CN103440460A - Application system change validation method and system - Google Patents

Application system change validation method and system Download PDF

Info

Publication number
CN103440460A
CN103440460A CN2013104069355A CN201310406935A CN103440460A CN 103440460 A CN103440460 A CN 103440460A CN 2013104069355 A CN2013104069355 A CN 2013104069355A CN 201310406935 A CN201310406935 A CN 201310406935A CN 103440460 A CN103440460 A CN 103440460A
Authority
CN
China
Prior art keywords
change
checking
abnormal
file
identifying object
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN2013104069355A
Other languages
Chinese (zh)
Inventor
王珂
张晓燕
陈睿
贺涛
孙伟
李长远
孟曦
李治坚
马轲鑫
高才宇
裴斐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Agricultural Bank of China
Original Assignee
Agricultural Bank of China
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Agricultural Bank of China filed Critical Agricultural Bank of China
Priority to CN2013104069355A priority Critical patent/CN103440460A/en
Publication of CN103440460A publication Critical patent/CN103440460A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Debugging And Monitoring (AREA)

Abstract

The invention discloses an application system change validation method which comprises the following steps: acquiring a validation scheme of a changed application system; validating validation contents carried in the validation scheme, and performing error correction processing or change backspace processing on the validation contents when the validation result is abnormal. The invention also discloses an application system change validation system.

Description

A kind of application system change verification method and verification system
Technical field
The present invention relates to field of computer technology, relate in particular to a kind of application system change verification method and verification system. 
Background technology
At present, the infosystem scale of large enterprise is day by day huge, relation between subsystem is more complicated, application system is altered to for the daily essential work of infosystem, described application system change refers to that application system is because the various uncertain factors such as demand response, change in resources, defect repair, system upgrade cause application system to carry out various variations or modification, and these variations or modification are called change.In application system, if can relate to complicated software and hardware when subsystem or function point change changes, and this change also may involve the software and hardware variation of other system, therefore infosystem has also been amplified the impact of system variation for system stability when increasing substantially performance, has increased the uncertainty of service operation. 
And the change checking is the work for guaranteeing that the normal operation of system is done after change is implemented to finish, being that change checking personnel are corresponding verifies or the relevance checking targetedly by the part of system variation, and a set of rigorous effective verification method is for guaranteeing that system stable operation and maintenance information system are significant.  
Traditional change verification mode is after application program has changed, by artificial verification system changed content, and when the result is abnormal by manually carrying out abnormality processing or trigger alarm information etc., but adopt this manual type to be verified application system after changing, not only there will be the manually-operated error, verify the phenomenons such as not comprehensive, and can not find timely and eliminate the harmful effect of system variation to software and hardware system and interconnected system thereof. 
Summary of the invention
In view of this, the fundamental purpose of the embodiment of the present invention is to provide a kind of application system change verification method and verification system, with when application system is verified after changing, and the purpose that realizes improving verification efficiency and eliminate in time anomalous event. 
For achieving the above object, the embodiment of the present invention provides a kind of application system change verification method, comprising:
Obtain the proof scheme of change application system;
The checking content of carrying in described proof scheme is verified, and when the result is abnormal, described checking content is carried out to error correction processing or the processing of change rollback. 
Preferably, in said method, described checking content comprises following one or more identifying object:
Whether correctly the first identifying object, be specially application file change;
The second identifying object, whether the change order that is specially interconnected system is correct;
Whether the 3rd identifying object, be specially the change transaction and/or call the transaction that frequency is higher and correctly conclude the business;
The 4th identifying object, whether the file be specially in application system is illegally changed. 
Preferably, in said method, the first identifying object carried in described proof scheme is verified, and when the result is abnormal, described the first identifying object is carried out to error correction processing or the processing of change rollback, specifically comprised:
Obtain the document change list;
Obtain the latest edition file of each change file in described document change list from described change application system, and obtain the first identifying code generated after the described latest edition file of operation;
Obtain the second identifying code generated after described change file true(-)running, described the second identifying code is pre-stored in the program version storehouse;
Obtain the abnormal document list that described the first identifying code is different identifying codes from described the second identifying code from described change application system, and become after changing right version or rollback to become version before changing the latest edition file modification of each file in described abnormal document list. 
Preferably, in said method, the second identifying object carried in described proof scheme is verified, and when the result is abnormal, described the second identifying object is carried out to error correction processing or the processing of change rollback, specifically comprised:
Obtain the Operation Log of interconnected system change order, described interconnected system comprises at least two systems;
Determine the actual change step of described interconnected system according to described Operation Log;
Inquiry is pre-stored between the step in the step contingency table the default change step with incidence relation, and the default change step of described interconnected system and described actual change step are compared;
Obtain the abnormal change step that described default change step is different from described actual change step from described change application system, and described abnormal change step is modified as to described default change step or rollback one-tenth step before changing. 
Preferably, in said method, the 3rd identifying object carried in described proof scheme is verified, and when the result is abnormal, described the 3rd identifying object is carried out to error correction processing or the processing of change rollback, specifically comprised:
Utilize the first checking sample checking change transaction generated in advance, and send first authorization information of carrying the result, so that trade mode or rollback that the information receiver is modified as described change transaction after changing according to first authorization information of carrying abnormal the result become trade mode before changing;
And/or,
Utilize the second checking sample checking generated in advance to call the transaction that frequency is higher, and send second authorization information of carrying the result, so that the information receiver carries out error correction according to second authorization information of carrying abnormal the result to calling the transaction that frequency is higher. 
Preferably, in said method, the 4th identifying object carried in described proof scheme is verified, and when the result is abnormal, described the 4th identifying object is carried out to error correction processing or the processing of change rollback, specifically comprised:
Within conversion period and in non-conversion period, whether the monitoring system file is illegally changed, and if so, described illegal system file is after changing reverted to illegal system file before changing. 
Preferably, said method also comprises:
The running status of each monitored point in supervisory system, the monitor message of carrying normal operating condition or abnormal operating condition with generation, and described monitor message is sent to designated terminal equipment. 
Preferably, said method also comprises:
After the checking content verification of carrying in to described proof scheme, according to the change completeness of the default described checking content of postevaluation index evaluation. 
The embodiment of the present invention also provides a kind of application system change verification system, comprising:
The scheme acquisition module, for obtaining the proof scheme of change application system;
The abnormality processing module, verified for the checking content that described proof scheme is carried, and when the result is abnormal, described checking content is carried out to error correction processing or the processing of change rollback. 
Preferably, in said system, described checking content comprises following one or more identifying object:
Whether correctly the first identifying object, be specially application file change;
The second identifying object, whether the change order that is specially interconnected system is correct;
Whether the 3rd identifying object, be specially the change transaction and/or call the transaction that frequency is higher and correctly conclude the business;
The 4th identifying object, whether the file be specially in application system is illegally changed. 
Preferably, in said system, described abnormality processing module comprises the first checking processing module, described the first checking processing module is verified for the first identifying object that described proof scheme is carried, and when the result is abnormal, described the first identifying object is carried out to error correction processing or the processing of change rollback;
Described the first checking processing module specifically comprises:
The list acquiring unit, for obtaining the document change list;
The first identifying code acquiring unit, for from described change application system, obtaining the latest edition file of each change file described document change list, and obtain the first identifying code generated after the described latest edition file of operation;
The second identifying code acquiring unit, for obtaining the second identifying code generated after described change file true(-)running, described the second identifying code is pre-stored in the program version storehouse;
The first exception processing unit, for from described change application system, obtaining the abnormal document list that described the first identifying code is different identifying codes from described the second identifying code, and become after changing right version or rollback to become version before changing the latest edition file modification of each file in described abnormal document list. 
Preferably, in said system, described abnormality processing module comprises the second checking processing module, described the second checking processing module is verified for the second identifying object that described proof scheme is carried, and when the result is abnormal, described the second identifying object is carried out to error correction processing or the processing of change rollback;
Described the second checking processing module specifically comprises:
The log acquisition unit, for obtaining the Operation Log of interconnected system change order, described interconnected system comprises at least two systems;
The step acquiring unit, for determining the actual change step of described interconnected system according to described Operation Log;
The step comparing unit, be pre-stored in the default change step that has incidence relation between the step of step contingency table for inquiry, and the default change step of described interconnected system and described actual change step are compared;
The second exception processing unit, for obtain the abnormal change step that described default change step is different from described actual change step from described change application system, and described abnormal change step is modified as to described default change step or rollback one-tenth step before changing. 
Preferably, in said system, described abnormality processing module comprises the 3rd checking processing module, described the 3rd checking processing module is verified for the 3rd identifying object that described proof scheme is carried, and when the result is abnormal, described the 3rd identifying object is carried out to error correction processing or the processing of change rollback;
Described the 3rd checking processing module specifically comprises:
The first transaction verification unit, for utilizing the first checking sample checking change transaction generated in advance, and send first authorization information of carrying the result, so that trade mode or rollback that the information receiver is modified as described change transaction after changing according to first authorization information of carrying abnormal the result become trade mode before changing;
And/or,
The second transaction verification unit, call for utilizing the second checking sample checking generated in advance the transaction that frequency is higher, and send second authorization information of carrying the result, so that the information receiver carries out error correction according to second authorization information of carrying abnormal the result to calling the transaction that frequency is higher. 
Preferably, in said system, described abnormality processing module comprises the 4th checking processing module, described the 4th checking processing module is verified for the 4th identifying object that described proof scheme is carried, and when the result is abnormal, described the 4th identifying object is carried out to error correction processing or the processing of change rollback;
Whether described the 4th checking processing module, illegally changed specifically for monitoring system file within conversion period and in non-conversion period, and if so, by described mistake, system file after changing reverts to illegal system file before changing. 
Preferably, said system also comprises:
The system monitoring module, for the running status of each monitored point of supervisory system, and generate the monitor message of carrying normal operating condition or abnormal operating condition, and described monitor message be sent to designated terminal equipment. 
The change evaluation module, after the checking content verification described proof scheme is carried, according to the change completeness of the default described checking content of postevaluation index evaluation. 
Application system change verification method and system that the embodiment of the present invention provides, by obtaining the proof scheme of application system after changing, and the checking content of carrying in described proof scheme is verified, when the result is abnormal, described checking content is carried out to error correction processing or the processing of change rollback, realized the automatic Verification to each identifying object in application system after changing, can find in time and process abnormal altering event, improve the accuracy of verification efficiency and checking. 
The accompanying drawing explanation
In order to be illustrated more clearly in the embodiment of the present invention or technical scheme of the prior art, below will the accompanying drawing of required use in embodiment or description of the Prior Art be briefly described, apparently, accompanying drawing in the following describes is some embodiments of the present invention, for those of ordinary skills, under the prerequisite of not paying creative work, can also obtain according to these accompanying drawings other accompanying drawing. 
The schematic flow sheet that Fig. 1 is embodiment of the present invention application system change verification method;
The schematic flow sheet that Fig. 2 is embodiment of the present invention document change verification method;
Fig. 3 is the alter the procedure schematic flow sheet of step verification method of the embodiment of the present invention;
The structural representation that Fig. 4 is embodiment of the present invention application system change verification system;
Fig. 5 is embodiment of the present invention verification system logical organization schematic diagram;
Fig. 6 is the actual configuration diagram of embodiment of the present invention verification system. 
Embodiment
For the purpose, technical scheme and the advantage that make the embodiment of the present invention clearer, below in conjunction with the accompanying drawing in the embodiment of the present invention, technical scheme in the embodiment of the present invention is clearly and completely described, obviously, described embodiment is the present invention's part embodiment, rather than whole embodiment.Embodiment based in the present invention, those of ordinary skills, not making under the creative work prerequisite the every other embodiment obtained, belong to the scope of protection of the invention. 
The embodiment of the present invention mainly is to provide a kind of application change verification method and system, strictly to retrain the change checking workflow in later stage and the correct enforcement that behavior guarantees programing change, and the very first time find and eliminate the harmful effect of system variation for software and hardware system and interconnected system.Concrete verification mode refers to following specific embodiment. 
Shown in Figure 1, the application system that Fig. 1 provides for the embodiment of the present invention changes the schematic flow sheet of verification method, specifically comprises:
Step 101: the proof scheme of obtaining the change application system. 
Step 102: the checking content of carrying in described proof scheme is verified, and when the result is abnormal, described checking content is carried out to error correction processing or the processing of change rollback. 
Wherein, can comprise one or more identifying objects in described checking content, according to predetermined authentication policy, these identifying objects are carried out to simultaneous verification or order checking, in the process that the checking content is verified, if current identifying object is different from the result of expection, according to the characteristics of identifying object itself, carry out in time error correction, make it meet the requirement of expection the result (for example re-starting alter operation), but, the abnormal occurrence of some identifying object but can't be got rid of in time, now, in order to guarantee the smooth work of application system, current identifying object is made to the change rollback to be processed, keep state before changing. 
The embodiment of the present invention has provided following identifying object, and the checking content in step 102 can comprise following one or more identifying object:
Whether correctly the first identifying object, be specially application file change;
The second identifying object, whether the change order that is specially interconnected system is correct;
Whether the 3rd identifying object, be specially the change transaction and/or call the transaction that frequency is higher and correctly conclude the business;
The 4th identifying object, whether the file be specially in application system is illegally changed. 
The process of below being verified with regard to these four identifying objects respectively is introduced:
1, the first identifying object is verified
Document change checking is the basic index of guaranteeing to change successfully, because system file quantity is usually a lot, may there is the abnormal occurrence that can't replace in the process that file is disposed, therefore need the not abnormal document of correct change of investigation, and these abnormal documents are processed accordingly. 
The schematic flow sheet of document change verification method shown in Figure 2, specifically the first identifying object carried in described proof scheme is verified, and when the result is abnormal, described the first identifying object is carried out to error correction processing or the processing of change rollback, specifically comprise:
Step 201: obtain the document change list. 
Having enumerated out which system file in described document change list need to be changed, and wherein, can enumerate change file with the form of the file identification of the filename of change file or other type. 
Step 202: obtain the latest edition file of each change file in described document change list from described change application system, and obtain the first identifying code generated after the described latest edition file of operation. 
Wherein, described latest edition file is the actual file used in the change application system. 
Step 203: obtain the second identifying code generated after described change file true(-)running, described the second identifying code is pre-stored in the program version storehouse. 
In the embodiment of the present invention; before carrying out the document change checking; need creation facilities program (CFP) version repository in advance; stored the different editions file of each application program in the application system in described program version storehouse; comprise right version file after changing, and the identifying code that generates after true(-)running of each version file, this identifying code is after operating file; if running paper normally can generate the identifying code of a representation file normal operation, this identifying code is used for the correctness of identification document. 
Step 204: the first identifying code of each file in the document change list and the second identifying code are compared, judge whether the file that exists the first identifying code to be different identifying codes from the second identifying code, if so, perform step 205, if not, perform step 206. 
Whether the file verification code that imports in advance the actual use file on applied environment after right version file verification code in the file issue bag in program version storehouse and change by comparison is consistent, successful in the angle of file to guarantee change.In addition, can also adopt the correctness of following manner authenticating documents change: when FileVersion is compared, for each file after system variation, use the change file version number stored in the version number of version and program version storehouse to compare reality, version number is identical, think that FileVersion changes successfully, otherwise think and change unsuccessfully.Certainly, can also adopt the version before and after the file identification difference document change of other type, to guarantee after system variation that the actual FileVersion used is for version after changing. 
Step 205: obtain the abnormal document list that described the first identifying code is different identifying codes from described the second identifying code from described change application system, and become after changing right version or rollback to become version before changing the latest edition file modification of each file in described abnormal document list, if successfully modified or change rollback success, perform step 206. 
After the identifying code that each file is corresponding in to the document change list is compared, if identifying code difference, illustrate that version (the actual latest edition file used in the change application system) is inconsistent with default change version (the right version file of storing in the program version storehouse) after changing, now, just all abnormal documents are enumerated out after all having compared, and do respectively special processing for different files: the one, abnormal document is modified to right version after changing again; The 2nd, abnormal document is changed to rollback in the time can not again changing and become normal version before changing, so that the abnormal document normal operation, in order to re-start the alter operation of file after the reason that follow-up investigation can't change.Certainly, also can, when noting abnormalities file, just make timely processing. 
Step 206: send and continue fill order, verified with the identifying object of the back-end system to current system. 
Generally, whole application system is comprised of a plurality of subsystems, certain subsystem may be the front end system of another one or a plurality of subsystems, the back-end system that described another one or a plurality of subsystem are described front end system, only, after front end system being verified and eliminated altering error, could verify back-end system just meaningful.So, can be after current system be verified, system sends and continues fill order to the back-end, with permission, the identifying object of back-end system is verified. 
2, the second identifying object is verified
In mini-system, the change step of interconnected system may not can impact system, once but after system scale and complicacy raising, whether the change step often can have influence on whole system change can successful implementation, therefore need to rear Operation Log be examined each step is complete, guaranteed operation after changing and the correctness of step. 
The schematic flow sheet of the shown in Figure 3 step verification method that alters the procedure, specifically the second identifying object carried in described proof scheme is verified, and when the result is abnormal, described the second identifying object is carried out to error correction processing or the processing of change rollback, specifically comprise:
Step 301: obtain the Operation Log of interconnected system change order, described interconnected system comprises at least two systems. 
Step 302: the actual change step of determining described interconnected system according to described Operation Log. 
Step 303: inquiry is pre-stored between the step in the step contingency table the default change step with incidence relation, and the default change step of described interconnected system and described actual change step are compared. 
In order to understand more easily the embodiment of the present invention, the step contingency table that ginseng is shown in Table 1, during practical operation, can be by the condition precedent of the committed step of each interconnected system note table, the row step of set in this table is the condition precedent of row step.Concrete, in the first row, show before carrying out change step 1, should first perform step 2 and step 3, between step 1 and step 2 and step 3, there is incidence relation; In the second row, the change of step 2 order is irrelevant with other any step, can carry out at any time the change of related content to step 2; In the third line, show should first change step 2 before carrying out change step 3, between step 1 and step 3, there is incidence relation; Get final product by that analogy.There is discrepancy if there are actual change step and this table data of step incidence relation in the change application system, the step of famous association is revised or rollback. 
Table 1
  Step 1 Step 2 Step 3 Step 4 Step 5 Step 6
Step 1   1  1       
Step 2            
[0108]?
Step 3   1         
Step 4         1  1 
Step 5 1           
Step 6 1           
Step 304: judge whether described default change step conforms to described actual change step, if conform to, performs step 306, if do not conform to, performs step 305. 
Step 305: obtain the abnormal change step that described default change step is different from described actual change step from described change application system, and described abnormal change step is modified as to described default change step or rollback one-tenth step before changing, perform step 306. 
In the present embodiment, obtain in actual change step and have different abnormal steps from default change step, according to the contiguity between interconnected system, determine the impact that operation causes on whole system of this abnormal step; Determine and retain changed content or be modified as default execution step or rollback one-tenth execution step before changing according to the seriousness of its impact.Referring to table 1, the changed content of step 2 and the changed content of other step do not have relevance, can carry out at any time the change of step 2, so, when the actual change of step 2 sequence error, can retain current changed content, again for example, before execution step 3, need to first perform step 2, if the change of step 3 has occurred in sequence mistake, need the impact of considering that change modifications and changes rollback causes interconnected system, under the prerequisite that can normally move in the assurance system, select wherein a kind of processing mode. 
In the present embodiment, can obtain successively the actual change step of each important step that need to verify, and these important steps are compared one by one,, if current important step is abnormal, just current step modified or change the processing such as rollback, after processing finishes or current execution step normal operation, next important step being compared.Or after important step still to be tested has been contrasted one by one, then obtain whole abnormal execution steps, finally unified to process (revising or the change rollback). 
Step 306: send and continue fill order, verified with the identifying object of the back-end system to current system. 
3, the 3rd identifying object is verified
The meaning of an infosystem is that it can externally provide various services, can therefore transact business be an important angle that needs after changing checking, the transaction changed by checking or call the transaction that frequency is higher, when the result abnormal (can arm's length transaction), the relative program of this transaction etc. not be processed, this can confirm that can system normally provide transaction to a great extent, and whether estimate change successful. 
Specifically the 3rd identifying object carried in described proof scheme is verified herein, and when the result is abnormal, described the 3rd identifying object is carried out to error correction processing or the processing of change rollback, specifically comprised:
Utilize the first checking sample checking change transaction generated in advance, and send first authorization information of carrying the result, so that trade mode or rollback that the information receiver is modified as described change transaction after changing according to first authorization information of carrying abnormal the result become trade mode before changing;
And/or, utilize the second checking sample checking generated in advance to call the transaction that frequency is higher, and send second authorization information of carrying the result, so that the information receiver carries out error correction according to second authorization information of carrying abnormal the result to calling the transaction that frequency is higher. 
Certainly, when the transaction verification success, can send the authorization information be proved to be successful. 
4, the 4th identifying object is verified
Specifically the 4th identifying object carried in described proof scheme is verified herein, and when the result is abnormal, described the 4th identifying object is carried out to error correction processing or the processing of change rollback, specifically comprise: within conversion period and in non-conversion period, whether the monitoring system file is illegally changed, if so, described illegal system file is after changing reverted to illegal system file before changing. 
Mainly that system core file (as configuration file and executable file) is monitored specially, and be mainly to being monitored with non-conversion period in conversion period, if there are the operating personnel of change authority to carry out maloperation or maliciously distorted by the hacker in non-change, cause file illegally to be changed, now automatically file is recovered, prevented the negative effect that wrong change produces system. 
In addition, because system is the support of program operation, the control points such as connectedness by supervisory system resources occupation rate (comprising CPU, internal memory, disk etc.), service state (as the IIS linking number etc.) and system mid-tier system and interconnected system can obtain the integrality after system variation, can observe like this impact of change for first floor system; The embodiment of the present invention can also to the change process whether the time point of arrival state switching (as identifying object occur abnormal or be proved to be successful, remodify successfully or failure, the success of change rollback or failure, system state abnormal etc.) monitored.Based on this, the embodiment of the present invention is also monitored in real time system state after system variation, and can be using above-mentioned monitoring content as monitored point, it is mainly the running status of each monitored point in supervisory system, carry the monitor message of normal operating condition or abnormal operating condition with generation, and described monitor message is sent to designated terminal equipment.Can communicate to continue subsequent treatment (as abnormality processing, change rollback etc.) with peripheral system or related personnel by instruments such as note, instant communication software or mails. 
In addition, after the checking content verification of carrying in to described proof scheme, according to the change completeness of the default described checking content of postevaluation index evaluation.Concrete, be use default postevaluation index to the change completeness (as whether completed at the appointed time, whether rollback, whether revise etc.) assessed, and the generation assessment result, described change completeness can be the change overall output score value of performance level or every kind of identifying object complete percentage value etc.Certainly, can also comprise in described postevaluation index that the monitored results that described monitored point is monitored is assessed, will be assessed together with monitored results the change performance, to obtain assessment result. 
The application system change verification method that the embodiment of the present invention provides, by obtaining the proof scheme of change application system, and the checking content of carrying in described proof scheme is verified, when the result is abnormal, described checking content is carried out to error correction processing or the processing of change rollback, realized the automatic Verification to each identifying object in application system after changing, can find in time and process abnormal altering event, improve the accuracy of verification efficiency and checking. 
Shown in Figure 4, a kind of application system that Fig. 4 provides for the embodiment of the present invention changes the structural representation of verification system, and this system comprises:
Scheme acquisition module 1, for obtaining the proof scheme of change application system;
Abnormality processing module 2, verified for the checking content that described proof scheme is carried, and when the result is abnormal, described checking content is carried out to error correction processing or the processing of change rollback. 
Wherein, described checking content comprises following one or more identifying object:
Whether correctly the first identifying object, be specially application file change;
The second identifying object, whether the change order that is specially interconnected system is correct;
Whether the 3rd identifying object, be specially the change transaction and/or call the transaction that frequency is higher and correctly conclude the business;
The 4th identifying object, whether the file be specially in application system is illegally changed. 
Wherein, described abnormality processing module comprises the first checking processing module 21, the second checking processing module 22, the 3rd checking processing module 23, the 4th checking processing module 24. 
Described the first checking processing module 21, verified for the first identifying object that described proof scheme is carried, and when the result is abnormal, described the first identifying object is carried out to error correction processing or the processing of change rollback; Described the first checking processing module 21 specifically comprises:
The list acquiring unit, for obtaining the document change list;
The first identifying code acquiring unit, for from described change application system, obtaining the latest edition file of each change file described document change list, and obtain the first identifying code generated after the described latest edition file of operation;
The second identifying code acquiring unit, for obtaining the second identifying code generated after described change file true(-)running, described the second identifying code is pre-stored in the program version storehouse;
The first exception processing unit, for from described change application system, obtaining the abnormal document list that described the first identifying code is different identifying codes from described the second identifying code, and become after changing right version or rollback to become version before changing the latest edition file modification of each file in described abnormal document list. 
Described the second checking processing module 22, verified for the second identifying object that described proof scheme is carried, and when the result is abnormal, described the second identifying object is carried out to error correction processing or the processing of change rollback; Described the second checking processing module 22 specifically comprises:
The log acquisition unit, for obtaining the Operation Log of interconnected system change order, described interconnected system comprises at least two systems;
The step acquiring unit, for determining the actual change step of described interconnected system according to described Operation Log;
The step comparing unit, be pre-stored in the default change step that has incidence relation between the step of step contingency table for inquiry, and the default change step of described interconnected system and described actual change step are compared;
The second exception processing unit, for obtain the abnormal change step that described default change step is different from described actual change step from described change application system, and described abnormal change step is modified as to described default change step or rollback one-tenth step before changing. 
Described the 3rd checking processing module 23, verified for the 3rd identifying object that described proof scheme is carried, and when the result is abnormal, described the 3rd identifying object is carried out to error correction processing or the processing of change rollback; Described the 3rd checking processing module 23 specifically comprises:
The first transaction verification unit, for utilizing the first checking sample checking change transaction generated in advance, and send first authorization information of carrying the result, so that trade mode or rollback that the information receiver is modified as described change transaction after changing according to first authorization information of carrying abnormal the result become trade mode before changing; And/or,
The second transaction verification unit, call for utilizing the second checking sample checking generated in advance the transaction that frequency is higher, and send second authorization information of carrying the result, so that the information receiver carries out error correction according to second authorization information of carrying abnormal the result to calling the transaction that frequency is higher. 
Described the 4th checking processing module 24, verified for the 4th identifying object that described proof scheme is carried, and when the result is abnormal, described the 4th identifying object is carried out to error correction processing or the processing of change rollback; Whether described the 4th checking processing module 24, illegally changed specifically for monitoring system file within conversion period and in non-conversion period, and if so, by described mistake, system file after changing reverts to illegal system file before changing. 
Said system also comprises:
The system monitoring module, for the running status of each monitored point of supervisory system, and generate the monitor message of carrying normal operating condition or abnormal operating condition, and described monitor message be sent to designated terminal equipment. 
The change evaluation module, after the checking content verification described proof scheme is carried, according to the change completeness of the default described checking content of postevaluation index evaluation. 
The application system change verification system that the embodiment of the present invention provides, by obtaining the proof scheme of application system after changing, and the checking content of carrying in described proof scheme is verified, when the result is abnormal, described checking content is carried out to error correction processing or the processing of change rollback, realized the automatic Verification to each identifying object in application system after changing, can find in time and process abnormal altering event, improve the accuracy of verification efficiency and checking. 
The embodiment of the present invention has also been introduced the logical architecture of verification system, verification system logical organization schematic diagram shown in Figure 5, this verification system comprises seven modules such as input processing module, control module, verification module, monitoring module, policy engine module, change evaluation module and messenger service module.In conjunction with the actual configuration diagram of the verification system shown in Fig. 6, below respectively each functional module in Fig. 5 is introduced:
Input processing module: before the change to the application system is verified, at first by change submitter (operating personnel) typing change proof scheme, then through input processing module, generate authentication policy (idiographic flow that each identifying object in verification module and monitoring module is verified), checking sample (for the transaction verification provides the checking sample) and postevaluation index (assessment change completeness).Hardware corresponding to this functional module is: in Fig. 6, input equipment 61, by keyboard and the mouse typing proof scheme of input equipment 61. 
The policy engine module: according to the authentication policy generated, the key elements such as the order in formulation checking flow process and verification method, realize the procedure script of authentication policy, and control all functions module in verification system by control module with generation.The feedback information that control module is received need to be uploaded to the policy engine module, so that the policy engine module is according to the authentication policy generated with upload information and carry out Event triggered, judgement needs the flow process of redirect and produces decision-making to carry out the switching of verification step.Hardware corresponding to this functional module is: in Fig. 6, Control Server 62. 
Control module: drive each functional module to be verified the module of work, to on the feedback information of authentication module and monitoring module generation, send the policy engine module, the instruction that the policy engine module is produced sends to authentication module and monitoring module, control the checking life cycle of modules, guarantee the synchronism between parallel work-flow.Hardware corresponding to this functional module is: in Fig. 6, Control Server 62, and Control Server 62 can be central processing unit. 
Verification module: initiatively change the module of checking, transaction verification and two function compositions of file verification are arranged.The former is the checking of the 3rd shown in Fig. 4 processing module, realizes the function of described the 3rd checking processing module, and the latter is the checking of first shown in Fig. 4 processing module, realizes the function of described the first checking processing module.Hardware corresponding to this functional module is: verification server 63 in Fig. 6, the verification server is verified sample and is obtained data from the program version storehouse by Network Capture, and directly connect the i.e. application system after changing of production environment, with to needing the content of checking to be verified in application system after changing. 
Monitoring module: monitor the module of system running state after changing, monitoring in steps, system monitoring and file monitor function composition.Described step monitoring is corresponding to the checking of second shown in Fig. 4 processing module, and described system monitoring is corresponding to the system monitoring module shown in Fig. 4, and described file monitor is corresponding to the checking of the 4th shown in Fig. 4 processing module.Hardware corresponding to this functional module is: the monitoring server 64 in Fig. 6, the input message of monitoring server 64 is the actual information from the system variation that application system is imported into after changing. 
The change evaluation module: use the postevaluation index to be assessed change completeness (as whether completed at the appointed time, whether rollback etc.), generation is output as the final Output rusults of change verification system.Hardware corresponding to this functional module is: the message server 65 in Fig. 6. 
The messenger service module: when the time point of change process arrival state switching (as identifying object occur abnormal or be proved to be successful, remodify successfully or failure, the success of change rollback or failure, system state abnormal etc.) time, need to communicate to continue following step (as abnormality processing, change rollback etc.) with peripheral system or related personnel by instruments such as note, instant communication software or mails.Hardware corresponding to this functional module is: the message server 65 in Fig. 6. 
In Fig. 6, store authentication policy, checking sample and postevaluation index in storage server 66; Version before changing and the version after changing of each file in the described document change list of storage in version repository 67; Abnormality processing equipment 68 can receive the abnormal information of verification server and monitoring server transmission, when equipment can not carry out abnormality processing automatically, by manually carrying out the operations such as bug patch and change rollback; The information that terminal device 69 sends for receipt message server 65. 
It should be noted that, the system architecture diagram shown in Fig. 6 is a kind of Organization Chart wherein just, the one or more servers in Fig. 6 is merged into to a physical server, or divides and also one of them server can be split into to a plurality of servers according to function. 
As seen through the above description of the embodiments, those skilled in the art can be well understood to the mode that all or part of step in above-described embodiment method can add essential general hardware platform by software and realizes.Understanding based on such, the part that technical scheme of the present invention contributes to prior art in essence in other words can embody with the form of software product, this computer software product can be stored in storage medium, as ROM/RAM, magnetic disc, CD etc., comprise that some instructions are with so that a computer equipment (can be personal computer, server, perhaps such as network communication equipments such as media gateway, etc.) the described method of some part of each embodiment of the present invention or embodiment carried out. 
It should be noted that, in this instructions, each embodiment adopts the mode of going forward one by one to describe, and what each embodiment stressed is and the difference of other embodiment that between each embodiment, identical similar part is mutually referring to getting final product.For the disclosed system of embodiment, because it corresponds to the method disclosed in Example, so description is fairly simple, relevant part partly illustrates and gets final product referring to method. 
Also it should be noted that, in this article, relational terms such as the first and second grades only is used for an entity or operation are separated with another entity or operational zone, and not necessarily requires or imply between these entities or operation the relation of any this reality or sequentially of existing.And, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thereby make the process, method, article or the equipment that comprise a series of key elements not only comprise those key elements, but also comprise other key elements of clearly not listing, or also be included as the intrinsic key element of this process, method, article or equipment.In the situation that not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the equipment that comprises described key element and also have other identical element. 
To the above-mentioned explanation of the disclosed embodiments, make professional and technical personnel in the field can realize or use the present invention.Multiple modification to these embodiment will be apparent for those skilled in the art, and General Principle as defined herein can be in the situation that do not break away from the spirit or scope of the present invention, realization in other embodiments.Therefore, the present invention will can not be restricted to these embodiment shown in this article, but will meet the widest scope consistent with principle disclosed herein and features of novelty. 

Claims (15)

1. an application system change verification method, is characterized in that, comprising:
Obtain the proof scheme of change application system;
The checking content of carrying in described proof scheme is verified, and when the result is abnormal, described checking content is carried out to error correction processing or the processing of change rollback. 
2. method according to claim 1, is characterized in that, described checking content comprises following one or more identifying object:
Whether correctly the first identifying object, be specially application file change;
The second identifying object, whether the change order that is specially interconnected system is correct;
Whether the 3rd identifying object, be specially the change transaction and/or call the transaction that frequency is higher and correctly conclude the business;
The 4th identifying object, whether the file be specially in application system is illegally changed. 
3. method according to claim 2, is characterized in that, the first identifying object carried in described proof scheme verified, and when the result is abnormal, described the first identifying object is carried out to error correction processing or the processing of change rollback, specifically comprises:
Obtain the document change list;
Obtain the latest edition file of each change file in described document change list from described change application system, and obtain the first identifying code generated after the described latest edition file of operation;
Obtain the second identifying code generated after described change file true(-)running, described the second identifying code is pre-stored in the program version storehouse;
Obtain the abnormal document list that described the first identifying code is different identifying codes from described the second identifying code from described change application system, and become after changing right version or rollback to become version before changing the latest edition file modification of each file in described abnormal document list. 
4. method according to claim 2, is characterized in that, the second identifying object carried in described proof scheme verified, and when the result is abnormal, described the second identifying object is carried out to error correction processing or the processing of change rollback, specifically comprises:
Obtain the Operation Log of interconnected system change order, described interconnected system comprises at least two systems;
Determine the actual change step of described interconnected system according to described Operation Log;
Inquiry is pre-stored between the step in the step contingency table the default change step with incidence relation, and the default change step of described interconnected system and described actual change step are compared;
Obtain the abnormal change step that described default change step is different from described actual change step from described change application system, and described abnormal change step is modified as to described default change step or rollback one-tenth step before changing. 
5. method according to claim 2, is characterized in that, the 3rd identifying object carried in described proof scheme verified, and when the result is abnormal, described the 3rd identifying object is carried out to error correction processing or the processing of change rollback, specifically comprises:
Utilize the first checking sample checking change transaction generated in advance, and send first authorization information of carrying the result, so that trade mode or rollback that the information receiver is modified as described change transaction after changing according to first authorization information of carrying abnormal the result become trade mode before changing;
And/or,
Utilize the second checking sample checking generated in advance to call the transaction that frequency is higher, and send second authorization information of carrying the result, so that the information receiver carries out error correction according to second authorization information of carrying abnormal the result to calling the transaction that frequency is higher. 
6. method according to claim 2, is characterized in that, the 4th identifying object carried in described proof scheme verified, and when the result is abnormal, described the 4th identifying object is carried out to error correction processing or the processing of change rollback, specifically comprises:
Within conversion period and in non-conversion period, whether the monitoring system file is illegally changed, and if so, described illegal system file is after changing reverted to illegal system file before changing. 
7. method according to claim 1, is characterized in that, described method also comprises:
The running status of each monitored point in supervisory system, the monitor message of carrying normal operating condition or abnormal operating condition with generation, and described monitor message is sent to designated terminal equipment. 
8. according to the described method of claim 1 to 7 any one, it is characterized in that, described method also comprises:
After the checking content verification of carrying in to described proof scheme, according to the change completeness of the default described checking content of postevaluation index evaluation. 
9. an application system change verification system, is characterized in that, comprising:
The scheme acquisition module, for obtaining the proof scheme of change application system;
The abnormality processing module, verified for the checking content that described proof scheme is carried, and when the result is abnormal, described checking content is carried out to error correction processing or the processing of change rollback. 
10. system according to claim 9, is characterized in that, described checking content comprises following one or more identifying object:
Whether correctly the first identifying object, be specially application file change;
The second identifying object, whether the change order that is specially interconnected system is correct;
Whether the 3rd identifying object, be specially the change transaction and/or call the transaction that frequency is higher and correctly conclude the business;
The 4th identifying object, whether the file be specially in application system is illegally changed. 
11. system according to claim 10, it is characterized in that, described abnormality processing module comprises the first checking processing module, described the first checking processing module is verified for the first identifying object that described proof scheme is carried, and when the result is abnormal, described the first identifying object is carried out to error correction processing or the processing of change rollback;
Described the first checking processing module specifically comprises:
The list acquiring unit, for obtaining the document change list;
The first identifying code acquiring unit, for from described change application system, obtaining the latest edition file of each change file described document change list, and obtain the first identifying code generated after the described latest edition file of operation;
The second identifying code acquiring unit, for obtaining the second identifying code generated after described change file true(-)running, described the second identifying code is pre-stored in the program version storehouse;
The first exception processing unit, for from described change application system, obtaining the abnormal document list that described the first identifying code is different identifying codes from described the second identifying code, and become after changing right version or rollback to become version before changing the latest edition file modification of each file in described abnormal document list. 
12. system according to claim 10, it is characterized in that, described abnormality processing module comprises the second checking processing module, described the second checking processing module is verified for the second identifying object that described proof scheme is carried, and when the result is abnormal, described the second identifying object is carried out to error correction processing or the processing of change rollback;
Described the second checking processing module specifically comprises:
The log acquisition unit, for obtaining the Operation Log of interconnected system change order, described interconnected system comprises at least two systems;
The step acquiring unit, for determining the actual change step of described interconnected system according to described Operation Log;
The step comparing unit, be pre-stored in the default change step that has incidence relation between the step of step contingency table for inquiry, and the default change step of described interconnected system and described actual change step are compared;
The second exception processing unit, for obtain the abnormal change step that described default change step is different from described actual change step from described change application system, and described abnormal change step is modified as to described default change step or rollback one-tenth step before changing. 
13. system according to claim 10, it is characterized in that, described abnormality processing module comprises the 3rd checking processing module, described the 3rd checking processing module is verified for the 3rd identifying object that described proof scheme is carried, and when the result is abnormal, described the 3rd identifying object is carried out to error correction processing or the processing of change rollback;
Described the 3rd checking processing module specifically comprises:
The first transaction verification unit, for utilizing the first checking sample checking change transaction generated in advance, and send first authorization information of carrying the result, so that trade mode or rollback that the information receiver is modified as described change transaction after changing according to first authorization information of carrying abnormal the result become trade mode before changing;
And/or,
The second transaction verification unit, call for utilizing the second checking sample checking generated in advance the transaction that frequency is higher, and send second authorization information of carrying the result, so that the information receiver carries out error correction according to second authorization information of carrying abnormal the result to calling the transaction that frequency is higher. 
14. system according to claim 10, it is characterized in that, described abnormality processing module comprises the 4th checking processing module, described the 4th checking processing module is verified for the 4th identifying object that described proof scheme is carried, and when the result is abnormal, described the 4th identifying object is carried out to error correction processing or the processing of change rollback;
Whether described the 4th checking processing module, illegally changed specifically for monitoring system file within conversion period and in non-conversion period, and if so, by described mistake, system file after changing reverts to illegal system file before changing. 
15. the described system of according to Claim 8 to 14 any one, is characterized in that, described system also comprises:
The system monitoring module, for the running status of each monitored point of supervisory system, and generate the monitor message of carrying normal operating condition or abnormal operating condition, and described monitor message be sent to designated terminal equipment. 
The change evaluation module, after the checking content verification described proof scheme is carried, according to the change completeness of the default described checking content of postevaluation index evaluation. 
CN2013104069355A 2013-09-09 2013-09-09 Application system change validation method and system Pending CN103440460A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN2013104069355A CN103440460A (en) 2013-09-09 2013-09-09 Application system change validation method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN2013104069355A CN103440460A (en) 2013-09-09 2013-09-09 Application system change validation method and system

Publications (1)

Publication Number Publication Date
CN103440460A true CN103440460A (en) 2013-12-11

Family

ID=49694153

Family Applications (1)

Application Number Title Priority Date Filing Date
CN2013104069355A Pending CN103440460A (en) 2013-09-09 2013-09-09 Application system change validation method and system

Country Status (1)

Country Link
CN (1) CN103440460A (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105721249A (en) * 2016-03-01 2016-06-29 浪潮软件集团有限公司 Monitoring system and monitoring method for recovering external network webpage tampering and sending short message notification
CN105991686A (en) * 2015-02-03 2016-10-05 中国移动通信集团重庆有限公司 Business adjustment and control method and system
CN106097104A (en) * 2016-06-07 2016-11-09 众安在线财产保险股份有限公司 A kind of judge the method and system of internet data integrity under distributed system
CN108446219A (en) * 2018-03-01 2018-08-24 网易宝有限公司 Operating method, system, medium and the computing device of application program
CN109711169A (en) * 2018-05-04 2019-05-03 360企业安全技术(珠海)有限公司 Means of defence and device, system, storage medium, the electronic device of system file
CN111506455A (en) * 2020-03-31 2020-08-07 拉扎斯网络科技(上海)有限公司 Checking method and device for service release result

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1682184A (en) * 2002-09-20 2005-10-12 国际商业机器公司 Method and apparatus for automatic updating and testing of software
WO2009004757A1 (en) * 2007-07-05 2009-01-08 Panasonic Corporation Data processing device, data processing method, data processing program, recording medium, and integrated circuit
CN101354651A (en) * 2007-07-27 2009-01-28 佛山市顺德区顺达电脑厂有限公司 Verification device and method for updating map file
US20100017809A1 (en) * 2008-07-16 2010-01-21 Sandisk Il Ltd. Methods for enabling software in storage-capable devices
CN101964725A (en) * 2010-09-01 2011-02-02 中兴通讯股份有限公司 Method and system for realizing upgrading without interrupting service

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1682184A (en) * 2002-09-20 2005-10-12 国际商业机器公司 Method and apparatus for automatic updating and testing of software
WO2009004757A1 (en) * 2007-07-05 2009-01-08 Panasonic Corporation Data processing device, data processing method, data processing program, recording medium, and integrated circuit
CN101354651A (en) * 2007-07-27 2009-01-28 佛山市顺德区顺达电脑厂有限公司 Verification device and method for updating map file
US20100017809A1 (en) * 2008-07-16 2010-01-21 Sandisk Il Ltd. Methods for enabling software in storage-capable devices
CN101964725A (en) * 2010-09-01 2011-02-02 中兴通讯股份有限公司 Method and system for realizing upgrading without interrupting service

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105991686A (en) * 2015-02-03 2016-10-05 中国移动通信集团重庆有限公司 Business adjustment and control method and system
CN105991686B (en) * 2015-02-03 2019-07-05 中国移动通信集团重庆有限公司 A kind of business regulation method and system
CN105721249A (en) * 2016-03-01 2016-06-29 浪潮软件集团有限公司 Monitoring system and monitoring method for recovering external network webpage tampering and sending short message notification
CN106097104A (en) * 2016-06-07 2016-11-09 众安在线财产保险股份有限公司 A kind of judge the method and system of internet data integrity under distributed system
CN108446219A (en) * 2018-03-01 2018-08-24 网易宝有限公司 Operating method, system, medium and the computing device of application program
CN109711169A (en) * 2018-05-04 2019-05-03 360企业安全技术(珠海)有限公司 Means of defence and device, system, storage medium, the electronic device of system file
CN111506455A (en) * 2020-03-31 2020-08-07 拉扎斯网络科技(上海)有限公司 Checking method and device for service release result
CN111506455B (en) * 2020-03-31 2021-06-25 拉扎斯网络科技(上海)有限公司 Checking method and device for service release result

Similar Documents

Publication Publication Date Title
US20190378073A1 (en) Business-Aware Intelligent Incident and Change Management
CN108427632B (en) Automatic test method and device
CN110442712B (en) Risk determination method, risk determination device, server and text examination system
CN103440460A (en) Application system change validation method and system
CN108628748B (en) Automatic test management method and automatic test management system
CN112183782B (en) Fault work order processing method and equipment
CN110088744A (en) A kind of database maintenance method and its system
CN105930226B (en) A kind of data processing method and device
US12056713B2 (en) Transaction exchange platform with a validation microservice for validating transactions before being processed
US12118567B2 (en) Detecting and preventing duplicate transactions on a transaction exchange platform
CN103150647A (en) Report file processing method, server and system
CN109284331B (en) Certificate making information acquisition method based on service data resources, terminal equipment and medium
US12118566B2 (en) Removing duplicate transactions from a transaction exchange platform
US11790249B1 (en) Automatically evaluating application architecture through architecture-as-code
CN112561370A (en) Software version management method and device, computer equipment and storage medium
CN113051180A (en) Test task monitoring method, device, equipment and storage medium
CN109544014B (en) Anti-fraud method and device based on historical data playback
US11663547B2 (en) Evolutionary software prioritization protocol for digital systems
US20240161109A1 (en) Distributed evaluation platform for nonfungible tokens using virtual token cloning
CN112015715A (en) Industrial Internet data management service testing method and system
CN114693116A (en) Method and device for detecting code review validity and electronic equipment
Seehusen A technique for risk-based test procedure identification, prioritization and selection
CN110213055B (en) Information updating method and device, computer equipment and computer readable storage medium
CN112559012A (en) System upgrading and testing method and device, computer equipment and readable storage medium
CN115639972B (en) Data migration method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20131211

RJ01 Rejection of invention patent application after publication