CN108427733B - Method, device and system for setting audit rule, equipment and storage medium - Google Patents
Method, device and system for setting audit rule, equipment and storage medium Download PDFInfo
- Publication number
- CN108427733B CN108427733B CN201810164483.7A CN201810164483A CN108427733B CN 108427733 B CN108427733 B CN 108427733B CN 201810164483 A CN201810164483 A CN 201810164483A CN 108427733 B CN108427733 B CN 108427733B
- Authority
- CN
- China
- Prior art keywords
- rule
- audit
- file
- audit rule
- target client
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/33—Querying
- G06F16/335—Filtering based on additional data, e.g. user or group profiles
- G06F16/337—Profile generation, learning or modification
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/10—Text processing
- G06F40/166—Editing, e.g. inserting or deleting
- G06F40/186—Templates
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/445—Program loading or initiating
- G06F9/44505—Configuring for program initiating, e.g. using registry, configuration files
- G06F9/4451—User profiles; Roaming
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computational Linguistics (AREA)
- Databases & Information Systems (AREA)
- Data Mining & Analysis (AREA)
- Health & Medical Sciences (AREA)
- Artificial Intelligence (AREA)
- Audiology, Speech & Language Pathology (AREA)
- General Health & Medical Sciences (AREA)
- Computer And Data Communications (AREA)
Abstract
The invention discloses a method, a device, a system, equipment and a storage medium for setting an audit rule. The setting method of the audit rule comprises the following steps: responding to an audit rule setting instruction, and acquiring target client information and an audit rule original file; wherein, the original file of the audit rule comprises at least one audit rule; obtaining a rule file template corresponding to the target client according to the target client information; generating a first audit rule file according to each audit rule in the audit rule original file and the rule file template; and sending the first audit rule file to the target client so that the target client sets each audit rule locally according to the first audit rule file. By adopting the invention, the efficiency of application development can be improved, and the service performance of the application can be improved.
Description
Technical Field
The present invention relates to the field of computer technologies, and in particular, to a method, an apparatus, a system, a device, and a storage medium for setting an audit rule.
Background
In the existing application development process, a plurality of rules are usually set in the application for corresponding auditing and judgment. For example, in the development of a game, a plurality of rules are usually set in the game, so as to filter words or non-civilized words with various violence tendencies, unhealthy colors, and the like in the game.
In the prior art, developers need to repeatedly develop the auditing and filtering functions for different application scenarios (e.g., different game product software). Therefore, on one hand, the workload of development is increased, and the working efficiency is low; on the other hand, the problems of abnormal results, difficult general and unified maintenance of rules, no hot update rule function and the like caused by inconsistent auditing standards are easily generated. .
Disclosure of Invention
The embodiment of the invention provides a method, a device, a system, equipment and a storage medium for setting an audit rule, which can improve the efficiency of application development and the usability of application.
The method for setting the audit rule provided by the embodiment of the invention specifically comprises the following steps:
responding to an audit rule setting instruction, and acquiring target client information and an audit rule original file; wherein, the original file of the audit rule comprises at least one audit rule;
obtaining a rule file template corresponding to the target client according to the target client information;
generating a first audit rule file according to each audit rule in the audit rule original file and the rule file template;
and sending the first audit rule file to the target client so that the target client sets each audit rule locally according to the first audit rule file.
Further, the setting method of the audit rule further includes:
receiving the auditing rule setting instruction sent by the target client; or,
receiving an audit rule setting instruction sent by the target client when detecting that each audit rule in the previously received second audit rule file is inconsistent with each audit rule in the audit rule original file; or,
and receiving the audit rule setting instruction sent by the target client when the positioning information of the second audit rule file is detected to be inconsistent with the positioning information of the original audit rule file.
Further, the auditing rule setting instruction comprises the target client information and a rule file identification code;
the obtaining target client information and an original file of the audit rule in response to the audit rule setting instruction specifically includes:
responding to the audit rule setting instruction, analyzing the audit rule setting instruction to obtain the target client information and the rule file identification code;
and querying a preset rule file database to obtain the original audit rule file corresponding to the rule file identification code.
Further, the setting method of the audit rule further includes:
and when the rule processing operation on the original audit rule file is detected to be completed, generating the audit rule setting instruction.
Further, the rule processing operation includes a rule new operation, a rule delete operation, and/or a rule modify operation.
Further, the generating the audit rule setting instruction when detecting that the rule processing operation on the audit rule original file is completed includes:
when detecting that the rule processing operation on the original audit rule file in a preset rule file database is completed, acquiring a rule file identification code of the original audit rule file, and generating an audit rule setting instruction according to the rule file identification code;
the obtaining target client information and an original file of the audit rule in response to the audit rule setting instruction specifically includes:
responding to the audit rule setting instruction, analyzing the audit rule setting instruction to obtain the rule file identification code;
inquiring the rule file database according to the rule file identification code to obtain the original file of the audit rule;
and inquiring a preset client record table according to the regular file identification code, acquiring all client information corresponding to the regular file identification code, and sequentially setting each client information as the target client information.
Further, the original file of the audit rule has a corresponding relation with the application; the application identification code is included in the rule file identification code.
Further, the at least one audit rule comprises a nickname audit rule and/or a language audit rule.
Further, the target client information includes client system type information and/or client type information.
Further, the setting method of the audit rule further includes:
obtaining rule storage path information corresponding to the target client according to the target client information;
the sending the first audit rule file to the target client so that the target client sets each audit rule locally according to the first audit rule file specifically includes:
and sending the first audit rule file and the rule storage path information to the target client, so that the target client sets each audit rule in the first audit rule file in a folder corresponding to the rule storage path information.
Further, the setting method of the audit rule further includes:
generating a file key corresponding to the first audit rule file;
sending the first audit rule file and the rule storage path information to the target client, so that the target client sets each audit rule in the first audit rule file in a folder corresponding to the rule storage path information, specifically including:
and sending the first audit rule file, the rule storage path information and the file key to the target client, so that the target client sets each audit rule in the first audit rule file in a folder corresponding to the rule storage path information, and encrypts the folder by using the file key.
Correspondingly, an embodiment of the present invention further provides a device for setting an audit rule, which specifically includes:
the rule original file obtaining module is used for responding to an audit rule setting instruction and obtaining target client information and an audit rule original file; wherein, the original file of the audit rule comprises at least one audit rule;
the rule file template obtaining module is used for obtaining a rule file template corresponding to the target client according to the target client information;
the audit rule file generation module is used for generating a first audit rule file according to each audit rule in the audit rule original file and the rule file template; and the number of the first and second groups,
and the auditing rule setting module is used for sending the first auditing rule file to the target client so that the target client sets each auditing rule locally according to the first auditing rule file.
Correspondingly, the embodiment of the invention also provides a setting system of the audit rule, which specifically comprises a server and at least one client;
the server is used for executing the setting method of the auditing rule;
the client comprises a target client and is used for setting each audit rule to the local according to the first audit rule file after receiving the first audit rule file sent by the server.
An embodiment of the present invention further provides a server device, which specifically includes a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor, where the processor implements the setting method of the audit rule as described above when executing the computer program.
The embodiment of the present invention further provides a computer-readable storage medium, which specifically includes a stored computer program, where when the computer program runs, the apparatus where the computer-readable storage medium is located is controlled to execute the above setting method for the audit rule.
The embodiment of the invention has the following beneficial effects:
according to the auditing rule setting method, the auditing rule setting device, the auditing rule setting system, the auditing rule setting equipment and the storage medium, different rule file templates are preset, and after the rule file template corresponding to the target client is selected, the auditing rule file which can be suitable for the target client is generated according to the rule file template and the auditing rule original file, so that the target client can set all auditing rules locally according to the auditing rule file. According to the method and the device, the rule file templates corresponding to the target clients are preset, so that the auditing rules can be developed in the same environment and can be used by different clients, the compatibility problem of the environment does not need to be considered in the application development process, and the application development efficiency can be improved. In addition, since the audit rule service of each client is provided by the server in the same development environment, the problem of server jamming caused by incompatibility of different environments can be avoided, so that the application use performance is improved, and the user experience is improved.
Drawings
FIG. 1 is a schematic structural diagram of a preferred embodiment of an audit rule setting system provided by the present invention;
FIG. 2 is a flow chart illustrating a preferred embodiment of a method for setting audit rules according to the present invention;
FIG. 3 is a schematic structural diagram of a preferred embodiment of an apparatus for setting audit rules provided by the present invention;
fig. 4 is a schematic structural diagram of a preferred embodiment of the server device provided by the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
As shown in fig. 1, a schematic structural diagram of a preferred embodiment of the system for setting audit rules provided by the present invention includes a server 11 and at least one client 12;
the server 11 is configured to execute a setting method of an audit rule according to any one of the following embodiments;
it should be noted that, a plurality of audit rules are stored in the server in advance, after the server obtains the relevant information of the target client, an audit rule file corresponding to the target client is generated according to the relevant information of the target client, and the audit rule file is sent to the target client, so that the target client sets a corresponding audit rule according to the audit rule file. It is understood that the target client is a client that needs to be set with rules.
The client 12 includes a target client, and is configured to set each audit rule locally according to the first audit rule file after receiving the first audit rule file sent by the server 11.
As shown in fig. 2, a schematic flow chart of a preferred embodiment of the setting method of the audit rule provided by the present invention includes steps S21 to S24, which are specifically as follows:
s21: responding to an audit rule setting instruction, and acquiring target client information and an audit rule original file; wherein, the original file of the audit rule comprises at least one audit rule. Optionally, the audit rule includes a general audit rule, and is not directed to an audit rule applied by a specific client. Therefore, the burden of maintenance and management of the audit rule can be further reduced, and the repeated utilization rate and the development efficiency of the rule are improved.
It should be noted that, the embodiment of the present invention is executed by the server in the setting system of the audit rule.
The audit rule setting instruction may be generated autonomously by the server or generated by the target client. After detecting the audit rule setting instruction, the server analyzes the audit rule setting instruction to obtain the relevant information of the target client, and meanwhile, obtains the original file of the audit rule to be set by inquiring a preset rule file database. The rule file database and the original audit rule file, audit rule, etc. therein may be developed and generated by using SDK (Software Development Kit). The audit rule may be a regular expression.
S22: and obtaining a rule file template corresponding to the target client according to the target client information.
It should be noted that, for different clients, different rule file templates are pre-configured in the server. Therefore, after the server side obtains the target client side information, the server side screens out the rule file template corresponding to the target client side by inquiring the rule file template configured in advance.
More preferably, the target client information includes client system type information and/or client type information.
It should be noted that the client system type information may be used to mark different client system types, such as an Android system, an iOS system, a Windows system, and the like, and therefore, a rule file template corresponding to the Android system, a rule file template corresponding to the iOS system, a rule file template corresponding to the Windows system, and the like may be configured in advance in the server. The client type information may be used to mark different client types, such as a domestic client type, a foreign client type, and the like, and therefore, the server may be configured with a rule file template corresponding to the domestic client type, a rule file template corresponding to the foreign client type, and the like in advance.
S23: and generating a first audit rule file according to each audit rule in the audit rule original file and the rule file template.
It should be noted that, after the server obtains the rule file template corresponding to the target client, the server edits the original audit rule file according to the rule file template, so as to obtain a first audit rule file applicable to the target client.
S24: and sending the first audit rule file to the target client so that the target client sets each audit rule locally according to the first audit rule file.
It should be noted that, after the target client sets each audit rule in the first audit rule file locally, the target client may perform audit and judgment on conditions in the application running process by using the audit rule.
It should be further noted that, in some specific embodiments, the service end itself may also invoke the audit rule in an HTTP (HyperText Transfer Protocol) manner.
More preferably, the at least one audit rule comprises a nickname audit rule and/or a language audit rule.
It should be noted that, when the nickname audit rule is set in the target client, each time the user sets a nickname, the target client will automatically call the nickname audit rule to perform corresponding audit and judgment. Specifically, when detecting that the user performs nickname setting, the target client acquires a nickname (e.g., a conference name, a pet name, etc.) input by the user, and calls the nickname audit rule by calling a nickname audit interface, thereby auditing the nickname. Generating an audit result as { "message": regular { "regular id": 6"," code ": 202" } whenever the audit is completed according to an audit rule, wherein the format of the audit result may be JSON (JS Object notification, JS Object mark) format; the message is the text prompt message of the audit result, and the value is "+"; the regular id is the number of the non-passing audit rule, and its value is "6"; the code is a status code of the audit result (e.g., an error occurs during the audit process, the audit content passes, the audit content violates a rule, etc.), and has a value of "202". When the nickname passes all the audit rules, the nickname is indicated to meet the set conditions, so that the nickname is judged to pass the audit, otherwise, the nickname is judged to not pass the audit, and a corresponding violation prompt is output.
When the language auditing rule is set in the target client, the target client automatically calls the language auditing rule to perform corresponding auditing and judgment whenever the user issues the language. Specifically, when the target client detects that the user releases the speech, the target client acquires the speech input by the user, the user level data, the speech place and the like, and calls the speech auditing rule by calling a speech auditing interface, so as to audit the speech. Generating an audit result as { "message": regular { "regular id": 6"," code ": 202" } whenever the audit is completed according to an audit rule, wherein the format of the audit result may be JSON (JS Object notification, JS Object mark) format; the message is the text prompt message of the audit result, and the value is "+"; the regular id is the number of the non-passing audit rule, and its value is "6"; the code is a status code of the audit result (e.g., an error occurs during the audit process, the audit content passes, the audit content violates a rule, etc.), and has a value of "202". When the language passes through all the auditing rules, the language is in accordance with the set conditions, so that the language is judged to pass the auditing, otherwise, the language is judged not to pass the auditing, and a corresponding violation prompt is output.
In some specific embodiments, the auditing rule may also be other rules for auditing and judging other contents input by a user or other contents of an application. Correspondingly, the target client can be provided with other types of auditing interfaces besides the nickname auditing interface and the speech auditing interface, and is used for calling other types of auditing rules.
It should be further noted that, in each client, the nickname audit rule and the statement audit rule are developed and generated by using SDK. In the auditing process, the judgment of whether the auditing rule is complete or not, whether the auditing process is overtime or not and the like can be added, so that the accuracy of the auditing result is improved.
In the embodiment, different rule file templates are preset, and after the rule file template corresponding to the target client is selected, an audit rule file applicable to the target client is generated according to the rule file template and the audit rule original file, so that the target client can set each audit rule locally according to the audit rule file. According to the method and the device, the rule file templates corresponding to the target clients are preset, so that the auditing rules can be developed in the same environment and can be used by different clients, the compatibility problem of the environment does not need to be considered in the application development process, and separate application development does not need to be carried out on each client, so that the application development efficiency can be improved. In addition, since the audit rule service of each client is provided by the server in the same development environment, the problem of server jamming caused by incompatibility of different environments can be avoided, so that the application use performance is improved, and the user experience is improved.
In another preferred embodiment, the audit rule setting instruction may be generated by the target client. The setting method of the audit rule further comprises steps S01, S02 or S03, which are specifically as follows:
s01: and receiving the auditing rule setting instruction sent by the target client.
It should be noted that, the target client may automatically generate an audit rule setting instruction at intervals, and send the audit rule setting instruction to the server, so as to complete automatic periodic update of the audit rule set in the target client.
S02: and receiving the audit rule setting instruction sent by the target client when detecting that each audit rule in the previously received second audit rule file is inconsistent with each audit rule in the audit rule original file.
It should be noted that, the target client automatically detects the currently set audit rule at intervals, determines whether the audit rules are consistent with the audit rule currently used in the server, and if not, generates an audit rule setting instruction and sends the audit rule setting instruction to the server to complete updating of the audit rule set by the target client; if the two are consistent, no processing is performed.
S03: and receiving the audit rule setting instruction sent by the target client when the positioning information of the second audit rule file is detected to be inconsistent with the positioning information of the original audit rule file.
It should be noted that the second audit rule file and the original audit rule file both include location information. The location information may be represented by a URL (Uniform Resource Locator). When the target client detects that the positioning information of the second audit rule file currently set by the target client is inconsistent with the positioning information of the original audit rule file, it indicates that the audit rule currently used by the target client is not the latest audit rule, so that an audit rule setting instruction is generated and sent to the server, and the locally set audit rule is updated.
Further, the auditing rule setting instruction includes the target client information and a rule file identification code.
It should be noted that, a plurality of original audit rule files are pre-configured in the server, and each original audit rule file has a unique rule file identification code. The target client can judge whether each locally set auditing rule is the latest auditing rule or not according to the rule file identification code.
Then, the step S21 may further include steps S2111 to S2112, which are as follows:
s2111: and responding to the audit rule setting instruction, analyzing the audit rule setting instruction, and acquiring the target client information and the rule file identification code.
S2112: and querying a preset rule file database to obtain the original audit rule file corresponding to the rule file identification code.
It should be noted that, a rule file database is preset in the server and is used for storing each original file of the audit rule.
More preferably, the original document of the audit rule has a corresponding relationship with the application; the application identification code is included in the rule file identification code.
It should be noted that the original audit rule file may also correspond to the application one to one, so that the original audit rule file may also be identified by the application identification code. For example, if the game identifier of a certain game is G, the original audit rule file corresponding to the game may also be identified as G. Therefore, the target client may also automatically detect and update all the auditing rules corresponding to the application each time the user starts the application. By corresponding the original audit rule file with the application, the audit rule of each application can be realized in the same development environment, so that the problem of application incompatibility caused by different development environments is avoided, and the use benefit of the application is further improved.
In a further preferred embodiment, the audit rule setting instruction may be automatically generated by the server. The setting method of the audit rule further includes step S04, which is as follows:
s04: and when the rule processing operation on the original audit rule file is detected to be completed, generating the audit rule setting instruction.
It should be noted that the server is provided with an audit rule database and a rule file database. Developers can directly develop all the audit rules in the audit rule database in the server. After the developer completes the development of a certain audit rule in the audit rule database, the server automatically queries the rule file database, screens out all audit rule original files containing the audit rule, and updates the audit rule to the audit rule original files. And when the original file of the audit rule is updated, automatically generating a corresponding audit rule setting instruction.
Further, the step S04 further includes a step S0401, which is as follows:
s0401: when detecting that the rule processing operation on the original audit rule file in the preset rule file database is completed, acquiring a rule file identification code of the original audit rule file, and generating the audit rule setting instruction according to the rule file identification code.
It should be noted that, a plurality of original audit rule files are pre-configured in the server, and each original audit rule file has a unique rule file identification code. Therefore, after the target server finishes updating a certain audit rule original file, the target server acquires the rule file identification code of the audit rule original file and generates an audit rule setting instruction corresponding to the audit rule original file.
More preferably, the rule processing operation includes a rule new operation, a rule delete operation, and/or a rule modify operation.
Then, the step S21 may further include steps S2121 to S2123, which are as follows:
s2121: and responding to the audit rule setting instruction, analyzing the audit rule setting instruction, and obtaining the rule file identification code.
S2122: and inquiring the rule file database according to the rule file identification code to obtain the original file of the audit rule.
It should be noted that, a rule file database is preset in the server and is used for storing each original file of the audit rule.
S2123: and inquiring a preset client record table according to the regular file identification code, acquiring all client information corresponding to the regular file identification code, and sequentially setting each client information as the target client information.
It should be noted that, a client record table is also preset in the server, and is used for recording a corresponding relationship between each audit rule original file and each client, that is, the client record table records a heading of each audit rule original file. For example, when the original file of the audit rule has a corresponding relationship with the application, the client record table records the relevant information of all clients installed with the application. When the server side obtains the rule file identification code of the original audit rule file after the rule processing operation, the client side record table is inquired, the client side information of all the client sides corresponding to the rule file identification code is obtained, and each client side information is sequentially set as the target client side information, so that the update of the audit rule set in all the client sides corresponding to the rule file identification code is completed.
More preferably, the original document of the audit rule has a corresponding relationship with the application; the application identification code is included in the rule file identification code.
In another preferred embodiment, the setting method of the audit rule further includes step S05, which is as follows:
s05: and obtaining the rule storage path information corresponding to the target client according to the target client information.
It should be noted that, rule storage path information corresponding to different clients is also configured in advance in the server. Therefore, after obtaining the target client information, the server obtains the rule storage path information corresponding to the target client according to the client information.
Step S24 may further include step S2401, which is as follows:
s2401: and sending the first audit rule file and the rule storage path information to the target client, so that the target client sets each audit rule in the first audit rule file in a folder corresponding to the rule storage path information.
Further, the setting method of the audit rule further includes step S06, which is as follows:
s06: and generating a file key corresponding to the first audit rule file.
The server generates a first audit file, and then generates a file key corresponding to the first audit file, where the file key is used to encrypt each audit rule in the first audit file, where the audit rule is set after the target client.
Then, the step S2401 may further include a step S2401_1, which is as follows:
s2401_ 1: and sending the first audit rule file, the rule storage path information and the file key to the target client, so that the target client sets each audit rule in the first audit rule file in a folder corresponding to the rule storage path information, and encrypts the folder by using the file key.
It should be noted that, before the target client sets each audit rule in the first audit rule file in the folder, the target client may also decrypt the folder by using the file key. The file key may include a public key and a private key.
According to the auditing rule setting method and system provided by the embodiment of the invention, different rule file templates are preset, and after the rule file template corresponding to the target client is selected, the auditing rule file which can be suitable for the target client is generated according to the rule file template and the auditing rule original file, so that the target client can set each auditing rule locally according to the auditing rule file. According to the method and the device, the rule file templates corresponding to the target clients are preset, so that the auditing rules can be developed in the same environment and can be used by different clients, the compatibility problem of the environment does not need to be considered in the application development process, and separate application development does not need to be carried out on each client, so that the application development efficiency can be improved. In addition, since the audit rule service of each client is provided by the server in the same development environment, the problem of server jamming caused by incompatibility of different environments can be avoided, so that the application use performance is improved, and the user experience is improved.
Correspondingly, the invention also provides a setting device of the audit rule, which can realize all the processes of the setting method of the audit rule in the embodiment.
As shown in fig. 3, a schematic structural diagram of a preferred embodiment of the setting apparatus for audit rules provided by the present invention is specifically as follows:
a rule original file obtaining module 31, configured to obtain target client information and an audit rule original file in response to an audit rule setting instruction; wherein, the original file of the audit rule comprises at least one audit rule;
a rule file template obtaining module 32, configured to obtain, according to the target client information, a rule file template corresponding to the target client;
the audit rule file generation module 33 is configured to generate a first audit rule file according to each audit rule in the audit rule original file and the rule file template; and the number of the first and second groups,
the audit rule setting module 34 is configured to send the first audit rule file to the target client, so that the target client sets each audit rule locally according to the first audit rule file.
Further, the setting device of the audit rule further includes:
the first rule setting instruction receiving module is used for receiving the auditing rule setting instruction sent by the target client; or,
a second rule setting instruction receiving module, configured to receive the audit rule setting instruction sent by the target client when detecting that each audit rule in the previously received second audit rule file is inconsistent with each audit rule in the audit rule original file; or,
and the third rule setting instruction receiving module is used for receiving the auditing rule setting instruction sent by the target client when the positioning information of the second auditing rule file is detected to be inconsistent with the positioning information of the auditing rule original file.
Further, the auditing rule setting instruction comprises the target client information and a rule file identification code;
the rule original file obtaining module specifically includes:
a rule file identification code obtaining unit, configured to respond to the audit rule setting instruction, and analyze the audit rule setting instruction to obtain the target client information and the rule file identification code; and the number of the first and second groups,
and the audit rule original file obtaining unit is used for inquiring a preset rule file database and obtaining the audit rule original file corresponding to the rule file identification code.
Further, the setting device of the audit rule further includes:
and the rule setting instruction generating module is used for generating the audit rule setting instruction when detecting that the rule processing operation on the audit rule original file is completed.
Further, the rule processing operation includes a rule new operation, a rule delete operation, and/or a rule modify operation.
Further, the rule setting instruction generating module specifically includes:
the rule setting instruction generating unit is used for acquiring a rule file identification code of the audit rule original file when detecting that the rule processing operation on the audit rule original file in a preset rule file database is completed, and generating the audit rule setting instruction according to the rule file identification code;
the rule original file obtaining module specifically includes:
a rule file identification code obtaining unit, configured to respond to the audit rule setting instruction, and analyze the audit rule setting instruction to obtain the rule file identification code;
an audit rule original file obtaining unit, configured to query the rule file database according to the rule file identification code to obtain the audit rule original file; and the number of the first and second groups,
and the target client information obtaining unit is used for inquiring a preset client record table according to the regular file identification code, obtaining all client information corresponding to the regular file identification code, and sequentially setting each piece of client information as the target client information.
Further, the original file of the audit rule has a corresponding relation with the application; the application identification code is included in the rule file identification code.
Further, the at least one audit rule comprises a nickname audit rule and/or a language audit rule.
Further, the target client information includes client system type information and/or client type information.
Further, the setting device of the audit rule further includes:
a rule storage path information obtaining module, configured to obtain, according to the target client information, rule storage path information corresponding to the target client;
the audit rule setting module specifically includes:
and the auditing rule setting unit is used for sending the first auditing rule file and the rule storage path information to the target client so that the target client can set each auditing rule in the first auditing rule file in a folder corresponding to the rule storage path information.
Further, the setting device of the audit rule further includes:
the file key generation module is used for generating a file key corresponding to the first audit rule file;
the audit rule setting unit specifically includes:
and the auditing rule setting subunit is configured to send the first auditing rule file, the rule storage path information, and the file key to the target client, so that the target client sets each auditing rule in the first auditing rule file in a folder corresponding to the rule storage path information, and encrypts the folder by using the file key.
According to the setting device of the audit rule, provided by the embodiment of the invention, different rule file templates are preset, and after the rule file template corresponding to the target client is selected, the audit rule file which can be suitable for the target client is generated according to the rule file template and the original audit rule file, so that the target client can set each audit rule locally according to the audit rule file. According to the method and the device, the rule file templates corresponding to the target clients are preset, so that the auditing rules can be developed in the same environment and can be used by different clients, the compatibility problem of the environment does not need to be considered in the application development process, and separate application development does not need to be carried out on each client, so that the application development efficiency can be improved. In addition, since the audit rule service of each client is provided by the server in the same development environment, the problem of server jamming caused by incompatibility of different environments can be avoided, so that the application use performance is improved, and the user experience is improved.
The invention also provides the server equipment.
As shown in fig. 4, a schematic structural diagram of a preferred embodiment of the server device provided by the present invention includes a processor 41, a memory 42, and a computer program stored in the memory 42 and configured to be executed by the processor 41, where the processor 41 implements the setting method of the audit rule according to any one of the above embodiments when executing the computer program.
It should be noted that fig. 4 only illustrates an example in which one memory and one processor in the server device are connected, in some specific embodiments, the server device may further include a plurality of memories and/or a plurality of processors, and the specific number and the connection mode thereof may be set and adaptively adjusted according to actual needs.
According to the server device provided by the embodiment of the invention, different rule file templates are preset, and after the rule file template corresponding to the target client is selected, the audit rule file which can be suitable for the target client is generated according to the rule file template and the audit rule original file, so that the target client can set each audit rule locally according to the audit rule file. According to the method and the device, the rule file templates corresponding to the target clients are preset, so that the auditing rules can be developed in the same environment and can be used by different clients, the compatibility problem of the environment does not need to be considered in the application development process, and separate application development does not need to be carried out on each client, so that the application development efficiency can be improved. In addition, since the audit rule service of each client is provided by the server in the same development environment, the problem of server jamming caused by incompatibility of different environments can be avoided, so that the application use performance is improved, and the user experience is improved.
The present invention further provides a computer-readable storage medium, which specifically includes a stored computer program, where when the computer program runs, the apparatus where the computer-readable storage medium is located is controlled to execute the method for setting the audit rule according to any of the above embodiments.
It should be noted that, all or part of the flow in the method according to the above embodiments of the present invention may also be implemented by a computer program instructing related hardware, where the computer program may be stored in a computer-readable storage medium, and when the computer program is executed by a processor, the steps of the above embodiments of the method may be implemented. Wherein the computer program comprises computer program code, which may be in the form of source code, object code, an executable file or some intermediate form, etc. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be further noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals in accordance with legislation and patent practice.
According to the computer-readable storage medium provided by the embodiment of the invention, different rule file templates are preset, and after the rule file template corresponding to the target client is selected, the audit rule file which can be suitable for the target client is generated according to the rule file template and the audit rule original file, so that the target client can set each audit rule locally according to the audit rule file. According to the method and the device, the rule file templates corresponding to the target clients are preset, so that the auditing rules can be developed in the same environment and can be used by different clients, the compatibility problem of the environment does not need to be considered in the application development process, and separate application development does not need to be carried out on each client, so that the application development efficiency can be improved. In addition, since the audit rule service of each client is provided by the server in the same development environment, the problem of server jamming caused by incompatibility of different environments can be avoided, so that the application use performance is improved, and the user experience is improved.
While the foregoing is directed to the preferred embodiment of the present invention, it will be understood by those skilled in the art that various changes and modifications may be made without departing from the spirit and scope of the invention.
Claims (15)
1. A setting method of audit rules is characterized by comprising the following steps:
responding to an audit rule setting instruction, and acquiring target client information and an audit rule original file corresponding to a target client; wherein, the original file of the audit rule comprises at least one audit rule;
obtaining a rule file template corresponding to the target client according to the target client information;
generating a first audit rule file applicable to a target client according to each audit rule in the original audit rule file and the rule file template;
and sending the first audit rule file to the target client so that the target client sets each audit rule locally according to the first audit rule file.
2. The setting method of audit rules according to claim 1, wherein the setting method of audit rules further includes:
receiving the auditing rule setting instruction sent by the target client; or,
receiving an audit rule setting instruction sent by the target client when detecting that each audit rule in the previously received second audit rule file is inconsistent with each audit rule in the audit rule original file; or,
and receiving the audit rule setting instruction sent by the target client when the positioning information of the second audit rule file is detected to be inconsistent with the positioning information of the original audit rule file.
3. The setting method of the audit rule according to claim 2, wherein the audit rule setting instruction includes the target client information and a rule file identification code;
the obtaining of the target client information and the original file of the audit rule in response to the audit rule setting instruction specifically includes:
responding to the audit rule setting instruction, analyzing the audit rule setting instruction to obtain the target client information and the rule file identification code;
and querying a preset rule file database to obtain the original audit rule file corresponding to the rule file identification code.
4. The setting method of audit rules according to claim 1, wherein the setting method of audit rules further includes:
and when the rule processing operation on the original audit rule file is detected to be completed, generating the audit rule setting instruction.
5. An audit rule setting method according to claim 4 wherein the rule processing operations include a rule new operation, a rule delete operation and/or a rule modify operation.
6. The method for setting an audit rule according to claim 4, wherein the generating the audit rule setting instruction when detecting that the rule processing operation on the audit rule original file is completed includes:
when detecting that the rule processing operation on the original audit rule file in a preset rule file database is completed, acquiring a rule file identification code of the original audit rule file, and generating an audit rule setting instruction according to the rule file identification code;
the obtaining target client information and an original file of the audit rule in response to the audit rule setting instruction specifically includes:
responding to the audit rule setting instruction, analyzing the audit rule setting instruction to obtain the rule file identification code;
inquiring the rule file database according to the rule file identification code to obtain the original file of the audit rule;
and inquiring a preset client record table according to the regular file identification code, acquiring all client information corresponding to the regular file identification code, and sequentially setting each client information as the target client information.
7. The setting method of the audit rule according to claim 3 or 6, wherein the original file of the audit rule has a corresponding relation with the application; the application identification code is included in the rule file identification code.
8. An audit rule setting method according to claim 1 wherein the at least one audit rule includes a nickname audit rule and/or a speech audit rule.
9. The setting method of the auditing rule according to claim 1, where the target client information includes client system type information and/or client type information.
10. The setting method of audit rules according to claim 1, wherein the setting method of audit rules further includes:
obtaining rule storage path information corresponding to the target client according to the target client information;
the sending the first audit rule file to the target client so that the target client sets each audit rule locally according to the first audit rule file specifically includes:
and sending the first audit rule file and the rule storage path information to the target client, so that the target client sets each audit rule in the first audit rule file in a folder corresponding to the rule storage path information.
11. The setting method of audit rules according to claim 10, wherein the setting method of audit rules further includes:
generating a file key corresponding to the first audit rule file;
sending the first audit rule file and the rule storage path information to the target client, so that the target client sets each audit rule in the first audit rule file in a folder corresponding to the rule storage path information, specifically including:
and sending the first audit rule file, the rule storage path information and the file key to the target client, so that the target client sets each audit rule in the first audit rule file in a folder corresponding to the rule storage path information, and encrypts the folder by using the file key.
12. An apparatus for setting an audit rule, comprising:
the rule original file obtaining module is used for responding to the audit rule setting instruction and obtaining target client information and an audit rule original file corresponding to the target client information; wherein, the original file of the audit rule comprises at least one audit rule;
the rule file template obtaining module is used for obtaining a rule file template corresponding to the target client according to the target client information;
the audit rule file generation module is used for generating a first audit rule file which can be suitable for a target client according to each audit rule in the audit rule original file and the rule file template; and the number of the first and second groups,
and the auditing rule setting module is used for sending the first auditing rule file to the target client so that the target client sets each auditing rule locally according to the first auditing rule file.
13. A setting system of audit rules is characterized by comprising a server and at least one client;
the server side is used for executing the setting method of the auditing rule according to any one of claims 1 to 11;
the client comprises a target client and is used for setting each audit rule to the local according to the first audit rule file after receiving the first audit rule file sent by the server.
14. A server device comprising a processor, a memory, and a computer program stored in the memory and configured to be executed by the processor, the processor implementing the setting method of audit rules according to any one of claims 1 to 11 when executing the computer program.
15. A computer-readable storage medium, comprising a stored computer program, wherein when the computer program runs, the computer-readable storage medium controls a device to execute the setting method of the audit rule according to any one of claims 1 to 11.
Priority Applications (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810164483.7A CN108427733B (en) | 2018-02-28 | 2018-02-28 | Method, device and system for setting audit rule, equipment and storage medium |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201810164483.7A CN108427733B (en) | 2018-02-28 | 2018-02-28 | Method, device and system for setting audit rule, equipment and storage medium |
Publications (2)
| Publication Number | Publication Date |
|---|---|
| CN108427733A CN108427733A (en) | 2018-08-21 |
| CN108427733B true CN108427733B (en) | 2021-08-10 |
Family
ID=63157128
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201810164483.7A Active CN108427733B (en) | 2018-02-28 | 2018-02-28 | Method, device and system for setting audit rule, equipment and storage medium |
Country Status (1)
| Country | Link |
|---|---|
| CN (1) | CN108427733B (en) |
Families Citing this family (10)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN109583987A (en) * | 2018-10-09 | 2019-04-05 | 阿里巴巴集团控股有限公司 | A kind of processing method of data, device and equipment |
| CN110414702A (en) * | 2019-06-28 | 2019-11-05 | 南京领行科技股份有限公司 | One kind is called a taxi application processing method, apparatus and system |
| CN111126965B (en) * | 2019-12-25 | 2023-08-29 | 深圳前海环融联易信息科技服务有限公司 | Auditing rule optimization method, auditing rule optimization device, computer equipment and storage medium |
| CN111026929B (en) * | 2019-12-27 | 2023-07-21 | 咪咕文化科技有限公司 | Text approval method, device and storage medium |
| CN111585988A (en) * | 2020-04-25 | 2020-08-25 | 中信银行股份有限公司 | Data auditing method, device and system and computer storage medium |
| CN111724132A (en) * | 2020-06-18 | 2020-09-29 | 北京明略软件系统有限公司 | File delivery method, device, intelligent terminal and storage medium |
| CN112579632B (en) * | 2020-12-28 | 2024-12-24 | 中国建设银行股份有限公司 | A data verification method, device, equipment and medium |
| CN112926941B (en) * | 2021-03-04 | 2023-07-11 | 远光软件股份有限公司 | Management method and device of financial auditing rules, storage medium and server |
| CN113205312B (en) * | 2021-05-13 | 2024-10-29 | 深圳供电局有限公司 | Power consumer archive management method and system, computer equipment and storage medium |
| CN113643113A (en) * | 2021-08-06 | 2021-11-12 | 国网山东省电力公司营销服务中心(计量中心) | Method, system, medium and electronic device for automatic review of electricity bills |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101021890A (en) * | 2007-03-20 | 2007-08-22 | 华为技术有限公司 | Method, system and server for checking page data |
| TW201220116A (en) * | 2010-11-09 | 2012-05-16 | Inst Information Industry | Information security protection host |
| US8712990B2 (en) * | 2009-10-09 | 2014-04-29 | Sap Ag | Methods and systems for providing a business repository |
| CN106101090A (en) * | 2016-06-07 | 2016-11-09 | 中国建设银行股份有限公司 | Operational approach and rule engine system for regulation engine |
| CN106126215A (en) * | 2016-06-17 | 2016-11-16 | 深圳市麦斯杰网络有限公司 | Business rule scenario generation method and device |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20110239293A1 (en) * | 2010-03-24 | 2011-09-29 | Microsoft Corporation | Auditing access to data based on resource properties |
| CN103927314B (en) * | 2013-01-16 | 2017-10-13 | 阿里巴巴集团控股有限公司 | A kind of method and apparatus of batch data processing |
| CN106055602A (en) * | 2016-05-24 | 2016-10-26 | 腾讯科技(深圳)有限公司 | File verification method and apparatus |
| CN107133275A (en) * | 2017-04-11 | 2017-09-05 | 国网福建省电力有限公司 | The method that a kind of regulation and control main website telemechanical point table is audited automatically |
-
2018
- 2018-02-28 CN CN201810164483.7A patent/CN108427733B/en active Active
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101021890A (en) * | 2007-03-20 | 2007-08-22 | 华为技术有限公司 | Method, system and server for checking page data |
| US8712990B2 (en) * | 2009-10-09 | 2014-04-29 | Sap Ag | Methods and systems for providing a business repository |
| TW201220116A (en) * | 2010-11-09 | 2012-05-16 | Inst Information Industry | Information security protection host |
| CN106101090A (en) * | 2016-06-07 | 2016-11-09 | 中国建设银行股份有限公司 | Operational approach and rule engine system for regulation engine |
| CN106126215A (en) * | 2016-06-17 | 2016-11-16 | 深圳市麦斯杰网络有限公司 | Business rule scenario generation method and device |
Non-Patent Citations (1)
| Title |
|---|
| 面向银行信贷的规则引擎系统设计与实现;王世春;《中国优秀硕士学位论文全文数据库经济与管理科学辑》;20170315;全文 * |
Also Published As
| Publication number | Publication date |
|---|---|
| CN108427733A (en) | 2018-08-21 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| CN108427733B (en) | Method, device and system for setting audit rule, equipment and storage medium | |
| CN109558748B (en) | Data processing method and device, electronic equipment and storage medium | |
| JP6980903B2 (en) | Selective voice-activated memory for voice capture devices | |
| US11755530B2 (en) | Method and system for applying data retention policies in a computing platform | |
| CN111400761B (en) | Data sharing method and device, storage medium and electronic equipment | |
| CN109635523B (en) | Application program detection method and device and computer readable storage medium | |
| KR20150096312A (en) | Telemetry system for a cloud synchronization system | |
| US20170139680A1 (en) | Systems, methods, and media for graphical task creation | |
| CN107918564B (en) | Data transmission exception handling method and device, electronic equipment and storage medium | |
| WO2020015191A1 (en) | Business rule releasing and managing method, electronic device and readable storage medium | |
| JP2021502648A (en) | FPGA cloud host development method and system | |
| CN110764894A (en) | Timed task management method, device, equipment and storage medium | |
| CN112799659A (en) | A method, device and terminal for automatically generating data interface without programming | |
| WO2019032133A1 (en) | Multi-platform model processing and execution management engine | |
| CN107277019A (en) | Data clear text acquisition methods, device, electric terminal and readable storage medium storing program for executing | |
| CN111984259A (en) | Interface creating method, device, equipment and storage medium | |
| CN106844532A (en) | A kind of application program acquisition methods and device and a kind of terminal device | |
| CN111260080A (en) | Process optimization method, device, terminal and storage medium based on machine learning | |
| US11048668B2 (en) | Sensitive data management | |
| CN108255967B (en) | Method and device for calling storage process, storage medium and terminal | |
| CN114465867A (en) | Server maintenance method and device, storage medium and processor | |
| CN111078424A (en) | Information interaction method and device, computer equipment and storage medium | |
| CN113204776B (en) | Method, device, equipment and storage medium for realizing column encryption | |
| CN106708706B (en) | Alarm information processing method and device for task program abnormity | |
| CN112084767B (en) | Information response processing method, intelligent voice equipment and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| PB01 | Publication | ||
| PB01 | Publication | ||
| SE01 | Entry into force of request for substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| GR01 | Patent grant | ||
| GR01 | Patent grant |