[go: up one dir, main page]

CN108427733B - Method, device and system for setting audit rule, equipment and storage medium - Google Patents

Method, device and system for setting audit rule, equipment and storage medium Download PDF

Info

Publication number
CN108427733B
CN108427733B CN201810164483.7A CN201810164483A CN108427733B CN 108427733 B CN108427733 B CN 108427733B CN 201810164483 A CN201810164483 A CN 201810164483A CN 108427733 B CN108427733 B CN 108427733B
Authority
CN
China
Prior art keywords
rule
audit
file
audit rule
target client
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810164483.7A
Other languages
Chinese (zh)
Other versions
CN108427733A (en
Inventor
钟锦源
何卓荣
梁兆豪
戚明锋
何家荣
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Netease Hangzhou Network Co Ltd
Original Assignee
Netease Hangzhou Network Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Netease Hangzhou Network Co Ltd filed Critical Netease Hangzhou Network Co Ltd
Priority to CN201810164483.7A priority Critical patent/CN108427733B/en
Publication of CN108427733A publication Critical patent/CN108427733A/en
Application granted granted Critical
Publication of CN108427733B publication Critical patent/CN108427733B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/30Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
    • G06F16/33Querying
    • G06F16/335Filtering based on additional data, e.g. user or group profiles
    • G06F16/337Profile generation, learning or modification
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/10Text processing
    • G06F40/166Editing, e.g. inserting or deleting
    • G06F40/186Templates
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/445Program loading or initiating
    • G06F9/44505Configuring for program initiating, e.g. using registry, configuration files
    • G06F9/4451User profiles; Roaming

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computational Linguistics (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer And Data Communications (AREA)

Abstract

The invention discloses a method, a device, a system, equipment and a storage medium for setting an audit rule. The setting method of the audit rule comprises the following steps: responding to an audit rule setting instruction, and acquiring target client information and an audit rule original file; wherein, the original file of the audit rule comprises at least one audit rule; obtaining a rule file template corresponding to the target client according to the target client information; generating a first audit rule file according to each audit rule in the audit rule original file and the rule file template; and sending the first audit rule file to the target client so that the target client sets each audit rule locally according to the first audit rule file. By adopting the invention, the efficiency of application development can be improved, and the service performance of the application can be improved.

Description

Method, device and system for setting audit rule, equipment and storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method, an apparatus, a system, a device, and a storage medium for setting an audit rule.
Background
In the existing application development process, a plurality of rules are usually set in the application for corresponding auditing and judgment. For example, in the development of a game, a plurality of rules are usually set in the game, so as to filter words or non-civilized words with various violence tendencies, unhealthy colors, and the like in the game.
In the prior art, developers need to repeatedly develop the auditing and filtering functions for different application scenarios (e.g., different game product software). Therefore, on one hand, the workload of development is increased, and the working efficiency is low; on the other hand, the problems of abnormal results, difficult general and unified maintenance of rules, no hot update rule function and the like caused by inconsistent auditing standards are easily generated. .
Disclosure of Invention
The embodiment of the invention provides a method, a device, a system, equipment and a storage medium for setting an audit rule, which can improve the efficiency of application development and the usability of application.
The method for setting the audit rule provided by the embodiment of the invention specifically comprises the following steps:
responding to an audit rule setting instruction, and acquiring target client information and an audit rule original file; wherein, the original file of the audit rule comprises at least one audit rule;
obtaining a rule file template corresponding to the target client according to the target client information;
generating a first audit rule file according to each audit rule in the audit rule original file and the rule file template;
and sending the first audit rule file to the target client so that the target client sets each audit rule locally according to the first audit rule file.
Further, the setting method of the audit rule further includes:
receiving the auditing rule setting instruction sent by the target client; or,
receiving an audit rule setting instruction sent by the target client when detecting that each audit rule in the previously received second audit rule file is inconsistent with each audit rule in the audit rule original file; or,
and receiving the audit rule setting instruction sent by the target client when the positioning information of the second audit rule file is detected to be inconsistent with the positioning information of the original audit rule file.
Further, the auditing rule setting instruction comprises the target client information and a rule file identification code;
the obtaining target client information and an original file of the audit rule in response to the audit rule setting instruction specifically includes:
responding to the audit rule setting instruction, analyzing the audit rule setting instruction to obtain the target client information and the rule file identification code;
and querying a preset rule file database to obtain the original audit rule file corresponding to the rule file identification code.
Further, the setting method of the audit rule further includes:
and when the rule processing operation on the original audit rule file is detected to be completed, generating the audit rule setting instruction.
Further, the rule processing operation includes a rule new operation, a rule delete operation, and/or a rule modify operation.
Further, the generating the audit rule setting instruction when detecting that the rule processing operation on the audit rule original file is completed includes:
when detecting that the rule processing operation on the original audit rule file in a preset rule file database is completed, acquiring a rule file identification code of the original audit rule file, and generating an audit rule setting instruction according to the rule file identification code;
the obtaining target client information and an original file of the audit rule in response to the audit rule setting instruction specifically includes:
responding to the audit rule setting instruction, analyzing the audit rule setting instruction to obtain the rule file identification code;
inquiring the rule file database according to the rule file identification code to obtain the original file of the audit rule;
and inquiring a preset client record table according to the regular file identification code, acquiring all client information corresponding to the regular file identification code, and sequentially setting each client information as the target client information.
Further, the original file of the audit rule has a corresponding relation with the application; the application identification code is included in the rule file identification code.
Further, the at least one audit rule comprises a nickname audit rule and/or a language audit rule.
Further, the target client information includes client system type information and/or client type information.
Further, the setting method of the audit rule further includes:
obtaining rule storage path information corresponding to the target client according to the target client information;
the sending the first audit rule file to the target client so that the target client sets each audit rule locally according to the first audit rule file specifically includes:
and sending the first audit rule file and the rule storage path information to the target client, so that the target client sets each audit rule in the first audit rule file in a folder corresponding to the rule storage path information.
Further, the setting method of the audit rule further includes:
generating a file key corresponding to the first audit rule file;
sending the first audit rule file and the rule storage path information to the target client, so that the target client sets each audit rule in the first audit rule file in a folder corresponding to the rule storage path information, specifically including:
and sending the first audit rule file, the rule storage path information and the file key to the target client, so that the target client sets each audit rule in the first audit rule file in a folder corresponding to the rule storage path information, and encrypts the folder by using the file key.
Correspondingly, an embodiment of the present invention further provides a device for setting an audit rule, which specifically includes:
the rule original file obtaining module is used for responding to an audit rule setting instruction and obtaining target client information and an audit rule original file; wherein, the original file of the audit rule comprises at least one audit rule;
the rule file template obtaining module is used for obtaining a rule file template corresponding to the target client according to the target client information;
the audit rule file generation module is used for generating a first audit rule file according to each audit rule in the audit rule original file and the rule file template; and the number of the first and second groups,
and the auditing rule setting module is used for sending the first auditing rule file to the target client so that the target client sets each auditing rule locally according to the first auditing rule file.
Correspondingly, the embodiment of the invention also provides a setting system of the audit rule, which specifically comprises a server and at least one client;
the server is used for executing the setting method of the auditing rule;
the client comprises a target client and is used for setting each audit rule to the local according to the first audit rule file after receiving the first audit rule file sent by the server.
An embodiment of the present invention further provides a server device, which specifically includes a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor, where the processor implements the setting method of the audit rule as described above when executing the computer program.
The embodiment of the present invention further provides a computer-readable storage medium, which specifically includes a stored computer program, where when the computer program runs, the apparatus where the computer-readable storage medium is located is controlled to execute the above setting method for the audit rule.
The embodiment of the invention has the following beneficial effects:
according to the auditing rule setting method, the auditing rule setting device, the auditing rule setting system, the auditing rule setting equipment and the storage medium, different rule file templates are preset, and after the rule file template corresponding to the target client is selected, the auditing rule file which can be suitable for the target client is generated according to the rule file template and the auditing rule original file, so that the target client can set all auditing rules locally according to the auditing rule file. According to the method and the device, the rule file templates corresponding to the target clients are preset, so that the auditing rules can be developed in the same environment and can be used by different clients, the compatibility problem of the environment does not need to be considered in the application development process, and the application development efficiency can be improved. In addition, since the audit rule service of each client is provided by the server in the same development environment, the problem of server jamming caused by incompatibility of different environments can be avoided, so that the application use performance is improved, and the user experience is improved.
Drawings
FIG. 1 is a schematic structural diagram of a preferred embodiment of an audit rule setting system provided by the present invention;
FIG. 2 is a flow chart illustrating a preferred embodiment of a method for setting audit rules according to the present invention;
FIG. 3 is a schematic structural diagram of a preferred embodiment of an apparatus for setting audit rules provided by the present invention;
fig. 4 is a schematic structural diagram of a preferred embodiment of the server device provided by the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, a schematic structural diagram of a preferred embodiment of the system for setting audit rules provided by the present invention includes a server 11 and at least one client 12;
the server 11 is configured to execute a setting method of an audit rule according to any one of the following embodiments;
it should be noted that, a plurality of audit rules are stored in the server in advance, after the server obtains the relevant information of the target client, an audit rule file corresponding to the target client is generated according to the relevant information of the target client, and the audit rule file is sent to the target client, so that the target client sets a corresponding audit rule according to the audit rule file. It is understood that the target client is a client that needs to be set with rules.
The client 12 includes a target client, and is configured to set each audit rule locally according to the first audit rule file after receiving the first audit rule file sent by the server 11.
As shown in fig. 2, a schematic flow chart of a preferred embodiment of the setting method of the audit rule provided by the present invention includes steps S21 to S24, which are specifically as follows:
s21: responding to an audit rule setting instruction, and acquiring target client information and an audit rule original file; wherein, the original file of the audit rule comprises at least one audit rule. Optionally, the audit rule includes a general audit rule, and is not directed to an audit rule applied by a specific client. Therefore, the burden of maintenance and management of the audit rule can be further reduced, and the repeated utilization rate and the development efficiency of the rule are improved.
It should be noted that, the embodiment of the present invention is executed by the server in the setting system of the audit rule.
The audit rule setting instruction may be generated autonomously by the server or generated by the target client. After detecting the audit rule setting instruction, the server analyzes the audit rule setting instruction to obtain the relevant information of the target client, and meanwhile, obtains the original file of the audit rule to be set by inquiring a preset rule file database. The rule file database and the original audit rule file, audit rule, etc. therein may be developed and generated by using SDK (Software Development Kit). The audit rule may be a regular expression.
S22: and obtaining a rule file template corresponding to the target client according to the target client information.
It should be noted that, for different clients, different rule file templates are pre-configured in the server. Therefore, after the server side obtains the target client side information, the server side screens out the rule file template corresponding to the target client side by inquiring the rule file template configured in advance.
More preferably, the target client information includes client system type information and/or client type information.
It should be noted that the client system type information may be used to mark different client system types, such as an Android system, an iOS system, a Windows system, and the like, and therefore, a rule file template corresponding to the Android system, a rule file template corresponding to the iOS system, a rule file template corresponding to the Windows system, and the like may be configured in advance in the server. The client type information may be used to mark different client types, such as a domestic client type, a foreign client type, and the like, and therefore, the server may be configured with a rule file template corresponding to the domestic client type, a rule file template corresponding to the foreign client type, and the like in advance.
S23: and generating a first audit rule file according to each audit rule in the audit rule original file and the rule file template.
It should be noted that, after the server obtains the rule file template corresponding to the target client, the server edits the original audit rule file according to the rule file template, so as to obtain a first audit rule file applicable to the target client.
S24: and sending the first audit rule file to the target client so that the target client sets each audit rule locally according to the first audit rule file.
It should be noted that, after the target client sets each audit rule in the first audit rule file locally, the target client may perform audit and judgment on conditions in the application running process by using the audit rule.
It should be further noted that, in some specific embodiments, the service end itself may also invoke the audit rule in an HTTP (HyperText Transfer Protocol) manner.
More preferably, the at least one audit rule comprises a nickname audit rule and/or a language audit rule.
It should be noted that, when the nickname audit rule is set in the target client, each time the user sets a nickname, the target client will automatically call the nickname audit rule to perform corresponding audit and judgment. Specifically, when detecting that the user performs nickname setting, the target client acquires a nickname (e.g., a conference name, a pet name, etc.) input by the user, and calls the nickname audit rule by calling a nickname audit interface, thereby auditing the nickname. Generating an audit result as { "message": regular { "regular id": 6"," code ": 202" } whenever the audit is completed according to an audit rule, wherein the format of the audit result may be JSON (JS Object notification, JS Object mark) format; the message is the text prompt message of the audit result, and the value is "+"; the regular id is the number of the non-passing audit rule, and its value is "6"; the code is a status code of the audit result (e.g., an error occurs during the audit process, the audit content passes, the audit content violates a rule, etc.), and has a value of "202". When the nickname passes all the audit rules, the nickname is indicated to meet the set conditions, so that the nickname is judged to pass the audit, otherwise, the nickname is judged to not pass the audit, and a corresponding violation prompt is output.
When the language auditing rule is set in the target client, the target client automatically calls the language auditing rule to perform corresponding auditing and judgment whenever the user issues the language. Specifically, when the target client detects that the user releases the speech, the target client acquires the speech input by the user, the user level data, the speech place and the like, and calls the speech auditing rule by calling a speech auditing interface, so as to audit the speech. Generating an audit result as { "message": regular { "regular id": 6"," code ": 202" } whenever the audit is completed according to an audit rule, wherein the format of the audit result may be JSON (JS Object notification, JS Object mark) format; the message is the text prompt message of the audit result, and the value is "+"; the regular id is the number of the non-passing audit rule, and its value is "6"; the code is a status code of the audit result (e.g., an error occurs during the audit process, the audit content passes, the audit content violates a rule, etc.), and has a value of "202". When the language passes through all the auditing rules, the language is in accordance with the set conditions, so that the language is judged to pass the auditing, otherwise, the language is judged not to pass the auditing, and a corresponding violation prompt is output.
In some specific embodiments, the auditing rule may also be other rules for auditing and judging other contents input by a user or other contents of an application. Correspondingly, the target client can be provided with other types of auditing interfaces besides the nickname auditing interface and the speech auditing interface, and is used for calling other types of auditing rules.
It should be further noted that, in each client, the nickname audit rule and the statement audit rule are developed and generated by using SDK. In the auditing process, the judgment of whether the auditing rule is complete or not, whether the auditing process is overtime or not and the like can be added, so that the accuracy of the auditing result is improved.
In the embodiment, different rule file templates are preset, and after the rule file template corresponding to the target client is selected, an audit rule file applicable to the target client is generated according to the rule file template and the audit rule original file, so that the target client can set each audit rule locally according to the audit rule file. According to the method and the device, the rule file templates corresponding to the target clients are preset, so that the auditing rules can be developed in the same environment and can be used by different clients, the compatibility problem of the environment does not need to be considered in the application development process, and separate application development does not need to be carried out on each client, so that the application development efficiency can be improved. In addition, since the audit rule service of each client is provided by the server in the same development environment, the problem of server jamming caused by incompatibility of different environments can be avoided, so that the application use performance is improved, and the user experience is improved.
In another preferred embodiment, the audit rule setting instruction may be generated by the target client. The setting method of the audit rule further comprises steps S01, S02 or S03, which are specifically as follows:
s01: and receiving the auditing rule setting instruction sent by the target client.
It should be noted that, the target client may automatically generate an audit rule setting instruction at intervals, and send the audit rule setting instruction to the server, so as to complete automatic periodic update of the audit rule set in the target client.
S02: and receiving the audit rule setting instruction sent by the target client when detecting that each audit rule in the previously received second audit rule file is inconsistent with each audit rule in the audit rule original file.
It should be noted that, the target client automatically detects the currently set audit rule at intervals, determines whether the audit rules are consistent with the audit rule currently used in the server, and if not, generates an audit rule setting instruction and sends the audit rule setting instruction to the server to complete updating of the audit rule set by the target client; if the two are consistent, no processing is performed.
S03: and receiving the audit rule setting instruction sent by the target client when the positioning information of the second audit rule file is detected to be inconsistent with the positioning information of the original audit rule file.
It should be noted that the second audit rule file and the original audit rule file both include location information. The location information may be represented by a URL (Uniform Resource Locator). When the target client detects that the positioning information of the second audit rule file currently set by the target client is inconsistent with the positioning information of the original audit rule file, it indicates that the audit rule currently used by the target client is not the latest audit rule, so that an audit rule setting instruction is generated and sent to the server, and the locally set audit rule is updated.
Further, the auditing rule setting instruction includes the target client information and a rule file identification code.
It should be noted that, a plurality of original audit rule files are pre-configured in the server, and each original audit rule file has a unique rule file identification code. The target client can judge whether each locally set auditing rule is the latest auditing rule or not according to the rule file identification code.
Then, the step S21 may further include steps S2111 to S2112, which are as follows:
s2111: and responding to the audit rule setting instruction, analyzing the audit rule setting instruction, and acquiring the target client information and the rule file identification code.
S2112: and querying a preset rule file database to obtain the original audit rule file corresponding to the rule file identification code.
It should be noted that, a rule file database is preset in the server and is used for storing each original file of the audit rule.
More preferably, the original document of the audit rule has a corresponding relationship with the application; the application identification code is included in the rule file identification code.
It should be noted that the original audit rule file may also correspond to the application one to one, so that the original audit rule file may also be identified by the application identification code. For example, if the game identifier of a certain game is G, the original audit rule file corresponding to the game may also be identified as G. Therefore, the target client may also automatically detect and update all the auditing rules corresponding to the application each time the user starts the application. By corresponding the original audit rule file with the application, the audit rule of each application can be realized in the same development environment, so that the problem of application incompatibility caused by different development environments is avoided, and the use benefit of the application is further improved.
In a further preferred embodiment, the audit rule setting instruction may be automatically generated by the server. The setting method of the audit rule further includes step S04, which is as follows:
s04: and when the rule processing operation on the original audit rule file is detected to be completed, generating the audit rule setting instruction.
It should be noted that the server is provided with an audit rule database and a rule file database. Developers can directly develop all the audit rules in the audit rule database in the server. After the developer completes the development of a certain audit rule in the audit rule database, the server automatically queries the rule file database, screens out all audit rule original files containing the audit rule, and updates the audit rule to the audit rule original files. And when the original file of the audit rule is updated, automatically generating a corresponding audit rule setting instruction.
Further, the step S04 further includes a step S0401, which is as follows:
s0401: when detecting that the rule processing operation on the original audit rule file in the preset rule file database is completed, acquiring a rule file identification code of the original audit rule file, and generating the audit rule setting instruction according to the rule file identification code.
It should be noted that, a plurality of original audit rule files are pre-configured in the server, and each original audit rule file has a unique rule file identification code. Therefore, after the target server finishes updating a certain audit rule original file, the target server acquires the rule file identification code of the audit rule original file and generates an audit rule setting instruction corresponding to the audit rule original file.
More preferably, the rule processing operation includes a rule new operation, a rule delete operation, and/or a rule modify operation.
Then, the step S21 may further include steps S2121 to S2123, which are as follows:
s2121: and responding to the audit rule setting instruction, analyzing the audit rule setting instruction, and obtaining the rule file identification code.
S2122: and inquiring the rule file database according to the rule file identification code to obtain the original file of the audit rule.
It should be noted that, a rule file database is preset in the server and is used for storing each original file of the audit rule.
S2123: and inquiring a preset client record table according to the regular file identification code, acquiring all client information corresponding to the regular file identification code, and sequentially setting each client information as the target client information.
It should be noted that, a client record table is also preset in the server, and is used for recording a corresponding relationship between each audit rule original file and each client, that is, the client record table records a heading of each audit rule original file. For example, when the original file of the audit rule has a corresponding relationship with the application, the client record table records the relevant information of all clients installed with the application. When the server side obtains the rule file identification code of the original audit rule file after the rule processing operation, the client side record table is inquired, the client side information of all the client sides corresponding to the rule file identification code is obtained, and each client side information is sequentially set as the target client side information, so that the update of the audit rule set in all the client sides corresponding to the rule file identification code is completed.
More preferably, the original document of the audit rule has a corresponding relationship with the application; the application identification code is included in the rule file identification code.
In another preferred embodiment, the setting method of the audit rule further includes step S05, which is as follows:
s05: and obtaining the rule storage path information corresponding to the target client according to the target client information.
It should be noted that, rule storage path information corresponding to different clients is also configured in advance in the server. Therefore, after obtaining the target client information, the server obtains the rule storage path information corresponding to the target client according to the client information.
Step S24 may further include step S2401, which is as follows:
s2401: and sending the first audit rule file and the rule storage path information to the target client, so that the target client sets each audit rule in the first audit rule file in a folder corresponding to the rule storage path information.
Further, the setting method of the audit rule further includes step S06, which is as follows:
s06: and generating a file key corresponding to the first audit rule file.
The server generates a first audit file, and then generates a file key corresponding to the first audit file, where the file key is used to encrypt each audit rule in the first audit file, where the audit rule is set after the target client.
Then, the step S2401 may further include a step S2401_1, which is as follows:
s2401_ 1: and sending the first audit rule file, the rule storage path information and the file key to the target client, so that the target client sets each audit rule in the first audit rule file in a folder corresponding to the rule storage path information, and encrypts the folder by using the file key.
It should be noted that, before the target client sets each audit rule in the first audit rule file in the folder, the target client may also decrypt the folder by using the file key. The file key may include a public key and a private key.
According to the auditing rule setting method and system provided by the embodiment of the invention, different rule file templates are preset, and after the rule file template corresponding to the target client is selected, the auditing rule file which can be suitable for the target client is generated according to the rule file template and the auditing rule original file, so that the target client can set each auditing rule locally according to the auditing rule file. According to the method and the device, the rule file templates corresponding to the target clients are preset, so that the auditing rules can be developed in the same environment and can be used by different clients, the compatibility problem of the environment does not need to be considered in the application development process, and separate application development does not need to be carried out on each client, so that the application development efficiency can be improved. In addition, since the audit rule service of each client is provided by the server in the same development environment, the problem of server jamming caused by incompatibility of different environments can be avoided, so that the application use performance is improved, and the user experience is improved.
Correspondingly, the invention also provides a setting device of the audit rule, which can realize all the processes of the setting method of the audit rule in the embodiment.
As shown in fig. 3, a schematic structural diagram of a preferred embodiment of the setting apparatus for audit rules provided by the present invention is specifically as follows:
a rule original file obtaining module 31, configured to obtain target client information and an audit rule original file in response to an audit rule setting instruction; wherein, the original file of the audit rule comprises at least one audit rule;
a rule file template obtaining module 32, configured to obtain, according to the target client information, a rule file template corresponding to the target client;
the audit rule file generation module 33 is configured to generate a first audit rule file according to each audit rule in the audit rule original file and the rule file template; and the number of the first and second groups,
the audit rule setting module 34 is configured to send the first audit rule file to the target client, so that the target client sets each audit rule locally according to the first audit rule file.
Further, the setting device of the audit rule further includes:
the first rule setting instruction receiving module is used for receiving the auditing rule setting instruction sent by the target client; or,
a second rule setting instruction receiving module, configured to receive the audit rule setting instruction sent by the target client when detecting that each audit rule in the previously received second audit rule file is inconsistent with each audit rule in the audit rule original file; or,
and the third rule setting instruction receiving module is used for receiving the auditing rule setting instruction sent by the target client when the positioning information of the second auditing rule file is detected to be inconsistent with the positioning information of the auditing rule original file.
Further, the auditing rule setting instruction comprises the target client information and a rule file identification code;
the rule original file obtaining module specifically includes:
a rule file identification code obtaining unit, configured to respond to the audit rule setting instruction, and analyze the audit rule setting instruction to obtain the target client information and the rule file identification code; and the number of the first and second groups,
and the audit rule original file obtaining unit is used for inquiring a preset rule file database and obtaining the audit rule original file corresponding to the rule file identification code.
Further, the setting device of the audit rule further includes:
and the rule setting instruction generating module is used for generating the audit rule setting instruction when detecting that the rule processing operation on the audit rule original file is completed.
Further, the rule processing operation includes a rule new operation, a rule delete operation, and/or a rule modify operation.
Further, the rule setting instruction generating module specifically includes:
the rule setting instruction generating unit is used for acquiring a rule file identification code of the audit rule original file when detecting that the rule processing operation on the audit rule original file in a preset rule file database is completed, and generating the audit rule setting instruction according to the rule file identification code;
the rule original file obtaining module specifically includes:
a rule file identification code obtaining unit, configured to respond to the audit rule setting instruction, and analyze the audit rule setting instruction to obtain the rule file identification code;
an audit rule original file obtaining unit, configured to query the rule file database according to the rule file identification code to obtain the audit rule original file; and the number of the first and second groups,
and the target client information obtaining unit is used for inquiring a preset client record table according to the regular file identification code, obtaining all client information corresponding to the regular file identification code, and sequentially setting each piece of client information as the target client information.
Further, the original file of the audit rule has a corresponding relation with the application; the application identification code is included in the rule file identification code.
Further, the at least one audit rule comprises a nickname audit rule and/or a language audit rule.
Further, the target client information includes client system type information and/or client type information.
Further, the setting device of the audit rule further includes:
a rule storage path information obtaining module, configured to obtain, according to the target client information, rule storage path information corresponding to the target client;
the audit rule setting module specifically includes:
and the auditing rule setting unit is used for sending the first auditing rule file and the rule storage path information to the target client so that the target client can set each auditing rule in the first auditing rule file in a folder corresponding to the rule storage path information.
Further, the setting device of the audit rule further includes:
the file key generation module is used for generating a file key corresponding to the first audit rule file;
the audit rule setting unit specifically includes:
and the auditing rule setting subunit is configured to send the first auditing rule file, the rule storage path information, and the file key to the target client, so that the target client sets each auditing rule in the first auditing rule file in a folder corresponding to the rule storage path information, and encrypts the folder by using the file key.
According to the setting device of the audit rule, provided by the embodiment of the invention, different rule file templates are preset, and after the rule file template corresponding to the target client is selected, the audit rule file which can be suitable for the target client is generated according to the rule file template and the original audit rule file, so that the target client can set each audit rule locally according to the audit rule file. According to the method and the device, the rule file templates corresponding to the target clients are preset, so that the auditing rules can be developed in the same environment and can be used by different clients, the compatibility problem of the environment does not need to be considered in the application development process, and separate application development does not need to be carried out on each client, so that the application development efficiency can be improved. In addition, since the audit rule service of each client is provided by the server in the same development environment, the problem of server jamming caused by incompatibility of different environments can be avoided, so that the application use performance is improved, and the user experience is improved.
The invention also provides the server equipment.
As shown in fig. 4, a schematic structural diagram of a preferred embodiment of the server device provided by the present invention includes a processor 41, a memory 42, and a computer program stored in the memory 42 and configured to be executed by the processor 41, where the processor 41 implements the setting method of the audit rule according to any one of the above embodiments when executing the computer program.
It should be noted that fig. 4 only illustrates an example in which one memory and one processor in the server device are connected, in some specific embodiments, the server device may further include a plurality of memories and/or a plurality of processors, and the specific number and the connection mode thereof may be set and adaptively adjusted according to actual needs.
According to the server device provided by the embodiment of the invention, different rule file templates are preset, and after the rule file template corresponding to the target client is selected, the audit rule file which can be suitable for the target client is generated according to the rule file template and the audit rule original file, so that the target client can set each audit rule locally according to the audit rule file. According to the method and the device, the rule file templates corresponding to the target clients are preset, so that the auditing rules can be developed in the same environment and can be used by different clients, the compatibility problem of the environment does not need to be considered in the application development process, and separate application development does not need to be carried out on each client, so that the application development efficiency can be improved. In addition, since the audit rule service of each client is provided by the server in the same development environment, the problem of server jamming caused by incompatibility of different environments can be avoided, so that the application use performance is improved, and the user experience is improved.
The present invention further provides a computer-readable storage medium, which specifically includes a stored computer program, where when the computer program runs, the apparatus where the computer-readable storage medium is located is controlled to execute the method for setting the audit rule according to any of the above embodiments.
It should be noted that, all or part of the flow in the method according to the above embodiments of the present invention may also be implemented by a computer program instructing related hardware, where the computer program may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the above embodiments of the method may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be further noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
According to the computer-readable storage medium provided by the embodiment of the invention, different rule file templates are preset, and after the rule file template corresponding to the target client is selected, the audit rule file which can be suitable for the target client is generated according to the rule file template and the audit rule original file, so that the target client can set each audit rule locally according to the audit rule file. According to the method and the device, the rule file templates corresponding to the target clients are preset, so that the auditing rules can be developed in the same environment and can be used by different clients, the compatibility problem of the environment does not need to be considered in the application development process, and separate application development does not need to be carried out on each client, so that the application development efficiency can be improved. In addition, since the audit rule service of each client is provided by the server in the same development environment, the problem of server jamming caused by incompatibility of different environments can be avoided, so that the application use performance is improved, and the user experience is improved.
While the foregoing is directed to the preferred embodiment of the present invention, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention.

Claims (15)

1. A setting method of audit rules is characterized by comprising the following steps:
responding to an audit rule setting instruction, and acquiring target client information and an audit rule original file corresponding to a target client; wherein, the original file of the audit rule comprises at least one audit rule;
obtaining a rule file template corresponding to the target client according to the target client information;
generating a first audit rule file applicable to a target client according to each audit rule in the original audit rule file and the rule file template;
and sending the first audit rule file to the target client so that the target client sets each audit rule locally according to the first audit rule file.
2. The setting method of audit rules according to claim 1, wherein the setting method of audit rules further includes:
receiving the auditing rule setting instruction sent by the target client; or,
receiving an audit rule setting instruction sent by the target client when detecting that each audit rule in the previously received second audit rule file is inconsistent with each audit rule in the audit rule original file; or,
and receiving the audit rule setting instruction sent by the target client when the positioning information of the second audit rule file is detected to be inconsistent with the positioning information of the original audit rule file.
3. The setting method of the audit rule according to claim 2, wherein the audit rule setting instruction includes the target client information and a rule file identification code;
the obtaining of the target client information and the original file of the audit rule in response to the audit rule setting instruction specifically includes:
responding to the audit rule setting instruction, analyzing the audit rule setting instruction to obtain the target client information and the rule file identification code;
and querying a preset rule file database to obtain the original audit rule file corresponding to the rule file identification code.
4. The setting method of audit rules according to claim 1, wherein the setting method of audit rules further includes:
and when the rule processing operation on the original audit rule file is detected to be completed, generating the audit rule setting instruction.
5. An audit rule setting method according to claim 4 wherein the rule processing operations include a rule new operation, a rule delete operation and/or a rule modify operation.
6. The method for setting an audit rule according to claim 4, wherein the generating the audit rule setting instruction when detecting that the rule processing operation on the audit rule original file is completed includes:
when detecting that the rule processing operation on the original audit rule file in a preset rule file database is completed, acquiring a rule file identification code of the original audit rule file, and generating an audit rule setting instruction according to the rule file identification code;
the obtaining target client information and an original file of the audit rule in response to the audit rule setting instruction specifically includes:
responding to the audit rule setting instruction, analyzing the audit rule setting instruction to obtain the rule file identification code;
inquiring the rule file database according to the rule file identification code to obtain the original file of the audit rule;
and inquiring a preset client record table according to the regular file identification code, acquiring all client information corresponding to the regular file identification code, and sequentially setting each client information as the target client information.
7. The setting method of the audit rule according to claim 3 or 6, wherein the original file of the audit rule has a corresponding relation with the application; the application identification code is included in the rule file identification code.
8. An audit rule setting method according to claim 1 wherein the at least one audit rule includes a nickname audit rule and/or a speech audit rule.
9. The setting method of the auditing rule according to claim 1, where the target client information includes client system type information and/or client type information.
10. The setting method of audit rules according to claim 1, wherein the setting method of audit rules further includes:
obtaining rule storage path information corresponding to the target client according to the target client information;
the sending the first audit rule file to the target client so that the target client sets each audit rule locally according to the first audit rule file specifically includes:
and sending the first audit rule file and the rule storage path information to the target client, so that the target client sets each audit rule in the first audit rule file in a folder corresponding to the rule storage path information.
11. The setting method of audit rules according to claim 10, wherein the setting method of audit rules further includes:
generating a file key corresponding to the first audit rule file;
sending the first audit rule file and the rule storage path information to the target client, so that the target client sets each audit rule in the first audit rule file in a folder corresponding to the rule storage path information, specifically including:
and sending the first audit rule file, the rule storage path information and the file key to the target client, so that the target client sets each audit rule in the first audit rule file in a folder corresponding to the rule storage path information, and encrypts the folder by using the file key.
12. An apparatus for setting an audit rule, comprising:
the rule original file obtaining module is used for responding to the audit rule setting instruction and obtaining target client information and an audit rule original file corresponding to the target client information; wherein, the original file of the audit rule comprises at least one audit rule;
the rule file template obtaining module is used for obtaining a rule file template corresponding to the target client according to the target client information;
the audit rule file generation module is used for generating a first audit rule file which can be suitable for a target client according to each audit rule in the audit rule original file and the rule file template; and the number of the first and second groups,
and the auditing rule setting module is used for sending the first auditing rule file to the target client so that the target client sets each auditing rule locally according to the first auditing rule file.
13. A setting system of audit rules is characterized by comprising a server and at least one client;
the server side is used for executing the setting method of the auditing rule according to any one of claims 1 to 11;
the client comprises a target client and is used for setting each audit rule to the local according to the first audit rule file after receiving the first audit rule file sent by the server.
14. A server device comprising a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor, the processor implementing the setting method of audit rules according to any one of claims 1 to 11 when executing the computer program.
15. A computer-readable storage medium, comprising a stored computer program, wherein when the computer program runs, the computer-readable storage medium controls a device to execute the setting method of the audit rule according to any one of claims 1 to 11.
CN201810164483.7A 2018-02-28 2018-02-28 Method, device and system for setting audit rule, equipment and storage medium Active CN108427733B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810164483.7A CN108427733B (en) 2018-02-28 2018-02-28 Method, device and system for setting audit rule, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810164483.7A CN108427733B (en) 2018-02-28 2018-02-28 Method, device and system for setting audit rule, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN108427733A CN108427733A (en) 2018-08-21
CN108427733B true CN108427733B (en) 2021-08-10

Family

ID=63157128

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810164483.7A Active CN108427733B (en) 2018-02-28 2018-02-28 Method, device and system for setting audit rule, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN108427733B (en)

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109583987A (en) * 2018-10-09 2019-04-05 阿里巴巴集团控股有限公司 A kind of processing method of data, device and equipment
CN110414702A (en) * 2019-06-28 2019-11-05 南京领行科技股份有限公司 One kind is called a taxi application processing method, apparatus and system
CN111126965B (en) * 2019-12-25 2023-08-29 深圳前海环融联易信息科技服务有限公司 Auditing rule optimization method, auditing rule optimization device, computer equipment and storage medium
CN111026929B (en) * 2019-12-27 2023-07-21 咪咕文化科技有限公司 Text approval method, device and storage medium
CN111585988A (en) * 2020-04-25 2020-08-25 中信银行股份有限公司 Data auditing method, device and system and computer storage medium
CN111724132A (en) * 2020-06-18 2020-09-29 北京明略软件系统有限公司 File delivery method, device, intelligent terminal and storage medium
CN112579632B (en) * 2020-12-28 2024-12-24 中国建设银行股份有限公司 A data verification method, device, equipment and medium
CN112926941B (en) * 2021-03-04 2023-07-11 远光软件股份有限公司 Management method and device of financial auditing rules, storage medium and server
CN113205312B (en) * 2021-05-13 2024-10-29 深圳供电局有限公司 Power consumer archive management method and system, computer equipment and storage medium
CN113643113A (en) * 2021-08-06 2021-11-12 国网山东省电力公司营销服务中心(计量中心) Method, system, medium and electronic device for automatic review of electricity bills

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101021890A (en) * 2007-03-20 2007-08-22 华为技术有限公司 Method, system and server for checking page data
TW201220116A (en) * 2010-11-09 2012-05-16 Inst Information Industry Information security protection host
US8712990B2 (en) * 2009-10-09 2014-04-29 Sap Ag Methods and systems for providing a business repository
CN106101090A (en) * 2016-06-07 2016-11-09 中国建设银行股份有限公司 Operational approach and rule engine system for regulation engine
CN106126215A (en) * 2016-06-17 2016-11-16 深圳市麦斯杰网络有限公司 Business rule scenario generation method and device

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110239293A1 (en) * 2010-03-24 2011-09-29 Microsoft Corporation Auditing access to data based on resource properties
CN103927314B (en) * 2013-01-16 2017-10-13 阿里巴巴集团控股有限公司 A kind of method and apparatus of batch data processing
CN106055602A (en) * 2016-05-24 2016-10-26 腾讯科技(深圳)有限公司 File verification method and apparatus
CN107133275A (en) * 2017-04-11 2017-09-05 国网福建省电力有限公司 The method that a kind of regulation and control main website telemechanical point table is audited automatically

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101021890A (en) * 2007-03-20 2007-08-22 华为技术有限公司 Method, system and server for checking page data
US8712990B2 (en) * 2009-10-09 2014-04-29 Sap Ag Methods and systems for providing a business repository
TW201220116A (en) * 2010-11-09 2012-05-16 Inst Information Industry Information security protection host
CN106101090A (en) * 2016-06-07 2016-11-09 中国建设银行股份有限公司 Operational approach and rule engine system for regulation engine
CN106126215A (en) * 2016-06-17 2016-11-16 深圳市麦斯杰网络有限公司 Business rule scenario generation method and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
面向银行信贷的规则引擎系统设计与实现;王世春;《中国优秀硕士学位论文全文数据库经济与管理科学辑》;20170315;全文 *

Also Published As

Publication number Publication date
CN108427733A (en) 2018-08-21

Similar Documents

Publication Publication Date Title
CN108427733B (en) Method, device and system for setting audit rule, equipment and storage medium
CN109558748B (en) Data processing method and device, electronic equipment and storage medium
JP6980903B2 (en) Selective voice-activated memory for voice capture devices
US11755530B2 (en) Method and system for applying data retention policies in a computing platform
CN111400761B (en) Data sharing method and device, storage medium and electronic equipment
CN109635523B (en) Application program detection method and device and computer readable storage medium
KR20150096312A (en) Telemetry system for a cloud synchronization system
US20170139680A1 (en) Systems, methods, and media for graphical task creation
CN107918564B (en) Data transmission exception handling method and device, electronic equipment and storage medium
WO2020015191A1 (en) Business rule releasing and managing method, electronic device and readable storage medium
JP2021502648A (en) FPGA cloud host development method and system
CN110764894A (en) Timed task management method, device, equipment and storage medium
CN112799659A (en) A method, device and terminal for automatically generating data interface without programming
WO2019032133A1 (en) Multi-platform model processing and execution management engine
CN107277019A (en) Data clear text acquisition methods, device, electric terminal and readable storage medium storing program for executing
CN111984259A (en) Interface creating method, device, equipment and storage medium
CN106844532A (en) A kind of application program acquisition methods and device and a kind of terminal device
CN111260080A (en) Process optimization method, device, terminal and storage medium based on machine learning
US11048668B2 (en) Sensitive data management
CN108255967B (en) Method and device for calling storage process, storage medium and terminal
CN114465867A (en) Server maintenance method and device, storage medium and processor
CN111078424A (en) Information interaction method and device, computer equipment and storage medium
CN113204776B (en) Method, device, equipment and storage medium for realizing column encryption
CN106708706B (en) Alarm information processing method and device for task program abnormity
CN112084767B (en) Information response processing method, intelligent voice equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant