CN116452125A - Business compliance inspection system - Google Patents

Business compliance inspection system Download PDF

Info

Publication number
CN116452125A
CN116452125A CN202210010854.2A CN202210010854A CN116452125A CN 116452125 A CN116452125 A CN 116452125A CN 202210010854 A CN202210010854 A CN 202210010854A CN 116452125 A CN116452125 A CN 116452125A
Authority
CN
China
Prior art keywords
data
review
user
target
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210010854.2A
Other languages
Chinese (zh)
Inventor
刘丽娟
冷桂丹
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Kingsoft Cloud Network Technology Co Ltd
Original Assignee
Beijing Kingsoft Cloud Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Kingsoft Cloud Network Technology Co Ltd filed Critical Beijing Kingsoft Cloud Network Technology Co Ltd
Priority to CN202210010854.2A priority Critical patent/CN116452125A/en
Publication of CN116452125A publication Critical patent/CN116452125A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Entrepreneurship & Innovation (AREA)
  • General Physics & Mathematics (AREA)
  • Operations Research (AREA)
  • Tourism & Hospitality (AREA)
  • Quality & Reliability (AREA)
  • General Business, Economics & Management (AREA)
  • Marketing (AREA)
  • Economics (AREA)
  • Computational Linguistics (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application provides a business compliance inspection system, which comprises: the to-be-inspected data generation module is used for acquiring to-be-inspected source data in the target service system; generating data to be checked and tasks to be checked according to the source data; the task to be checked display module is used for acquiring and displaying all tasks to be checked of the checking user; receiving a first input of a review user, and responding to the first input, and sending a task identification of a target task to be reviewed to a data review module; the data review module is used for receiving the task identification; acquiring target to-be-inspected data corresponding to the target to-be-inspected task according to the task identification, and displaying the target to-be-inspected data; receiving review information of a review user aiming at target data to be reviewed, and storing the review information; and the data auditing module is used for displaying all the tasks to be audited so that an auditing user monitors the tasks to be audited which are not reviewed and/or audits the tasks to be audited which pass through.

Description

Business compliance inspection system
Technical Field
The embodiment of the disclosure relates to the technical field of computers, in particular to a business compliance inspection system.
Background
With the increasing development of enterprise business, enterprises often face compliance audit reviews of various laws and regulations and industry specifications.
When conventional compliance inspection is performed on various business systems of an enterprise, related responsible persons of each business system generally need to manually sort various materials to be inspected according to an inspection period, for example, account authority list, online operation record, change record and other materials in the business system, and send different kinds of sorted materials to an inspection supervisor for inspection in a mail mode. The review manager needs to receive mails, download and open data for review one by one, reply review comments one by one, and the efficiency is low; in addition, when the enterprise submits the review results of the review manager manually to the internal or external review, the auditor may challenge the authenticity of the data in the past because of the possibility of manually modifying the review results.
As a result, it is known that the conventional method has problems of low efficiency, scattered information, and unreliable authenticity of the inspection result when inspecting whether the enterprise business system is compliant.
Disclosure of Invention
It is an object of the present disclosure to provide a business compliance screening system to solve the problems of inefficiency, information dispersion, and unreliable authenticity of screening results existing when compliance screening is performed on an enterprise business system.
According to a first aspect of the present disclosure, there is provided an embodiment of a business compliance censoring system, comprising:
the system comprises a data to be inspected generating module, an inspection task displaying module, a data review module and a data audit module;
the data to be inspected generation module is used for acquiring source data to be inspected in the target service system; generating to-be-inspected data and to-be-inspected tasks corresponding to the to-be-inspected data according to the source data, wherein the to-be-inspected tasks are tasks for indicating corresponding to-be-inspected users to review the to-be-inspected data;
the task to be checked display module is used for acquiring and displaying all tasks to be checked of the checking user; receiving a first input of the review user, and responding to the first input, and sending a task identification of a target task to be reviewed to a data review module, wherein the first input comprises an input for indicating to review the target task to be reviewed, and the target task to be reviewed is any task in all tasks to be reviewed;
the data review module is used for receiving the task identification; acquiring target to-be-inspected data corresponding to the target to-be-inspected task according to the task identifier, and displaying the target to-be-inspected data; and receiving review information of the review user for the target to-be-reviewed data, and storing the review information, wherein the review information comprises review process information and review result information;
and the data auditing module is used for displaying all the tasks to be audited so as to enable an auditing user to monitor the tasks to be audited which are not reviewed and/or audit the tasks to be audited which pass through.
Optionally, the review data generation module is further configured to:
generating a message to be checked corresponding to the data to be checked, and sending the message to be checked to a first terminal device, wherein the first terminal device is a device logged in with the account number of the checking user.
Optionally, the data review module, when presenting the target censored data, is to:
acquiring identification information corresponding to the target data to be checked;
displaying the identification information, responding to the second input of the review user, displaying the target to-be-reviewed data on line, and/or providing the target to-be-reviewed data to the first terminal device;
the second input is used for indicating online display and/or downloading of the target data to be checked.
Optionally, the data review module includes an assistance review request sub-module and an assistance input sub-module;
the assistance review request sub-module is used for receiving a third input which is input by the review user and is used for requesting assistance of a user to review in the process of the review user reviewing the target to-be-reviewed data, and generating an assistance review sub-task and an assistance review message in response to the third input; and sending the assistance review message to a second terminal device;
the assistance input sub-module is used for receiving assistance examination information input by the assistance user and displaying the assistance examination information for the review user to review;
the auxiliary examination subtask is a task for indicating the auxiliary user to assist in examining the target data to be examined, and the second terminal device is a device logged in with the account number of the auxiliary user.
Optionally, the system further comprises a rights management module;
the authority management module is used for managing and configuring user authorities in the business compliance review system, wherein the user authorities comprise authorities of at least one user of an audit user, a review user and an assisting user corresponding to the target business system, the review user is a first responsible user corresponding to the target business system, the assisting user is a second responsible user corresponding to the target business system, and the audit user is used for monitoring and auditing tasks to be reviewed, which are responsible for review by the review user.
Optionally, the assistance review request submodule, in response to the third input, is further configured to, when generating the assistance review subtask and the assistance review message:
generating a right opening request for requesting to open the assistance user to view the target data to be checked, checking and responding to the assistance checking subtask, and sending the right opening request to the right management module.
Optionally, the system manages the hierarchical relationship between the target censored task and the censored subtask in a tree list format.
Optionally, the censoring data generating module is configured to, when acquiring source data to be censored in the target service system:
acquiring configuration data corresponding to the target service system, wherein the configuration data comprises interface information of a data access interface corresponding to the target service system, and timing task configuration information for indicating to acquire the source data according to the data access interface;
and obtaining the source data according to the configuration data.
Optionally, the censoring data generating module is configured to, when acquiring source data to be censored in the target service system: and receiving the source data uploaded by the reference users.
Optionally, the censoring data generating module is further configured to, after obtaining the source data: and compressing the source data and storing the compressed source data.
Optionally, the system further comprises: a function configuration module;
the function configuration module is configured to configure configuration data of the target service system, where the configuration data includes interface information of a data access interface corresponding to the target service system, and timing task configuration information for indicating to obtain the source data according to the data access interface.
Optionally, the source data includes at least one of account authority data, operation and maintenance change data and operation log data corresponding to the target service system.
According to the embodiment of the disclosure, when auditing and examining are carried out on a target business system of an enterprise, source data to be examined in the target business system can be automatically acquired on line by a business compliance examining system, and the data to be examined and corresponding tasks to be examined are generated according to the source data; and then, the review user can browse and view all the tasks to be reviewed through the task display module to be reviewed, review the target data to be reviewed in the target tasks to be reviewed rapidly and conveniently through the data review module, and submit review process information, review result information and other review information to the system, so that all the review processes can form a closed loop on line, and the authenticity of the review results is ensured.
Other features of the present specification and its advantages will become apparent from the following detailed description of exemplary embodiments thereof, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments of the specification and together with the description, serve to explain the principles of the specification.
Fig. 1 is a schematic structural diagram of a business compliance review system provided in an embodiment of the present disclosure.
Fig. 2 is a schematic diagram of an assisted review interface provided by an embodiment of the present disclosure.
Detailed Description
Various exemplary embodiments of the present disclosure will now be described in detail with reference to the accompanying drawings. It should be noted that: the relative arrangement of the components and steps, numerical expressions and numerical values set forth in these embodiments do not limit the scope of the present invention unless it is specifically stated otherwise.
The following description of at least one exemplary embodiment is merely exemplary in nature and is in no way intended to limit the invention, its application, or uses.
Techniques, methods, and apparatus known to one of ordinary skill in the relevant art may not be discussed in detail, but are intended to be part of the specification where appropriate.
In all examples shown and discussed herein, any specific values should be construed as merely illustrative, and not a limitation. Thus, other examples of exemplary embodiments may have different values.
It should be noted that: like reference numerals and letters denote like items in the following figures, and thus once an item is defined in one figure, no further discussion thereof is necessary in subsequent figures.
< System example >
Please refer to fig. 1, which is a schematic diagram of a business compliance review system according to an embodiment of the present disclosure. As shown in fig. 1, the business compliance review system 100 includes a data to be reviewed generation module 1100, a review task presentation module 1200, a data review module 1300, and a data audit module 1400.
The to-be-inspected data generating module 1100 is configured to obtain to-be-inspected source data in the target service system; and generating to-be-inspected data and to-be-inspected tasks corresponding to the to-be-inspected data according to the source data, wherein the to-be-inspected tasks are tasks for indicating the corresponding inspected users to inspect the to-be-inspected data.
The target service system is a pre-configured service system to be subjected to compliance inspection, and the number of the target service systems can be one or a plurality of target service systems, which are not particularly limited herein. The target business system may be, for example, a network operations center (NOC, network Operation Center) system.
The source data may be at least one of account authority data, operation and maintenance change data and operation log data corresponding to the target service system, where the operation and maintenance change data may be a code change data record corresponding to the target service system, and the operation log data may be a user operation log recorded in the target service system.
It should be noted that the source data may be in the form of an online data table, or may be a data file in any format, which is not limited herein.
In one embodiment, the pending data generation module 1100, when acquiring pending source data in a target business system, may be configured to: the source data uploaded by the reference user is received,
the review user is a first responsible user corresponding to the target service system, namely, the review user has main responsibility on the data to be inspected in the target service system, and the review user explains the proposed problem in the process of inspecting the data to be inspected.
Specifically, the business compliance review system 100 supports a user to manually upload source data and automatically generate corresponding tasks to be reviewed according to the source data. However, this method still has a problem of inconvenience because the user still needs to manually upload the source data.
To solve the above problem, in one embodiment, the to-be-inspected data generating module 1100 may be further configured to, when acquiring to-be-inspected source data in the target service system: acquiring configuration data corresponding to a target service system, wherein the configuration data comprises interface information of a data access interface corresponding to the target service system, and timing task configuration information for indicating to acquire the source data according to the data access interface; and obtaining the source data according to the configuration data.
That is, the business compliance review system can automatically acquire source data according to the corresponding configuration data configured in advance, so as to solve the problem that the manual uploading of the user is inconvenient.
It should be noted that, the configuration data may be pre-configured configuration information corresponding to the target service system, that is, in one embodiment, in order to facilitate the user to dynamically access different target service systems and facilitate the system to automatically obtain the source data, the service compliance review system 100 further includes a functional configuration module 1500; the function configuration module 1500 is configured to configure configuration data of a target service system, where the configuration data includes interface information of a data access interface corresponding to the target service system, and timing task configuration information for indicating to obtain source data according to the data access interface.
It should be further noted that, in the implementation, the service compliance inspection system 100 may automatically pull the source data from the target service system according to the corresponding configuration data to generate the data to be inspected, or may be configured by an administrator of the target service system to pre-arrange the source data in the service system, and then actively push the data to the service compliance inspection system 100 through the corresponding data access interface by the target service system, which is not limited in particular herein.
The data Access interface refers to an interface corresponding to the target service system and used for performing data interaction with the target service system, and the data Access interface may be an application programming interface (API, application Programming Interface) or may be a data interface that performs authentication based on an AK/SK (Access Key Id/Secret Access Key) encryption mode, which is not particularly limited herein.
The timing task configuration information is preset and used for indicating the business compliance inspection system to acquire source data from the corresponding business system according to the data inspection period corresponding to each business system so as to generate relevant configuration information of the data to be inspected. For example, it may be set that the source data is automatically acquired every month.
It should be noted that, the task to be checked corresponding to the data to be checked may include a task identifier, a review user identifier, and a criticizing person identifier.
In one embodiment, to facilitate transmission and save storage space, the data to be inspected generation module may be further configured to, after obtaining the source data: compressing the source data and storing the compressed source data.
In one embodiment, after generating the task to be reviewed, the review data generation module may be further configured to: generating a message to be checked corresponding to the data to be checked, and sending the message to be checked to first terminal equipment, wherein the first terminal equipment is equipment logged in with an account number of a checking user.
That is, in embodiments of the present disclosure, after generating the task to be reviewed, to facilitate review by the reviewing user in time, the system may also send a corresponding message to the user terminal to prompt the user to review in time. In this embodiment, the message to be checked may be sent to the first terminal device in a mail notification manner, or may be sent to a corresponding instant application program of the first terminal device in an instant communication manner, where the content and the sending form of the message to be checked are not drunk, and are specifically limited.
In particular implementations, after receiving a message to be reviewed at its terminal device, a reviewing user may jump to a data review details page for data review via the review message.
The task to be inspected display module 1200 is configured to acquire and display all tasks to be inspected by the user; and receiving a first input of a review user, and responding to the first input, and sending a task identification of the target task to be reviewed to a data review module, wherein the first input comprises an input for indicating to review the target task to be reviewed, and the target task to be reviewed is any task in all tasks to be reviewed.
Specifically, the business compliance review system may display a task list page to be reviewed to a review user based on the task display module 1200, where the user may select a target task to be reviewed through operations such as clicking, etc., so as to view the target data to be reviewed corresponding to the task according to the data review details page provided by the data review module, and determine whether the review user needs to interpret some problems, whether the review needs to be assisted by the user, and whether the review can be passed.
It should be noted that, in the specific implementation, in order to reduce the user operation and improve the user experience, in the case that the number of tasks to be inspected corresponding to the user is multiple, when the user finishes inspecting the current task to be inspected and gives out the inspection result, the business compliance inspection system can also automatically enter the data inspection page of the next task to be inspected, so as to facilitate the user to continuously inspect the next task.
For example, after the user examines task 1 to be examined and clicks the "pass" button in the data review page, the business compliance review system can automatically open the data review page corresponding to task 2 to be examined after counting down for 5s, so as to reduce user operations and facilitate the user to continue examination.
The data review module 1300 is configured to receive a task identifier; acquiring target to-be-inspected data corresponding to the target to-be-inspected task according to the task identifier, and displaying the target to-be-inspected data; and receiving review information of the review user for the target data to be reviewed and storing the review information, wherein the review information includes review process information and review result information.
The review information is information of all intermediate process information and final review results generated in the process of reviewing the data to be reviewed by a review user.
The review process information may be, for example, process content information such as review comments of a review user for a certain file in the data to be reviewed, reply comments of a review user for the review comments, and the like.
The auditing result information refers to information indicating whether the data to be audited passes or not.
Specifically, in order to avoid the problems that information is scattered and information is possibly manually modified when transmitted in an offline mode based on manual or mail and the like, so that the authenticity of the information cannot be guaranteed, the business compliance checking system provided by the embodiment of the disclosure only provides checking authority for all roles referring to a checking process, but does not provide data modification authority, aiming at the to-be-checked data generated by the manual mode or the system based on source data acquired automatically by a corresponding data access interface, so that the authenticity of the to-be-checked data and the checking process is guaranteed.
In addition, to facilitate user review of the data to be reviewed, in one embodiment, the data review module, when presenting the target data to be reviewed, may be configured to: acquiring identification information corresponding to target data to be checked; displaying the identification information, and responding to the second input of the review user, displaying the target to-be-reviewed data on line and/or providing the target to-be-reviewed data to the first terminal equipment; wherein the second input is an input for indicating to display and/or download the target censored data online.
The identification information corresponding to the target data to be checked can be information for uniquely identifying the target data to be checked, and the identification information can be at least one of the information of the name, the number, the data abstract and the like.
In addition, the business compliance review system can provide online viewing functionality for commonly used data formats, e.g., image, document class file formats, to facilitate user review. Of course, the business compliance checking system also supports a file downloading function, and a user can click a key corresponding to each piece of data to be checked and indicating downloading, and the data to be checked is downloaded to the local for checking, and the business compliance checking system is not particularly limited herein.
It should be noted that, in the process that the review user reviews the target data to be reviewed in the data review page, in case of a query, the review suggestion can be input, the send button is clicked, the review suggestion is sent to the corresponding review user for review, and the business compliance system can automatically record; in addition, to avoid misoperations, the business compliance system 100 also supports a review suggestion revocation function, i.e., after a review user enters a review suggestion, either actively sent or sent in error, the issued review suggestion can also be revoked via a "revoke" key.
In one embodiment, the data review module includes an assistance review request sub-module and an assistance input sub-module; the assistance review request sub-module is used for receiving a third input which is input by a review user and is used for requesting assistance of the user to review in the process of reviewing target to-be-reviewed data by the review user, and generating an assistance review sub-task and an assistance review message in response to the third input; and sending the assistance review message to the second terminal device; the assistance input sub-module is used for receiving assistance examination information input by an assistance user and displaying the assistance examination information for the review user to review; the auxiliary examination subtask is a task for indicating auxiliary user to examine target data to be examined, and the second terminal equipment is equipment logged with an account number of the auxiliary user.
In this embodiment, the assistance review request submodule, in response to the third input, may be further operable to, in generating the assistance review subtask and the assistance review message: generates a rights opening request for requesting to open a user assistance to view the target data to be inspected, and views and responds to the sub-task assistance to be inspected, and sends the rights opening request to the rights management module 1600.
Specifically, the business compliance review system 100 provided by the embodiments of the present disclosure further includes a permission management module 1600, configured to manage and configure user permissions in the business compliance review system, where the user permissions include permissions of at least one user of an audit user, a review user, and an assist user corresponding to the target business system, the review user is a first responsible user corresponding to the target business system, the assist user is a second responsible user corresponding to the target business system, and the audit user is used to monitor and audit a task to be reviewed for which the review user is responsible for review.
The assisting user is a user which responds to the assisting examination request of the reviewing user and participates in the corresponding task to be examined to assist the reviewing user to examine the corresponding task.
In general, only the reviewing user and the reviewing user may participate in an initial stage of creating the target task to be reviewed, and assistance user participation and assistance in data review are requested during review of the data to be reviewed in the target task to be reviewed by the reviewing user.
Specifically, in an embodiment of the disclosure, in order to facilitate review of data to be reviewed by a user, in a data review detail page corresponding to target data to be reviewed, in a process of reviewing data, the reviewing user may send an assistance review message to a selected assistance user in a manner of assisting a subtask by selecting a manner of assisting the user to assist, so as to request the assistance user to reply to a query in the process of review or to supplement a material.
It should be noted that, when the user is assisted to view the target task to be checked and the corresponding target data to be checked, the business compliance system may open the authority of the user to participate in the target task to be checked and view the target data to be checked and reply or upload the data in the sub task to be checked by the authority management module 1600 under the trigger that the user to be checked creates the sub task to be checked and selects the operation of the user to be assisted.
In particular implementations, to facilitate user operation, when a user creates an assistance subtask in a data review page, the user may select an assistance user in the form "@" in the review area, such as selecting "assistance user 02", and entering assistance content, creates an assistance subtask and sends a corresponding assistance review message to the assistance user, similarly as shown in fig. 2.
Additionally, for ease of management, in one embodiment, the business compliance review system may manage the hierarchical relationship between the target to-be-reviewed tasks and the review-assisted subtasks in a tree list format to facilitate management and invocation of data.
The data auditing module 1400 is configured to expose all tasks to be audited, so that an auditing user monitors the tasks to be audited that are not reviewed and/or audits the tasks to be audited that have passed.
In one embodiment, the business compliance review system may further include a log module 1700, where the log module 1700 may be responsible for recording the working key information of each module in the system, for example, when the module for generating the data to be reviewed acquires the source data and generates the data to be reviewed, the log module may correspondingly generate a relevant log to record in the log file; for another example, when the reviewing user reviews for the target data to be reviewed, the relevant operations corresponding to the review process information and the review result information may be recorded in a log file.
Based on the log module 1700, an administrator of the business compliance review system can conveniently and quickly view all audit records of review users for data to be reviewed to assist in verifying the authenticity of audit results.
In summary, in the business compliance inspection system provided by the embodiment of the present disclosure, when an audit is performed on a target business system of an enterprise, source data to be inspected in the target business system may be automatically acquired on line by the business compliance inspection system, and data to be inspected and a corresponding task to be inspected may be generated according to the source data; and then, the review user can browse and view all the tasks to be reviewed through the task display module to be reviewed, review the target data to be reviewed in the target tasks to be reviewed rapidly and conveniently through the data review module, and submit review process information, review result information and other review information to the system, so that all the review processes can form a closed loop on line, and the authenticity of the review results is ensured.
One or more embodiments of the present description may be a system, method, and/or computer program product. The computer program product may include a computer-readable storage medium having computer-readable program instructions embodied thereon for causing a processor to implement aspects of the present description.
The computer readable storage medium may be a tangible device that can hold and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: portable computer disks, hard disks, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), static Random Access Memory (SRAM), portable compact disk read-only memory (CD-ROM), digital Versatile Disks (DVD), memory sticks, floppy disks, mechanical coding devices, punch cards or in-groove structures such as punch cards or grooves having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media, as used herein, are not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through waveguides or other transmission media (e.g., optical pulses through fiber optic cables), or electrical signals transmitted through wires.
The computer readable program instructions described herein may be downloaded from a computer readable storage medium to a respective computing/processing device or to an external computer or external storage device over a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmissions, wireless transmissions, routers, firewalls, switches, gateway computers and/or edge servers. The network interface card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium in the respective computing/processing device.
Computer program instructions for carrying out operations of embodiments of the present description may be assembly instructions, instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, c++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer readable program instructions may be executed entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, aspects of the present description are implemented by personalizing electronic circuitry, such as programmable logic circuitry, field Programmable Gate Arrays (FPGAs), or Programmable Logic Arrays (PLAs), with state information for computer-readable program instructions, which may execute the computer-readable program instructions.
Various aspects of the present description are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the specification. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable medium having the instructions stored therein includes an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present description. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. It is well known to those skilled in the art that implementation by hardware, implementation by software, and implementation by a combination of software and hardware are all equivalent.
The embodiments of the present specification have been described above, and the above description is illustrative, not exhaustive, and not limited to the embodiments disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the various embodiments described. The terminology used herein was chosen in order to best explain the principles of the embodiments, the practical application, or the technical improvement in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein. The scope of the application is defined by the appended claims.

Claims (12)

1. A business compliance censoring system, comprising: the system comprises a data to be inspected generating module, an inspection task display module, a data review module and a data audit module;
the data to be inspected generation module is used for acquiring source data to be inspected in the target service system; generating to-be-inspected data and to-be-inspected tasks corresponding to the to-be-inspected data according to the source data, wherein the to-be-inspected tasks are tasks for indicating corresponding to-be-inspected users to review the to-be-inspected data;
the task to be checked display module is used for acquiring and displaying all tasks to be checked of the checking user; receiving a first input of the review user, and responding to the first input, and sending a task identification of a target task to be reviewed to a data review module, wherein the first input comprises an input for indicating to review the target task to be reviewed, and the target task to be reviewed is any task in all tasks to be reviewed;
the data review module is used for receiving the task identification; acquiring target to-be-inspected data corresponding to the target to-be-inspected task according to the task identifier, and displaying the target to-be-inspected data; and receiving review information of the review user for the target to-be-reviewed data, and storing the review information, wherein the review information comprises review process information and review result information;
and the data auditing module is used for displaying all the tasks to be audited so as to enable an auditing user to monitor the tasks to be audited which are not reviewed and/or audit the tasks to be audited which pass through.
2. The system of claim 1, wherein the review data generation module is further to:
generating a message to be checked corresponding to the data to be checked, and sending the message to be checked to a first terminal device, wherein the first terminal device is a device logged in with the account number of the checking user.
3. The system of claim 2, wherein the data review module, when presenting the target censored data, is to:
acquiring identification information corresponding to the target data to be checked;
displaying the identification information, responding to the second input of the review user, displaying the target to-be-reviewed data on line, and/or providing the target to-be-reviewed data to the first terminal device;
the second input is used for indicating online display and/or downloading of the target data to be checked.
4. The system of claim 1, wherein the data review module includes an assistance review request sub-module and an assistance input sub-module;
the assistance review request sub-module is used for receiving a third input which is input by the review user and is used for requesting assistance of a user to review in the process of the review user reviewing the target to-be-reviewed data, and generating an assistance review sub-task and an assistance review message in response to the third input; and sending the assistance review message to a second terminal device;
the assistance input sub-module is used for receiving assistance examination information input by the assistance user and displaying the assistance examination information for the review user to review;
the auxiliary examination subtask is a task for indicating the auxiliary user to assist in examining the target data to be examined, and the second terminal device is a device logged in with the account number of the auxiliary user.
5. The system of claim 4, further comprising a rights management module;
the authority management module is used for managing and configuring user authorities in the business compliance review system, wherein the user authorities comprise authorities of at least one user of an audit user, a review user and an assisting user corresponding to the target business system, the review user is a first responsible user corresponding to the target business system, the assisting user is a second responsible user corresponding to the target business system, and the audit user is used for monitoring and auditing tasks to be reviewed, which are responsible for review by the review user.
6. The system of claim 4, wherein the assistance review request submodule, in generating assistance review subtasks and assistance review messages in response to the third input, is further to:
generating a right opening request for requesting to open the assistance user to view the target data to be checked, checking and responding to the assistance checking subtask, and sending the right opening request to the right management module.
7. The system of claim 4, wherein the system manages a hierarchical relationship between the target censored task and the assisted censored subtask in a tree list format.
8. The system of claim 1, wherein the data to be inspected generation module, when acquiring source data to be inspected in a target business system, is configured to:
acquiring configuration data corresponding to the target service system, wherein the configuration data comprises interface information of a data access interface corresponding to the target service system, and timing task configuration information for indicating to acquire the source data according to the data access interface;
and obtaining the source data according to the configuration data.
9. The system of claim 1, wherein the data to be inspected generation module, when acquiring source data to be inspected in a target business system, is configured to:
and receiving the source data uploaded by the reference users.
10. The system of claim 8 or 9, wherein the data-to-be-inspected generation module, after obtaining the source data, is further configured to: and compressing the source data and storing the compressed source data.
11. The system of claim 1, wherein the system further comprises: a function configuration module;
the function configuration module is configured to configure configuration data of the target service system, where the configuration data includes interface information of a data access interface corresponding to the target service system, and timing task configuration information for indicating to obtain the source data according to the data access interface.
12. The system of claim 1, wherein the source data comprises at least one of account rights data, operation and maintenance change data, and operation log data corresponding to the target business system.
CN202210010854.2A 2022-01-05 2022-01-05 Business compliance inspection system Pending CN116452125A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210010854.2A CN116452125A (en) 2022-01-05 2022-01-05 Business compliance inspection system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210010854.2A CN116452125A (en) 2022-01-05 2022-01-05 Business compliance inspection system

Publications (1)

Publication Number Publication Date
CN116452125A true CN116452125A (en) 2023-07-18

Family

ID=87118852

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210010854.2A Pending CN116452125A (en) 2022-01-05 2022-01-05 Business compliance inspection system

Country Status (1)

Country Link
CN (1) CN116452125A (en)

Similar Documents

Publication Publication Date Title
US20240054245A1 (en) Dynamic management of data with context-based processing
US11455457B2 (en) Displaying a defined preview of a resource in a group-based communication interface
US20110099549A1 (en) Methods, systems and computer program products for a reminder manager for project development
Wessel et al. Don't disturb me: Challenges of interacting with software bots on open source software projects
US11212300B2 (en) Secure incident investigation event capture
US10650476B2 (en) Electronic discovery process using a blockchain
US8930325B2 (en) Generating and utilizing a data fingerprint to enable analysis of previously available data
US10547525B2 (en) Determining events by analyzing stored electronic communications
US20140223150A1 (en) Information processing apparatus, information processing system, and stop method
US20210295234A1 (en) Automated evidence collection
US11777889B2 (en) Information processing method and device and electronic equipment
US10701004B2 (en) Simulating executable objects included in electronic messages
Dixon Monitoring with Graphite: Tracking Dynamic Host and Application Metrics at Scale
CN116069838A (en) Data processing method, device, computer equipment and storage medium
US20240154993A1 (en) Scalable reporting system for security analytics
CN114047854A (en) Information interaction method and device for document processing, electronic equipment and storage medium
US20200351687A1 (en) Notification Signal Error Diagnosis And Repair
EP3266155A1 (en) Monitoring and reporting transmission and completeness of data upload from a source location to a destination location
WO2023230840A1 (en) Product production management method and apparatus, electronic device, and readable storage medium
CN116452125A (en) Business compliance inspection system
Pawlaszczyk et al. API-based evidence acquisition in the cloud-a survey
US11567758B2 (en) Configuration properties management for software
CN110795137A (en) Authority configuration method, device, system, electronic equipment and readable medium
Skenderi et al. Ethics in DevOps, The attitude of programmers towards it
Chowdhary Email-based Intelligent Virtual Assistant for scheduling (EIVA)

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination