CN115510169A - Asset checking method, terminal and computer readable storage medium - Google Patents

Asset checking method, terminal and computer readable storage medium Download PDF

Info

Publication number
CN115510169A
CN115510169A CN202211211447.4A CN202211211447A CN115510169A CN 115510169 A CN115510169 A CN 115510169A CN 202211211447 A CN202211211447 A CN 202211211447A CN 115510169 A CN115510169 A CN 115510169A
Authority
CN
China
Prior art keywords
asset
inventory
information
rule
asset inventory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211211447.4A
Other languages
Chinese (zh)
Inventor
王敬星
邓郭权
王煜
肖圣
刘炜
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zoomlion Heavy Industry Science and Technology Co Ltd
Zhongke Yungu Technology Co Ltd
Original Assignee
Zoomlion Heavy Industry Science and Technology Co Ltd
Zhongke Yungu Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zoomlion Heavy Industry Science and Technology Co Ltd, Zhongke Yungu Technology Co Ltd filed Critical Zoomlion Heavy Industry Science and Technology Co Ltd
Priority to CN202211211447.4A priority Critical patent/CN115510169A/en
Publication of CN115510169A publication Critical patent/CN115510169A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/28Databases characterised by their database models, e.g. relational or object models
    • G06F16/283Multi-dimensional databases or data warehouses, e.g. MOLAP or ROLAP
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses an asset checking method, a terminal and a computer readable storage medium, wherein the asset checking method comprises the following steps: establishing a data warehouse for storing asset inventory information, wherein the asset inventory information comprises at least one item of asset attribute information, user information and asset inventory historical log information; acquiring an inventory business rule associated with the asset inventory information; and executing corresponding asset checking operation according to the asset checking information and the checking service rule. Therefore, the asset checking efficiency is improved by establishing the data warehouse, the checking service rule is set through the rule engine and is used for determining the result corresponding to the checking operation in the complex scene, and the flexibility of service change processing can be improved.

Description

Asset checking method, terminal and computer readable storage medium
Technical Field
The present invention relates to the field of asset checking technologies, and in particular, to an asset checking method, a terminal, and a computer-readable storage medium.
Background
The asset checking is generally to count the stock of raw materials, semi-finished products, etc., or the real objects of fixed assets such as machine equipment, office equipment, etc. of an enterprise to determine the real inventory number at a certain point of time, so as to further enhance the management of the assets. The key points of the asset inventory comprise the following aspects: 1. authenticity. It is determined that the asset does exist and must be owned by the enterprise. 2. Integrity. Ensuring that all assets owned by the enterprise are all within inventory. 3. And (4) accuracy. And ensuring that the data information, specification model, quantity and the like of the assets are consistent with the record of the account.
The asset checking intelligent platform in the current stage optimizes the registration and summarization process of asset data to the greatest extent, can quickly retrieve specific information of assets, obviously helps checking personnel to reduce working time, reduces error rate of checking work to a certain extent, and obviously improves working efficiency of the checking personnel. In the current asset inventory related information system, most asset data is stored through a traditional relational database, along with the continuous increase of the quantity of assets and the improvement of the management information fineness, the system performance problem is more and more prominent in the process of processing mass data by inventory operation, and the inventory operation is used for experience reduction. In addition, in the prior art, most of the service logics in the inventory process are implemented by direct coding, and even if some key indexes are set by combining configuration files or configuration centers, the following problems still exist: 1. the cost of the change of the asset inventory rules is too high: the tight degree of the combination of the rules of the traditional asset inventory platform and IT application is quite high, once the emergency condition of rule change occurs, background developers need to go through the process from requirement proposing to development completing, so that the requirements cannot be responded in time; moreover, the quality of change is relatively difficult to ensure, and chain reaction is easy to cause. 2. The flexibility of the asset inventory rules is low: the traditional asset checking method is simple, and related elements are single, and only comprise the traditional elements of the name, the quantity, the weight value, the estimated depreciation and disqualification of the asset, the name, the quantity, the original price, the depreciation and the like of the damaged fixed asset. Different inventory contents cannot be set according to different assets (such as asset types, entry management departments and the like). 3. The checking result under the complex scene needs to be confirmed manually, the difference updating of the checking result also needs to initiate different processing flows manually, the intelligent degree and the automation degree are lower, the labor cost is higher, and errors are easy to occur.
The foregoing description is provided for general background information and is not admitted to be prior art.
Disclosure of Invention
The application aims to provide an asset checking method, a terminal and a computer readable storage medium, the asset checking efficiency is improved by establishing a data warehouse, and a checking service rule is set through a rule engine, so that a result corresponding to checking operation in a complex scene is determined, and the flexibility of service change processing can be improved.
In order to achieve the above purpose:
in a first aspect, an embodiment of the present application provides an asset checking method, including the following steps:
s201, establishing a data warehouse for storing asset inventory information, wherein the asset inventory information comprises at least one item of asset attribute information, user information and asset inventory historical log information;
s202, acquiring an inventory business rule associated with the asset inventory information;
s203, executing corresponding asset checking operation according to the asset checking information and the checking service rule.
Optionally, the step S202 includes at least one of:
acquiring an asset inventory filling content rule associated with the asset attribute information;
acquiring a user usage environment rule associated with the user information;
acquiring an asset inventory summary check authority rule associated with the user information;
and acquiring asset reimbursement early warning rules and asset inventory special processing rules which are associated with the asset inventory historical log information and the asset attribute information.
Optionally, when the inventory business rule is an asset inventory filling content rule, the step S203 includes:
determining corresponding asset inventory filling content according to the asset attribute information;
if the asset inventory filling content meets the asset inventory content rule, the filling is successful;
and if the filling content does not meet the asset inventory content rule, failing to fill.
Optionally, when the inventory service rule is a user usage environment rule, the step S203 includes:
determining user use environment information according to the user information;
if the user using environment meets the user using environment rule, the user using environment is safe, and asset checking is allowed to continue;
and if the user using environment does not meet the user using environment rule, the user using environment has risks, and corresponding asset inventory exception reminding is executed.
Optionally, when the inventory service rule is an asset inventory summary check authority rule, the step S203 includes:
determining user identity information according to the user information;
comparing the user identity information with an asset inventory summary check authority rule;
and granting different user identity information to summarize and check the authority with different inventories.
Optionally, when the inventory service rule is an asset inventory special processing rule, the step S203 includes:
acquiring first asset inventory historical information and first asset attribute information related to asset inventory;
if the first asset inventory historical information and the first asset attribute information meet the asset inventory special processing rule, carrying out special processing according to special conditions;
and if the first asset inventory historical information and the first asset attribute information do not meet the asset inventory special processing rule, executing corresponding asset inventory abnormal reminding.
Optionally, when the inventory business rule is an asset inventory reimbursement warning rule, the step S203 includes:
acquiring second asset inventory historical information and second asset attribute information related to asset inventory reimbursement early warning;
if the second asset inventory historical information and the second asset attribute information meet the asset inventory reimbursement early warning rule, the assets are normal, and the assets are brought into a judgment range;
and if the second asset inventory historical information and the second asset attribute information do not meet the asset inventory reimbursement early warning rule, the asset is abnormal, and corresponding asset inventory abnormity reminding is executed.
Optionally, after the step S203, the method further includes:
and performing differential automatic processing on the asset inventory result.
In a second aspect, an embodiment of the present application provides a terminal, including: a processor and a memory storing a computer program which, when executed by the processor, performs the steps of the above-described asset inventory method.
In a third aspect, an embodiment of the present application provides a computer-readable storage medium, in which a computer program is stored, and the computer program, when executed by a processor, implements the steps of the above-mentioned asset inventory method.
The asset checking method, the terminal and the computer readable storage medium provided by the embodiment of the application comprise the following steps: establishing a data warehouse for storing asset inventory information, wherein the asset inventory information comprises at least one item of asset attribute information, user information and asset inventory historical log information; acquiring an inventory business rule associated with the asset inventory information; and executing corresponding asset checking operation according to the asset checking information and the checking service rule. Therefore, the asset checking efficiency is improved by establishing the data warehouse, the checking service rule is set through the rule engine and is used for determining the result corresponding to the checking operation in the complex scene, and the flexibility of service change processing can be improved.
Drawings
FIG. 1 is a schematic flow diagram of asset inventory in the prior art;
FIG. 2 is a schematic flow chart of an asset inventory method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a terminal according to an embodiment of the present invention.
Detailed Description
Reference will now be made in detail to the exemplary embodiments, examples of which are illustrated in the accompanying drawings. The following description refers to the accompanying drawings in which the same numbers in different drawings represent the same or similar elements unless otherwise indicated. The embodiments described in the following exemplary embodiments do not represent all embodiments consistent with the present application. Rather, they are merely examples of apparatus and methods consistent with certain aspects of the present application, as detailed in the appended claims.
It should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, the recitation of a claim "comprising a" 8230a "\8230means" does not exclude the presence of additional identical elements in the process, method, article or apparatus in which the element is incorporated, and further, similarly named components, features, elements in different embodiments of the application may have the same meaning or may have different meanings, the specific meaning of which should be determined by its interpretation in the specific embodiment or by further combination with the context of the specific embodiment.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope herein. The word "if" as used herein may be interpreted as "at" \8230; "or" when 8230; \8230; "or" in response to a determination ", depending on the context. Also, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes" and/or "including," when used in this specification, specify the presence of stated features, steps, operations, elements, components, items, species, and/or groups, but do not preclude the presence, or addition of one or more other features, steps, operations, elements, components, species, and/or groups thereof. The terms "or" and/or "as used herein are to be construed as inclusive or meaning any one or any combination. Thus, "a, B or C" or "a, B and/or C" means "any of the following: a; b; c; a and B; a and C; b and C; A. b and C ". An exception to this definition will occur only when a combination of elements, functions, steps or operations are inherently mutually exclusive in some way.
It should be understood that, although the steps in the flowcharts in the embodiments of the present application are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least some of the steps in the figures may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, in different orders, and may be performed alternately or at least partially with respect to other steps or sub-steps of other steps.
It should be noted that step numbers such as S101 and S102 are used herein for the purpose of more clearly and briefly describing the corresponding contents, and do not constitute a substantial limitation on the sequence, and those skilled in the art may perform S102 first and then S101 in specific implementations, but these steps should be within the scope of the present application.
It should be understood that the specific embodiments described herein are merely illustrative of and not restrictive on the broad application.
In the following description, suffixes such as "module", "component", or "unit" used to denote elements are used only for the convenience of description of the present application, and have no specific meaning in themselves. Thus, "module", "component" or "unit" may be used mixedly.
As shown in fig. 1, the flow of the asset inventory in the prior art is as follows:
step S101: and (4) checking and planning to release.
The checking plan comprises checking targets, ranges, time arrangement, division of labor of personnel participating in checking and the like.
Step S102: the user or a designated agent is used for inventory.
And checking the card information and the account information of the assets and the regular model, the quantity and the condition of the real objects, and checking whether the card information and the account information are consistent with the regular model, the quantity and the condition of the real objects. And (4) performing classified inventory on the assets, respectively recording, and confirming and submitting in an information system.
Step S103: and (5) summarizing and checking by the administrator.
The isograms of the asset custodian and the separation returning manager are summarized and checked according to the checking result of the user, the difference information is recorded, and the difference information is reported and summarized step by step. The process may have repeated submission, rejection, confirmation, etc. until no objection is made to the checking result.
Step S104: and issuing an inventory result.
Wherein, the checking person and the rechecker confirm the signature, and issue the checking report after the approval, and the detail item is the checking result ledger.
Step S105: and (4) performing inventory difference updating.
And updating the assets according to the checking result in different situations, wherein the updating comprises checking excess and account entry, checking deficiency treatment, difference updating and the like.
As shown in fig. 2, an asset checking method provided for the embodiment of the present application includes the following steps:
step S201: a data repository is established for storing asset inventory information, the asset inventory information including at least one of asset attribute information, user information, and asset inventory history log information.
In this embodiment, after the asset inventory plan is issued, the asset information snapshot on the reference day is stored as a reference for subsequent inventory operations. And extracting asset data information based on the asset inventory reference day to establish a SPARK-based big data offline warehouse. The SPARK is a quick and general computing engine specially designed for large-scale data processing, and distributed computing is achieved based on a MapReduce algorithm.
Specifically, a SPARK-based big data offline warehouse is established, and the data warehouse is used for storing asset attribute information, user information and asset inventory historical log information;
the data warehouse comprises a Buffer Data Layer (BDL), a paste source/Operation Data Layer (ODL), a Standard Data Layer (SDL), an Integration Data Layer (IDL) and an Application Data Layer (ADL):
buffer Data Layer (Buffer Data Layer): and extracting a buffer layer to the large data platform from the asset inventory system database, and storing the Hive table in a textfile format to be consistent with external data. The hive is a data warehouse tool based on Hadoop, can map a structured data file into a database table, provides a complete sql query function, and can convert an sql statement into a MapReduce task for operation.
Paste source/operation Data Layer (Operational Data Layer): the BDL is converted and basically consistent with a source system, the original appearance of service data is maintained as much as possible, historical data is reserved, a partition table is used as a main part, a small number of large data tables are subjected to zipper table generation, the storage format is partial, and the compression mode is Snapyy. The zipper list is a table for maintaining historical state and latest state data, and operation records of zipper time points can be conveniently restored through the zipper list. Specifically, the data is stored in a zipper table form, processed, subjected to open chain (start _ date) and closed chain (end _ date), and then determined according to the main key, so that the storage space is saved, data records in any time period can be inquired according to the ranges of the start _ date and the end _ date, and when large data volume is inquired, the inquiry speed can be remarkably increased through the inquiry method, and further the required data result is obtained.
Standard Data Layer (Standard Data Layer): the ODL layer is stored in the SDL layer after simple formatting and analysis, and is commonly used in dictionary translation, null value conversion, date formatting and data standardization;
integration Data Layer (Integration Data Layer): the theme-oriented data area is unified, normalized, integrated and shared according to the asset inventory rule;
application Data Layer (Application Data Layer): usually interfacing with the demand, and converting the result into a result related to the combination of the user and the asset by operations such as the IDL layer based on the deep processing statistical summary of certain dimensions.
In the process, user information, asset attribute information and asset historical log information are stored by establishing a SPARK-HIVE big data platform, and indexes required by asset inventory are calculated and analyzed, such as inventory asset total number, asset inventory excess/inventory deficiency number, inventory failure number, inventory already-inventory number, state difference number, position difference number and the like. Therefore, the asset information of the reference day is stored by establishing the big data counting bin, the asset disk point and other operations of the asset are synchronous without influencing each other, and the mutual pollution of the asset information in the operation process is not worried about. In addition, the introduction of a big data tool obviously improves the asset operation performance, and particularly the inventory operation user experience is obviously improved according to the mass resource information of large group enterprises.
Step S202: and acquiring the inventory business rule associated with the asset inventory information.
In this embodiment, at least one of the following is specifically included:
acquiring an asset inventory filling content rule associated with asset attribute information;
acquiring a user use environment rule associated with user information;
acquiring an asset checking and summarizing right regulation associated with user information;
and acquiring asset reimbursement early warning rules and asset inventory special processing rules which are associated with the asset inventory historical log information and the asset attribute information.
Step S203: and executing corresponding asset checking operation according to the asset checking information and the checking service rule.
In this embodiment, the asset checking information and the checking service rule implement the corresponding asset checking operation based on the rule engine. The business rule change is inevitably caused in the operation process of the business system, the rule engine is provided, and the business rule part is realized by adopting the rule engine, so that the business rule can be modified by utilizing the rule engine under the condition of normal operation of the system, and the business rule can be conveniently realized as required.
It should be noted that the rule engine is developed from an inference engine, and is a component embedded in an application program, which implements separation of business decisions from application program codes, and writes business decisions using predefined semantic modules. The specific execution of the rules engine can be divided into several processes of accepting data input, interpreting business rules, and making business decisions based on the business rules.
After the rule engine is introduced into the system, the business rules are not resident in the system in the form of program codes any more, but are replaced by the rule engine for processing the rules, and the business rules are stored in the rule base and are completely independent of the program. Business personnel can manage the business rules like managing data, such as querying, adding, updating, counting, submitting the business rules, and the like. The business rules are loaded into the rules engine for application system calls. The rule engine in the embodiment of the application is mainly used in the intellectualization and automation of the judgment of the business scene, so that the uncertainty and the inconsistency of manual intervention are reduced while the efficiency is improved. In addition, the use of the rule engine further meets the requirement of flexible change of the business rules. When a system user needs to change the business rules, only the rule codes in the rule engine need to be directly modified. The development cost of the system is reduced, and the influence range of the change on the system can be better controlled.
In one embodiment, when the inventory business rule is the asset inventory filling content rule, the step S203 includes:
determining corresponding asset inventory filling content according to the asset attribute information;
if the asset inventory filling content meets the asset inventory content rule, the filling is successful;
and if the filling content does not meet the asset inventory content rule, failing to fill.
In this embodiment, an asset inventory filling content rule is drawn up according to the asset attribute information, and the process of making the asset inventory filling content is specifically as follows:
acquiring asset class information, and dividing assets into vehicles, office equipment, land, houses, buildings and other attachments;
according to different assets, displaying different required filling contents on a client, such as asset numbers, company codes, asset names, financial numbers, asset categories, checking persons, checking results, original values, net values and the like;
and comparing the filled content with the asset inventory content rule, if the filled content meets the established rule, passing the filling, and sending the content to a background for auditing, otherwise, failing to fill, and warning the user according to the content violating the rule.
The filling content rules of the vehicle comprise whether the asset number is empty, whether the checking result uses a user/position difference, whether the asset number corresponds to the asset and the like;
the filled content rule of the office equipment comprises whether the asset number is empty, whether the checking result uses the user/position difference, whether the asset number corresponds to the asset and the like;
the filling content rules of the land comprise whether the asset number is empty, whether the checking result uses a user/position difference, whether the asset number corresponds to the asset, whether the checking result is sufficient and the like;
the filled content rules for houses, buildings and other attachments include whether the asset number is empty, whether the inventory result uses people differences, whether the asset number corresponds to an asset, etc.
In one embodiment, when the inventory service rule is the user usage environment rule, step S203 includes:
determining user use environment information according to the user information;
if the user use environment meets the user use environment rule, the user use environment is safe, and asset checking is allowed to be continuously carried out;
and if the user using environment does not meet the user using environment rule, the user using environment has risk, and corresponding asset inventory exception reminding is executed.
In this embodiment, a rule of the user usage environment is formulated according to the user information, and the process of determining the user usage environment is specifically as follows:
acquiring user use environment information such as an IP address, operating equipment, a GPS and the like;
and comparing the use environment with the use environment rule of the user, if the set rule is met, ensuring that the use environment of the user is safe, allowing the user to continue inventory of the assets, otherwise, ensuring that the use environment of the user has risks, and warning the user according to the content violating the rule.
The user using environment rules comprise whether an IP address is in a designated position, whether the operating equipment is frequently used equipment and whether a GPS is in a safe area.
In one embodiment, when the inventory business rule is the asset inventory gathering check authority rule, the step S203 includes:
determining user identity information according to the user information;
comparing the user identity information with the asset inventory summary check authority rule;
and granting different user identity information to summarize and check the authority with different inventories.
In this embodiment, an asset checking, summarizing and checking authority rule is formulated according to user information, and the process of granting the asset checking, summarizing and checking authority is specifically as follows:
acquiring identity information of a user, such as a job number, a job title, a job age, a post and the like of the user;
the identity information of the user is compared with the asset checking and summarizing authority rules, different checking and summarizing authorities of different users are granted, and the different checking and summarizing authorities comprise asset users, asset custodians, classified entry managers, classified entry management department responsible persons, asset accounting, financial management department responsible persons, entry management department records, division of business department responsible persons and the like.
The asset checking and summarizing right rules comprise a classification returning management department responsible person, a returning management department responsible person, asset accounting, a financial management department responsible person, a returning management department for record and a cause department responsible person which do not support the correction of the checking result;
after receiving the checking result, the asset custodian, the classified entry manager and the entry manager can confirm and refute the assets one by one or in batches;
during the rejection, if the previous node is a classified entrance management department responsible person, an entrance management department responsible person and a financial management department responsible person, the rejection result automatically skips the nodes until the nodes can be operated and maintained, and simultaneously sends rejection information to the skipped nodes;
under the condition that assets which are not checked exist, the asset classification entry manager prohibits the classification entry manager from submitting checking results;
rejected assets, such as resubmitted inventory results, follow a progressive approval.
In one embodiment, when the inventory business rule is an asset inventory special processing rule, the step S203 includes:
acquiring first asset inventory historical information and first asset attribute information related to asset inventory;
if the first asset inventory historical information and the first asset attribute information meet the asset inventory special processing rule, carrying out special processing according to special conditions;
and if the first asset inventory historical information and the first asset attribute information do not meet the asset inventory special processing rule, executing corresponding asset inventory exception reminding.
In this embodiment, an asset reimbursement early warning rule and an asset inventory special processing rule are drawn up according to the asset inventory historical log information and the asset attribute information, and the asset inventory special processing flow is specifically as follows:
acquiring historical information and asset attribute information related to asset inventory, such as inventory authorization information, inventory scenes of users and the like;
comparing the historical information and the asset attribute information related to asset inventory with asset inventory special processing rules, if the historical information and the asset attribute information meet the set rules, carrying out special processing according to special conditions, otherwise, carrying out exception on asset inventory, and warning the user according to the content of violation rules.
The asset checking special rule comprises that if the checking plan is not checked, the user A can delegate other people (user B) to check, otherwise, the other people (user B) is not allowed to be delegated to check, meanwhile, the delegation is valid after being agreed by the agent, the custodian can also be replaced as authorization, the user B replaces the user A to check, the checking agent can handle before or after the checking plan is issued, and the user (agent checking person) is displayed in the checking list in real time. According to different user checking scenes, different special processing methods exist, for example, if a user A cannot find the asset and does not check the asset, the user B, C, D and E sequentially checks the asset, the latest checking trace of the users B, C, D and E is displayed under the checking task of the user A, and finally the user A judges whether the checking result is correct; if the user A has checked an asset, the users B, C, D and E sequentially check the asset, no other checking trace is displayed under the checking task of the user A, and the checking result is subject to the checking trace of the user A; if the user A has checked a loss of a certain asset, and the users B, C, D and E check the asset in sequence, displaying the latest checking traces of the people B, C, D and E under the checking task of the user A, and finally judging whether the checking result is correct or incorrect by the user A or the custodian; if users A, B, C, D are engaged in the same asset, the custodian judges that the result of each engagement is correct.
In an embodiment, when the inventory business rule is an asset inventory reimbursement warning rule, step S203 includes:
acquiring second asset inventory historical information and second asset attribute information related to asset inventory reimbursement early warning;
if the second asset inventory historical information and the second asset attribute information meet the asset inventory reimbursement early warning rule, the assets are normal, and the assets are brought into the judgment range;
and if the second asset checking historical information and the second asset attribute information do not meet the asset checking reimbursement early warning rule, the asset is abnormal, and corresponding asset checking abnormity reminding is executed.
In this embodiment, the early warning signal is output according to the asset reimbursement rule and the asset early warning rule. The process of reimbursement early warning in the asset inventory process specifically comprises the following steps:
acquiring historical information and asset attribute information related to asset inventory reimbursement early warning, such as asset use duration, expected asset use life, asset depreciation degree, GPS information of assets and the like;
comparing the asset inventory historical information and the asset attribute information with the asset inventory reimbursement early warning rule, if the asset inventory historical information and the asset attribute information meet the set rule, enabling the asset to be normal, bringing the asset into a judgment range, otherwise enabling the asset to be abnormal, and warning and punishing a user according to the content violating the rule.
The asset checking reimbursement early warning rules comprise whether the asset use duration is longer than the expected use life of the asset, whether the asset is damaged or not and whether the GPS information of the asset is in a specified position or not.
In one embodiment, after step S203, the method further includes:
and performing differentiated automatic processing on the asset inventory result.
In this embodiment, after the asset checking operation and the summary checking process are finished, the automated process processing is performed on different checking difference results according to the set rules. Specifically, the automated processing of the inventory difference results includes:
and setting a rule engine, sending an inventory result to a user for the assets updated after the reference day, automatically initiating an entry approval process for the inventory sufficient assets, automatically initiating a disposal process for the inventory deficient assets, and initiating a batch information updating approval process for other differential assets. Therefore, according to the rules set by the rule engine, different counting results can be automatically updated or processed in a difference mode.
The asset checking method in the embodiment of the application comprises the following steps: establishing a data warehouse for storing asset inventory information, wherein the asset inventory information comprises at least one item of asset attribute information, user information and asset inventory historical log information; acquiring an inventory business rule associated with the asset inventory information; and executing corresponding asset checking operation according to the asset checking information and the checking service rule. Therefore, the asset checking efficiency is improved by establishing the data warehouse, the checking service rule is set through the rule engine and is used for determining the result corresponding to the checking operation in the complex scene, and the flexibility of service change processing can be improved.
Based on the same inventive concept as the previous embodiment, an embodiment of the present invention provides a terminal, as shown in fig. 3, the apparatus including: a processor 310 and a memory 311 storing computer programs; the processor 310 illustrated in fig. 3 is not used to refer to the number of the processors 310 as one, but is used only to refer to the position relationship of the processor 310 relative to other devices, and in practical applications, the number of the processors 310 may be one or more; similarly, the memory 311 shown in fig. 3 is also used in the same sense, i.e. it is only used to refer to the position relationship of the memory 311 with respect to other devices, and in practical applications, the number of the memory 311 may be one or more. The asset inventory method applied to the above-described apparatus is implemented when the processor 310 runs the computer program.
The apparatus may further comprise: at least one network interface 312. The various components of the device are coupled together by a bus system 313. It will be appreciated that the bus system 313 is used to enable communications among the components of the connection. The bus system 313 includes a power bus, a control bus, and a status signal bus in addition to the data bus. For clarity of illustration, however, the various buses are labeled as bus system 313 in FIG. 3.
The memory 311 may be a volatile memory or a nonvolatile memory, or may include both volatile and nonvolatile memories. Among them, the nonvolatile Memory may be a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read-Only Memory (EPROM), an Electrically Erasable Programmable Read-Only Memory (EEPROM), a magnetic random access Memory (FRAM), a magnetic random access Memory (Flash Memory), a magnetic surface Memory, an optical Disc, or a Compact Disc Read-Only Memory (CD-ROM); the magnetic surface storage may be disk storage or tape storage. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration and not limitation, many forms of RAM are available, such as Static Random Access Memory (SRAM), synchronous Static Random Access Memory (SSRAM), dynamic Random Access Memory (DRAM), synchronous Dynamic Random Access Memory (SDRAM), double Data Rate Synchronous Dynamic Random Access Memory (DDRSDRAM), enhanced Synchronous Dynamic Random Access Memory (ESDRAM), enhanced Synchronous Dynamic Random Access Memory (Enhanced DRAM), synchronous Dynamic Random Access Memory (SLDRAM), direct Memory (DRmb Access), and Random Access Memory (DRAM). The memory 311 described in connection with the embodiments of the invention is intended to comprise, without being limited to, these and any other suitable types of memory.
The memory 311 in the embodiment of the present invention is used to store various types of data to support the operation of the apparatus. Examples of such data include: any computer program for operating on the device, such as operating systems and application programs; contact data; telephone book data; a message; a picture; video, etc. The operating system includes various system programs, such as a framework layer, a core library layer, a driver layer, and the like, and is used for implementing various basic services and processing hardware-based tasks. The application programs may include various application programs such as a Media Player (Media Player), a Browser (Browser), etc. for implementing various application services. Here, a program that implements the method of the embodiment of the present invention may be included in the application program.
Based on the same inventive concept of the foregoing embodiments, this embodiment further provides a computer-readable storage medium, where a computer program is stored, and the computer-readable storage medium may be a magnetic random access Memory (FRAM), a Read Only Memory (ROM), a Programmable Read Only Memory (PROM), an Erasable Programmable Read Only Memory (EPROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Flash Memory (Flash Memory), a magnetic surface Memory, an optical Disc, or a Compact Disc Read Only Memory (CD-ROM), and the like; or may be a variety of devices including one or any combination of the above memories, such as a mobile phone, computer, tablet device, personal digital assistant, etc. The computer program stored in the computer-readable storage medium implements the asset inventory method applied to the above-described apparatus when being executed by a processor. Please refer to the description of the above embodiments for a specific flow of steps realized when the computer program is executed by the processor, which is not described herein again.
The technical features of the embodiments described above may be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the embodiments described above are not described, but should be considered as being within the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
In this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, which may include other elements not expressly listed in addition to those listed.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily think of the changes or substitutions within the technical scope of the present invention, and shall cover the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.

Claims (10)

1. An asset inventory method, comprising the steps of:
s201, establishing a data warehouse for storing asset inventory information, wherein the asset inventory information comprises at least one item of asset attribute information, user information and asset inventory historical log information;
s202, acquiring an inventory business rule associated with the asset inventory information;
and S203, executing corresponding asset checking operation according to the asset checking information and the checking service rule.
2. The asset inventory method as claimed in claim 1, wherein said step S202 includes at least one of:
acquiring an asset inventory filling content rule associated with the asset attribute information;
acquiring a user usage environment rule associated with the user information;
acquiring an asset inventory summary check authority rule associated with the user information;
and acquiring asset reimbursement early warning rules and asset inventory special processing rules which are associated with the asset inventory historical log information and the asset attribute information.
3. The asset inventory method of claim 2, wherein when the inventory service rule is an asset inventory fill content rule, the step S203 includes:
determining corresponding asset inventory filling content according to the asset attribute information;
if the asset inventory filling content meets the asset inventory content rule, the filling is successful;
and if the filling content does not meet the asset inventory content rule, failing to fill.
4. The asset inventory method of claim 2, wherein when the inventory business rule is a user usage environment rule, said step S203 comprises:
determining user use environment information according to the user information;
if the user using environment meets the user using environment rule, the user using environment is safe, and asset checking is allowed to continue;
and if the user using environment does not meet the user using environment rule, the user using environment has risk, and corresponding asset inventory abnormity reminding is executed.
5. The asset inventory method according to claim 2, wherein when the inventory business rule is an asset inventory summary check authority rule, the step S203 includes:
determining user identity information according to the user information;
comparing the user identity information with an asset inventory summary check authority rule;
and granting different user identity information to summarize and check the authority with different inventories.
6. The asset inventory method according to claim 2, wherein when the inventory business rule is an asset inventory special processing rule, the step S203 includes:
acquiring first asset inventory historical information and first asset attribute information related to asset inventory;
if the first asset inventory historical information and the first asset attribute information meet the asset inventory special processing rule, carrying out special processing according to special conditions;
and if the first asset inventory historical information and the first asset attribute information do not meet the asset inventory special processing rule, executing corresponding asset inventory abnormal reminding.
7. The asset inventory method according to claim 2, wherein when the inventory business rule is an asset inventory reimbursement warning rule, the step S203 includes:
acquiring second asset inventory historical information and second asset attribute information related to asset inventory reimbursement early warning;
if the second asset inventory historical information and the second asset attribute information meet the asset inventory reimbursement early warning rule, the assets are normal, and the assets are brought into a judgment range;
and if the second asset inventory historical information and the second asset attribute information do not meet the asset inventory reimbursement early warning rule, the asset is abnormal, and corresponding asset inventory abnormity reminding is executed.
8. The asset inventory method of claim 1, wherein said step S203 is followed by the steps of:
and performing differential automatic processing on the asset inventory result.
9. A terminal, comprising: a processor and a memory storing a computer program which, when executed by the processor, implement the steps of the asset inventory method of any of claims 1 to 8.
10. A computer-readable storage medium, characterized in that a computer program is stored which, when being executed by a processor, carries out the steps of the asset inventory method of any one of claims 1 to 8.
CN202211211447.4A 2022-09-30 2022-09-30 Asset checking method, terminal and computer readable storage medium Pending CN115510169A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211211447.4A CN115510169A (en) 2022-09-30 2022-09-30 Asset checking method, terminal and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211211447.4A CN115510169A (en) 2022-09-30 2022-09-30 Asset checking method, terminal and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN115510169A true CN115510169A (en) 2022-12-23

Family

ID=84507251

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211211447.4A Pending CN115510169A (en) 2022-09-30 2022-09-30 Asset checking method, terminal and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN115510169A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116797148A (en) * 2023-06-28 2023-09-22 河北建投智慧财务服务有限公司 Fixed asset management method and device based on comprehensive office system

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116797148A (en) * 2023-06-28 2023-09-22 河北建投智慧财务服务有限公司 Fixed asset management method and device based on comprehensive office system

Similar Documents

Publication Publication Date Title
US7574379B2 (en) Method and system of using artifacts to identify elements of a component business model
US8200709B2 (en) Data model and applications
CA2846176C (en) System and method for generating an informational packet for the purpose of marketing a vehicle to prospective customers
US8782616B2 (en) Templates for configuring digital sending devices to achieve an automated business process
US20080163347A1 (en) Method to maintain or remove access rights
US20020052862A1 (en) Method and system for supply chain product and process development collaboration
US20020111850A1 (en) System and method for new product clearance and development
US9608987B2 (en) Systems and methods for the secure sharing of data
CN110032594B (en) Customizable data extraction method and device for multi-source database and storage medium
US20230169065A1 (en) System for uploading information into a metadata repository
CN102870110B (en) Document registration system
US20030101085A1 (en) Method and system for vendor communication
CN112598364A (en) Expert information management platform based on cloud service
CN115510169A (en) Asset checking method, terminal and computer readable storage medium
JP2003196476A (en) Security policy creation support system and security measure determination support system
CN113095647B (en) Vehicle inspection system
GB2601045A (en) Automated computerized identification of assets
US20170270163A1 (en) Data Information Framework
US20200387802A1 (en) Dynamically adaptable rules and communication system for managing process controls
CN116719799A (en) Environment-friendly data management method, device, computer equipment and storage medium
CN115564356A (en) Real-time sharing method and device for relatives and friends logistics order information
US20140149186A1 (en) Method and system of using artifacts to identify elements of a component business model
CN115115334A (en) Information archive database management system
Gatling et al. Enterprise information management with SAP
CN111861401A (en) Technical scheme of industry qualification management and online approval system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination