CN115563425A - Multi-granularity embedded integration method and device based on business intelligent system - Google Patents

Multi-granularity embedded integration method and device based on business intelligent system Download PDF

Info

Publication number
CN115563425A
CN115563425A CN202211400357.XA CN202211400357A CN115563425A CN 115563425 A CN115563425 A CN 115563425A CN 202211400357 A CN202211400357 A CN 202211400357A CN 115563425 A CN115563425 A CN 115563425A
Authority
CN
China
Prior art keywords
main
container
embedded
data information
authentication token
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211400357.XA
Other languages
Chinese (zh)
Inventor
刘涛
赵建伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Xi'an Grape City Software Co ltd
Original Assignee
Xi'an Grape City Software Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Xi'an Grape City Software Co ltd filed Critical Xi'an Grape City Software Co ltd
Priority to CN202211400357.XA priority Critical patent/CN115563425A/en
Publication of CN115563425A publication Critical patent/CN115563425A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/957Browsing optimisation, e.g. caching or content distillation
    • G06F16/9577Optimising the visualization of content, e.g. distillation of HTML documents
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/451Execution arrangements for user interfaces
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45504Abstract machines for programme code execution, e.g. Java virtual machine [JVM], interpreters, emulators
    • G06F9/45529Embedded in an application, e.g. JavaScript in a Web browser

Landscapes

  • Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Human Computer Interaction (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a multi-granularity embedded integration method and device based on a business intelligent system, and belongs to the technical field of business intelligence. The method specifically comprises the following steps: starting the main system, and finishing authentication according to the acquired identity authentication token of the main system and the URL of the server; creating a main container in a main system, and recording a preview address and a unique identity of the main container; setting a main system containing an identity authentication token and a server URL as a resource attribute of a service system page inline frame; the display system is used for displaying visual data information with different granularities in a main container of a main system by using different embedded frameworks according to display requirements. The method realizes the embedding of the instrument board or the report in a business intelligent system in a form of various granularities, and provides a service for customizing a design business system for a user.

Description

Multi-granularity embedded integration method and device based on business intelligent system
Technical Field
The application relates to the technical field of business intelligence, in particular to a multi-granularity embedded integration method and device based on a business intelligence system.
Background
An embedded Business Intelligence (BI) system, also called an embedded analysis system, is a Business Intelligence system specially providing a self-service analysis function in a Business application program for a user. The system has the main functions of analyzing the acquired data, displaying the analysis result in a graph form in a visual mode, effectively and quickly displaying enterprise data information comprehensively, analyzing the operation data of enterprises, providing decision basis for the enterprises, and becoming a carrier and a platform for numerous enterprise data operation management. The embedded business intelligent system can be widely applied to multiple fields of financial analysis, sales analysis, market analysis, production analysis, supply chain analysis, risk analysis, quality analysis and the like.
The existing embedded business intelligence system usually uses a link form or an Iframe integral embedded form to externally display the dashboard and the report. At present, no matter the instrument panel and the report are externally displayed in a linked form or an Iframe integrated embedded form, a user can only view a designed complete instrument panel or report, and the embedded granularity of the instrument panel or the report cannot be controlled according to the requirements of a business system.
Disclosure of Invention
The embodiment of the application solves the problems that in the prior art, a link or Iframe integrated embedded form is used for disclosing the instrument panel or the report, the user freedom degree is low, and the instrument panel or the report cannot be modified and edited in an individualized way, and realizes that the instrument panel, the report or a designer is embedded into a product owned by a client, and a multi-granularity embedded mode of integrated embedding or partial embedding is provided, so that the client can modify or edit the instrument panel or the report according to the requirement. The embedded business intelligence tool is embedded into the own software product by technicians, and the user can access the analysis without relying on the support of a third party BI advisor or a client, so that the software company is easily helped to realize the data analysis function in the own software product.
In a first aspect, an embodiment of the present application provides a multi-granularity embedded integration method based on a business intelligence system, where the method includes: starting a main system, and finishing authentication according to the acquired identity authentication token of the main system and the URL of the server; creating a main container in the main system, and recording a preview address and a unique identity of the main container; setting the main system containing the identity authentication token and the server URL as a resource attribute of a business system page inline frame; and the display module is used for displaying visual data information with different granularities in the main container of the main system by using different embedded frames according to display requirements.
With reference to the first aspect, in a possible implementation manner, the completing authentication and authorization according to the acquired authentication token of the host system and the server URL includes: the host system creates the authentication token for the user when being accessed, and returns the authentication token to the client; when a user carries the authentication token to access the client, the host system analyzes the authentication token and carries out authentication; and if the identity authentication token passes the verification and the transmission parameters are complete and correct, finishing the authentication.
With reference to the first aspect, in one possible implementation manner, the host system includes a Wyn Enterprise business intelligence system, and the host container includes an analysis dashboard.
With reference to the first aspect, in a possible implementation manner, the displaying, in the primary container of the primary system, visualization data information of different granularities by using different embedded frameworks includes: embedding visual data information of different granularities in the main container by using an Iframe framework; embedding visual data information of different granularities in the main container by using a Div framework.
With reference to the first aspect, in a possible implementation manner, the visualization data information with different granularities includes: the whole dashboard, part of the dashboard page and part of the dashboard page components.
With reference to the first aspect, in one possible implementation manner, the embedding visual data information of different granularities in the main container by using an Iframe framework includes: supplementing the identity authentication token into the preview address of the main container to serve as a supplemented address, and creating a target form in the main container; the target window accesses the main system through the complementing address, and control parameters with various granularities are used as a first function; and calling corresponding data in the main system by using the first function to realize embedding visual data information with different granularities.
With reference to the first aspect, in a possible implementation manner, the embedding visual data information of different granularities in the main container by using a Div framework includes: calling a JavaScript API by using a target container established in the main container, and acquiring an authentication token of the main system, a server URL and a preview address of the main container; instantiating a plurality of embedded containers in the target container and initializing the embedded containers; identifying a plurality of said embedded containers as a second function of said embedded component; and calling corresponding data in the main system by using the second function to realize embedding of different visual data information.
In a second aspect, an embodiment of the present application provides a multi-granularity embedded integrated device based on a business intelligence system, where the device includes: the authentication module is used for starting the main system and finishing authentication according to the acquired identity authentication token of the main system and the URL of the server; the main container module is used for creating a main container in the main system and recording a preview address and a unique identity of the main container; the setting module is used for setting the main system containing the identity authentication token and the server URL as the resource attribute of a business system page internal frame; and the embedding module is used for embedding visual data information with different granularities into the main container of the main system according to the display requirement.
With reference to the second aspect, in a possible implementation manner, the authentication module is specifically configured to: the host system creates the authentication token for the user when being accessed, and returns the authentication token to the client; when a user carries the authentication token to access the client, the host system analyzes the authentication token and carries out authentication; and if the identity authentication token passes the verification and the transmission parameters are complete and correct, finishing the authentication.
With reference to the second aspect, in a possible implementation manner, the embedding module is specifically configured to: embedding visual data information of different granularities in the main container by using an Iframe framework; embedding visual data information of different granularities in the main container by using a Div framework.
In a third aspect, an embodiment of the present application provides an apparatus, where the apparatus includes: a processor; a memory for storing processor-executable instructions; the processor, when executing the executable instructions, performs the method as described in the first aspect or any one of the possible implementations of the first aspect.
In a fourth aspect, embodiments of the present application provide a non-transitory computer-readable storage medium including instructions or computer programs for storing a computer program, which when executed, causes a method according to the first aspect or any one of the possible implementations of the first aspect to be implemented.
One or more technical solutions provided in the embodiments of the present application have at least the following technical effects:
the embedded integration method and the embedded integration device based on the multi-granularity effectively solve the problem that the existing embedded business intelligent system can only embed the designed instrument panel and the report integrally.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments of the present application or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and other drawings can be obtained by those skilled in the art without creative efforts.
Fig. 1 is a flowchart of a multi-granularity embedded integration method based on a business intelligence system according to an embodiment of the present application;
fig. 2 is a flowchart illustrating obtaining authentication of a host system according to an embodiment of the present application;
fig. 3 is a flowchart of embedding visualized data information with different granularities by using an Iframe framework according to an embodiment of the present application;
FIG. 4 is a flowchart of embedding visual data information of different granularities using a Div framework according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of a multi-granular embedded integrated device based on a business intelligence system according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application. It is to be understood that the embodiments described are only a few embodiments of the present invention, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The embodiment of the application provides a multi-granularity embedded integration method and device based on a business intelligent system, which are used for solving the problems that the existing business intelligent system can only embed an instrument panel or a report integrally in a link or Iframe mode and a user cannot control the embedded granularity of the instrument panel or the report according to actual requirements, so that a multi-granularity embedding method is realized, and the user can customize and control the embedded granularity of the instrument panel or the report according to the requirements.
Some of the techniques referred to in the embodiments of the present application are described below, including the use of custom terms for the embodiments of the present application to facilitate understanding, which should be considered exemplary only. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the present application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
An authentication token: (English: token), which is equivalent to the account and password in the login system. The system Wyn Enterprise is internally provided with a login system, and a user needs an account and a password to login when using the system, but after the system is embedded into a business system of a client, the user needs to login the system at each access from the user experience angle, which is a very tedious step, so that the user can directly obtain Token when using the embedded system, and only one check is needed, and the system can carry the authentication Token to automatically analyze and complete authentication when accessing the system.
Server URL: refers to accessing the URL of the host system Wyn Enterprise, specifically http%3A%2F%2Flocalhost%3A51980%2F in the examples of this application.
Preview address: refer to a page preview web site, for example: http% 3A%.
Fig. 1 is a flowchart of a method for multi-granular embedded integration based on a business intelligence system according to an embodiment of the present application, including steps 101 to 104. Fig. 1 is only an execution sequence shown in the embodiment of the present application, and does not represent a unique execution sequence of the multi-granularity embedded integration method based on a business intelligence system, and the steps shown in fig. 1 may be executed in parallel in the case that a final result is achieved.
Step 101: and starting the main system, and finishing authentication according to the acquired identity authentication token of the main system and the URL of the server.
The specific implementation manner of step 101 and the technical effects thereof can refer to the embodiment shown in fig. 2, which includes steps 201 to 203, which are described in detail as follows.
Step 201: the host system, when accessed, creates an authentication token for the user and returns the authentication token to the client. Specifically, in step 201, when the Wyn Enterprise business intelligence system, the primary system, is used, the authentication token is generated in the configuration page to register the authentication token and the server URL, which in the embodiment of the present application is http% 3a-2f-2fcalcholhost-3a 51980-2f-is generated. The host system creates an Access Token for the user, stores the Access Token in the server, and returns a Reference Token to the client, wherein the Reference Token does not contain authentication information.
Step 202: when the user carries the authentication token to access the client, the host system analyzes the authentication token and carries out authentication. Step 202 specifically includes, when accessing the client, transmitting required parameters including Reference Token, file ID, etc., when the front-end page requests resources from the back-end server, the front-end page carries the Reference Token to apply for authentication, the back-end server automatically resolves the Reference Token into JSON Web Token (JWT Token) according to the stored information, and acquires a user context according to the JWT Token to authenticate the request.
Step 203: and if the identity authentication token passes the verification and the transmission parameters are complete and correct, finishing the authentication. Step 203 specifically includes performing a subsequent embedding step if Token check passes and the transmitted parameters are complete and correct.
Step 102: creating a main container in the main system, and recording the preview address and the unique identity of the main container. Step 102 is specifically creating a master container in the master system, i.e., the Wyn Enterprise Business Intelligence System, which in the present embodiment is the analysis dashboard, recording the preview address and unique ID of the analysis dashboard, wherein the preview address in the present embodiment is http% 3A%2F%2Flocalhost%:
http%3A 2F%2Flocalhost%.
Step 103: and setting the main system containing the identity authentication token and the server URL as the resource attribute of the service system page inline frame. Step 103 is to obtain attribute information of background resources of the main system after the identity authentication token is combined with the server URL to embed the main system into the service system.
Step 104: the display system is used for displaying visual data information with different granularities in a main container of a main system by using different embedded frameworks according to display requirements. Step 104 specifically includes embedding visualization data information of different granularities in the main container using an Iframe framework and embedding visualization data information of different granularities in the main container using a Div framework. Wherein the visualization data information of different granularities comprises: the whole dashboard, part of the dashboard page and part of the dashboard page components.
The specific implementation of step 104 and the technical effects thereof can be obtained by referring to the embodiments shown in fig. 3 and fig. 4, including steps 301 to 303 and steps 401 to 404, which are described in detail below.
Fig. 3 is a flowchart of embedding visualized data information with different granularities in a main container by using an Iframe framework, which is described in detail below.
Step 301: and supplementing the identity authentication token into the preview address of the main container to serve as a supplemented address, and creating a target form in the main container. Step 301 specifically includes creating a target window, that is, an Iframe container, and using the format of preview address & token = authentication token, filling the authentication token into the preview address of the main container as a filling address to be placed in the Iframe container, which in this embodiment may be:
<Iframe
src="http%3A%2F%2Flocalhost%3A51980%2Fdashboards%2Fview%2F5d5cafe6e98abc00018ff4e5%3Ftheme%3Ddefault&token%3D0b77ebfe232bff06248ce245c24af6aa84010b5f747ef41e605b08ae310a6fed"%2F>。
step 302: the target form accesses the main system through the supplementary address, and the control parameters with various granularities are used as a first function. Step 302 specifically, the complementing address is directly used as an attribute value of src of the target form, where the first function is null; using the padding address plus & pageNumber = x, where x is the specific page number of the dashboard page, and taking the & pageNumber = x as a first function, for example: & pageNumber =2, indicating that the dashboard page with page number 2 in the dashboard is called. Using the supplemented address followed by & scenario = y, y being the name of the dashboard page component, taking & scenario = y as the first function, for example: & sconalio = area, indicating that a component named area in the instrument panel is commissioned.
Step 303: and calling corresponding data in the main system by using the first function to realize embedding visual data information with different granularities. Step 303 specifically includes directly using the complementary address as the src attribute value of the target window, so as to implement embedding the entire dashboard into the target window. For example:
src = "http%3A%2F =" 2Flocalanchor 3 A51980%.
And embedding the designated dashboard page into the target window by using the supplemented address and a first function & pageNumber = x, wherein x is a specific page number of the dashboard page and is used as an attribute value of src of the target window. For example:
src = "http% 3A%2F%2Flocalanchor%.
Embedding the instrument panel assembly into the target window can be realized by adding a first function & sconario = y after the address is added, wherein y is the name of the instrument panel page assembly and is used as the attribute value of src of the target window. For example:
src = "http%3A%2F =" http% 3A%.
Fig. 4 illustrates the use of Div frames to embed visualization data information of different granularities in the main container. The details are as follows.
Step 401: and calling a JavaScript API by using the target container created in the main container, and acquiring the authentication token of the main system, the server URL and the preview address of the main container. Step 401 specifically includes calling a js function in the JavaScript API in the main container, and taking the authentication token of the main system, the server URL, and the preview address of the main container as corresponding attribute values in the main container.
Step 402: multiple embedded containers are instantiated in the target container and initialized.
Step 403: the identities of the plurality of embedded containers are identified as a second function of the embedded component. Step 403 specifically includes creating a plurality of Div containers in the target container, setting styles for the Div containers and defining IDs, where the IDs are identifiers of the Div containers, and taking the IDs of the Div containers as a second function. In the embodiment of the application, when the instrument panel is integrally embedded into the target container, the second function is # dashboard-root; when the dashboard page is embedded into the target container, the second function is # page-1; embedding part of the components of the dashboard into the target container, the second function is # firstscorio. The # dashboard-root, # page-1, and # firstscanario are merely illustrative, and should not be construed as limiting the embodiments of the present application, and those skilled in the art should understand that the Div containers correspond to different levels of ids.
Step 404: and calling corresponding data in the main system by using the second function to realize embedding of different visual data information. Step 404 is specifically to implement control over the embedding granularity by calling a different second function in the target container. Calling the identity of the instrument panel-level Div container, if the identity is a # dashboard-root, integrally embedding the instrument panel into the target container; calling the identity of the Div container at the dashboard page level, and if the identity is # page-1, embedding the dashboard page into the target container; calling the identity of the Div container at the dashboard component level, such as # firstScenario, embeds the dashboard component in the target container.
On the other hand, in the embodiment of the application, the layout mode of the components can be changed after the target container is embedded into the dashboard component. Specifically, a layout container is instantiated in a target container, and the layout container is initialized; and calling the identity identifications of the Div containers of a plurality of instrument panel component levels in the layout container, and setting the layout mode of each component in the target container by using a layout function.
The embodiment of the application greatly enhances the capability of the embedded business intelligent system, supports the embedding of various content granularities into other business systems and various embedding modes, supports the selection of partial visual components when JavaScript is embedded into Div, and applies a brand new layout mode. The embodiment of the application provides a more comprehensive embedding mode and better customizability, and can more comprehensively adapt to user requirements.
Although the present application provides method steps as described in an embodiment or flowchart, additional or fewer steps may be included based on conventional or non-inventive efforts. The sequence of steps recited in this embodiment is only one of many steps performed and does not represent a unique order of execution. When an actual apparatus or client product executes, it can execute sequentially or in parallel (e.g., in the context of parallel processors or multi-threaded processing) according to the methods shown in this embodiment or the figures.
As shown in fig. 5, the embodiment of the present application further provides a multi-granular embedded integrated device 500 for a business intelligence system. The device includes: an authentication module 501, a main container module 502, a setting module 503 and an embedding module 504.
The authentication module 501 is configured to start a host system, and complete authentication according to the acquired authentication token of the host system and the URL of the server. The authentication module 501 is specifically configured to create an authentication token for the user when the host system is accessed, and return the authentication token to the client; when a user carries an authentication token to access a client, the main system analyzes the authentication token and carries out authentication; and if the identity authentication token passes the verification and the transmission parameters are complete and correct, finishing the authentication.
The main container module 502 is configured to create a main container in the host system, and record a preview address and a unique identifier of the main container. The main container module 502 is specifically configured to create a main container in a main system, that is, a Wyn Enterprise business intelligence system, where the main container is an analysis dashboard in this embodiment of the present application, and records a preview address and a unique identity of the analysis dashboard, where the preview address is: http% 3A%:
http% 3A-, 2F-2Flocalhost-, 3A51980-2Fdashboards-2Fview-2F55cafefetie98abc00018ff4e5-3Ftheme-3Ddefault, wherein 5d5cafe6e98abc00018ff4e is the ID of the page being previewed, i.e. the unique identity of the created main container.
The setting module 503 is configured to set the host system including the authentication token and the server URL as a resource attribute of a service system page inline frame. The setting module 503 is specifically configured to combine the authentication token with the server URL to obtain attribute information of background resources of the host system after the host system is embedded in the service system.
The embedding module 504 is configured to embed visual data information with different granularities in the main container of the main system according to a display requirement. The embedding module 504 is specifically configured to embed visualized data information of different granularities in the main container using an Iframe framework; visual data information of different granularities is embedded in the main container using a Div framework. Wherein, the visual data information with different granularities comprises: the whole dashboard, part dashboard page and part dashboard page components. After a user embeds the instrument panel assembly into a user business system by using the Div framework, the layout form of the embedded assembly can be controlled by a layout function, and more flexible and customizable service is provided for the user.
Some of the modules in the apparatus described herein may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, classes, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The apparatus or module described in the embodiments of the application may be implemented by a computer chip or an entity, or by a product with certain functions. For convenience of description, the above devices are described as being divided into various modules by functions, and are described separately. The functions of the modules can be implemented in the same or multiple software and/or hardware when implementing the embodiments of the present application. Of course, a module that implements a certain function may be implemented by a plurality of sub-modules or sub-units in combination.
The methods, apparatus or modules described herein may be implemented in a computer readable program code means for a controller in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer readable medium storing computer readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, application Specific Integrated Circuits (ASICs), programmable logic controllers and embedded microcontrollers, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, atmel AT91SAM, microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller in purely computer readable program code means, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may therefore be considered as a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be regarded as being both a software module for performing the method and a structure within a hardware component.
An embodiment of the present application further provides an apparatus, including: a processor; a memory for storing processor-executable instructions; when the processor executes the executable instructions, the method according to the embodiment of the application is realized.
Embodiments of the present application also provide a non-transitory computer-readable storage medium having stored thereon a computer program or instructions, which when executed, cause a method as described in embodiments of the present application to be implemented.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing module, or each of the modules may exist alone, or two or more modules may be integrated into one module.
The storage medium includes, but is not limited to, a Random Access Memory (RAM), a Read-Only Memory (ROM), a Cache, a Hard disk (Hard disk), or a Memory card (HDD). The memory may be used to store computer program instructions.
From the above description of the embodiments, it is clear to those skilled in the art that the present application can be implemented by software plus necessary hardware. Based on such understanding, the technical solutions of the present application may be embodied in the form of software products or in the implementation process of data migration, which essentially or partially contributes to the prior art. The computer software product may be stored in a storage medium such as ROM/RAM, magnetic disk, optical disk, etc., and includes instructions for causing a computer device (which may be a personal computer, mobile terminal, server, or network device, etc.) to perform the methods described in the various embodiments or portions of the embodiments of the present application.
The embodiments in the present specification are described in a progressive manner, and the same or similar parts among the embodiments may be referred to each other, and each embodiment is described with emphasis on the difference from the other embodiments. All or portions of the present application are operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, mobile communication terminals, multiprocessor systems, microprocessor-based systems, programmable electronic devices, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like.
The above embodiments are only used to illustrate the technical solutions of the present application, and not to limit the present application; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; such modifications or substitutions do not depart from the spirit and scope of the present disclosure.

Claims (10)

1. A multi-granularity embedded integration method based on a business intelligent system is characterized by comprising the following steps:
starting a main system, and finishing authentication according to the acquired identity verification token of the main system and the URL of the server;
creating a main container in the main system, and recording a preview address and a unique identity of the main container;
setting the main system containing the identity authentication token and the server URL as the resource attribute of a business system page inline frame;
and the display module is used for displaying visual data information with different granularities in the main container of the main system by using different embedded frames according to display requirements.
2. The method according to claim 1, wherein the performing authentication according to the acquired authentication token of the host system and the server URL comprises:
the host system creates the authentication token for the user when being accessed, and returns the authentication token to the client;
when a user carries the identity authentication token to access the client, the main system analyzes the identity authentication token and performs authentication;
and if the identity authentication token passes the verification and the transmission parameters are complete and correct, finishing the authentication.
3. The method of claim 1, wherein the host system comprises a Wyn Enterprise business intelligence system and the primary container comprises an analysis dashboard.
4. The method of claim 1, wherein the displaying visual data information of different granularities in the master container of the master system using different embedded frameworks comprises:
embedding visual data information of different granularities in the main container by using an Iframe framework;
embedding visual data information of different granularities in the main container by using a Div framework.
5. The method of claim 1 or 4, wherein the visualization data information of different granularities comprises: the whole dashboard, part of the dashboard page and part of the dashboard page components.
6. The method according to claim 4, wherein the embedding visualization data information of different granularities in the master container using an Iframe framework comprises:
supplementing the identity authentication token into the preview address of the main container to serve as a supplemented address, and creating a target form in the main container;
the target window accesses the main system through the complementing address, and control parameters with various granularities are used as a first function;
and calling corresponding data in the main system by using the first function to realize embedding visual data information with different granularities.
7. The method according to claim 4, wherein the embedding visual data information of different granularities in the main container using the Div framework comprises:
calling JavaScript API by using the target container established in the main container, and acquiring an authentication token of the main system, a server URL and a preview address of the main container;
instantiating a plurality of embedded containers in the target container and initializing the embedded containers;
identifying a plurality of said embedded containers as a second function of said embedded component;
and calling corresponding data in the main system by using the second function to realize embedding of different visual data information.
8. A multi-granularity embedded integrated device based on a business intelligence system, comprising:
the authentication module is used for starting the main system and finishing authentication according to the acquired identity verification token of the main system and the URL of the server;
the main container module is used for creating a main container in the main system and recording a preview address and a unique identity of the main container;
the setting module is used for setting the main system containing the identity authentication token and the server URL as the resource attribute of a business system page internal frame;
and the embedding module is used for embedding visual data information with different granularities into the main container of the main system according to the display requirement.
9. An apparatus, comprising:
a processor;
a memory for storing processor-executable instructions;
the processor, when executing the executable instructions, implements the method of any one of claims 1 to 7.
10. A non-transitory computer-readable storage medium comprising instructions for storing a computer program or instructions that, when executed, cause the method of any one of claims 1 to 7 to be implemented.
CN202211400357.XA 2022-11-09 2022-11-09 Multi-granularity embedded integration method and device based on business intelligent system Pending CN115563425A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211400357.XA CN115563425A (en) 2022-11-09 2022-11-09 Multi-granularity embedded integration method and device based on business intelligent system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211400357.XA CN115563425A (en) 2022-11-09 2022-11-09 Multi-granularity embedded integration method and device based on business intelligent system

Publications (1)

Publication Number Publication Date
CN115563425A true CN115563425A (en) 2023-01-03

Family

ID=84769150

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211400357.XA Pending CN115563425A (en) 2022-11-09 2022-11-09 Multi-granularity embedded integration method and device based on business intelligent system

Country Status (1)

Country Link
CN (1) CN115563425A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140157170A1 (en) * 2012-12-04 2014-06-05 Sap Ag Storytelling in Visual Analytics Tools for Business Intelligence
CN106354786A (en) * 2016-08-23 2017-01-25 冯村 Visual analysis method and system
US20190066012A1 (en) * 2017-08-22 2019-02-28 Beavex Incorporated Enterprise customer website

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20140157170A1 (en) * 2012-12-04 2014-06-05 Sap Ag Storytelling in Visual Analytics Tools for Business Intelligence
CN106354786A (en) * 2016-08-23 2017-01-25 冯村 Visual analysis method and system
US20190066012A1 (en) * 2017-08-22 2019-02-28 Beavex Incorporated Enterprise customer website

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
WYN_WRITER: "Wyn Enterprise 5.0 Update1 帮助文档", 《HTTPS://HELP.GRAPECITY.COM.CN/PAGES/VIEWPAGE.ACTION?PAGEID=62062846》 *

Similar Documents

Publication Publication Date Title
US10606576B1 (en) Developer experience for live applications in a cloud collaboration platform
CN109416651B (en) Update coordination in a multi-tenant cloud computing environment
US10601866B2 (en) Discovering website phishing attacks
US9430449B2 (en) Systems, methods, and media for managing editable previews of webpages
US9722873B2 (en) Zero-downtime, reversible, client-driven service migration
EP3005100B1 (en) Bundle package generation
US10528675B2 (en) Context-aware translation memory to facilitate more accurate translation
US10142371B2 (en) Authorization policy customization and authorization policy lockdown
US20160306735A1 (en) Customized application performance testing of upgraded software
US10289397B2 (en) Silent installation of software with dependencies
US9984087B2 (en) Performing actions on objects as a result of applying tags to the objects
US9189204B2 (en) Static analysis of computer software applications having a model-view-controller architecture
CN108509207A (en) The cross-system of WEB application program is installed
CN113076104A (en) Page generation method, device, equipment and storage medium
US20180357436A1 (en) Parallel access to running eda application
US20210392144A1 (en) Automated and adaptive validation of a user interface
AU2013390785A1 (en) Bundle package signing
US9158932B2 (en) Modeled authorization check implemented with UI framework
US11269756B1 (en) Self-healing web applications
CN105912328B (en) Display methods, device and the web system of the web system page
US20170017380A1 (en) Mobile enabling a web application developed without mobile rendering capabilities
US20230224279A1 (en) Deploying and Utilizing a Dynamic Data Stenciling System with a Smart Linking Engine
US11288232B2 (en) Database deployment objects and deterministic locking models
CN113742005A (en) Platform docking method and device
US11604662B2 (en) System and method for accelerating modernization of user interfaces in a computing environment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination