terminal responds to click operation of a first user to obtain a calling interface, and the calling interface is used for obtaining an organization structure character string; the organizational structure character string is associated with authentication information of the first user; the second terminal responds to a comparison instruction of a second user, acquires the authentication information and acquires current organization structure data corresponding to the first user according to the authentication information; and the second terminal compares the current organization structure data with the organization structure character string to obtain a troubleshooting result.
And the organizational structure character string is the encrypted latest organizational structure data corresponding to the first user.
The second terminal compares the current organizational structure data with the organizational structure character string to obtain a checking result, and the checking result includes:
the second terminal decrypts the organizational structure character string to obtain the latest organizational structure data; and the second terminal compares the latest organization architecture data with the current organization architecture data to obtain a checking result, and sends the checking result to the first terminal.
The method for acquiring the calling interface by the first terminal in response to the click operation of the first user comprises the following steps:
the first terminal responds to the click operation of the first user in a preset area to obtain a calling interface, and the click operation is performed three times continuously.
Before the second terminal responds to the comparison instruction of the second user and acquires the authentication information, the method further comprises the following steps:
the second terminal responds to a login instruction of the second user based on a comparison tool, and logs in the comparison tool; receiving, by the comparison tool, the organizational structure string of the second user input.
The second terminal, in response to the comparison instruction of the second user, acquires the authentication information, and acquires the current organizational structure data corresponding to the first user according to the authentication information, including:
and the second terminal responds to a comparison instruction of the second user, acquires the authentication information associated with the organizational structure character string through the comparison tool, and acquires the current organizational structure data corresponding to the first user according to the login information through the comparison tool.
The second terminal compares the current organizational structure data with the organizational structure character string to obtain a checking result, and the checking result includes:
the second terminal compares the current organization structure data with the organization structure character string through the comparison tool to obtain a checking result; and the second terminal sends the investigation result to the first user.
Before the second terminal responds to the comparison instruction of the second user, the method further includes:
and the first terminal displays the organizational structure character string to the first user through a confirmation page, wherein the confirmation page comprises a function key for confirming whether to send the organizational structure character string or not.
A second aspect of the present application provides an electronic device, which includes a memory and a processor coupled to each other, where the processor is configured to execute program instructions stored in the memory to implement the method for checking that an organization architecture change causes a data exception in the first aspect.
A third aspect of the present application provides a computer-readable storage medium, on which program instructions are stored, and when the program instructions are executed by a processor, the method for troubleshooting the data exception caused by the change of the tissue architecture in the first aspect is implemented.
According to the scheme, the problem in which the problem occurs can be quickly positioned according to the comparison between the organizational structure character string inquired by the first user and the current organizational structure data of the first user inquired by the second user.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present application and, together with the description, serve to explain the principles of the application.
FIG. 1 is a flowchart illustrating an embodiment of a method for troubleshooting data anomalies caused by organizational structure changes according to the present application;
FIG. 2 is a block diagram of an embodiment of an electronic device of the present application;
FIG. 3 is a block diagram of an embodiment of a computer-readable storage medium of the present application.
Detailed Description
The embodiments of the present application will be described in detail below with reference to the drawings.
In the following description, for purposes of explanation and not limitation, specific details are set forth such as particular system results, interfaces, techniques, etc. in order to provide a thorough understanding of the present application.
The term "and/or" herein is merely an association relationship describing an associated object, and means that there may be three relationships, for example, a and/or B, which may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the character "/" herein generally indicates that the former and latter related objects are in an "or" relationship. Further, the term "plurality" herein means two or more than two. In addition, the term "at least one" herein means any one of a plurality or any combination of at least two of a plurality, for example, including at least one of a, B, C, and may mean including any one or more elements selected from the group consisting of a, B, and C.
If the technical scheme of the application relates to personal information, a product applying the technical scheme of the application clearly informs personal information processing rules before processing the personal information, and obtains personal independent consent. If the technical scheme of the application relates to sensitive personal information, before the sensitive personal information is processed, a product applying the technical scheme of the application obtains individual consent and simultaneously meets the requirement of 'explicit consent'. For example, at a personal information collection device such as a camera, a clear and significant identifier is set to inform that the personal information collection range is entered, the personal information is collected, and if the person voluntarily enters the collection range, the person is regarded as agreeing to collect the personal information; or on the device for processing the personal information, under the condition of informing the personal information processing rule by using obvious identification/information, obtaining personal authorization by modes of popping window information or asking a person to upload personal information of the person by himself, and the like; the personal information processing rule may include information such as a personal information processor, a personal information processing purpose, a processing method, and a type of personal information to be processed.
Referring to fig. 1, fig. 1 is a flowchart illustrating a method for checking data exception caused by organizational structure change according to an embodiment of the present disclosure. The method for checking data abnormality caused by the change of the organization structure may be executed by a terminal device, a server, or other processing devices, where the terminal device may be a User Equipment (UE), a mobile device, a User terminal, a Personal Digital Assistant (PDA), a handheld device, a computing device, or the like. In some possible implementations, the method for troubleshooting data anomalies caused by organizational structure changes can be implemented by a processor calling computer-readable instructions stored in a memory. Specifically, the method may include the steps of:
s11, the first terminal responds to the click operation of a first user to obtain a calling interface, and the calling interface is used for obtaining an organization structure character string; the organizational structure string is associated with authentication information of the first user.
In this embodiment, before a user acquires an organizational structure character string, the user logs in a corresponding user system on the first terminal, and by setting a call interface on the user system, the user performs a click operation in a preset area in the user system, thereby acquiring the call interface. The calling interface is a back-end interface, and the organizational structure character string can be acquired from a storage unit on back-end equipment such as a server. The corresponding authentication information is information used for representing the user identity, such as the user um or the Emp number when the user logs in the user system.
And S12, the second terminal responds to a comparison instruction of a second user, acquires the authentication information, and acquires the current organizational structure data corresponding to the first user according to the authentication information.
In this embodiment, the second user may perform data comparison on the first terminal or the second terminal. The first user can send the organizational structure character string to a second user using a second terminal through the first terminal, and the second user clicks a comparison function key after receiving the organizational structure character string on a display page of the second terminal to obtain a comparison instruction. Or the second user inputs the organization structure character string to a comparison page of the second terminal after obtaining the organization structure character string, and clicks a comparison function key to obtain a comparison instruction.
And after obtaining the organization architecture character string, the second terminal acquires authentication information associated with the organization Party A character string according to the comparison instruction. The second terminal may obtain the current organizational structure data corresponding to the first user from a storage unit on the second terminal or a storage unit of other terminal equipment according to the authentication information.
In this embodiment, the first user may be a front-end worker, the second user may be a back-end developer, and the back-end developer updates the organization structure in response to a change in the organization structure of the front-end worker. Because the information between the back end and the front end is not equal, the organization structure developed by the back end developer may not be updated to the account corresponding to the front end worker in time, and the front end worker knows that the organization structure of the front end worker changes, and the organization structure seen by the front end worker is still the historical organization structure, so that the back end worker is informed to perform investigation. When finding that the self organization structure has a problem on the first terminal, the front-end staff informs the back-end developer, and the back-end developer finds out the current organization structure data corresponding to the front-end staff on the second terminal to compare.
And S13, the second terminal compares the current organization structure data with the organization structure character string to obtain a checking result.
In this embodiment, the second user may compare the current organizational structure data with the organizational structure character string by using the first terminal or the second terminal, and determine whether the two are consistent; if not, the current organizational structure data is not updated; if the first user is consistent with the second user, the second user does not update the organizational structure character string.
In this embodiment, according to the comparison between the organizational structure character string queried by the first user and the current organizational structure data of the first user queried by the second user, which aspect has a problem can be quickly located from the source.
In an exemplary embodiment, the step S11 includes:
the first terminal responds to the click operation of the first user in a preset area to obtain a calling interface, and the click operation is performed three times continuously.
In this embodiment, an invisible switch is provided in a relatively hidden place on a user system where a first user logs in, the switch is a call interface, the call interface is obtained after three continuous clicks, and an encrypted organization structure character string is obtained through the call interface.
In an exemplary embodiment, before the step S12, the method further includes:
and the first terminal displays the organizational structure character string to the first user through a confirmation page, wherein the confirmation page comprises a function key for confirming whether to send the organizational structure character string.
In this embodiment, the organizational structure character string may be displayed through a pop-up window display or a display page, and whether to send the organizational structure character string to the function key of the first user is correspondingly set. The organizational structure character string is sent from the first terminal to the second terminal, so that the second user can compare the organizational structure character string with the organizational structure character string through the second terminal.
In an exemplary embodiment, the organizational structure character string is encrypted latest organizational structure data corresponding to the first user; the step S13 includes:
the second terminal decrypts the organizational structure character string to obtain the latest organizational structure data; and the second terminal compares the latest organization structure data with the current organization structure data to obtain a troubleshooting result, and sends the troubleshooting result to the first terminal.
In this embodiment, the calling interface may encrypt the latest organization structure data to obtain an organization structure character string. The encryption algorithm used by the calling interface is the AES encryption algorithm. For example, the obtained latest organizational structure data is creditce 003078 (straight-tube decentralization) -creditce 00888 (non-straight-tube decentralization) -lbs tunan 0001 (team) -23084028 (group), AES encryption algorithm encryption is performed by calling an interface, a key is aibma, and the obtained organizational structure character string is:
U2FsdGVkX189sM6rOsobJcTDKOVxnFH9cuk6pHphZ19+aMqwBQUdLmjUWtHim3mDX2s9IXhXlrUCBhdsxcOanXAMV0P+6JCbFo5P9VYdKg4=。
correspondingly, when the second terminal compares the current organizational structure data with the organizational structure character string, the organizational structure character string needs to be decrypted to obtain the latest organizational structure data, and then the latest organizational structure data is compared with the current organizational structure data to obtain a checking result. The key used for decryption may be identical to that used for encryption.
In an exemplary embodiment, a method for checking data anomalies caused by changes in an organization architecture according to another embodiment of the present application may specifically include:
the method comprises the steps that a first terminal responds to click operation of a first user to obtain a calling interface, and the calling interface is used for obtaining an organization structure character string; the organizational structure character string is associated with authentication information of the first user; the second terminal responds to a login instruction of the second user based on a comparison tool, and logs in the comparison tool; receiving, by the comparison tool, the organizational structure string input by the second user; the second terminal responds to a comparison instruction of the second user, acquires the authentication information associated with the organizational structure character string through the comparison tool, and acquires current organizational structure data corresponding to the first user according to the login information through the comparison tool; the second terminal compares the current organization structure data with the organization structure character string through the comparison tool to obtain a checking result; and the second terminal sends the troubleshooting result to the first user.
In this embodiment, the organization structure may be compared by a comparison tool on the second terminal, and before the comparison, the second user needs to log in the comparison tool to obtain the corresponding authority, so that the current organization structure data may be obtained according to the authentication information.
The comparison tool set by the embodiment is developed by a back-end developer, and can compare data one by one and judge whether the data change.
It will be understood by those skilled in the art that in the method of the present invention, the order of writing the steps does not imply a strict order of execution and any limitations on the implementation, and the specific order of execution of the steps should be determined by their function and possible inherent logic.
Referring to fig. 2, fig. 2 is a schematic block diagram of an embodiment of an electronic device 20 according to the present application. The electronic device 20 includes a memory 21 and a processor 22 coupled to each other, and the processor 22 is configured to execute program instructions stored in the memory 21 to implement the steps in any of the embodiments of the method for troubleshooting organizational structure changes that cause data anomalies. In one particular implementation scenario, electronic device 20 may include, but is not limited to: a microcomputer, a server, and the electronic device 20 may also include a mobile device such as a notebook computer, a tablet computer, and the like, which is not limited herein.
Specifically, the processor 22 is configured to control itself and the memory 21 to implement the steps in any of the above embodiments of the checking method for the data exception caused by the change of the organizational structure. The processor 22 may also be referred to as a CPU (Central Processing Unit). Processor 22 may be an integrated circuit chip having signal processing capabilities. The Processor 22 may also be a general purpose Processor, a Digital Signal Processor (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic, discrete hardware components. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. In addition, the processor 22 may be commonly implemented by an integrated circuit chip.
Referring to fig. 3, fig. 3 is a block diagram of a non-volatile computer readable storage medium 30 according to an embodiment of the present invention. The non-volatile computer readable storage medium 30 stores program instructions 301 capable of being executed by the processor, and the program instructions 301 are used for implementing any of the steps of the above embodiments of the method for troubleshooting data anomalies caused by organizational structure changes.
In some embodiments, functions of or modules included in the apparatus provided in the embodiments of the present disclosure may be used to execute the method described in the above method embodiments, and specific implementation thereof may refer to the description of the above method embodiments, and for brevity, will not be described again here.
The foregoing description of the various embodiments is intended to highlight various differences between the embodiments, and the same or similar parts may be referred to each other, and for brevity, will not be described again herein.
In the several embodiments provided in the present application, it should be understood that the disclosed method and apparatus may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of a module or a unit is only one type of logical division, and other divisions may be implemented in practice, for example, the unit or component may be combined or integrated with another system, or some features may be omitted, or not implemented. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection of devices or units through some interfaces, and may be in an electrical, mechanical or other form.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes instructions for causing a computer device (which may be a personal computer, a server, a network device, or the like) or a processor (processor) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.

Claims (10)

1. A method for checking data exception caused by tissue architecture change is characterized by comprising the following steps:
the method comprises the steps that a first terminal responds to click operation of a first user to obtain a calling interface, and the calling interface is used for obtaining an organization structure character string; the organizational structure character string is associated with authentication information of the first user;
the second terminal responds to a comparison instruction of a second user, acquires the authentication information and acquires current organization structure data corresponding to the first user according to the authentication information;
and the second terminal compares the current organization structure data with the organization structure character string to obtain a troubleshooting result.
2. The method of claim 1, wherein the organizational structure string is encrypted latest organizational structure data corresponding to the first user.
3. The method according to claim 2, wherein the comparing, by the second terminal, the current organizational structure data with the organizational structure character string to obtain a troubleshooting result comprises:
the second terminal decrypts the organizational structure character string to obtain the latest organizational structure data;
and the second terminal compares the latest organization structure data with the current organization structure data to obtain a troubleshooting result, and sends the troubleshooting result to the first terminal.
4. The method of claim 1, wherein the first terminal obtains the call interface in response to a click operation of the first user, and comprises:
the first terminal responds to the click operation of the first user in a preset area to obtain a calling interface, and the click operation is performed three times continuously.
5. The method according to claim 1, wherein before the second terminal responds to the comparison instruction of the second user and obtains the authentication information, the method further comprises:
the second terminal responds to a login instruction of the second user based on a comparison tool, and logs in the comparison tool;
receiving, by the comparison tool, the organizational structure string input by the second user.
6. The method according to claim 5, wherein the second terminal, in response to the comparison instruction of the second user, acquires the authentication information, and acquires the current organizational structure data corresponding to the first user according to the authentication information, including:
and the second terminal responds to a comparison instruction of the second user, acquires the authentication information associated with the organizational structure character string through the comparison tool, and acquires the current organizational structure data corresponding to the first user according to the login information through the comparison tool.
7. The method according to claim 6, wherein the comparing, by the second terminal, the current organizational structure data with the organizational structure character string to obtain a troubleshooting result comprises:
the second terminal compares the current organization structure data with the organization structure character string through the comparison tool to obtain a check result;
and the second terminal sends the troubleshooting result to the first user.
8. The method according to claim 1, wherein the second terminal responds to the comparison instruction of the second user before, the method further comprising:
and the first terminal displays the organizational structure character string to the first user through a confirmation page, wherein the confirmation page comprises a function key for confirming whether to send the organizational structure character string.
9. An electronic device, comprising a memory and a processor coupled to each other, wherein the processor is configured to execute program instructions stored in the memory to implement the method for troubleshooting organization and architecture change caused data exception as claimed in any one of claims 1 to 8.
10. A non-transitory computer readable storage medium having stored thereon program instructions, wherein the program instructions, when executed by a processor, implement the method for troubleshooting tissue architecture change induced data anomalies as claimed in any one of claims 1 to 8.
CN202211243278.2A 2022-10-11 2022-10-11 Method and related device for checking data exception caused by tissue architecture change Pending CN115509930A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211243278.2A CN115509930A (en) 2022-10-11 2022-10-11 Method and related device for checking data exception caused by tissue architecture change

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211243278.2A CN115509930A (en) 2022-10-11 2022-10-11 Method and related device for checking data exception caused by tissue architecture change

Publications (1)

Publication Number Publication Date
CN115509930A true CN115509930A (en) 2022-12-23

Family

ID=84509308

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211243278.2A Pending CN115509930A (en) 2022-10-11 2022-10-11 Method and related device for checking data exception caused by tissue architecture change

Country Status (1)

Country Link
CN (1) CN115509930A (en)

Similar Documents

Publication Publication Date Title
US11943362B2 (en) System and method for providing personal information using one time private key based on blockchain of proof of use
US11494754B2 (en) Methods for locating an antenna within an electronic device
US20180324735A1 (en) Bluetooth automatic connection method, and master device, slave device, and system
CN110414258B (en) File processing method and system and data processing method
CN108347361B (en) Application program testing method and device, computer equipment and storage medium
CN110138744B (en) Method, device and system for replacing communication number, computer equipment and storage medium
CN108681676B (en) Data management method and apparatus, system, electronic device, program, and storage medium
US10691424B2 (en) Method for programming and terminal device
CN109284608B (en) Method, device and equipment for identifying Legionella software and safety processing method
CN112637199B (en) Method and device for automatically detecting encrypted data, computer equipment and medium
CN115509930A (en) Method and related device for checking data exception caused by tissue architecture change
CN113794735B (en) Sensitive data security protection method in SAAS system scene
CN114625756A (en) Data query method and device and server
CN111190824B (en) Monitoring method, device, terminal equipment and storage medium
CN112636914B (en) Identity verification method, identity verification device and smart card
CN110049036B (en) Data encryption method and device and data encryption system
CN114117388A (en) Device registration method, device registration apparatus, electronic device, and storage medium
CN111258598B (en) Metric updating method, device, system, storage medium and computer equipment
CN113228016A (en) Apparatus and method for luxo software decryption
CN111199027B (en) User authentication method and device, computer-readable storage medium and electronic equipment
CN115589571B (en) Device retrieving method, user equipment, ground satellite equipment and storage medium
CN113439292B (en) System and method for managing trusted applications in computer chip modules
CN111242770B (en) Risk equipment identification method and device, electronic equipment and readable storage medium
CN115964724A (en) Data processing method and device and electronic equipment
CN117313126A (en) Method for detecting encrypted data, machine-readable storage medium, and computer device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination