CN117634470A - Verification method, device, equipment and storage medium - Google Patents
Verification method, device, equipment and storage medium Download PDFInfo
- Publication number
- CN117634470A CN117634470A CN202311657044.7A CN202311657044A CN117634470A CN 117634470 A CN117634470 A CN 117634470A CN 202311657044 A CN202311657044 A CN 202311657044A CN 117634470 A CN117634470 A CN 117634470A
- Authority
- CN
- China
- Prior art keywords
- list
- plan
- record
- record list
- object identifier
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 53
- 238000012795 verification Methods 0.000 title claims abstract description 51
- 238000003860 storage Methods 0.000 title claims abstract description 19
- 230000008859 change Effects 0.000 claims abstract description 48
- 230000006399 behavior Effects 0.000 claims description 53
- 238000012384 transportation and delivery Methods 0.000 claims description 22
- 238000004590 computer program Methods 0.000 claims description 16
- 238000012216 screening Methods 0.000 claims description 5
- 238000004458 analytical method Methods 0.000 description 11
- 238000007689 inspection Methods 0.000 description 10
- 238000004891 communication Methods 0.000 description 8
- 238000011156 evaluation Methods 0.000 description 7
- 238000012545 processing Methods 0.000 description 6
- 238000010586 diagram Methods 0.000 description 5
- 238000013439 planning Methods 0.000 description 5
- 230000002159 abnormal effect Effects 0.000 description 3
- 238000004422 calculation algorithm Methods 0.000 description 3
- 238000012790 confirmation Methods 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000012423 maintenance Methods 0.000 description 3
- 238000007726 management method Methods 0.000 description 3
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 230000008569 process Effects 0.000 description 3
- 208000025174 PANDAS Diseases 0.000 description 2
- 208000021155 Paediatric autoimmune neuropsychiatric disorders associated with streptococcal infection Diseases 0.000 description 2
- 240000004718 Panda Species 0.000 description 2
- 235000016496 Panda oleosa Nutrition 0.000 description 2
- 238000004140 cleaning Methods 0.000 description 2
- 230000003993 interaction Effects 0.000 description 2
- 238000005457 optimization Methods 0.000 description 2
- 238000007781 pre-processing Methods 0.000 description 2
- 230000009467 reduction Effects 0.000 description 2
- 238000003491 array Methods 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 230000009286 beneficial effect Effects 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 238000007405 data analysis Methods 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000000605 extraction Methods 0.000 description 1
- 239000011521 glass Substances 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000010801 machine learning Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000010606 normalization Methods 0.000 description 1
- 239000013307 optical fiber Substances 0.000 description 1
- 238000013433 optimization analysis Methods 0.000 description 1
- 238000005096 rolling process Methods 0.000 description 1
- 238000013515 script Methods 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000001953 sensory effect Effects 0.000 description 1
- 238000006467 substitution reaction Methods 0.000 description 1
- 238000012549 training Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Landscapes
- Debugging And Monitoring (AREA)
Abstract
The invention discloses a verification method, a verification device, verification equipment and a storage medium. The method comprises the following steps: acquiring an operation behavior record and a change document; generating an operation record list set according to the operation behavior record; generating a plan list set according to the change document; according to the plan list in the plan list set, the operation record list in the operation record list set is checked to obtain a check result, and through the technical scheme of the invention, the check efficiency and the check coverage rate can be improved.
Description
Technical Field
The embodiment of the invention relates to the technical field of computers, in particular to a verification method, a verification device, verification equipment and a storage medium.
Background
Changes are common operations in the data center operations and maintenance, and unauthorized changes, changes that are not planned, often may pose a risk of service interruption. Hidden danger can be found in time through changing compliance inspection, on one hand, optimization of propulsion management and technical-level safety control measures can be quickened, on the other hand, non-compliance behaviors can be found in time to conduct management and control, and similar situations are avoided to happen again.
In recent years, as the iteration of financial business needs increases, the number of changes also increases rapidly. On the other hand, as operation and maintenance automation work advances, more and more changing operations are performed by diversified automation platforms.
The conventional manual inspection of the operation records on the server is not suitable for the current change compliance inspection work.
Disclosure of Invention
The embodiment of the invention provides a verification method, a device, equipment and a storage medium, which can improve verification efficiency and verification coverage rate.
According to an aspect of the present invention, there is provided a verification method, including:
acquiring an operation behavior record and a change document;
generating an operation record list set according to the operation behavior record;
generating a plan list set according to the change document;
and checking the operation record list in the operation record list set according to the plan list in the plan list set to obtain a checking result.
According to another aspect of the present invention, there is provided a verification apparatus including:
the acquisition module is used for acquiring the operation behavior record and the change document;
the operation record list set generating module is used for generating an operation record list set according to the operation behavior record;
the plan list set generating module is used for generating a plan list set according to the change document;
and the verification module is used for verifying the operation record list in the operation record list set according to the plan list in the plan list set to obtain a verification result.
According to another aspect of the present invention, there is provided an electronic apparatus including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the verification method of any one of the embodiments of the invention.
According to another aspect of the present invention, there is provided a computer readable storage medium storing computer instructions for causing a processor to execute a verification method according to any embodiment of the present invention.
According to the embodiment of the invention, the operation behavior record and the change document are obtained; generating an operation record list set according to the operation behavior record; generating a plan list set according to the change document; and checking the operation record list in the operation record list set according to the plan list in the plan list set to obtain a checking result, so that the checking efficiency and the checking coverage rate can be improved.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the invention or to delineate the scope of the invention. Other features of the present invention will become apparent from the description that follows.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings that are needed in the embodiments will be briefly described below, it being understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and other related drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of a verification method in an embodiment of the invention;
FIG. 2 is a flow chart of another verification method in an embodiment of the invention;
FIG. 3 is a schematic diagram of a verification device according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of an electronic device in an embodiment of the present invention.
Detailed Description
In order that those skilled in the art will better understand the present invention, a technical solution in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in which it is apparent that the described embodiments are only some embodiments of the present invention, not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the present invention without making any inventive effort, shall fall within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and the claims of the present invention and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate such that the embodiments of the invention described herein may be implemented in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It will be appreciated that prior to using the technical solutions disclosed in the embodiments of the present disclosure, the user should be informed and authorized of the type, usage range, usage scenario, etc. of the personal information related to the present disclosure in an appropriate manner according to the relevant legal regulations.
Example 1
Fig. 1 is a flowchart of a verification method provided by an embodiment of the present invention, where the embodiment is applicable to a case of verifying a change, the method may be performed by a verification device in the embodiment of the present invention, and the device may be implemented in a software and/or hardware manner, as shown in fig. 1, and the method specifically includes the following steps:
s110, acquiring an operation behavior record and a change document.
Specifically, the manner of obtaining the operation behavior record and the change document may be: and the data acquisition of the operation behavior records is realized through the interfaces of all channels, and the standardized documents are automatically downloaded and changed in batches through the crawler framework.
According to the embodiment of the invention, the files are downloaded and changed in batches through the scrapy framework of Python, and the pandas module is adopted to automatically realize the analysis and extraction of the file content, so that the portability is good and the expansion is easy.
S120, generating an operation record list set according to the operation behavior record.
Specifically, the manner of generating the operation record list set according to the operation behavior record may be: preprocessing the operation behavior record to obtain a preprocessed operation behavior record, and generating an operation record list set according to the preprocessed operation behavior record. The method for generating the operation record list set according to the operation behavior record may further be: acquiring the delivery time in the configuration library; screening the operation behavior records according to the delivery time to obtain operation behavior records with operation time after the delivery time; and generating an operation record list set according to the operation behavior records of which the operation time is after the delivery time.
Because of the differences in the format and content of the operation behavior records of each channel, the operation behavior records are sequentially cleaned, reduced and standardized. The cleaning is to delete repeated data and invalid data (such as the operations of back display blank, ctrl+C, etc.). The reduction is to reduce the dimension of the data by deleting irrelevant attributes, and extract valuable attributes. In the embodiment of the invention, the operation behavior record mainly comprises the following attributes: the method comprises an operation object identifier, an operation type corresponding to the operation object identifier, an operation step corresponding to the operation object identifier, an operation time corresponding to the operation object identifier, an implementation person and a change number. Normalization is the unification of the format of the content of data. According to the embodiment of the invention, python writing scripts are used for realizing automatic collection, cleaning, reduction and standardization of operation records of a plurality of channels. The characteristic attribute of the standardized operation behavior record is compared with the characteristic attribute in the change document, so that the comparison and inspection of the compliance of the change operation is automatically realized, the inspection efficiency is greatly improved, and the labor cost is reduced.
S130, generating a plan list set according to the change document.
Specifically, the method for generating the plan list set according to the change document may be as follows: and splitting the change document according to the change number to obtain a plan list set.
It should be noted that, because the change document is an attachment document, the subsequent analysis and comparison are not facilitated, and the pandas module of Python is used to read related information, such as the change number, the operation object identifier, the operation type corresponding to the operation object identifier, the operation step corresponding to the operation object identifier, the operation time corresponding to the operation object identifier, and the like in the change document, and the information is written into the database after being summarized.
And S140, checking the operation record list in the operation record list set according to the plan list in the plan list set to obtain a checking result.
Specifically, the operation record list in the operation record list set is verified according to the plan list in the plan list set, and the verification result may be obtained by: judging whether an operation type corresponding to an operation object identifier in the first operation record list exists in the first plan list or not; if so, judging whether the operation time corresponding to the operation object identifier in the first operation record list exists in the first plan list or not; if yes, judging whether the operation steps corresponding to the operation object identifiers in the first operation record list are consistent with the operation steps corresponding to the operation object identifiers in the first plan list; if the verification is consistent, the verification is passed. The operation record list in the operation record list set is checked according to the plan list in the plan list set, and the mode of obtaining the check result can be as follows: inputting a plan list in a plan list set and an operation record list with the same change number as the plan list into a target model to obtain a verification result, wherein the target model is obtained by iteratively training a first model through a target sample set, and the target sample set comprises: the operation record list sample, the plan list sample with the same change number as the operation record list and the verification result.
The embodiment of the invention firstly collects the change documents and the operation records of different platforms, and then preprocesses the collected data to realize information standardization. Then, according to the operation object identification in the operation record, the operation type corresponding to the operation object identification, the operation step corresponding to the operation object identification and the operation time corresponding to the operation object identification, analysis and comparison are carried out, so that relevant non-compliance operation behaviors are mined, for example: operation without evaluation approval, operation performed in an unauthorized period, operation performed without the steps of the operation formulated before the change operation, and the like. And forming an abnormal condition report through analysis, confirming the checking result by an implementation personnel, adding the abnormal condition into an analysis comparison exception strategy when the analysis comparison is carried out through the condition which is evaluated to be reasonable, and iterating and optimizing a data analysis algorithm. The effectiveness of the analysis strategy is gradually improved through periodical analysis and learning optimization analysis algorithm.
Optionally, verifying the operation record list in the operation record list set according to the plan list in the plan list set to obtain a verification result, including:
acquiring a first plan list in a plan list set, wherein the first plan list has the same change number as a first operation record list in the operation record list set;
and checking the first operation record list according to the first plan list to obtain a checking result.
Specifically, the method for obtaining the first plan list in the plan list set, which is the same as the change number of the first operation record list in the operation record list set, may be: the method comprises the steps of obtaining a change number of each plan list in a plan list set and a change number of each operation record list in an operation record list set, and obtaining a first plan list which is the same as the change number of a first operation record list in the operation record list set in the plan list set through the matching of the change numbers.
Optionally, the plan list includes: the operation record list comprises an operation object identifier, a plan operation type corresponding to the operation object identifier, a plan operation step corresponding to the operation object identifier and a plan operation time corresponding to the operation object identifier, wherein the operation record list comprises: the operation method comprises an operation object identifier, an operation type corresponding to the operation object identifier, an operation step corresponding to the operation object identifier and an operation time corresponding to the operation object identifier.
Optionally, the verifying the first operation record list according to the first plan list, to obtain a verification result, includes:
judging whether the operation object identification in the first operation record list exists in the first plan list or not;
if yes, judging whether the operation type corresponding to the operation object identifier in the first operation record list exists in the first plan list or not;
if so, judging whether the operation time corresponding to the operation object identifier in the first operation record list exists in the first plan list or not;
if yes, judging whether the operation steps corresponding to the operation object identifiers in the first operation record list are consistent with the plan operation steps corresponding to the operation object identifiers in the first plan list;
and if the operation object identifiers are consistent with the operation object identifiers in the first operation record list, the operation verification corresponding to the operation object identifiers in the first operation record list is passed.
Specifically, the method for determining whether the operation type corresponding to the operation object identifier in the first operation record list exists in the first plan list may be: and querying the first plan list, if the operation type corresponding to the operation object identifier in the first plan list is the same as the operation type corresponding to the operation object identifier in the first operation record list, determining that the operation type corresponding to the operation object identifier in the first operation record list exists in the first plan list, and if the operation type corresponding to the operation object identifier in the first plan list is different from the operation type corresponding to the operation object identifier in the first operation record list, determining that the operation type corresponding to the operation object identifier in the first operation record list is not in the first plan list. Specifically, the method for determining whether the operation time corresponding to the operation object identifier in the first operation record list exists in the first plan list may be: if the operation time corresponding to the operation object identifier in the first plan list is the same as the operation time corresponding to the operation object identifier in the first operation record list, determining that the operation time corresponding to the operation object identifier in the first operation record list exists in the first plan list, and if the operation time corresponding to the operation object identifier in the first plan list is different from the operation time corresponding to the operation object identifier in the first operation record list, determining that the operation time corresponding to the operation object identifier in the first operation record list is not in the first plan list.
Specifically, the method for determining whether the operation steps corresponding to the operation object identifiers in the first operation record list are consistent with the scheduled operation steps corresponding to the operation object identifiers in the first plan list may be: and sequentially judging whether each operation step corresponding to the operation object identifier in the first operation record list is identical to each planning operation step corresponding to the operation object identifier in the first plan list, if the execution sequence of the operation steps corresponding to the operation object identifier in the first operation record list is different from the execution sequence of the planning operation steps corresponding to the operation object identifier in the first plan list, determining that the operation steps corresponding to the operation object identifier in the first operation record list are inconsistent with the planning operation steps corresponding to the operation object identifier in the first plan list, and if the execution sequence of the operation steps corresponding to the operation object identifier in the first operation record list is identical to the execution sequence of the planning operation steps corresponding to the operation object identifier in the first plan list, determining that the operation steps corresponding to the operation object identifier in the first operation record list are consistent with the planning operation steps corresponding to the operation object identifier in the first plan list.
Optionally, the method further comprises:
and if the operation time corresponding to the operation object identifier in the first operation record list is different from the operation time in the first plan list, determining that the operation corresponding to the operation object identifier is the operation implemented in the unauthorized period.
Optionally, the method further comprises:
if the operation steps corresponding to the operation object identifiers in the first operation record list are inconsistent with the plan operation steps corresponding to the operation object identifiers in the first plan list, determining that the operation corresponding to the operation object identifiers is the operation which is not executed according to the specified operation steps before the change operation.
The abnormal condition obtained by inspection is automatically sent to corresponding implementation personnel for confirmation, the implementation personnel confirms the inspection result after receiving the notification, and feedback which is evaluated as reasonable by an expert is taken as an optimization term and is included into the comparison analysis exception strategy.
In one specific example, as shown in FIG. 2, the operational behavior record collection and change document download is first performed. After the operation behavior records are collected, preprocessing the operation behavior records, inquiring a configuration library to obtain the delivery time corresponding to the operation object identification, and generating an operation record list set according to the delivery time corresponding to the operation object identification and the preprocessed operation behavior records. After the changed document is obtained, the changed document is analyzed, and a plan list set is generated. And acquiring a first plan list in the plan list set, wherein the first plan list is the same as the change number of a first operation record list in the operation record list set. Judging whether the operation object identifier in the first operation record list is in the first plan list or not, if not, determining that the operation corresponding to the operation object identifier in the first operation record list is an operation which is not subjected to evaluation approval; if yes, judging whether the operation type corresponding to the operation object identifier in the first operation record list exists in the first plan list, and if not, determining that the operation corresponding to the operation object identifier in the first operation record list is an operation which is not subjected to evaluation approval; if so, judging whether the operation time corresponding to the operation object identifier in the first operation record list exists in the first plan list, if not, determining that the operation corresponding to the operation object identifier in the first operation record list is the operation in real time in an unauthorized period, if so, judging whether the operation steps corresponding to the operation object identifier in the first operation record list are consistent with the plan operation steps corresponding to the operation object identifier in the first plan list, if so, checking to pass, and if not, determining that the operation corresponding to the operation object identifier is the operation which is not executed according to the appointed operation steps before the change operation. If the verification is not passed, acquiring the confirmation feedback and expert evaluation of the implementation personnel, and optimizing a list according to the confirmation feedback and expert evaluation of the implementation personnel.
According to the embodiment of the invention, expert evaluation is introduced according to the analysis result and the actual operation and maintenance requirement, the analysis strategy is optimized by rolling iteration, and the accuracy of automatic inspection is improved.
Optionally, generating an operation record list set according to the operation behavior record includes:
acquiring the delivery time in the configuration library;
screening the operation behavior records according to the delivery time to obtain operation behavior records with operation time after the delivery time;
and generating an operation record list set according to the operation behavior records of which the operation time is after the delivery time.
Specifically, the manner of obtaining the delivery time in the configuration library may be: and acquiring the delivery time corresponding to each operation object identifier in the operation behavior record.
Specifically, the method for screening the operation behavior record according to the delivery time to obtain the operation behavior record with the operation time after the delivery time may be: and screening the operation behavior records according to the delivery time corresponding to each operation object identifier in the operation behavior records to obtain the operation behavior records with the operation time corresponding to each operation object identifier after the delivery time.
It should be noted that, first, by associating the operation object with the delivery time in the configuration library, the operation object meeting the modification standard is screened, and the operation record of the operation object before the delivery time belongs to the production deployment stage is removed. Next, it is further checked whether the operation behavior conforming to the condition conforms to the relevant standard, rule, for example, whether the operation is an operation which has not been subjected to evaluation approval, whether the operation is performed in an unauthorized period, whether the operation is an operation which has not been performed in a planned operation step, or the like.
The technical scheme provided by the embodiment of the invention can simultaneously realize automatic inspection of the operation records which are directly changed on the server and the operation records which are changed by various automatic platforms, standardize the operation records of various platforms which are changed, and realize automatic comparison inspection of the compliance of the changing operation by comparing the characteristic attribute of the standardized operation record with the characteristic attribute in the changed document.
According to the technical scheme, the operation behavior record and the change document are obtained; generating an operation record list set according to the operation behavior record; generating a plan list set according to the change document; and checking the operation record list in the operation record list set according to the plan list in the plan list set to obtain a checking result, so that the checking efficiency and the checking coverage rate can be improved.
Example two
Fig. 3 is a schematic structural diagram of a verification device according to an embodiment of the present invention. The embodiment may be applicable to the case of changing the verification, and the device may be implemented in a software and/or hardware manner, and the device may be integrated in any device that provides the verification function, as shown in fig. 3, where the verification device specifically includes: the system comprises an acquisition module 210, an operation record list set generation module 220, a plan list set generation module 230 and a verification module 240.
The acquisition module is used for acquiring the operation behavior record and the change document;
the operation record list set generating module is used for generating an operation record list set according to the operation behavior record;
the plan list set generating module is used for generating a plan list set according to the change document;
and the verification module is used for verifying the operation record list in the operation record list set according to the plan list in the plan list set to obtain a verification result.
The product can execute the method provided by any embodiment of the invention, and has the corresponding functional modules and beneficial effects of the execution method.
According to the technical scheme, the operation behavior record and the change document are obtained; generating an operation record list set according to the operation behavior record; generating a plan list set according to the change document; and checking the operation record list in the operation record list set according to the plan list in the plan list set to obtain a checking result, so that the checking efficiency and the checking coverage rate can be improved.
Example III
Fig. 4 shows a schematic diagram of the structure of an electronic device 10 that may be used to implement an embodiment of the invention. Electronic devices are intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, servers, blade servers, mainframes, and other appropriate computers. Electronic equipment may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices (e.g., helmets, glasses, watches, etc.), and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the inventions described and/or claimed herein.
As shown in fig. 4, the electronic device 10 includes at least one processor 11, and a memory, such as a Read Only Memory (ROM) 12, a Random Access Memory (RAM) 13, etc., communicatively connected to the at least one processor 11, in which the memory stores a computer program executable by the at least one processor, and the processor 11 may perform various appropriate actions and processes according to the computer program stored in the Read Only Memory (ROM) 12 or the computer program loaded from the storage unit 18 into the Random Access Memory (RAM) 13. In the RAM 13, various programs and data required for the operation of the electronic device 10 may also be stored. The processor 11, the ROM 12 and the RAM 13 are connected to each other via a bus 14. An input/output (I/O) interface 15 is also connected to bus 14.
Various components in the electronic device 10 are connected to the I/O interface 15, including: an input unit 16 such as a keyboard, a mouse, etc.; an output unit 17 such as various types of displays, speakers, and the like; a storage unit 18 such as a magnetic disk, an optical disk, or the like; and a communication unit 19 such as a network card, modem, wireless communication transceiver, etc. The communication unit 19 allows the electronic device 10 to exchange information/data with other devices via a computer network, such as the internet, and/or various telecommunication networks.
The processor 11 may be a variety of general and/or special purpose processing components having processing and computing capabilities. Some examples of processor 11 include, but are not limited to, a Central Processing Unit (CPU), a Graphics Processing Unit (GPU), various specialized Artificial Intelligence (AI) computing chips, various processors running machine learning model algorithms, digital Signal Processors (DSPs), and any suitable processor, controller, microcontroller, etc. The processor 11 performs the various methods and processes described above, such as the verification method.
In some embodiments, the verification method may be implemented as a computer program tangibly embodied on a computer-readable storage medium, such as the storage unit 18. In some embodiments, part or all of the computer program may be loaded and/or installed onto the electronic device 10 via the ROM 12 and/or the communication unit 19. When the computer program is loaded into RAM 13 and executed by processor 11, one or more steps of the verification method described above may be performed. Alternatively, in other embodiments, the processor 11 may be configured to perform the verification method in any other suitable way (e.g., by means of firmware).
Various implementations of the systems and techniques described here above may be implemented in digital electronic circuitry, integrated circuit systems, field Programmable Gate Arrays (FPGAs), application Specific Integrated Circuits (ASICs), application Specific Standard Products (ASSPs), systems On Chip (SOCs), load programmable logic devices (CPLDs), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
A computer program for carrying out methods of the present invention may be written in any combination of one or more programming languages. These computer programs may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus, such that the computer programs, when executed by the processor, cause the functions/acts specified in the flowchart and/or block diagram block or blocks to be implemented. The computer program may execute entirely on the machine, partly on the machine, as a stand-alone software package, partly on the machine and partly on a remote machine or entirely on the remote machine or server.
In the context of the present invention, a computer-readable storage medium may be a tangible medium that can contain, or store a computer program for use by or in connection with an instruction execution system, apparatus, or device. The computer readable storage medium may include, but is not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any suitable combination of the foregoing. Alternatively, the computer readable storage medium may be a machine readable signal medium. More specific examples of a machine-readable storage medium would include an electrical connection based on one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
To provide for interaction with a user, the systems and techniques described here can be implemented on an electronic device having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and a pointing device (e.g., a mouse or a trackball) through which a user can provide input to the electronic device. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), blockchain networks, and the internet.
The computing system may include clients and servers. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other. The server can be a cloud server, also called a cloud computing server or a cloud host, and is a host product in a cloud computing service system, so that the defects of high management difficulty and weak service expansibility in the traditional physical hosts and VPS service are overcome.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps described in the present invention may be performed in parallel, sequentially, or in a different order, so long as the desired results of the technical solution of the present invention are achieved, and the present invention is not limited herein.
The above embodiments do not limit the scope of the present invention. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present invention should be included in the scope of the present invention.
Claims (10)
1. A method of verification, comprising:
acquiring an operation behavior record and a change document;
generating an operation record list set according to the operation behavior record;
generating a plan list set according to the change document;
and checking the operation record list in the operation record list set according to the plan list in the plan list set to obtain a checking result.
2. The method of claim 1, wherein verifying the operation record list in the operation record list set according to the plan list in the plan list set to obtain a verification result comprises:
acquiring a first plan list in a plan list set, wherein the first plan list has the same change number as a first operation record list in the operation record list set;
and checking the first operation record list according to the first plan list to obtain a checking result.
3. The method of claim 2, wherein the schedule list comprises: the operation record list comprises an operation object identifier, a plan operation type corresponding to the operation object identifier, a plan operation step corresponding to the operation object identifier and a plan operation time corresponding to the operation object identifier, wherein the operation record list comprises: the operation method comprises an operation object identifier, an operation type corresponding to the operation object identifier, an operation step corresponding to the operation object identifier and an operation time corresponding to the operation object identifier.
4. A method according to claim 3, wherein verifying the first operation record list according to the first plan list to obtain a verification result comprises:
judging whether the operation object identification in the first operation record list exists in the first plan list or not;
if yes, judging whether the operation type corresponding to the operation object identifier in the first operation record list exists in the first plan list or not;
if so, judging whether the operation time corresponding to the operation object identifier in the first operation record list exists in the first plan list or not;
if yes, judging whether the operation steps corresponding to the operation object identifiers in the first operation record list are consistent with the plan operation steps corresponding to the operation object identifiers in the first plan list;
and if the operation object identifiers are consistent with the operation object identifiers in the first operation record list, the operation verification corresponding to the operation object identifiers in the first operation record list is passed.
5. The method as recited in claim 4, further comprising:
and if the operation time corresponding to the operation object identifier in the first operation record list is different from the operation time in the first plan list, determining that the operation corresponding to the operation object identifier is the operation implemented in the unauthorized period.
6. The method as recited in claim 4, further comprising:
if the operation steps corresponding to the operation object identifiers in the first operation record list are inconsistent with the plan operation steps corresponding to the operation object identifiers in the first plan list, determining that the operation corresponding to the operation object identifiers is the operation which is not executed according to the specified operation steps before the change operation.
7. The method of claim 1, wherein generating a set of operational records inventory from the operational behavior records comprises:
acquiring the delivery time in a configuration library;
screening the operation behavior records according to the delivery time to obtain operation behavior records with operation time after the delivery time;
and generating an operation record list set according to the operation behavior records of which the operation time is after the delivery time.
8. A verification device, comprising:
the acquisition module is used for acquiring the operation behavior record and the change document;
the operation record list set generating module is used for generating an operation record list set according to the operation behavior record;
the plan list set generating module is used for generating a plan list set according to the change document;
and the verification module is used for verifying the operation record list in the operation record list set according to the plan list in the plan list set to obtain a verification result.
9. An electronic device, the electronic device comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the verification method of any one of claims 1-7.
10. A computer readable storage medium, characterized in that the computer readable storage medium stores computer instructions for causing a processor to implement the verification method of any one of claims 1-7 when executed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311657044.7A CN117634470A (en) | 2023-12-05 | 2023-12-05 | Verification method, device, equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202311657044.7A CN117634470A (en) | 2023-12-05 | 2023-12-05 | Verification method, device, equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN117634470A true CN117634470A (en) | 2024-03-01 |
Family
ID=90028568
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202311657044.7A Pending CN117634470A (en) | 2023-12-05 | 2023-12-05 | Verification method, device, equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN117634470A (en) |
-
2023
- 2023-12-05 CN CN202311657044.7A patent/CN117634470A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106708738B (en) | Software test defect prediction method and system | |
CN116107589B (en) | Automatic compiling method, device and equipment of software codes and storage medium | |
CN114924990A (en) | Abnormal scene testing method and electronic equipment | |
CN115204733A (en) | Data auditing method and device, electronic equipment and storage medium | |
CN117499148A (en) | Network access control method, device, equipment and storage medium | |
CN117519656A (en) | Software development system based on intelligent manufacturing | |
CN116074183B (en) | C3 timeout analysis method, device and equipment based on rule engine | |
CN111831817A (en) | Questionnaire generation and analysis method and device, computer equipment and readable storage medium | |
CN116757837A (en) | Credit wind control method and system applied to winning bid | |
CN113296836B (en) | Method for training model, test method, device, electronic equipment and storage medium | |
CN110795308A (en) | Server inspection method, device, equipment and storage medium | |
CN116340172A (en) | Data collection method and device based on test scene and test case detection method | |
CN117634470A (en) | Verification method, device, equipment and storage medium | |
CN115687406A (en) | Sampling method, device and equipment of call chain data and storage medium | |
CN114881503A (en) | Scoring determination method, device, equipment and storage medium | |
CN114693116A (en) | Method and device for detecting code review validity and electronic equipment | |
CN115599687A (en) | Method, device, equipment and medium for determining software test scene | |
CN115408236A (en) | Log data auditing system, method, equipment and medium | |
CN114881112A (en) | System anomaly detection method, device, equipment and medium | |
CN114912866A (en) | Information association method, device, equipment and storage medium | |
CN113610225A (en) | Quality evaluation model training method and device, electronic equipment and storage medium | |
CN117609055A (en) | Data management method, device, electronic equipment and storage medium | |
CN117574890A (en) | Model identification method and device, storage medium and electronic equipment | |
CN116737121A (en) | Software development management method, device, system, equipment and storage medium | |
CN117541053A (en) | Project risk prompting method and device, electronic equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |