CN116757642A - Operation auditing method, device and equipment - Google Patents

Operation auditing method, device and equipment Download PDF

Info

Publication number
CN116757642A
CN116757642A CN202310806197.7A CN202310806197A CN116757642A CN 116757642 A CN116757642 A CN 116757642A CN 202310806197 A CN202310806197 A CN 202310806197A CN 116757642 A CN116757642 A CN 116757642A
Authority
CN
China
Prior art keywords
job
target
auditing
result
submitting
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310806197.7A
Other languages
Chinese (zh)
Inventor
金慧敏
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202310806197.7A priority Critical patent/CN116757642A/en
Publication of CN116757642A publication Critical patent/CN116757642A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • G06Q10/103Workflow collaboration or project management

Landscapes

  • Business, Economics & Management (AREA)
  • Human Resources & Organizations (AREA)
  • Strategic Management (AREA)
  • Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Operations Research (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Data Mining & Analysis (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the specification provides a method, a device and equipment for auditing operation, which can be applied to the technical field of big data. The method comprises the following steps: determining the job type of the target job; the job type is used for identifying the submitting environment of the target job; extracting an audit identifier of the target operation based on the operation type; modifying the audit identifier into a designated audit identifier and auditing the target operation under the condition that the audit identifier is not the designated audit identifier corresponding to the submitting environment; the appointed audit identifier is used for identifying the operation with the submitted record; and submitting the target operation to a corresponding operating system under the condition that the auditing result of the target operation is a normal auditing result. The method effectively avoids repeated auditing of the target operation, and ensures the correctness and the effectiveness of the operation through the operation auditing, thereby ensuring the efficiency of the operation auditing and optimizing the timeliness and the accuracy of the operation processing.

Description

Operation auditing method, device and equipment
Technical Field
The embodiment of the specification relates to the technical field of big data, in particular to a method, a device and equipment for auditing operation.
Background
In order to ensure the accuracy and standardization of job processing, different units such as enterprises, institutions and the like often use corresponding operating systems to process jobs. Based on the operation system, the operation can be accurately processed in batches, and the operation processing method is beneficial to standardizing the operation processing flow in practical application.
Accordingly, when a job is processed by using the job system, since the same job may involve processing by different persons, the different persons may correspond to different departments or different areas, so that a certain deviation may exist in the processing result of the job, and thus, the processing result of the job needs to be checked. However, on the one hand, when the work load is large, the auditor is easy to make mistakes, so that the auditing result is easy to make mistakes so as to influence the final operation processing result; on the other hand, when the operation involves different personnel, the repeated auditing condition is easy to generate, thereby seriously affecting the normal auditing efficiency of the operation. Therefore, a method for accurately and effectively completing the operation checking process is needed.
Disclosure of Invention
The embodiment of the specification aims to provide a method, a device and equipment for checking operation, so as to solve the problem of how to accurately and effectively complete the checking operation process.
In order to solve the above technical problems, an embodiment of the present disclosure provides an operation auditing method, including: determining the job type of the target job; the job type is used for identifying the submitting environment of the target job; extracting an audit identifier of the target operation based on the operation type; modifying the audit identifier into a designated audit identifier and auditing the target operation under the condition that the audit identifier is not the designated audit identifier corresponding to the submitting environment; the appointed audit identifier is used for identifying the operation with the submitted record; and submitting the target operation to a corresponding operating system under the condition that the auditing result of the target operation is a normal auditing result.
In some implementations, the target job includes job content and job commands; the job command includes processing instructions for a target job; the auditing the target job includes: and auditing the operation content and/or the operation command.
In some embodiments, the auditing the target job includes: and auditing the grammar of the target job based on the job type.
In some embodiments, the auditing the target job includes: rechecking the target operation to obtain a rechecking result; acquiring a primary core result of the target operation; and under the condition that the rechecking result is matched with the primary checking result, determining that the checking result of the target operation is a normal checking result.
Based on the above embodiment, after obtaining the primary core result of the target job, the method further includes: under the condition that the rechecking result and the primary checking result are not matched, determining checking results of the rechecking result and the primary checking result; and sending a re-checking instruction to a checking person when the checking result is an error result, or sending a re-submitting operation instruction to a submitting person when the initial checking result is an error result.
In some embodiments, before determining the job type of the target job, the method further includes: determining the user identity of a current operation user; and under the condition that the user identity is the identity of the submitting person, displaying a job submitting interface so that the current operation user inputs the target job based on the job submitting interface.
In some embodiments, the auditing the target job includes: determining the user identity of a current operation user; generating a job rechecking interface based on the target job under the condition that the user identity is a rechecking personnel identity; and displaying the operation rechecking interface to the current operation user so that the current operation user rechecks the target operation based on the operation rechecking interface.
Based on the above embodiment, the generating a job review interface based on the target job in the case that the user identity is a review person identity includes: judging whether the identity of the rechecking person is the same as the identity of the submitting person corresponding to the target operation or not under the condition that the user identity is the identity of the rechecking person; and if the target jobs are different, generating a job review interface based on the target jobs.
In some embodiments, after the extracting the audit identifier of the target job based on the job type, the method further includes: and under the condition that the audit identifier is a specified audit identifier, terminating the audit flow of the target operation.
The embodiment of the specification also provides a job auditing device, which comprises: the job type determining module is used for determining the job type of the target job; the job type is used for identifying the submitting environment of the target job; the audit identifier extraction module is used for extracting audit identifiers of the target operation based on the operation type; the operation auditing module is used for modifying the auditing identification into a designated auditing identification and auditing the target operation under the condition that the auditing identification is not the designated auditing identification corresponding to the submitting environment; the appointed audit identifier is used for identifying the operation with the submitted record; and the job submitting module is used for submitting the target job to a corresponding operating system under the condition that the auditing result of the target job is a normal auditing result.
The embodiment of the specification also provides electronic equipment, which comprises a memory and a processor; the memory is used for storing computer programs/instructions, and the processor is used for executing the computer programs/instructions to realize the steps of the job auditing method.
The present specification embodiment also proposes a computer storage medium having stored thereon a computer program/instruction which, when executed, is adapted to carry out the steps of the job audit method described above.
The present description embodiments also provide a computer program product comprising a computer program/instructions for implementing the steps of the job audit method described above when executed.
As can be seen from the technical solutions provided in the embodiments of the present specification, in the job auditing method in the embodiments of the present specification, after a target job is obtained, a job type of the target job is first determined, and an audit identifier of the target job is extracted according to the job type, and further, after it is determined that the target job is not repeatedly submitted through checking and modifying the audit identifier, the target job is audited, and if the audit is a normal audit result, the target job is submitted to a corresponding operating system. According to the method, under the condition that the operation type and the submitting environment of the target operation are considered, the corresponding auditing identification is obtained to judge whether the target operation is the repeated submitting operation, so that repeated auditing of the target operation is effectively avoided, the correctness and the effectiveness of the operation are ensured through the operation auditing, the efficiency of the operation auditing can be ensured, and the timeliness and the accuracy of the operation processing are optimized.
Drawings
In order to more clearly illustrate the embodiments of the present description or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments described in the present description, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a job auditing method according to an embodiment of the present disclosure;
FIG. 2 is a schematic diagram of a job audit interaction flow according to an embodiment of the present disclosure;
fig. 3 is a block diagram of an operation checking device according to an embodiment of the present disclosure.
Detailed Description
The technical solutions of the embodiments of the present specification will be clearly and completely described below with reference to the drawings in the embodiments of the present specification, and it is apparent that the described embodiments are only some embodiments of the present specification, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art without undue burden from the present disclosure, are intended to be within the scope of the present disclosure.
In order to solve the above technical problems, an embodiment of the present disclosure provides an operation auditing method. The execution main body of the operation auditing method is corresponding electronic equipment, and the electronic equipment comprises, but is not limited to, a server, an industrial personal computer, a PC (personal computer) and the like. As shown in fig. 1, the job auditing method may include the following specific implementation steps.
S110: determining the job type of the target job; the job type is used for identifying the submitting environment of the target job.
The target job may be a processing result for a specific service, or may be a corresponding instruction generated for a service processing status, or the like. The specific content of the target job can be determined according to the actual application situation, and the specific content is not limited.
In the embodiment of the present disclosure, the target job is a job that has generated a corresponding job content and needs to be checked. Specifically, the target job may include job content and a job command, where the job content may be a specific parameter of the job, for example, when the job is a corresponding service, the job content may be a specific content of the service and a corresponding service parameter obtained after the service is processed; the job command may be an instruction, a request, etc. generated for the corresponding job, and is used to instruct the receiver or other processing end to perform the next operation, and accordingly, the job command of this type is not executed until the auditing is completed, and in addition, the job command may be a command that needs to be executed in the auditing process, for example, a command for executing a specific auditing process. The specific job content and the format of the job command, and the content can be set according to the actual application conditions, and will not be described herein.
In some implementations, the target job may be a job submitted by a submitter. The submitting person can be a processing person of the target job, and can also be a submitting person responsible for forwarding the target job.
Specifically, the user identity of the current operating user may be predetermined. The manner of confirming the identity of the user can be to directly obtain the identity of the operating user, such as the identity of an account number, a job number and the like. Specifically, the user login program in the library can be called to obtain information such as a login account number or identity information of the user for authenticating the identity of the user.
And after the user identity of the current operation user is determined to be the identity of the submitting person, displaying a job submitting interface. The job submission interface may also be invoked from the library, enabling an operating user to submit a job via the job submission interface. In order to avoid the simultaneous realization of job submission and job audit by a submitting person, a job audit window is not included in the job submission interface.
For example, in practical application, job submission and auditing can be completed based on different users respectively through JSSC (job submittal security control, job submission safety control) system.
The specific job submitting mode can be set based on the actual application requirements, and is not limited.
The job type is a preset type, and the job can be distinguished based on parameters of the job itself, for example, a simple job type needing to be checked or a job type needing to clearly or checking corresponding content; the job can be distinguished based on the submitting environment of the job, the submitting environment of the job can be a system for submitting different jobs, for example, the system can be used for submitting different jobs, the job can be distinguished based on the region where the job is submitted, for example, the job can be divided into an inner job type and an outer job type based on the actual application condition, and different processing and auditing modes are adopted for different types of jobs.
The response mode of the job can be optimized through the job type, for example, a delivery environment corresponding to the job type can be added in the job response command, for example, if the operator at the site A responds to '700, Y' and the operator at the site B responds to '491, Y' aiming at the information in the system. Because of inconsistent response numbers, the operating system can report a mismatch and need to respond again. When a large number of responses are received, the timeliness of the treatment is reduced, and the operator is bothered, so that the operation treatment is delayed. And after the submitting environment is integrated into the response command, the modified response number is "/CCC AAA, B", wherein the CCC is NOVA (in) or FOVA (out of the country). Not only is the environment differentiated, but it also ensures that the response is correct. The related operations may be optimized in other ways in practical applications, which are not limited.
S120: and extracting the audit identifier of the target job based on the job type.
Based on different job types, audit marks can be extracted from target jobs according to format settings of the different job types. The audit mark is mainly used for marking the audit state of the target operation, and the repeated audit condition can be avoided through the mark of the corresponding audit mark aiming at the operation which has completed audit.
Different types of jobs may have different audit trail setting locations and different audit trail formats, so audit trail extraction may be accomplished in conjunction with job type.
Describing a specific example, when the JOB type is JOB (JOB), 1-3 bits of the input content may be saved to the variable BCMD; when the action type is a CLEAR Command (CLEAR), the 6-20 bits of the input may be saved to the variable ENV; when the task type is a VIEW command (VIEW), the 6-20 bits of input can also be saved to the variable ENV.
In addition, for different job types, when the audit identifier is read, if the job type is a corresponding job command, a certain operation can be completed based on the job command, for example, the clearing command can clear the content stored in the corresponding variable, and the viewing command can read and record the content stored in the variable. The specific operation mode can be set based on the actual application situation, and is not limited.
The audit trail can be an additionally arranged character specially playing a role of trail, or can be a command line of the operation. When the audit marks are characters specially playing a role in marking, the content corresponding to different audit marks can be determined through the format limiting mode of the characters; when the audit identifier is the command line of the operation, the command corresponding to the audit identifier may also need to be executed in the subsequent process. Under the condition that the audit mark is a command line, the format of the command line can be modified, so that whether the command is continuously and normally executed can be judged through the format of the command line when the command line is executed.
S130: modifying the audit identifier into a designated audit identifier and auditing the target operation under the condition that the audit identifier is not the designated audit identifier corresponding to the submitting environment; and the specified audit identifier is used for identifying the operation with the submitted record.
After the audit identifier is obtained, analysis and judgment can be carried out on the audit identifier to determine whether the audit identifier is a designated audit identifier corresponding to the submitting environment. The appointed audit mark is used for marking the operation with submitted records, so that whether the operation has repeated submitted conditions or not can be determined through comparison of the appointed audit mark, and repeated audit on the operation is avoided.
Using a specific example to describe, assuming that the format of the audit identifier is "/S XXX, m=yyyy", the format of the audit identifier is "/B XXX, m=yyy" is specified, and after the target job is acquired, if the audit identifier is "/SXXX, m=yyy", it is transformed into "/B XXX, m=yyy", and then normal audit and command execution flow are executed. If the received command is "/B XXX, m=yyy", the current audit flow for the target job is terminated.
In addition, the specified audit identifier can also be a command format adopted in a specific system, different systems can be distinguished at the same time by changing the audit identifier into the specified audit identifier, and a processing mode of no audit or no audit acceptance is adopted for the operation submitted by the specific system.
In addition, the specified audit identifier may have a corresponding association with a corresponding submitting environment, for example, in the case that the submitting environment is a corresponding operating system, the operating system has a format of the specified audit identifier specific to itself; under the condition that the submitting environment is the region, different regions may also have a preset format for designating the audit identifier. In practical application, corresponding appointed audit marks can be obtained in advance according to a submitting environment for processing.
And when the repeated submitting condition of the job is determined to be absent, auditing can be carried out aiming at the target job. The auditing can be performed with respect to information such as environment variables, operation contents, user information and the like, for example, the operation auditing can be completed by adopting a mode of reading the SPOOL of the corresponding environment, matching the input information of the corresponding environment and checking the user information of the corresponding environment. Specific audit contents can be set based on requirements, and are not described herein.
If the audit identifier is the appointed audit identifier, the audit process of the target operation can be terminated, so that the condition of repeatedly auditing the operation is avoided, and the audit efficiency is improved.
In some embodiments, auditing for the job is a double review mode. And a primary inspector and a recheck are arranged in the double recheck mode, the primary inspector and the recheck respectively audit the operation, when the auditing results of the primary inspector and the recheck for the operation are the same, the auditing is determined to pass, otherwise, the auditing is not processed in a corresponding mode.
The double review mode can reduce errors affecting operation processing results caused by single review errors, and ensure the effectiveness of operation review processes. Specifically, in the double review mode, when the operation is reviewed, the operation can be sent to a primary inspector and a review operator to review respectively, and a primary review result and a review result are obtained. When the primary checking result is matched with the rechecking result, determining that the checking result of the target operation is a normal checking result. And if the primary checking result is not matched with the rechecking result, the current checking result is an abnormal checking result.
If the two checking results are different after double checking, namely, when the final checking result is an abnormal checking result, the initial checking result and the checking result can be checked to respectively determine the corresponding checking results.
If the analysis and judgment of the checking result prove that the checking result is an error result, a re-checking instruction can be sent to a checking person, so that the checking person re-submits a correct command; if the primary core result is an error result, the primary core personnel can check the error, and a re-checking instruction can be sent to the primary core personnel. If the rechecking result and the initial checking result are not matched after the operation, the problem may occur in the submitted operation, and an instruction may be sent to the submitted personnel to re-submit the operation and re-execute the auditing process.
In some embodiments, the user identity of the current operator may also be determined prior to the audit. And generating a job rechecking interface based on the target job after determining that the current user is the identity of the rechecking personnel. The identity of the review personnel can be pre-specified, for example, a corresponding identifier can be set for the relevant personnel to indicate that the user is the personnel of the review job.
The specific content and related parameters of the target job can be displayed in the job review interface, and the interface can also contain corresponding operation options of the review job. The operation review interface can conveniently and effectively realize the examination and verification of the operation.
Preferably, after determining that the user identity is the identity of the rechecking person, the method can further judge whether the identity of the rechecking person is the same as the identity of the submitting person corresponding to the target operation, and if not, generate an operation rechecking interface based on the target operation for operation checking; if the operation submitting personnel and the auditing personnel are the same, the auditing result can be influenced, and the current auditing flow can be terminated or the auditing request of the corresponding auditing personnel can be refused.
In addition, when a double check mode is adopted, the identities of the primary check personnel and the check personnel can be sequentially obtained, and when the identities of the primary check personnel, the check personnel and the operation submitting personnel are different, the checking flow of the operation is executed.
The double check mode in the embodiments of the present specification will be further described with reference to fig. 2. The submitter may be a processing person of the job or a forwarding person of the job. After submitting the job to the operation system A, the operation system A distributes corresponding primary and rechecks to respectively audit the job. After the operation verification is passed, the operation system A submits the operation to the operation system B, and the operation system B carries out the next operation flow.
Accordingly, in the case that the target job includes the job content and the job command, the job content and/or the job command may be checked based on the requirement. The specific auditing process is not described in detail herein.
In some embodiments, when auditing the target job, the grammar of the target job may also be audited according to the job type. Specifically, different formats of the grammar of the job can be set according to the job type, and further the content of the job is checked according to the formats of the grammar. The specific grammar format can be set according to the requirements of practical application, and is not limited.
In addition, it should be noted that, since the auditing process needs to be sent to the corresponding auditing personnel for auditing, the corresponding time and effort are required for the job processing. Therefore, when the operation is submitted, the operation can be marked and screened, and part of the operation can enter an auditing flow to complete operation auditing treatment; no auditing may be performed for the general operation, and specific operation procedures are not described here.
S140: and submitting the target operation to a corresponding operating system under the condition that the auditing result of the target operation is a normal auditing result.
If the auditing result is determined to be the normal auditing result based on the auditing process, the current target operation is indicated to be normal, and the target operation can be submitted to the corresponding operating system. The submitting to the corresponding operation system may be sending to the corresponding operation system to perform the next operation on the job, or may be sending the target job to the corresponding operation system to record and save, for example, recording in the corresponding log file. The specific subsequent processing submitted to the corresponding operating system can be set according to the actual application requirements, and is not limited.
If the auditing result of the target operation is determined to be the abnormal auditing result based on the auditing process, analysis and judgment can be performed according to the specific situation of the abnormal auditing result. If the abnormal auditing result is generated because the operation itself has an abnormality, the specific error content in the abnormal auditing result can be sent to the operation submitting personnel so that the operation submitting personnel can submit the corrected operation content again. The specific error content may be content indicated by an auditor.
If the abnormal auditing result is caused by the auditing problem, the abnormal auditing result can be fed back to the corresponding auditing instruction of the auditing personnel, so that the auditing personnel can submit the corresponding auditing result again. For example, if the auditing results are different in the double review mode, the auditing error of the auditor is inevitably present.
After the abnormal auditing result is processed according to the processing procedure, the normal auditing result corresponding to the target job is obtained, and then the target job can be submitted to the corresponding operating system again, so that the normal processing procedure of the job is completed.
Based on the description of the embodiment and the scene example, it can be seen that after the method acquires the target job, the job type of the target job is first determined, and the audit identifier of the target job is extracted according to the job type, and further, after the target job is determined to be not repeatedly submitted through checking and modifying the audit identifier, the target job is audited, and if the audit is a normal audit result, the target job is submitted to the corresponding operating system. According to the method, under the condition that the operation type and the submitting environment of the target operation are considered, the corresponding auditing identification is obtained to judge whether the target operation is the repeated submitting operation, so that repeated auditing of the target operation is effectively avoided, the correctness and the effectiveness of the operation are ensured through the operation auditing, the efficiency of the operation auditing can be ensured, and the timeliness and the accuracy of the operation processing are optimized.
Based on the operation auditing method corresponding to fig. 1, an operation auditing apparatus according to an embodiment of the present disclosure is described. The operation auditing device can be arranged on the corresponding electronic equipment. As shown in fig. 3, the job auditing apparatus includes the following modules.
A job type determining module 310, configured to determine a job type of the target job; the job type is used for identifying the submitting environment of the target job.
And the audit identifier extraction module 320 is configured to extract audit identifiers of the target job based on the job type.
A job auditing module 330, configured to modify the audit identifier into a specified audit identifier and audit the target job if the audit identifier is not the specified audit identifier corresponding to the submitting environment; and the specified audit identifier is used for identifying the operation with the submitted record.
And the job submitting module 340 is configured to submit the target job to the corresponding operating system when the auditing result of the target job is a normal auditing result.
Based on the job auditing method corresponding to fig. 1, an embodiment of the present disclosure provides an electronic device. The electronic device may include a memory and a processor.
In this embodiment, the memory may be implemented in any suitable manner. For example, the memory may be a read-only memory, a mechanical hard disk, a solid state hard disk, or a usb disk. The memory may be used to store computer program instructions.
In this embodiment, the processor may be implemented in any suitable manner. For example, the processor may take the form of, for example, a microprocessor or processor, and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), a programmable logic controller, and an embedded microcontroller, among others. The processor may execute the computer program instructions to implement the job auditing method in the embodiment corresponding to fig. 1.
The present description provides a computer-readable storage medium having stored thereon computer programs/instructions. The computer readable storage medium may be read by a processor based on an internal bus of a device, and program instructions in the computer readable storage medium are implemented by the processor.
In this embodiment, the computer-readable storage medium may be implemented in any suitable manner. The computer readable storage medium includes, but is not limited to, random access Memory (Random Access Memory, RAM), read-Only Memory (ROM), cache (Cache), hard Disk (HDD), memory Card (Memory Card), and the like. The computer storage medium stores computer program instructions. Program instructions or modules that, when executed, implement the job auditing method of the embodiment of fig. 1 of the present specification.
The present description also provides a computer program product comprising a computer program/instructions. The computer program product may be a program written in a corresponding computer program language, stored in a corresponding storage device in a program manner, and transmitted over a computer network. The computer program product may be executable by a processor. In the present description, the computer program product, when executed, implements the program instructions or modules of the job audit method of the corresponding embodiment as shown in fig. 1.
It should be noted that the method, the device and the equipment for auditing the operation can be applied to the technical field of big data, and can also be applied to other technical fields except the technical field of big data, and are not limited in this regard.
In addition, the implementation process of the embodiment relates to operations of acquiring, processing, using, storing and the like of the data, which all meet the requirements of relevant national laws and regulations.
While the process flows described above include a plurality of operations occurring in a particular order, it should be apparent that the processes may include more or fewer operations, which may be performed sequentially or in parallel (e.g., using a parallel processor or a multi-threaded environment).
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the specification. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of computer-readable media.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, read only optical disk read only memory (CD-ROM), digital Versatile Disks (DVD) or other optical storage, magnetic tape storage, magnetic disk storage or other magnetic storage devices, or any other non-transmission media that can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It will be appreciated by those skilled in the art that embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, the present specification embodiments may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present description embodiments may take the form of a computer program product on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, etc.) having computer-usable program code embodied therein.
The present embodiments may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The embodiments of the specification may also be practiced in large data computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a big data computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
In this specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment mainly describes differences from other embodiments. In particular, for system embodiments, since they are substantially similar to method embodiments, the description is relatively simple, as relevant to see a section of the description of method embodiments. In the description of the present specification, a description referring to terms "one embodiment," "some embodiments," "examples," "specific examples," or "some examples," etc., means that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the embodiments of the present specification. In this specification, schematic representations of the above terms are not necessarily directed to the same embodiment or example. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, the different embodiments or examples described in this specification and the features of the different embodiments or examples may be combined and combined by those skilled in the art without contradiction.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and variations of the present application will be apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. which come within the spirit and principles of the application are to be included in the scope of the claims of the present application.

Claims (13)

1. A job auditing method, comprising:
determining the job type of the target job; the job type is used for identifying the submitting environment of the target job;
extracting an audit identifier of the target operation based on the operation type;
modifying the audit identifier into a designated audit identifier and auditing the target operation under the condition that the audit identifier is not the designated audit identifier corresponding to the submitting environment; the appointed audit identifier is used for identifying the operation with the submitted record;
and submitting the target operation to a corresponding operating system under the condition that the auditing result of the target operation is a normal auditing result.
2. The method of claim 1, wherein the target job comprises job content and job commands; the job command includes processing instructions for a target job;
the auditing the target job includes:
and auditing the operation content and/or the operation command.
3. The method of claim 1, wherein auditing the target job comprises:
and auditing the grammar of the target job based on the job type.
4. The method of claim 1, wherein auditing the target job comprises:
rechecking the target operation to obtain a rechecking result;
acquiring a primary core result of the target operation;
and under the condition that the rechecking result is matched with the primary checking result, determining that the checking result of the target operation is a normal checking result.
5. The method of claim 4, wherein after the obtaining the primary core result of the target job, further comprising:
under the condition that the rechecking result and the primary checking result are not matched, determining checking results of the rechecking result and the primary checking result;
and sending a rechecking instruction to a rechecking personnel when the rechecking result is an error result, or sending a rechecking instruction to a submitting personnel when the initial checking result is an error result.
6. The method of claim 1, wherein prior to determining the job type of the target job, further comprising:
determining the user identity of a current operation user;
and under the condition that the user identity is the identity of the submitting person, displaying a job submitting interface so that the current operation user inputs the target job based on the job submitting interface.
7. The method of claim 1, wherein auditing the target job comprises:
determining the user identity of a current operation user;
generating a job rechecking interface based on the target job under the condition that the user identity is a rechecking personnel identity;
and displaying the operation rechecking interface to the current operation user so that the current operation user rechecks the target operation based on the operation rechecking interface.
8. The method of claim 7, wherein the generating a job review interface based on the target job if the user identity is a review person identity comprises:
judging whether the identity of the rechecking person is the same as the identity of the submitting person corresponding to the target operation or not under the condition that the user identity is the identity of the rechecking person;
and if the target jobs are different, generating a job review interface based on the target jobs.
9. The method of claim 1, wherein after extracting the audit trail for the target job based on the job type, further comprising:
and under the condition that the audit identifier is a specified audit identifier, terminating the audit flow of the target operation.
10. An operation auditing device, comprising:
the job type determining module is used for determining the job type of the target job; the job type is used for identifying the submitting environment of the target job;
the audit identifier extraction module is used for extracting audit identifiers of the target operation based on the operation type;
the operation auditing module is used for modifying the auditing identification into a designated auditing identification and auditing the target operation under the condition that the auditing identification is not the designated auditing identification corresponding to the submitting environment; the appointed audit identifier is used for identifying the operation with the submitted record;
and the job submitting module is used for submitting the target job to a corresponding operating system under the condition that the auditing result of the target job is a normal auditing result.
11. An electronic device includes a memory and a processor; characterized in that the memory is adapted to store a computer program/instruction, the processor being adapted to execute the computer program/instruction to carry out the steps of the method according to any one of claims 1-9.
12. A computer storage medium having stored thereon a computer program/instruction which, when executed, is adapted to carry out the steps of the method according to any of claims 1-9.
13. A computer program product comprising computer programs/instructions which, when executed, are adapted to carry out the steps of the method according to any one of claims 1-9.
CN202310806197.7A 2023-06-30 2023-06-30 Operation auditing method, device and equipment Pending CN116757642A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310806197.7A CN116757642A (en) 2023-06-30 2023-06-30 Operation auditing method, device and equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310806197.7A CN116757642A (en) 2023-06-30 2023-06-30 Operation auditing method, device and equipment

Publications (1)

Publication Number Publication Date
CN116757642A true CN116757642A (en) 2023-09-15

Family

ID=87960873

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310806197.7A Pending CN116757642A (en) 2023-06-30 2023-06-30 Operation auditing method, device and equipment

Country Status (1)

Country Link
CN (1) CN116757642A (en)

Similar Documents

Publication Publication Date Title
CN111221743B (en) Automatic test method and system
CN108628748B (en) Automatic test management method and automatic test management system
CN107730385A (en) Simulation process method, apparatus, storage medium and the computer equipment of sequence information
CN108073517B (en) Management method, device, medium and computer equipment for third-party software test
CN112905459B (en) Service interface testing method and device, electronic equipment and storage medium
CN112380255A (en) Service processing method, device, equipment and storage medium
CN112882957B (en) Test task validity checking method and device
CN114035789A (en) Log analysis template generation method, log analysis device and log analysis equipment
CN111367934B (en) Data consistency checking method, device, server and medium
CN116757642A (en) Operation auditing method, device and equipment
CN110309057B (en) Automatic script-based flow project testing method and related equipment
CN113238940B (en) Interface test result comparison method, device, equipment and storage medium
CN115185829A (en) Business process testing method and device, terminal equipment and storage medium
CN111680974B (en) Method and device for positioning problems of electronic underwriting process
CN115878448A (en) Database test method, distributed database and storage medium
CN110517010B (en) Data processing method, system and storage medium
CN113901476A (en) Vulnerability verification method, system, equipment and medium based on virtualization environment
US11593461B2 (en) Systems and methods for third-party library management
CN112965986A (en) Service consistency processing method, device, equipment and storage medium
CN111475400A (en) Verification method of service platform and related equipment
CN110716856A (en) Distributed system submodule interaction testing method and device
CN113157558B (en) System testing method and device
CN110602057B (en) Server login approval method and device, equipment and storage medium
CN114092234A (en) Data management method and data management device
CN117611069A (en) Abnormality determination method and device, processor and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination