WO2021159940A1 - 报告的生成管理方法、装置、计算机设备和存储介质 - Google Patents

报告的生成管理方法、装置、计算机设备和存储介质 Download PDF

Info

Publication number
WO2021159940A1
WO2021159940A1 PCT/CN2021/073126 CN2021073126W WO2021159940A1 WO 2021159940 A1 WO2021159940 A1 WO 2021159940A1 CN 2021073126 W CN2021073126 W CN 2021073126W WO 2021159940 A1 WO2021159940 A1 WO 2021159940A1
Authority
WO
WIPO (PCT)
Prior art keywords
report
operator
authority
make
image
Prior art date
Application number
PCT/CN2021/073126
Other languages
English (en)
French (fr)
Inventor
王大伟
黄北辰
郭凌峰
杨镭
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2021159940A1 publication Critical patent/WO2021159940A1/zh

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/26Visual data mining; Browsing structured data
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/32User authentication using biometric data, e.g. fingerprints, iris scans or voiceprints
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Definitions

  • This application relates to the field of data analysis, in particular to a report generation and management method, device, computer equipment and storage medium.
  • the real concept of insight report refers to the visual analysis of big data, and refers to the report formed by the activities and technologies used to extract meaningful data.
  • intelligent analysis reports are essential to reduce uncertainty. They can help decision makers analyze market conditions and competitors, and help senior managers acquire relevant knowledge to make strategic business decisions.
  • smart reports are used in credit assessment, investment and personal financial management. The inventor found that the report generated by the insight report generation tool can only obtain a fixed-dimensional report, and the decision maker cannot obtain the insight report required by the decision maker.
  • the insight report sometimes involves some commercial secrets, etc., it is easy to be obtained by the operator, which increases the risk of the disclosure of commercial secrets.
  • the main purpose of this application is to provide a report generation and management method, device, computer equipment, and storage medium, aiming to solve the technical problem that existing reports have few insight dimensions and easy leakage of commercial secrets.
  • this application proposes a report generation management method, including:
  • the types of prompts include at least one or more of discrete and continuous univariate analysis prompts, multivariate analysis prompts, outlier detection prompts, and missing value detection prompts;
  • This application also provides a report generation management device, including:
  • the obtaining unit is used to obtain the first data to be mined
  • the authority verification unit is used to detect whether the operator has the authority to make the report
  • the generating unit is used for the operator having the authority to make the report, and then generating an interface for the operator to input the type of prompt required in the report;
  • the determining unit is configured to receive the prompt type input by the operator on the prompt type interface, or determine the prompt type required in the report according to the data source of the first data or the keywords in the first data ,
  • the prompt types include at least one or more of discrete and continuous univariate analysis prompts, multivariate analysis prompts, outlier detection prompts, and missing value detection prompts;
  • the calling unit is configured to, if there are multiple types of prompts, respectively call preset analysis components corresponding to the prompt types to process the first data in parallel, so as to obtain different mining results corresponding to different prompt types;
  • the combination unit is used to combine different mining results to form the report.
  • the present application also provides a computer device, including a memory and a processor, the memory stores a computer program, and when the processor executes the computer program, a method for generating and managing reports is implemented, and the method includes:
  • the types of prompts include at least one or more of discrete and continuous univariate analysis prompts, multivariate analysis prompts, outlier detection prompts, and missing value detection prompts;
  • the present application also provides a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, a method for generating and managing reports is implemented, the method including:
  • the types of prompts include at least one or more of discrete and continuous univariate analysis prompts, multivariate analysis prompts, outlier detection prompts, and missing value detection prompts;
  • multiple prompt types can be selected at the same time according to needs, and multiple corresponding mining results can be obtained, and a report with multi-dimensional mining results can be obtained at one time, which is convenient to view.
  • the decision maker of the report makes decisions through multi-dimensional thinking; and in the process of generating the above report, authorization verification is also required. Only operators who pass the authorization verification can complete the preparation of the report, reducing the leakage of commercial secrets in the report. risk.
  • FIG. 1 is a schematic flowchart of a report generation management method according to an embodiment of this application
  • FIG. 2 is a schematic block diagram of the structure of a report generation management apparatus according to an embodiment of the application
  • FIG. 3 is a schematic block diagram of the structure of a computer device according to an embodiment of the application.
  • an embodiment of the present application provides a report generation management method, including:
  • the prompt types include at least one or more of discrete and continuous univariate analysis prompts, multivariate analysis prompts, outlier detection prompts, and missing value detection prompts;
  • prompt types are of multiple types, respectively call preset analysis components corresponding to the prompt types to process the first data in parallel, so as to obtain different mining results corresponding to different prompt types;
  • the first data to be mined may be a data collection crawled on the World Wide Web by an operator through web crawling technology, or a data collection downloaded from a different database.
  • the company name entered by the operator is received, and then the company’s legal person information is obtained from the Administration for Industry and Commerce according to the company name, and then crawling technology is used to crawl the company name related to the company name on the World Wide Web. All the first information data in the time period, and the use of crawler technology to crawl all the second information data related to the legal person information in the above preset time period on the World Wide Web, and then combine the first information data and the second information The data is merged to form the above-mentioned first data.
  • the above-mentioned first information data and second information data include news data, financial data, social sharing data such as Weibo and so on.
  • company name and the company’s legal person information as keywords for crawling data, you can obtain relevant data about the above-mentioned companies in a targeted manner, and then gain insights into some of the company’s business trends or business trends, etc., to obtain the company’s legal person information.
  • the legal person has other company data, the credit information of the legal person, financial status, etc., will affect the final result of the report.
  • the above first data may be a kind of data involving commercial secrets.
  • users and others cannot discover the commercial secrets in it, but when it is generated in a report, it may be It will reflect the commercial secrets in it. Therefore, not all people have the authority to mine the first data and form it into a report. Therefore, in this application, it is preferred to check whether the operator has the authority to make the report.
  • permissions such as fingerprint verification, face verification, password verification, etc.; if the verification is passed, an interface for the type of prompt required by the user will be generated for the user to enter the report, otherwise it will not be generated for the user to enter the report.
  • the interface of the required prompt type to prevent the operator without the authority from proceeding to the next step.
  • the types of prompts manually input by the operator are received.
  • the visual operation the display interface is set to display different types of prompts. The operator clicks on the button to select the desired prompt type.
  • automated operation identify the source of the first data, and then determine the prompt type according to the "data source-prompt type mapping table”; another example, automated operation: preview whether the first data contains preset keywords, according to the included Keyword to the preset "keyword-prompt type mapping table” to determine the prompt type, for example, the keyword “finance” corresponds to "outlier detection prompt", when the first data contains “finance", it will automatically Make sure that the types of prompts you need include “outlier detection prompts” and so on.
  • analysis components pre-stored in the report generation system, and different analysis components are used to analyze the above-mentioned first data, that is, different analysis components are encapsulated with different analysis logic to complete different analysis of the first data.
  • the difference from the prior art is that the operator can obtain multiple different types of prompts at the same time, such as the aforementioned discrete and continuous univariate analysis prompts, multivariate analysis prompts, outlier detection prompts, and Missing value detection prompts, etc., so that the operator can get a report more in line with his needs. specifically:
  • the above discrete and continuous univariate analysis tips can provide insights into the characteristics of a single discrete variable, including data distribution, data statistical indicators (including mean/quantile/variance/standard deviation and other statistical indicators), and data bias
  • data statistical indicators including mean/quantile/variance/standard deviation and other statistical indicators
  • data bias The oblique situation and the large number of concentrated areas of the data are given measures, etc., and the user has been prompted for the large number of data and the rarely occurring data, so that the user can decide whether it is normal;
  • the continuous univariate mentioned above refers to a single variable, and the variable
  • the value is continuous, such as turnover. Insight into its characteristics mainly refers to insight into its statistical indicators and distribution, such as the mean value written above.
  • the above measurement is to measure the proportion of the data in each part or a region (multiple adjacent parts) to the total data after the data is divided into equal-sized intervals.
  • the above-mentioned multivariate analysis prompts can be used to analyze the relationship between continuous variables, or the relationship between discrete variables, or the relationship between discrete and continuous variables by using different correlation coefficients, to assist users in decision-making, such as reminding users to pay attention to more correlations.
  • High variables which can be presented in the report by visual means such as text prompts or heat maps/scatter plots, so that users can dig deeper into their commercial value.
  • the relationship between the above continuous variables can be analyzed by Pearson correlation coefficient analysis/scatter plot analysis, the relationship between discrete variables can be used by chi-square test, and the relationship between discrete and continuous variables can be compared using multiple box plots.
  • the above-mentioned outlier detection prompt can prompt the user that there are outliers in some characteristics of the data, and inform the user of the characteristics of the outliers, so that users can quickly pay attention to these sample values, so that users can discover data abnormalities and outliers in time
  • detection algorithms such as DBSCAN (Density-Based Spatial Clustering of Applications with Noise, a density-based clustering method with noise), isolated forests, using quantile detection, etc., using the DBSCAN algorithm to detect abnormal values, for example: study the number of points contained in a specified distance e with a certain point as the center, and give the number of points m are parameters.
  • the points are divided into core points/boundary points/noise points.
  • the core points are data points that contain at least m points within the distance e, and the boundary points are the neighboring points within the distance e of the core point. , But the number of points included is less than m, and the rest are noise points, that is, abnormal points.
  • the above-mentioned missing value detection prompt is mainly by detecting the missing value of the field. If the missing value exceeds a certain threshold (this threshold is set differently according to different scenarios), the user is prompted to analyze the characteristics of the missing record on the basis of finding the missing value, for example A large number of missing values in the A field are mainly M in the B field.
  • the system By detecting the missing values and secondly mining the missing value features, it provides users with business guidance value and so on. In different scenarios, the sensitivity and requirements for missing values are different. For example, when doing scorecard modeling, when the missing value exceeds 5%, the system will prompt the user.
  • step S6 there are many ways to combine different mining results to form the report. For example, different mining results of different prompt types are formed into an independent report, and then multiple independent reports Splice in a certain order to form a report. For another example, how abnormal results appear in each mining result can be identified by the corresponding algorithm. The abnormal results in different forms of mining results are unified on the first page of the report. If the first page cannot be all If abnormal results are displayed, it will be postponed to the second page, and so on.
  • the step S2 of detecting whether the operator has the authority to make the report includes:
  • the terminal is a mobile terminal, it is determined that the operator does not have the authority to make the report;
  • the terminal is a non-mobile terminal, acquiring location information of the non-mobile terminal according to the IP;
  • the above-mentioned mobile terminal is generally a mobile office device such as a mobile phone or a notebook computer. Because of its mobile nature, the security of the environment in which it is located cannot be determined, so the terminal As long as it is a mobile terminal, it is determined that the operator does not have the authority to make the report. When it is not a mobile terminal, the location of the non-mobile terminal can be determined according to the IP number.
  • a rotatable camera is introduced here, that is, the rotation of the rotatable camera can be controlled to capture images of the specified area, which is generally far away from the non-mobile terminal , Can clearly determine the large-scale image in front of the non-mobile terminal to prevent the direct use of the camera of the non-mobile terminal due to the short distance.
  • There may be people who do not have the authority so it will be determined that the operator does not have the authority to make the report. When the number of people is 0, it means that the operator deliberately hides his information, so it is directly determined that the operator did not make the report. Permissions. When there is only one person, the operator is considered to have the authority to make reports.
  • the method of judging that the number of people in front of the non-mobile terminal is greater than or equal to 2 or 0 can use existing computer image processing technology to separate the image of the person in the first image information, and then count The number of person images is sufficient; and to determine the number of people in front of the non-mobile terminal, the non-mobile terminal can be identified, and then according to the first position information of the person image in the first image information and the non-mobile terminal in the first image information When the first location information is within the specified range of the first location information, it can be determined that the person corresponding to the first location information is in front of the non-mobile terminal.
  • the step of determining that the operator has the authority to make the report includes:
  • the camera of the non-mobile terminal when there is only one person, the camera of the non-mobile terminal is activated, the person's face image is collected, and the face permission verification has been completed, which further improves the safety of the report and prevents the report from being reported.
  • the trade secret of was stolen by others.
  • Face verification method The matching method of Chinese face images can use any one of the existing technologies, so I won’t repeat them here.
  • the above-mentioned face permission database is preset, it is a database that can be called when the face image in the second image information needs to be matched, and the image in the face permission database is that the staff will have operation permission in advance
  • the face image of the operator is stored to the face image in the face permission library.
  • the step S2 of detecting whether the operator has the authority to make the report includes:
  • a reminder message is generated to remind the person in front of the terminal to adjust the orientation of the face as required;
  • the fourth image in front of the terminal is taken;
  • the terminal when all the face information in front of the terminal is collected, and all the face information is required to have the reporting authority, the terminal is run to continue the process of generating the report.
  • there is generally only one operator in front of the terminal so when the third image is taken, the person in front of the terminal is not required to adjust the face orientation, and the verification process can be completed without perception.
  • a reminder message will be generated to quickly obtain the fourth image that meets the requirements and improve the efficiency of authorization verification.
  • step S6 of combining different mining results to form the report includes:
  • the operator's talent type where the talent type includes the type of researcher for data research and the type of decision maker who analyzes business issues based on the report;
  • the method for judging the talent type of the operator is generally through the method of face recognition.
  • a database of authorized operators is established in advance, and the faces of different operators are stored in the database.
  • the operator’s facial feature information is used to determine the operator’s talent type, and then the report template corresponding to the talent type is selected.
  • the report template corresponding to the type of decision maker its data is more business-oriented. It provides decision makers with business discoveries and guides their business decisions. The language description should avoid statistical terminology as much as possible.
  • the report template corresponding to the type of developer has its data.
  • the form of expression is more statistical, providing analysts with data mining findings, and the language description is more professional.
  • the decision maker when multiple people are preparing to view the report in front of the terminal at the same time, it is generally the decision maker. Therefore, when there are multiple operators, if one of them is a decision maker, the decision maker is called Type of report template; when the operator is a person, the report template of the talent type corresponding to that person is called.
  • the setting has a corresponding switch, and the function can be turned on or off. When the function is turned off, the command manually selected by the operator can be obtained for processing.
  • multiple prompt types can be selected at the same time according to requirements, and corresponding multiple mining results have been obtained.
  • Dimensional thinking makes decisions.
  • an embodiment of the present application also provides a report generation management device, including:
  • the obtaining unit 10 is used to obtain the first data to be mined
  • the authority verification unit 20 is used to detect whether the operator has the authority to make the report
  • the generating unit 30 is used for the operator having the authority to make the report, and then generating an interface for the operator to input the type of prompt required in the report;
  • the determining unit 40 receives the prompt type input by the operator on the prompt type interface, or determines the prompt type required in the report according to the data source of the first data or the keywords in the first data,
  • the prompt types include at least one or more of discrete and continuous univariate analysis prompts, multivariate analysis prompts, outlier detection prompts, and missing value detection prompts;
  • the calling unit 50 is configured to, if there are multiple types of prompts, respectively call preset analysis components corresponding to the prompt types to process the first data in parallel, so as to obtain different mining results corresponding to different prompt types;
  • the combining unit 60 is used to combine different mining results to form the report.
  • the above-mentioned authority verification unit 20 includes:
  • a judging module configured to judge whether the terminal is a mobile terminal according to the IP
  • the first determination module is configured to determine that the operator does not have the authority to make the report if the terminal is a mobile terminal
  • An obtaining module configured to obtain location information of the non-mobile terminal according to the IP if the terminal is a non-mobile terminal;
  • a control collection module used to control a preset rotatable camera to collect the first image information in front of the non-mobile terminal
  • the second determination module is configured to determine that if the number of people in front of the non-mobile terminal in the first image information is greater than or equal to 2 or 0, determine that the operator does not have the authority to make the report;
  • the third determination module is configured to determine that the operator has the authority to make the report if the number of people in front of the non-mobile terminal is 1 in the first image information.
  • the above-mentioned third determination module includes:
  • Starting the photographing sub-module configured to start the camera of the non-mobile terminal to collect the second image information in front of the non-mobile terminal if the number of people in front of the non-mobile terminal is 1 in the first image information;
  • Recognition sub-module for recognizing the face image in the second image information, and to find in the preset face permission library whether there is an image matching the face image;
  • a judging sub-module which is used to determine that the operator has the authority to make the report if an image matching the face image is found in the face authority database; otherwise, it is judged that the operator has not made the report permission.
  • the above-mentioned authority verification unit 20 includes:
  • the first photographing module is configured to use a camera on the terminal operated by the operator to collect a third image in front of the terminal, wherein the number of persons in the third image is greater than or equal to 1;
  • An angle judging module configured to judge whether the face images in the third image all satisfy a preset shooting angle
  • the reminding module is configured to generate reminder information to remind the person in front of the terminal to adjust the orientation of the face as required if there is a face image in the third image that does not meet the preset shooting angle;
  • the second photographing module is configured to photograph the fourth image in front of the terminal after the preview image judges that the human face reaches the preset photographing angle;
  • the recognition and matching module is used to recognize all the face information in the fourth image, and put all the face information into a preset face authority database to find whether there is an image matching each face information;
  • the result determination module is configured to determine that the operator has the authority to make the report if all the face information matches the corresponding image, otherwise determine that the operator does not have the authority to make the report.
  • combination unit 60 includes:
  • the reading module is used to read the talent type of the operator when it is determined that the operator has the authority to make the report, where the talent type includes the type of the researcher for data research and the decision-making of business issues based on the report.
  • Person type includes the type of the researcher for data research and the decision-making of business issues based on the report.
  • the calling module is used to call the report template corresponding to the talent type of the operator
  • the integration module is used to integrate different mining results into the called report templates. Among them, different report templates have different manifestations of the mining results presented.
  • the aforementioned calling module includes:
  • the calling sub-module is used to call the report template of the decision maker type when there are multiple operators, if one of them is the decision maker type; when the operator is one person, call the talent type corresponding to the person Report template.
  • the report generation and management device in the embodiment of the present application corresponds to the above-mentioned report generation and management method.
  • the specific function introduction of each unit, module, and sub-module is the same as the multi-purpose method, so there is no repeated explanation.
  • the report generation management device of the present application can also select multiple prompt types at the same time according to needs, and have obtained corresponding multiple mining results, and obtain a report with multi-dimensional mining results at one time, which is convenient for decision-makers who view the report through multi-dimensional Thinking about making decisions.
  • an embodiment of the present application also provides a computer device.
  • the computer device may be a server, and its internal structure may be as shown in FIG. 3.
  • the computer equipment includes a processor, a memory, a network interface, and a database connected through a system bus. Among them, the processor designed by the computer is used to provide calculation and control capabilities.
  • the memory of the computer device includes a non-volatile storage medium and an internal memory.
  • the non-volatile storage medium stores an operating system, a computer program, and a database.
  • the memory provides an environment for the operation of the operating system and the computer program in the non-volatile storage medium.
  • the database of the computer equipment is used to store various data to be analyzed, analysis components and other data.
  • the network interface of the computer device is used to communicate with an external terminal through a network connection.
  • the computer program is executed by the processor to realize the report generation and management method of any one of the foregoing embodiments.
  • FIG. 3 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the computer device to which the solution of the present application is applied.
  • the embodiments of the present application also provide a computer-readable storage medium.
  • the computer storage medium may be non-volatile or volatile.
  • a computer program is stored thereon, and a report is realized when the computer program is executed by a processor.
  • the generation management method includes: obtaining the first data to be excavated; detecting whether an operator has the authority to make the report; if so, generating an interface for the operator to input the type of prompt required in the report; Receive the prompt type input by the operator on the prompt type interface, or determine the prompt type required in the report according to the data source of the first data or the keywords in the first data, wherein the The prompt types include at least one or more of discrete and continuous univariate analysis prompts, multivariate analysis prompts, outlier detection prompts, and missing value detection prompts; if there are multiple types of prompts, the preset ones are respectively called
  • the analysis component corresponding to the prompt type processes the first data in parallel to obtain different mining results corresponding to different prompt types; the different mining results are combined to form the
  • Non-volatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • Volatile memory may include random access memory (RAM) or external cache memory.
  • RAM is available in many forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), dual-rate data rate SDRAM (SSRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

一种报告的生成管理方法、装置、计算机设备和存储介质,其中方法包括获取待挖掘的第一数据(S1);检测操作者是否具有制作生成管理装置报告的权限(S2);若有,则生成供生成管理装置操作者输入生成管理装置报告中所需的提示种类的界面(S3);接收所述操作者在所述提示种类的界面输入的提示种类,或者根据所述第一数据的数据来源或第一数据中的关键字确定报告中所需的提示种类(S4);若所述提示种类为多种时,分别调用预设的对应提示种类的分析组件并行处理生成管理装置第一数据,以得到对应不同的提示种类的不同挖掘结果(S5);将不同的挖掘结果组合到一起形成生成管理装置报告(S6)。上述方法可以一次性得到一个具有多维度挖掘结果的报告,还降低报告中商业机密被泄露的风险。

Description

报告的生成管理方法、装置、计算机设备和存储介质
本申请要求于2020年2月14日提交中国专利局、申请号为2020100935404,发明名称为“报告的生成管理方法、装置、计算机设备和存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及到数据分析领域,特别是涉及到一种报告的生成管理方法、装置、计算机设备和存储介质。
背景技术
洞察报告真正的概念指的是大数据可视化分析,指用于提取有意义的数据的活动和技术所形成的报告。在商业领域,智能分析报告对于减少不确定性至关重要,可以帮助决策者分析市场状况和竞争对手,有助于高层管理人员获取相关知识做出战略性的商业决策。在金融科技领域,智能报告在信用评估、投资和个人财务管理上都有所应用。发明人发现,利用洞察报告生成工具生成的报告,仅能获取固定维度的报告,决策者无法得到决策者需要的洞察报告。另外,由于洞察报告中有时会涉及一些商业机密等,容易被操作者获取到,提高商业机密等被泄密的风险。
技术问题
本申请的主要目的为提供一种报告的生成管理方法、装置、计算机设备和存储介质,旨在解决现有报告洞察维度少,并且存在商业机密容易泄露的技术问题。
技术解决方案
为了实现上述发明目的,本申请提出一种报告的生成管理方法,包括:
获取待挖掘的第一数据;
检测操作者是否具有制作所述报告的权限;
若有,则生成供所述操作者输入报告中所需的提示种类的界面;
接收所述操作者在所述提示种类的界面输入的提示种类,或者根据所述第一数据的数据来源或第一数据中的关键字确定所述报告中所需的提示种类,其中,所述提示种类至少包括离散和连续单变量分析提示、多变量分析提示、离群值检测提示和缺失值检测提示中的一种或多种;
若所述提示种类为多种时,分别调用预设的对应提示种类的分析组件并行处理所述第一数据,以得到对应不同的提示种类的不同挖掘结果;
将不同的挖掘结果组合到一起形成所述报告。
本申请还提供一种报告的生成管理装置,包括:
获取单元,用于获取待挖掘的第一数据;
权限验证单元,用于检测操作者是否具有制作所述报告的权限;
生成单元,用于操作者具有制作所述报告的权限,则生成供所述操作者输入报告中所需的提示种类的界面;
确定单元,用于接收所述操作者在所述提示种类的界面输入的提示种类,或者根据所述第一数据的数据来源或第一数据中的关键字确定所述报告中所需的提示种类,其中,所述提示种类至少包括离散和连续单变量分析提示、多变量分析提示、离群值检测提示和缺失值检测提示中的一种或多种;
调用单元,用于若所述提示种类为多种时,分别调用预设的对应提示种类的分析组件并行处理所述第一数据,以得到对应不同的提示种类的不同挖掘结果;
组合单元,用于将不同的挖掘结果组合到一起形成所述报告。
本申请还提供一种计算机设备,包括存储器和处理器,所述存储器存储有计算机程序,所述处理器执行所述计算机程序时实现一种报告的生成管理方法,所述方法包括:
获取待挖掘的第一数据;
检测操作者是否具有制作所述报告的权限;
若有,则生成供所述操作者输入所述报告中所需的提示种类的界面;
接收所述操作者在所述提示种类的界面输入的提示种类,或者根据所述第一数据的数据来源或第一数据中的关键字确定所述报告中所需的提示种类,其中,所述提示种类至少包括离散和连续单变量分析提示、多变量分析提示、离群值检测提示和缺失值检测提示中的一种或多种;
若所述提示种类为多种时,分别调用预设的对应提示种类的分析组件并行处理所述第一数据,以得到对应不同的提示种类的不同挖掘结果;
将不同的挖掘结果组合到一起形成所述报告。
本申请还提供一种计算机可读存储介质,其上存储有计算机程序,所述计算机程序被处理器执行时实现一种报告的生成管理方法,所述方法包括:
获取待挖掘的第一数据;
检测操作者是否具有制作所述报告的权限;
若有,则生成供所述操作者输入所述报告中所需的提示种类的界面;
接收所述操作者在所述提示种类的界面输入的提示种类,或者根据所述第一数据的数据来源或第一数据中的关键字确定所述报告中所需的提示种类,其中,所述提示种类至少包括离散和连续单变量分析提示、多变量分析提示、离群值检测提示和缺失值检测提示中的一种或多种;
若所述提示种类为多种时,分别调用预设的对应提示种类的分析组件并行处理所述第一数据,以得到对应不同的提示种类的不同挖掘结果;
将不同的挖掘结果组合到一起形成所述报告。
有益效果
本申请的报告的生成管理方法、装置、计算机设备和存储介质,可以根据需求同时选择多种提示种类已得到对应的多种挖掘结果,一次性得到一个具有多维度挖掘结果的报告,方便查看该报告的决策者通过多维度的思考做出决策;而且在生成上述报告的过程中,还需要进行权限验证,只有通过权限验证的操作者才可以完成报告的制作,降低报告中商业机密被泄露的风险。
附图说明
图1 为本申请一实施例的报告的生成管理方法的流程示意图;
图2 为本申请一实施例的报告的生成管理装置的结构示意框图;
图3 为本申请一实施例的计算机设备的结构示意框图。
本发明的最佳实施方式
为了使本申请的目的、技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
参照图1,本申请实施例提供一种报告的生成管理方法,包括:
S1、获取待挖掘的第一数据;
S2、检测操作者是否具有制作所述报告的权限;
S3、若有,则生成供所述操作者输入报告中所需的提示种类的界面
S4、接收所述操作者在所述提示种类的界面输入的提示种类,或者根据所述第一数据的数据来源或第一数据中的关键字确定所述报告中所需的提示种类,其中,所述提示种类至少包括离散和连续单变量分析提示、多变量分析提示、离群值检测提示和缺失值检测提示中的一种或多种;
S5、若所述提示种类为多种时,分别调用预设的对应提示种类的分析组件并行处理所述第一数据,以得到对应不同的提示种类的不同挖掘结果;
S6、将不同的挖掘结果组合到一起形成所述报告。
如上述步骤S1所述,上述待挖掘的第一数据可以是操作者通过网络爬虫技术在万维网上爬取的数据集合,也可以是在不同的数据库下载下来的数据集合。在一个具体实施例中,接收操作者输入的公司名称,然后根据公司名称到工商管理局中获取该公司的法人信息,然后利用爬虫技术到万维网上爬取与所述公司名称相关的在预设时间段内的所有第一信息数据,以及利用爬虫技术到万维网上爬取与所述法人信息相关的在上述预设时间段内的所有第二信息数据,然后将第一信息数据和第二信息数据合并,形成上述第一数据。上述第一信息数据和第二信息数据包括新闻数据、财务数据、微博等社交分享数据等等。将公司名称,以及公司的法人信息作为爬取数据的关键词,可以有针对性的获取关于上述公司的相关数据,然后洞察出该公司的一些经营动向或者经营趋势等,获取公司的法人信息是为了更好的获取该公司相关的信息,比如法人还有另外的公司数据,法人的征信信息、财务状况等,都会影响报告的最终结果。在其它实施例中,还可以直接到指定的数据库下载需要分析的数据,如到财务处下载指定的财务数据,到运营部门下载运营计划数据,到销售部门下载销售数据等,然后将下载到的数据整合到一起形成上述第一数据。
如上述步骤S2和S3所述,上述第一数据可能是一种涉及商业机密的数据,当作为数据的时候,用户等人无法发现其中的商业秘密,但是当将其生成报告的时候,则可能会体现出其中的商业秘密,所以,并不是所有的人都具有挖掘第一数据,将其形成报告的权限,因此,本申请中,首选要检测操作者是否具有制作所述报告的权限,具体的权限检查方法包括多种,如指纹验证、人脸验证、密码验证等;如果验证通过才会生成供用户输入报告中所需的提示种类的界面,否者不会生成供用户输入报告中所需的提示种类的界面,以防止没有权限的操作者进行下一步的操作。
如上述步骤S4和S5所述,确定报告中所需的提示种类的方法包括多种,比如,接收操作者手动输入的提示种类,具体地,可视化操作:在显示界面上设置有展示不同提示种类的按钮,操作者点击选择所需的提示种类。又比如,自动化操作:识别第一数据的来源,然后根据“数据来源-提示种类映射表”确定提示种类;再比如,自动化操作:预览第一数据中是否包含预设的关键词,根据包含的关键字到预设的“关键字-提示种类映射表”中确定提示种类,比如,关键字“财务”对应“离群值检测提示”,当第一数据中包含“财务”的时候,其自动确定需要的提示种类中包含“离群值检测提示”等。
在生成报告的系统中预存有多种分析组件,不同的分析组件用于对上述第一数据进行分析,即不同的分析组件中封装有不同的分析逻辑,以完成对第一数据的不同分析。本实施例中,与现有技术的不同点在于,可以让操作者同时获取到多种不同种类的提示,比如上述的离散和连续单变量分析提示、多变量分析提示、离群值检测提示和缺失值检测提示等,使操作者得到一个更加符合自己需求报告。具体地:
上述离散和连续单变量分析提示,可以提供单个离散变量内的特征洞察,包括数据分布情况、数据的统计学指标情况(包括均值/分位数/方差/标准差等统计指标)、对数据偏斜情况和数据大量集中区域给出度量等,已完成对大量出现的数据和极少出现的数据给予用户提示,让用户决策是否属于正常情况;上述连续单变量指的是单个变量,且该变量取值是连续的,例如营业额。洞察其特征主要指洞察其统计学指标和分布情况,如上述写到的均值等等。上述度量即为将数据按相等大小的区间分割后,度量每部分或者一片区域(多个相邻部分)的数据占总数据的比例。上述多变量分析提示,可以是通过采用不同相关系数来分析连续变量之间关系,或离散变量之间关系,或离散和连续变量之间关系等,以辅助用户决策,比如提示用户关注相关性较高的变量,其在报告中可以以文字提示或热力图/散点图等可视化手段呈现,使得用户可以深入挖掘其商业价值。上述连续变量之间的关系可以使用Pearson相关系数分析/散点图分析,离散变量之间的关系可以使用卡方检验,离散和连续变量之间的关系可以使用多个箱线图比较。上述离群值检测提示可以提示用户数据的某些特征中存在离群值,并告知用户离群值的特征,让用户能快速关注到这些样本值,使得用户及时发现数据异常情况,离群值检测的算法有多种,例如DBSCAN(Density-Based Spatial Clustering of Applications with Noise,具有噪声的基于密度的聚类方法)、孤立森林、使用分位数检测等等,以DBSCAN算法检测异常值为例:研究以某点为中心指定距离e中包含的点数,给出点数m个为参数,对所有点进行判断后将点分为核心点/边界点/噪声点,核心点为距离e内至少包含m个点数的数据点,边界点是核心点距离e内的邻近点,但包含的点数小于m,其他剩下的都是噪声点,即异常点。上述缺失值检测提示,主要是通过检测字段的缺失值,若缺失情况超过某个阈值(这个阈值根据不同场景有不同设置)则提示用户,在发现缺失值的基础上分析缺失记录的特征,例如在A字段上大量缺失的值在B字段上取值主要是M,通过检测缺失值并二次挖掘缺失值特征给用户提供商业指导价值等等。不同场景下,对缺失值的敏感和要求程度不同,例如在做评分卡建模时,当缺失值超过5%时,系统会提示用户。
如上述步骤S6所述,将不同的挖掘结果组合到一起形成所述报告的方式包括多种,比如,将通过不同的提示种类的不同挖掘结果分别形成一块独立的报告,然后多个独立的报告按照一定顺序拼接形成报告。又比如,各中挖掘结果中如何出现异常的结果,其对应的算法是可以识别出来的,将不同形式的挖掘结果中的异常的结果统一设置在报告的第一页,若第一页不能全部展示异常结果,则顺延至第二页,并以此类推。
在一个实施例中,上述检测操作者是否具有制作所述报告的权限的步骤S2,包括:
检查所述操作者所操作的终端的IP;
根据所述IP判断所述终端是否为移动终端;
若所述终端是移动终端,则判定所述操作者没有制作所述报告的权限;
若所述终端是非移动终端,则根据所述IP获取所述非移动终端的位置信息;
控制预设的可转动摄像头,采集所述非移动终端前的第一图像信息;
若所述第一图像信息中,位于所述非移动终端前的人数大于等于2或为0时,则判定所述操作者没有制作所述报告的权限;
若所述第一图像信息中,位于所述非移动终端前的人数为1时,则判定所述操作者具有制作所述报告的权限。
在本实施例中,主要是提供一个具体的权限验证方法,上述移动终端一般为手机或者笔记本电脑等可以移动办公的设备,因为其移动性质,所以不能确定其所处环境的安全性,所以终端只要是移动终端的均判定操作者没有制作所述报告的权限。当不是移动终端的时候,则可以根据IP号确定非移动终端的位置,这里引入了一个可转动摄像头,即可以控制可转动摄像头的转动来拍摄指定区域的图像,其距离非移动终端一般较远,可以清楚地判断出非移动终端面前的大范围图像,以防止直接使用非移动终端的摄像头因为距离近的原因不能全面的拍摄非移动终端面前的人物信息,当人数大于2的时候,这些人中可能存在没有权限的人,所以就会判定操作者没有制作所述报告的权限,当人数为0时,则说明操作者故意隐藏自己的信息,因此也直接判定操作者没有制作所述报告的权限。当只有一个人的时候,才会认为操作者具有制作报告的权限。在本实施例中,判断位于所述非移动终端前的人数大于等于2或为0的方法,可以使用现有的计算机图像处理技术,将上述第一图像信息中的人物图像分离出来,然后统计人物图像的数量即可;而判断非移动终端前的人数,则可以将非移动终端识别出来,然后根据人物图像在第一图像信息中的第一位置信息以及非移动终端在第一图像信息中的第二位置信息,当第一位置信息在第一位置信息的指定范围之内时,则可以确定第一位置信息对应的人物在非移动终端前。
进一步地,上述若所述第一图像信息中,位于所述非移动终端前的人数为1时,则判定所述操作者具有制作所述报告的权限的步骤,包括:
若所述第一图像信息中,位于所述非移动终端前的人数为1时,启动所述非移动终端的摄像头采集非移动终端前的第二图像信息;
识别所述第二图像信息中的人脸图像,并到预设的人脸权限库中查找是否存在与所述人脸图像匹配的图像;
若有,则判定所述操作者具有制作所述报告的权限,否者判定所述操作者没有制作所述报告的权限。
在本实施例中,当只有一个人的时候,则启动非移动终端的摄像头,采集这个人的人脸图像,已完成人脸权限的验证等,进一步地提高报告的使用安全性,防止报告中的商业秘密被他人窃取。人脸验证的方法中国人脸图像的匹配方法可以使用现有技术中的任意一种,再此不在赘述。上述人脸权限数据库是预设的,是一个当需要对第二图像信息中的人脸图像进行匹配的时候可以调用的数据库,而人脸权限数据库中的图像则是工作人员事先将具有操作权限的操作者的人脸图像存储到人脸权限库中的人脸图像。
在一个实施例中,上述检测操作者是否具有制作所述报告的权限的步骤S2,包括:
使用所述操作者所操作的终端上的摄像头采集所述终端面前的第三图像,其中,所述第三图像中的人数大于等于1;
判断所述第三图像中的人脸图像是否均满足预设的拍摄角度;
若不满足,则生成提醒信息,提醒所述终端面前的人将人脸的朝向按照要求进行调整;
在预览图像通判断人脸达到预设的拍摄角度后,拍摄所述终端面前的第四图像;
识别所述第四图像中的全部人脸信息,并将全部人脸信息到预设的人脸权限库中查找是否存在与各人脸信息匹配的图像;
若全部人脸信息均匹配到对应的图像,则判定所述操作者具有制作所述报告的权限,否者判定所述操作者没有制作所述报告的权限。
在本实施例中,是将终端面前的全部人脸信息采集到,并且要求全部的人脸信息全部具有报告的权限时,才运行终端继续完成生成报告的过程。本实施例中,终端面前一般只有一个人操作者,所以在拍摄第三图像的时候并没有要求终端面前的人调整人脸朝向,可以无感知的完成验证过程。但是人多的时候,或者第三图像中有人脸没有通过验证的时候,才会生成提醒信息等,以快速得到满足要求的第四图像,提高权限验证的效率。
进一步地,上述将不同的挖掘结果组合到一起形成所述报告的步骤S6,包括:
判定所述操作者具有制作所述报告的权限的时候,读取所述操作者的人才类型,其中,人才类型包括数据研究的研发者类型和根据报告分析商业问题的决策者类型;
调用所述操作者的人才类型对应的报告模板;
将不同的挖掘结果整合到调用的报告模板中,其中,不同的报告模板,其呈现的挖掘结果的表现形式不同。
在本实施例中,判断所述操作者的人才类型的方法一般是通过人脸识别的方法,具体的,预先建立具有权限的操作者的数据库,该数据库中存储有不同的操作者的人脸特征信息,以及与人脸特征信息对应的人才类型,在制作洞察的报告的时候先通过操作者的人脸特征信息确定操作者的人才类型,然后选择与人才类型对应的报告模板。决策者类型对应的报告模板,其数据的表现形式更偏向商业性,给决策者提供商业发现,辅导其商业决策,语言描述尽量避免统计学专业术语,而研发者类型对应的报告模板,其数据的表现形式更偏统计性,给分析者提供数据挖掘发现,语言描述较为专业。在本实施例中,因为当多个人同时在终端面前准备查看报告的时候,一般以决策者为主,所以当操作者为多人时,若其中一个人为决策者类型,则调用所述决策者类型的报告模板;当操作者为一个人时,则调用该人对应的人才类型的报告模板。当然,该设置具有对应的开关,可以打开该功能,也可以关闭该功能,关闭该功能的时候,可以获取操作者的手动选择的命令进行处理。
本申请实施例的报告的生成管理方法,可以根据需求同时选择多种提示种类已得到对应的多种挖掘结果,一次性得到一个具有多维度挖掘结果的报告,方便查看该报告的决策者通过多维度的思考做出决策。
参照图2,本申请实施例还提供一种报告的生成管理装置,包括:
获取单元10,用于获取待挖掘的第一数据;
权限验证单元20,用于检测操作者是否具有制作所述报告的权限;
生成单元30,用于操作者具有制作所述报告的权限,则生成供所述操作者输入报告中所需的提示种类的界面;
确定单元40,接收所述操作者在所述提示种类的界面输入的提示种类,或者根据所述第一数据的数据来源或第一数据中的关键字确定所述报告中所需的提示种类,其中,所述提示种类至少包括离散和连续单变量分析提示、多变量分析提示、离群值检测提示和缺失值检测提示中的一种或多种;
调用单元50,用于若所述提示种类为多种时,分别调用预设的对应提示种类的分析组件并行处理所述第一数据,以得到对应不同的提示种类的不同挖掘结果;
组合单元60,用于将不同的挖掘结果组合到一起形成所述报告。
在一个实施例中,上述权限验证单元20,包括:
检查模块,用于检查所述操作者所操作的终端的IP;
判断模块,用于根据所述IP判断所述终端是否为移动终端;
第一判定模块,用于若所述终端是移动终端,则判定所述操作者没有制作所述报告的权限;
获取模块,用于若所述终端是非移动终端,则根据所述IP获取所述非移动终端的位置信息;
控制采集模块,用于控制预设的可转动摄像头,采集所述非移动终端前的第一图像信息;
第二判定模块,用于若所述第一图像信息中,位于所述非移动终端前的人数大于等于2或为0时,则判定所述操作者没有制作所述报告的权限;
第三判定模块,用于若所述第一图像信息中,位于所述非移动终端前的人数为1时,则判定所述操作者具有制作所述报告的权限。
在一个实施例中,上述第三判定模块,包括:
启动拍摄子模块,用于若所述第一图像信息中,位于所述非移动终端前的人数为1时,启动所述非移动终端的摄像头采集非移动终端前的第二图像信息;
识别子模块,用于识别所述第二图像信息中的人脸图像,并到预设的人脸权限库中查找是否存在与所述人脸图像匹配的图像;
判定子模块,用于若人脸权限库中查找到与所述人脸图像匹配的图像,则判定所述操作者具有制作所述报告的权限,否者判定所述操作者没有制作所述报告的权限。
在一个实施例中,上述权限验证单元20,包括:
第一拍摄模块,用于使用所述操作者所操作的终端上的摄像头采集所述终端面前的第三图像,其中,所述第三图像中的人数大于等于1;
角度判断模块,用于判断所述第三图像中的人脸图像是否均满足预设的拍摄角度;
提醒模块,用于若上述第三图像中的人脸图像存在不满足预设的拍摄角度的人脸图像,则生成提醒信息,提醒所述终端面前的人将人脸的朝向按照要求进行调整;
第二拍摄模块,用于在预览图像通判断人脸达到预设的拍摄角度后,拍摄所述终端面前的第四图像;
识别匹配模块,用于识别所述第四图像中的全部人脸信息,并将全部人脸信息到预设的人脸权限库中查找是否存在与各人脸信息匹配的图像;
结果判定模块,用于若全部人脸信息均匹配到对应的图像,则判定所述操作者具有制作所述报告的权限,否者判定所述操作者没有制作所述报告的权限。
进一步地,上述组合单元60,包括:
读取模块,用于判定所述操作者具有制作所述报告的权限的时候,读取所述操作者的人才类型,其中,人才类型包括数据研究的研发者类型和根据报告分析商业问题的决策者类型;
调用模块,用于调用所述操作者的人才类型对应的报告模板;
整合模块,用于将不同的挖掘结果整合到调用的报告模板中,其中,不同的报告模板,其呈现的挖掘结果的表现形式不同。
进一步地,上述调用模块,包括:
调用子模块,用于当操作者为多人时,若其中一个人为决策者类型,则调用所述决策者类型的报告模板;当操作者为一个人时,则调用该人对应的人才类型的报告模板。
本申请实施例的报告的生成管理装置,是对应上述报告的生成管理方法的装置,各单元、模块、子模块的具体功能介绍与其多用的方法相同,所以没有重复阐述。本申请的报告的生成管理装置,同样可以根据需求同时选择多种提示种类已得到对应的多种挖掘结果,一次性得到一个具有多维度挖掘结果的报告,方便查看该报告的决策者通过多维度的思考做出决策。
参照图3,本申请实施例中还提供一种计算机设备,该计算机设备可以是服务器,其内部结构可以如图3所示。该计算机设备包括通过系统总线连接的处理器、存储器、网络接口和数据库。其中,该计算机设计的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性存储介质、内存储器。该非易失性存储介质存储有操作系统、计算机程序和数据库。该内存器为非易失性存储介质中的操作系统和计算机程序的运行提供环境。该计算机设备的数据库用于存储各种待分析数据、分析组件等数据。该计算机设备的网络接口用于与外部的终端通过网络连接通信。该计算机程序被处理器执行时以实现上述任一实施例的报告的生成管理方法。
本领域技术人员可以理解,图3中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定。
本申请实施例还提供一种计算机可读存储介质,所述计算机存储介质可以是非易失性,也可以是易失性,其上存储有计算机程序,计算机程序被处理器执行时实现一种报告的生成管理方法,包括:获取待挖掘的第一数据;检测操作者是否具有制作所述报告的权限;若有,则生成供所述操作者输入所述报告中所需的提示种类的界面;接收所述操作者在所述提示种类的界面输入的提示种类,或者根据所述第一数据的数据来源或第一数据中的关键字确定所述报告中所需的提示种类,其中,所述提示种类至少包括离散和连续单变量分析提示、多变量分析提示、离群值检测提示和缺失值检测提示中的一种或多种;若所述提示种类为多种时,分别调用预设的对应提示种类的分析组件并行处理所述第一数据,以得到对应不同的提示种类的不同挖掘结果;将不同的挖掘结果组合到一起形成所述报告。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机程序来指令相关的硬件来完成,所述的计算机程序可存储与一非易失性计算机可读取存储介质中,该计算机程序在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的和实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可以包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM一多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双速据率SDRAM(SSRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、装置、物品或者方法不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、装置、物品或者方法所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、装置、物品或者方法中还存在另外的相同要素。
以上所述仅为本申请的优选实施例,并非因此限制本申请的专利范围,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本申请的专利保护范围内。

Claims (20)

  1. 一种报告的生成管理方法,其中,包括:
    获取待挖掘的第一数据;
    检测操作者是否具有制作所述报告的权限;
    若有,则生成供所述操作者输入所述报告中所需的提示种类的界面;
    接收所述操作者在所述提示种类的界面输入的提示种类,或者根据所述第一数据的数据来源或第一数据中的关键字确定所述报告中所需的提示种类,其中,所述提示种类至少包括离散和连续单变量分析提示、多变量分析提示、离群值检测提示和缺失值检测提示中的一种或多种;
    若所述提示种类为多种时,分别调用预设的对应提示种类的分析组件并行处理所述第一数据,以得到对应不同的提示种类的不同挖掘结果;
    将不同的挖掘结果组合到一起形成所述报告。
  2. 根据权利要求1所述的报告的生成管理方法,其中,所述检测操作者是否具有制作所述报告的权限的步骤,包括:
    检查所述操作者所操作的终端的IP;
    根据所述IP判断所述终端是否为移动终端;
    若所述终端是移动终端,则判定所述操作者没有制作所述报告的权限;
    若所述终端是非移动终端,则根据所述IP获取所述非移动终端的位置信息;
    控制预设的可转动摄像头,采集所述非移动终端前的第一图像信息;
    若所述第一图像信息中,位于所述非移动终端前的人数大于等于2或为0时,则判定所述操作者没有制作所述报告的权限;
    若所述第一图像信息中,位于所述非移动终端前的人数为1时,则判定所述操作者具有制作所述报告的权限。
  3. 根据权利要求2所述的报告的生成管理方法,其中,所述若所述第一图像信息中,位于所述非移动终端前的人数为1时,则判定所述操作者具有制作所述报告的权限的步骤,包括:
    若所述第一图像信息中,位于所述非移动终端前的人数为1时,启动所述非移动终端的摄像头采集非移动终端前的第二图像信息;
    识别所述第二图像信息中的人脸图像,并到预设的人脸权限库中查找是否存在与所述人脸图像匹配的图像;
    若有,则判定所述操作者具有制作所述报告的权限,否者判定所述操作者没有制作所述报告的权限。
  4. 根据权利要求1所述的报告的生成管理方法,其中,所述检测操作者是否具有制作所述报告的权限的步骤,包括:
    使用所述操作者所操作的终端上的摄像头采集所述终端面前的第三图像,其中,所述第三图像中的人数大于等于1;
    判断所述第三图像中的人脸图像是否均满足预设的拍摄角度;
    若不满足,则生成提醒信息,提醒所述终端面前的人将人脸的朝向按照要求进行调整;
    在预览图像通判断人脸达到预设的拍摄角度后,拍摄所述终端面前的第四图像;
    识别所述第四图像中的全部人脸信息,并将全部人脸信息到预设的人脸权限库中查找是否存在与各人脸信息匹配的图像;
    若全部人脸信息均匹配到对应的图像,则判定所述操作者具有制作所述报告的权限,否者判定所述操作者没有制作所述报告的权限。
  5. 根据权利要求4所述的报告的生成管理方法,其中,所述将不同的挖掘结果组合到一起形成所述报告的步骤,包括:
    判定所述操作者具有制作所述报告的权限的时候,读取所述操作者的人才类型,其中,人才类型包括数据研究的研发者类型和根据报告分析商业问题的决策者类型;
    调用所述操作者的人才类型对应的报告模板;
    将不同的挖掘结果整合到调用的报告模板中,其中,不同的报告模板,其呈现的挖掘结果的表现形式不同。
  6. 根据权利要求5所述的报告的生成管理方法,其中,所述调用所述操作者的人才类型对应的报告模板的步骤,包括:
    当操作者为多人时,若其中一个人为决策者类型,则调用所述决策者类型的报告模板;当操作者为一个人时,则调用该人对应的人才类型的报告模板。
  7. 一种报告的生成管理装置,其中,包括:
    获取单元,用于获取待挖掘的第一数据;
    权限验证单元,用于检测操作者是否具有制作所述报告的权限;
    生成单元,用于操作者具有制作所述报告的权限,则生成供所述操作者输入报告中所需的提示种类的界面;
    确定单元,用于接收所述操作者在所述提示种类的界面输入的提示种类,或者根据所述第一数据的数据来源或第一数据中的关键字确定所述报告中所需的提示种类,其中,所述提示种类至少包括离散和连续单变量分析提示、多变量分析提示、离群值检测提示和缺失值检测提示中的一种或多种;
    调用单元,用于若所述提示种类为多种时,分别调用预设的对应提示种类的分析组件并行处理所述第一数据,以得到对应不同的提示种类的不同挖掘结果;
    组合单元,用于将不同的挖掘结果组合到一起形成所述报告。
  8. 根据权利要求8所述的报告的生成管理装置,其中,所述权限验证单元,包括:
    检查模块,用于检查所述操作者所操作的终端的IP;
    判断模块,用于根据所述IP判断所述终端是否为移动终端;
    第一判定模块,用于若所述终端是移动终端,则判定所述操作者没有制作所述报告的权限;
    获取模块,用于若所述终端是非移动终端,则根据所述IP获取所述非移动终端的位置信息;
    控制采集模块,用于控制预设的可转动摄像头,采集所述非移动终端前的第一图像信息;
    第二判定模块,用于若所述第一图像信息中,位于所述非移动终端前的人数大于等于2或为0时,则判定所述操作者没有制作所述报告的权限;
    第三判定模块,用于若所述第一图像信息中,位于所述非移动终端前的人数为1时,则判定所述操作者具有制作所述报告的权限。
  9. 一种计算机设备,包括存储器和处理器,所述存储器存储有计算机程序,其中,所述处理器执行所述计算机程序时实现一种报告的生成管理方法,所述方法包括:
    获取待挖掘的第一数据;
    检测操作者是否具有制作所述报告的权限;
    若有,则生成供所述操作者输入所述报告中所需的提示种类的界面;
    接收所述操作者在所述提示种类的界面输入的提示种类,或者根据所述第一数据的数据来源或第一数据中的关键字确定所述报告中所需的提示种类,其中,所述提示种类至少包括离散和连续单变量分析提示、多变量分析提示、离群值检测提示和缺失值检测提示中的一种或多种;
    若所述提示种类为多种时,分别调用预设的对应提示种类的分析组件并行处理所述第一数据,以得到对应不同的提示种类的不同挖掘结果;
    将不同的挖掘结果组合到一起形成所述报告。
  10. 根据权利要求9所述的计算机设备,其中,所述检测操作者是否具有制作所述报告的权限的步骤,包括:
    检查所述操作者所操作的终端的IP;
    根据所述IP判断所述终端是否为移动终端;
    若所述终端是移动终端,则判定所述操作者没有制作所述报告的权限;
    若所述终端是非移动终端,则根据所述IP获取所述非移动终端的位置信息;
    控制预设的可转动摄像头,采集所述非移动终端前的第一图像信息;
    若所述第一图像信息中,位于所述非移动终端前的人数大于等于2或为0时,则判定所述操作者没有制作所述报告的权限;
    若所述第一图像信息中,位于所述非移动终端前的人数为1时,则判定所述操作者具有制作所述报告的权限。
  11. 根据权利要求10所述的计算机设备,其中,所述若所述第一图像信息中,位于所述非移动终端前的人数为1时,则判定所述操作者具有制作所述报告的权限的步骤,包括:
    若所述第一图像信息中,位于所述非移动终端前的人数为1时,启动所述非移动终端的摄像头采集非移动终端前的第二图像信息;
    识别所述第二图像信息中的人脸图像,并到预设的人脸权限库中查找是否存在与所述人脸图像匹配的图像;
    若有,则判定所述操作者具有制作所述报告的权限,否者判定所述操作者没有制作所述报告的权限。
  12. 根据权利要求9所述的计算机设备,其中,所述检测操作者是否具有制作所述报告的权限的步骤,包括:
    使用所述操作者所操作的终端上的摄像头采集所述终端面前的第三图像,其中,所述第三图像中的人数大于等于1;
    判断所述第三图像中的人脸图像是否均满足预设的拍摄角度;
    若不满足,则生成提醒信息,提醒所述终端面前的人将人脸的朝向按照要求进行调整;
    在预览图像通判断人脸达到预设的拍摄角度后,拍摄所述终端面前的第四图像;
    识别所述第四图像中的全部人脸信息,并将全部人脸信息到预设的人脸权限库中查找是否存在与各人脸信息匹配的图像;
    若全部人脸信息均匹配到对应的图像,则判定所述操作者具有制作所述报告的权限,否者判定所述操作者没有制作所述报告的权限。
  13. 根据权利要求12所述的计算机设备,其中,所述将不同的挖掘结果组合到一起形成所述报告的步骤,包括:
    判定所述操作者具有制作所述报告的权限的时候,读取所述操作者的人才类型,其中,人才类型包括数据研究的研发者类型和根据报告分析商业问题的决策者类型;
    调用所述操作者的人才类型对应的报告模板;
    将不同的挖掘结果整合到调用的报告模板中,其中,不同的报告模板,其呈现的挖掘结果的表现形式不同。
  14. 根据权利要求13所述的计算机设备,其中,所述调用所述操作者的人才类型对应的报告模板的步骤,包括:
    当操作者为多人时,若其中一个人为决策者类型,则调用所述决策者类型的报告模板;当操作者为一个人时,则调用该人对应的人才类型的报告模板。
  15. 一种计算机可读存储介质,其上存储有计算机程序,其中,所述计算机程序被处理器执行时实现一种报告的生成管理方法,所述方法包括:
    获取待挖掘的第一数据;
    检测操作者是否具有制作所述报告的权限;
    若有,则生成供所述操作者输入所述报告中所需的提示种类的界面;
    接收所述操作者在所述提示种类的界面输入的提示种类,或者根据所述第一数据的数据来源或第一数据中的关键字确定所述报告中所需的提示种类,其中,所述提示种类至少包括离散和连续单变量分析提示、多变量分析提示、离群值检测提示和缺失值检测提示中的一种或多种;
    若所述提示种类为多种时,分别调用预设的对应提示种类的分析组件并行处理所述第一数据,以得到对应不同的提示种类的不同挖掘结果;
    将不同的挖掘结果组合到一起形成所述报告。
  16. 根据权利要求15所述的算机可读存储介质,其中,所述检测操作者是否具有制作所述报告的权限的步骤,包括:
    检查所述操作者所操作的终端的IP;
    根据所述IP判断所述终端是否为移动终端;
    若所述终端是移动终端,则判定所述操作者没有制作所述报告的权限;
    若所述终端是非移动终端,则根据所述IP获取所述非移动终端的位置信息;
    控制预设的可转动摄像头,采集所述非移动终端前的第一图像信息;
    若所述第一图像信息中,位于所述非移动终端前的人数大于等于2或为0时,则判定所述操作者没有制作所述报告的权限;
    若所述第一图像信息中,位于所述非移动终端前的人数为1时,则判定所述操作者具有制作所述报告的权限。
  17. 根据权利要求16所述的算机可读存储介质,其中,所述若所述第一图像信息中,位于所述非移动终端前的人数为1时,则判定所述操作者具有制作所述报告的权限的步骤,包括:
    若所述第一图像信息中,位于所述非移动终端前的人数为1时,启动所述非移动终端的摄像头采集非移动终端前的第二图像信息;
    识别所述第二图像信息中的人脸图像,并到预设的人脸权限库中查找是否存在与所述人脸图像匹配的图像;
    若有,则判定所述操作者具有制作所述报告的权限,否者判定所述操作者没有制作所述报告的权限。
  18. 根据权利要求15所述的算机可读存储介质,其中,所述检测操作者是否具有制作所述报告的权限的步骤,包括:
    使用所述操作者所操作的终端上的摄像头采集所述终端面前的第三图像,其中,所述第三图像中的人数大于等于1;
    判断所述第三图像中的人脸图像是否均满足预设的拍摄角度;
    若不满足,则生成提醒信息,提醒所述终端面前的人将人脸的朝向按照要求进行调整;
    在预览图像通判断人脸达到预设的拍摄角度后,拍摄所述终端面前的第四图像;
    识别所述第四图像中的全部人脸信息,并将全部人脸信息到预设的人脸权限库中查找是否存在与各人脸信息匹配的图像;
    若全部人脸信息均匹配到对应的图像,则判定所述操作者具有制作所述报告的权限,否者判定所述操作者没有制作所述报告的权限。
  19. 根据权利要求18所述的算机可读存储介质,其中,所述将不同的挖掘结果组合到一起形成所述报告的步骤,包括:
    判定所述操作者具有制作所述报告的权限的时候,读取所述操作者的人才类型,其中,人才类型包括数据研究的研发者类型和根据报告分析商业问题的决策者类型;
    调用所述操作者的人才类型对应的报告模板;
    将不同的挖掘结果整合到调用的报告模板中,其中,不同的报告模板,其呈现的挖掘结果的表现形式不同。
  20. 根据权利要求19所述的算机可读存储介质,其中,所述调用所述操作者的人才类型对应的报告模板的步骤,包括:
    当操作者为多人时,若其中一个人为决策者类型,则调用所述决策者类型的报告模板;当操作者为一个人时,则调用该人对应的人才类型的报告模板。
PCT/CN2021/073126 2020-02-14 2021-01-21 报告的生成管理方法、装置、计算机设备和存储介质 WO2021159940A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202010093540.4A CN111352990A (zh) 2020-02-14 2020-02-14 报告的生成管理方法、装置、计算机设备和存储介质
CN202010093540.4 2020-02-14

Publications (1)

Publication Number Publication Date
WO2021159940A1 true WO2021159940A1 (zh) 2021-08-19

Family

ID=71196988

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/073126 WO2021159940A1 (zh) 2020-02-14 2021-01-21 报告的生成管理方法、装置、计算机设备和存储介质

Country Status (2)

Country Link
CN (1) CN111352990A (zh)
WO (1) WO2021159940A1 (zh)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111505433A (zh) * 2020-04-10 2020-08-07 国网浙江余姚市供电有限公司 一种低压台区户变关系纠错及相位识别方法

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111352990A (zh) * 2020-02-14 2020-06-30 深圳壹账通智能科技有限公司 报告的生成管理方法、装置、计算机设备和存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102664903A (zh) * 2012-05-16 2012-09-12 李明 一种网络用户验证方法及系统
CN106993168A (zh) * 2017-04-28 2017-07-28 珠海格力电器股份有限公司 一种监控方法、装置、电子设备及系统
CN107527151A (zh) * 2017-08-31 2017-12-29 郑州云海信息技术有限公司 一种构建企业画像的方法及系统
CN108830701A (zh) * 2018-06-25 2018-11-16 美味不用等(上海)信息科技股份有限公司 去中心化财务报表系统
US20190371134A1 (en) * 2018-06-01 2019-12-05 Industrial Technology Research Institute Self-checkout system, method thereof and device therefor
CN111352990A (zh) * 2020-02-14 2020-06-30 深圳壹账通智能科技有限公司 报告的生成管理方法、装置、计算机设备和存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102664903A (zh) * 2012-05-16 2012-09-12 李明 一种网络用户验证方法及系统
CN106993168A (zh) * 2017-04-28 2017-07-28 珠海格力电器股份有限公司 一种监控方法、装置、电子设备及系统
CN107527151A (zh) * 2017-08-31 2017-12-29 郑州云海信息技术有限公司 一种构建企业画像的方法及系统
US20190371134A1 (en) * 2018-06-01 2019-12-05 Industrial Technology Research Institute Self-checkout system, method thereof and device therefor
CN108830701A (zh) * 2018-06-25 2018-11-16 美味不用等(上海)信息科技股份有限公司 去中心化财务报表系统
CN111352990A (zh) * 2020-02-14 2020-06-30 深圳壹账通智能科技有限公司 报告的生成管理方法、装置、计算机设备和存储介质

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111505433A (zh) * 2020-04-10 2020-08-07 国网浙江余姚市供电有限公司 一种低压台区户变关系纠错及相位识别方法
CN111505433B (zh) * 2020-04-10 2022-06-28 国网浙江余姚市供电有限公司 一种低压台区户变关系纠错及相位识别方法

Also Published As

Publication number Publication date
CN111352990A (zh) 2020-06-30

Similar Documents

Publication Publication Date Title
US10846426B2 (en) Methods and systems for secure document management
US7772972B2 (en) Security monitoring device, security monitoring system and security monitoring method
CN109815803B (zh) 面审风险控制方法、装置、计算机设备和存储介质
US20160260185A1 (en) Electronic Contract Creator
US20050055231A1 (en) Candidate-initiated background check and verification
CN111625809B (zh) 数据授权方法及装置、电子设备、存储介质
WO2021159940A1 (zh) 报告的生成管理方法、装置、计算机设备和存储介质
US20220358509A1 (en) Methods and System for Authorizing a Transaction Related to a Selected Person
Makasi et al. Value–based guiding principles for managing cognitive computing systems in the public sector
US20240037570A1 (en) Method for managing, evaluating and improving identity governance and administration
WO2018232443A1 (en) METHOD AND SYSTEM FOR IDENTITY CONFIRMATION
Binder et al. Biometric technology in “no-gate border crossing solutions” under consideration of privacy, ethical, regulatory and social acceptance
US11948365B2 (en) Frictionless authentication and monitoring
Okumura et al. Identity verification using face recognition for artificial-intelligence electronic forms with speech interaction
US20240089258A1 (en) Identity authentication system and method therefor
Lodge Nameless and faceless: The role of biometrics in realising quantum (in) security and (un) accountability
Harikrishnan et al. Insurance Customer Authentication Using SVM and Financial Time Series Analysis for Mobile Applications.
US10558784B2 (en) Time and motion data fusion for determining and remedying issues based on physical presence
Konnon et al. An Extended Layered Information Security Architecture (ELISA) for e-Government in Developing Countries
US20230308450A1 (en) Authentication management computer for identity authentication, and identity authentication system and identity authentication method using authentication management computer
Tao et al. Ethics of Face Recognition in Smart Cities Toward Trustworthy AI
Koorn et al. Big Data Analytics & Privacy: How To Resolve This Paradox?
US20230161695A1 (en) Test And Validation of Privacy Protection Quality of Anonymization Solutions
CN111612410B (zh) 人员权限管理方法、装置、计算机设备和存储介质
KR102181009B1 (ko) 임의후견 사무관리감독을 위한 블록체인 기반 자산활동 관리 서비스 제공 방법

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21753669

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 110123)

122 Ep: pct application non-entry in european phase

Ref document number: 21753669

Country of ref document: EP

Kind code of ref document: A1