CN114971505A - Workflow calling method and device, computer equipment and storage medium - Google Patents
Workflow calling method and device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN114971505A CN114971505A CN202110217460.XA CN202110217460A CN114971505A CN 114971505 A CN114971505 A CN 114971505A CN 202110217460 A CN202110217460 A CN 202110217460A CN 114971505 A CN114971505 A CN 114971505A
- Authority
- CN
- China
- Prior art keywords
- workflow
- instruction
- target
- calling
- calling instruction
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 48
- 238000004590 computer program Methods 0.000 claims description 15
- 238000013507 mapping Methods 0.000 claims description 8
- 230000004044 response Effects 0.000 claims description 7
- 230000001960 triggered effect Effects 0.000 claims description 4
- 238000010586 diagram Methods 0.000 description 17
- 238000007726 management method Methods 0.000 description 12
- 230000008569 process Effects 0.000 description 7
- 238000004891 communication Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 238000012544 monitoring process Methods 0.000 description 4
- 238000012795 verification Methods 0.000 description 4
- 230000006978 adaptation Effects 0.000 description 3
- 230000006870 function Effects 0.000 description 3
- 238000012550 audit Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 2
- 238000012423 maintenance Methods 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012545 processing Methods 0.000 description 2
- 238000004458 analytical method Methods 0.000 description 1
- 238000013473 artificial intelligence Methods 0.000 description 1
- 238000013475 authorization Methods 0.000 description 1
- 238000004883 computer application Methods 0.000 description 1
- 238000013500 data storage Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000001514 detection method Methods 0.000 description 1
- 230000003862 health status Effects 0.000 description 1
- 230000002452 interceptive effect Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 230000007246 mechanism Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 238000012954 risk control Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation; Time management
- G06Q10/103—Workflow collaboration or project management
Landscapes
- Business, Economics & Management (AREA)
- Human Resources & Organizations (AREA)
- Strategic Management (AREA)
- Engineering & Computer Science (AREA)
- Entrepreneurship & Innovation (AREA)
- Operations Research (AREA)
- Economics (AREA)
- Marketing (AREA)
- Data Mining & Analysis (AREA)
- Quality & Reliability (AREA)
- Tourism & Hospitality (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The application relates to a workflow calling method and device, computer equipment and a storage medium. The method comprises the following steps: displaying a target session interface in a target application; the target session interface comprises a message input box; if the session message sent by the current user through the message input box is detected to be a preset workflow calling instruction, sending the workflow calling instruction to a cloud platform server; the cloud platform server is used for responding to the workflow calling instruction and executing a target workflow corresponding to the workflow calling instruction; the workflow calling instruction is an instruction for triggering the target application to call a corresponding workflow; and receiving an execution result returned by the cloud platform server after the target workflow is executed, and displaying the execution result in the target session interface. By adopting the method, the calling efficiency of the automatic workflow can be improved.
Description
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method and an apparatus for workflow invocation, a computer device, and a storage medium.
Background
An automated workflow refers to an automated flow of a portion or the entirety of a business process in a computer application environment.
In the process of executing the automated workflow by using the office management application, the traditional technology usually needs a user to log in a special management platform for operation or to call a background interface, the operation is complicated, and certain professional knowledge is needed, so that the efficiency of calling the workflow by the traditional technology is reduced.
Therefore, the current workflow calling method has the problem of low efficiency.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a workflow invoking method, apparatus, computer device and storage medium capable of improving invoking efficiency of an automated workflow.
A workflow invocation method, said method comprising:
displaying a target session interface in a target application; the target session interface comprises a message input box;
if the session message sent by the current user through the message input box is detected to be a preset workflow calling instruction, sending the workflow calling instruction to a cloud platform server; the cloud platform server is used for responding to the workflow calling instruction and executing a target workflow corresponding to the workflow calling instruction; the workflow calling instruction is an instruction for triggering the target application to call a corresponding workflow;
and receiving an execution result returned after the cloud platform server executes the target workflow, and displaying the execution result in the target session interface.
A workflow invocation apparatus, said apparatus comprising:
the display module is used for displaying a target session interface in the target application; the target session interface comprises a message input box;
the calling module is used for sending the workflow calling instruction to the cloud platform server if the conversation message sent by the current user through the message input box is detected to be a preset workflow calling instruction; the cloud platform server is used for responding to the workflow calling instruction and executing a target workflow corresponding to the workflow calling instruction; the workflow calling instruction is an instruction for triggering the target application to call a corresponding workflow;
and the receiving module is used for receiving an execution result returned after the cloud platform server executes the target workflow and displaying the execution result in the target session interface.
A computer device comprising a memory and a processor, the memory storing a computer program, the processor implementing the following steps when executing the computer program:
displaying a target session interface in a target application; the target session interface comprises a message input box;
if the session message sent by the current user through the message input box is detected to be a preset workflow calling instruction, sending the workflow calling instruction to a cloud platform server; the cloud platform server is used for responding to the workflow calling instruction and executing a target workflow corresponding to the workflow calling instruction; the workflow calling instruction is an instruction for triggering the target application to call a corresponding workflow;
and receiving an execution result returned by the cloud platform server after the target workflow is executed, and displaying the execution result in the target session interface.
A computer-readable storage medium, on which a computer program is stored which, when executed by a processor, carries out the steps of:
displaying a target session interface in a target application; the target session interface comprises a message input box;
if the session message sent by the current user through the message input box is detected to be a preset workflow calling instruction, sending the workflow calling instruction to a cloud platform server; the cloud platform server is used for responding to the workflow calling instruction and executing a target workflow corresponding to the workflow calling instruction; the workflow calling instruction is an instruction for triggering the target application to call a corresponding workflow;
and receiving an execution result returned after the cloud platform server executes the target workflow, and displaying the execution result in the target session interface.
According to the workflow calling method, the workflow calling device, the computer equipment and the storage medium, the target session interface comprising the message input box in the target application is displayed, and when the session message sent by the current user through the message input box is detected to be the preset workflow calling instruction, the workflow calling instruction is sent to the cloud platform server; the cloud platform server is used for responding to the workflow calling instruction and executing a target workflow corresponding to the workflow calling instruction; the workflow calling instruction is used for triggering a target application to call a corresponding workflow, receiving an execution result returned after the cloud platform server executes the target workflow, and displaying the execution result of the target workflow in a target session interface; therefore, the current user can trigger the cloud platform server to execute the target workflow in a similar message sending mode without logging in a special management platform to operate or calling a background interface, the learning cost is low, the requirement of mobile office of the user on the target application is greatly facilitated, the practicability and cross-platform performance of the automatic workflow are improved, and the efficiency of calling the automatic workflow is improved.
Drawings
FIG. 1 is a diagram of an application environment for a method for workflow invocation in one embodiment;
FIG. 2 is a flow diagram illustrating a method for workflow invocation in one embodiment;
FIG. 3 is an interface diagram of a target session interface, under an embodiment;
FIG. 4 is a flow diagram that illustrates the execution of a target workflow in one embodiment;
FIG. 5 is a schematic diagram of an interface for a workflow query in one embodiment;
FIG. 6 is a diagram of a workflow creation interface in one embodiment;
FIG. 7 is a flowchart illustrating a workflow invocation method in accordance with another embodiment;
FIG. 8 is an overall flow diagram of a workflow invocation in one embodiment;
FIG. 9 is a diagram illustrating the results of a workflow execution in one embodiment;
FIG. 10 is a block diagram of a workflow invocation means in one embodiment;
FIG. 11 is a diagram of the internal structure of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The workflow calling method provided by the application can be applied to the application environment shown in fig. 1. The terminal 102 communicates with the cloud platform server 104 through a network. The terminal 102 displays a target session interface in a target application; the target session interface comprises a message input box; if the session message sent by the current user through the message input box is detected to be a preset workflow calling instruction, sending the workflow calling instruction to the cloud platform server 104; the cloud platform server 104 is configured to respond to the workflow calling instruction and execute a target workflow corresponding to the workflow calling instruction; the workflow calling instruction is an instruction for triggering the target application to call the corresponding workflow; and receiving an execution result returned after the cloud platform server 104 executes the target workflow, and displaying the execution result in the target session interface. In practical applications, the terminal 102 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices, and the cloud platform server 104 may be implemented by an independent server or a server cluster formed by multiple servers.
The cloud platform server 104 may be an independent physical server, or may be a server cluster or a distributed system formed by a plurality of physical servers. In practice, the target server may be used to provide blockchain storage services.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism and an encryption algorithm. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains information of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the information and generate a next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer.
The block chain underlying platform can comprise processing modules such as user management, basic service, intelligent contract and operation monitoring. The user management module is responsible for identity information management of all blockchain participants, and comprises public and private key generation maintenance (account management), key management, user real identity and blockchain address corresponding relation maintenance (authority management) and the like, and under the authorization condition, the user management module supervises and audits the transaction condition of certain real identities and provides rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain node equipment and used for verifying the validity of the service request, recording the service request to storage after consensus on the valid request is completed, for a new service request, the basic service firstly performs interface adaptation analysis and authentication processing (interface adaptation), then encrypts service information (consensus management) through a consensus algorithm, transmits the service information to a shared account (network communication) completely and consistently after encryption, and performs recording and storage; the intelligent contract module is responsible for registering and issuing contracts, triggering the contracts and executing the contracts, developers can define contract logics through a certain programming language, issue the contract logics to a block chain (contract registration), call keys or other event triggering and executing according to the logics of contract clauses, complete the contract logics and simultaneously provide the function of upgrading and canceling the contracts; the operation monitoring module is mainly responsible for deployment, configuration modification, contract setting, cloud adaptation in the product release process and visual output of real-time states in product operation, such as: alarm, monitoring network conditions, monitoring node equipment health status, and the like.
The platform product service layer provides basic capability and an implementation framework of typical application, and developers can complete block chain implementation of business logic based on the basic capability and the characteristics of the superposed business. The application service layer provides the application service based on the block chain scheme for the business participants to use.
In addition, the cloud platform server 104 may also be a cloud server providing basic cloud computing services such as cloud services, cloud databases, cloud computing, cloud functions, cloud storage, web services, cloud communications, middleware services, domain name services, security services, CDNs, and big data and artificial intelligence platforms.
In an embodiment, as shown in fig. 2, a workflow invoking method is provided, which is described by taking the method as an example applied to the terminal 102 in fig. 1, and includes the following steps:
step S202, displaying a target session interface in a target application; the target conversation interface includes a message input box.
Wherein the target application may refer to an office application.
The target session interface may refer to an interface for performing a session with at least one target account in the target application. In practical applications, the target conversation interface may refer to an interface for conversation with a customer service robot in an office application. Namely, the target account is the customer service robot account of the target application.
In specific implementation, a user can trigger a session entry corresponding to a target account in a target application through a terminal, and then input a session request for the target account to the terminal for the terminal to receive. After the terminal receives the session request aiming at the target account, the terminal responds to the session request aiming at the target account and displays a target session interface in the target application. Wherein, the target session interface comprises a message input box. The user may send a session message to the target account via the message input box.
In practical application, the target session interface further includes a message sending entry. The user can trigger the message sending entrance after inputting the session message in the message input box, and further trigger the terminal to send the session message to the target account.
Step S204, if the conversation message sent by the current user through the message input box is detected to be a preset workflow calling instruction, sending the workflow calling instruction to the cloud platform server; the cloud platform server is used for responding to the workflow calling instruction and executing the target workflow corresponding to the workflow calling instruction.
The workflow calling instruction is an instruction used for triggering the target application to call the corresponding workflow. In practice, the workflow may refer to an automated office workflow provided with the target application.
In specific implementation, when the terminal detects that the session message sent by the current user through the message input box is a workflow calling instruction, the terminal calls a target workflow corresponding to the workflow calling instruction. Specifically, if the session message sent by the current user through the message input box is a preset workflow calling instruction, the terminal sends the workflow calling instruction generated based on the workflow calling instruction to the cloud platform server.
After the cloud platform server receives the workflow calling instruction sent by the terminal, the cloud platform server queries a workflow corresponding to the workflow identification from a plurality of candidate workflows based on the workflow identification carried by the workflow calling instruction, takes the workflow as a target workflow corresponding to the workflow calling instruction, and executes the target workflow.
And step S206, receiving an execution result returned after the cloud platform server executes the target workflow, and displaying the execution result in the target session interface.
The execution result may refer to a result obtained after the target workflow is executed.
In the specific implementation, after the cloud platform server finishes executing the target workflow, the cloud platform server returns an execution result of the target workflow to the terminal; and after the terminal receives the execution result of the target workflow, the terminal displays the execution result of the target workflow in the target session interface. Specifically, the terminal can simulate a mode of sending a message to the current user, and display an execution result of the target workflow in the target session interface, so as to prompt the current user that the target workflow is called and executed.
FIG. 3 provides a flow chart of the execution of a target workflow. Analyzing the workflow definition; then, initializing each application program instance in the workflow; determining an originating application instance; then, pushing the initial application program instance to enter an instance execution queue; executing the application program instances in the instance execution queue when the instance execution queue is not an empty queue; and after the application program instance is successfully executed, recording the application program instance execution log and data, pushing the next application program instance of the current application program instance into an instance execution queue, and circularly executing the steps until all the application program instances in the workflow are completely executed or a stop instruction is received.
To facilitate understanding by those skilled in the art, FIG. 4 provides an interface diagram of a target session interface. Wherein 410 is a target session interface; 420 is a session message; 430 is the execution result of the target workflow.
In the workflow calling method, a target session interface including a message input box in a target application is displayed, and when a session message sent by a current user through the message input box is detected to be a preset workflow calling instruction, the workflow calling instruction is sent to a cloud platform server; the cloud platform server is used for responding to the workflow calling instruction and executing a target workflow corresponding to the workflow calling instruction; the workflow calling instruction is used for triggering a target application to call a corresponding workflow, receiving an execution result returned after the cloud platform server executes the target workflow, and displaying the execution result of the target workflow in a target session interface; therefore, the current user can trigger the cloud platform server to execute the target workflow in a similar message sending mode without logging in a special management platform to operate or calling a background interface, the learning cost is low, the requirement of mobile office of the user on the target application is greatly facilitated, the practicability and cross-platform performance of the automatic workflow are improved, and the efficiency of calling the automatic workflow is improved.
In one embodiment, if it is detected that the session message sent by the current user through the message input box is a preset workflow call instruction, sending the workflow call instruction to the cloud platform server includes: if the session message is detected to have the instruction identification, determining that the session message is a workflow calling instruction, and determining that the workflow calling instruction is an effective instruction or an invalid instruction; and if the workflow calling instruction is an invalid instruction, displaying prompt information that the workflow calling instruction is the invalid instruction in the target session interface.
In specific implementation, in the process of sending the workflow calling instruction to the cloud platform server if it is detected that a session message sent by a current user through the message input box is a preset workflow calling instruction, the terminal may determine a callback URL interface (a message interface for receiving the workflow calling instruction) to the cloud platform server, sign the session message and generate ciphertext data, and push the ciphertext data to the cloud platform server through the callback URL interface.
After the cloud platform server receives the ciphertext data pushed through the callback URL interface, the cloud platform server verifies and decrypts the ciphertext data through a Token (password) and an EncodingAESKey (encoding key) generated by system registration. If the cloud platform server determines that the Token verification signature is invalid, it indicates that the content of the session message is possibly tampered or is not sent by the target application, and the cloud platform server ignores the session message; the cloud platform server determines that the EncodingAESKey fails to decrypt the ciphertext, and also indicates that the content of the session message is possibly tampered, and the cloud platform server ignores the session message.
If the ciphertext data passes the Token signature verification and the EncodingAESKey decryption ciphertext, the cloud platform server obtains the session message, and then judges whether the session message has an instruction identifier, for example, whether the session message is a "/" start or not, and the cloud platform server considers that the session message is not a workflow calling instruction; if the session message has the instruction identifier, the cloud platform server searches whether the instruction is created, and if the workflow calling instruction cannot be inquired in the created workflow calling instruction set, the cloud platform server sends a message for prompting that the workflow calling instruction is an invalid instruction to the terminal. After receiving the message, the terminal determines that the session message has the instruction identifier, determines that the workflow calling instruction is an invalid instruction, and displays prompt information that the workflow calling instruction is an invalid instruction in a target session interface. And if the terminal does not receive a message which is sent by the cloud platform server and used for prompting that the workflow calling instruction is an invalid instruction, the terminal determines that the workflow calling instruction is an effective instruction.
According to the technical scheme, when the session message is detected to have the instruction identification, the workflow calling instruction is detected to be the valid instruction or the invalid instruction, the workflow calling instruction is the invalid instruction, and the prompt message that the workflow calling instruction is the invalid instruction is displayed in the target session interface in time, so that the user is timely reminded of inputting the workflow calling instruction to be the invalid instruction, and the calling efficiency of the target workflow is prevented from being influenced due to the fact that the user repeatedly inputs the wrong instruction.
In an embodiment, if the workflow calling instruction is an effective instruction, the cloud platform server is further configured to execute a target workflow corresponding to the workflow calling instruction if it is detected that the current user has a right to trigger the target application to call the workflow corresponding to the workflow calling instruction.
In specific implementation, after the cloud platform server queries a workflow calling instruction sent by a terminal in a created workflow calling instruction set, the cloud platform server needs to detect whether a current user sending the workflow calling instruction has a permission to trigger a target application to call a workflow corresponding to the workflow calling instruction; specifically, the cloud platform server may obtain an authorized user list corresponding to the workflow calling instruction; then, the cloud platform server queries whether the current user is in the authorized user list. If the current user is not in the authorized user list, the cloud platform server determines that the current user does not have the authority for triggering the target application to call the workflow corresponding to the workflow calling instruction, and at the moment, the cloud platform server sends a message that the current user does not have the authority to the terminal. After the terminal receives the message that the current user has no authority, the terminal determines that the current user does not have the calling authority, and then prompt information that the current user has no authority is displayed in a target session interface so as to remind the current user that the current user has no execution authority.
And if the cloud platform server detects that the current user has the authority of triggering the target application to call the workflow corresponding to the workflow calling instruction, executing the target workflow corresponding to the workflow calling instruction.
According to the technical scheme, whether the current user has the right of triggering the target application to call the workflow corresponding to the workflow calling instruction is judged, and only when the current user has the right of triggering the target application to call the workflow corresponding to the workflow calling instruction, the workflow calling instruction is determined to be used as the preset target workflow calling instruction and the workflow corresponding to the target workflow calling instruction is called, so that the right of each user to call the workflow is effectively controlled, the user is timely reminded through the target session interface when the current user does not have the execution right, and the user is prevented from repeatedly inputting the workflow calling instruction without the calling right.
In one embodiment, the method further comprises: if the conversation message is detected to be a workflow query instruction, acquiring executable instruction information aiming at the current user; the executable instruction information is information of a workflow calling instruction corresponding to a workflow which can be called by a target application triggered by a current user; and displaying the executable instruction information in the target session interface.
The workflow query instruction may refer to a request instruction for querying information of a workflow that can be invoked by a current user. In practical applications, the workflow query command may be set to "/list".
The executable instruction information includes name information, function information, author information, and the like, which may include executable instructions.
In specific implementation, when information that a current user can call a workflow needs to be queried, the current user can send a session message of a workflow query instruction to the target account (such as a customer service robot account of a target application) through the message input box, and the terminal sends the workflow query instruction to the cloud platform server; after receiving the workflow query instruction, the cloud platform server queries the workflow which can be called by the current user, and sends information of the workflow call instruction corresponding to the workflow as executable instruction information to the terminal. After receiving the executable instruction information of the current user, the terminal displays the executable instruction information in the target session interface, and the information of the instruction cannot be viewed for the user without the instruction authority. To facilitate understanding by those skilled in the art, FIG. 5 provides a scenario diagram of a workflow query. Wherein 510 is a target session interface; 520 query instructions for the workflow; 530 is executable instruction information.
According to the technical scheme of the embodiment, when the session message is detected to be the workflow query instruction, the instruction information can be executed by acquiring the information of the workflow call instruction corresponding to the workflow which can be called by the target application triggered by the current user, and the executable instruction information is displayed in the target session interface; in this manner, the current user can accurately know the automated workflow information that he can currently invoke.
In one embodiment, the method further comprises: if the conversation message is detected to be a workflow creating instruction, displaying a workflow creating interface; responding to the creation operation of the workflow creation interface, and acquiring a newly added workflow, a newly added workflow calling instruction and an authorized user list which are created through the workflow creation interface; and establishing a mapping relation among the newly added workflow calling instruction, the newly added workflow and the authorized user list.
The workflow creation interface may refer to a front-end interactive interface for creating and configuring a workflow.
The authorized user list is a user list with the authority of triggering the target application to call the newly added workflow.
In a specific implementation, when the terminal detects that the session message is a workflow creation instruction, the terminal displays a workflow creation interface. Then, the terminal responds to the creation operation of the workflow creation interface, and obtains a newly added workflow, a newly added workflow calling instruction and an authorized user list which are created through the workflow creation interface. And then, the terminal establishes a mapping relation among a newly added workflow calling instruction, the newly added workflow and the authorized user list and stores the mapping relation to the cloud platform server.
To facilitate understanding by those skilled in the art, FIG. 6 provides a schematic diagram of a workflow creation interface; the workflow creation interface 610 includes a workflow creation entry 620, a workflow call instruction writing entry 630, a user right configuration entry 640, a save entry 650, and the like. Specifically, the terminal may respond to a workflow creating operation implemented by a user at a workflow creating entry, and further acquire a newly added workflow created by the user, and the terminal determines a newly added workflow calling instruction and related information for the newly added workflow, for example, information such as an instruction name, instruction introduction, and an application name corresponding to the instruction, in response to a workflow calling instruction writing operation implemented by the user at a workflow calling instruction writing entry, and the terminal responds to a user authority configuration operation implemented by the user at a user authority configuration entry, and acquires ID information of an authorized user filled by the user, that is, a user having an authority to trigger a target application to call the newly added workflow, to obtain an authorized user list. And finally, the terminal needs to establish a newly-added workflow calling instruction, a mapping relation between the newly-added workflow and the authorized user list and store the newly-added workflow calling instruction and the mapping relation to the cloud platform server when a user performs a triggering operation at a storage inlet.
According to the technical scheme of the embodiment, if the session message is detected to be the workflow creating instruction, the newly added workflow calling instruction and the authorized user list created through the workflow creating interface are obtained by displaying the workflow creating interface and responding to the creating operation of the workflow creating interface; finally, establishing a mapping relation among a newly added workflow calling instruction, the newly added workflow and the authorized user list; therefore, a user can directly configure corresponding instruction names, instruction introduction descriptions and instruction using members on the target application, the workflow can be designed according to actual business requirements, and the workflow can be effectively used in storage.
In one embodiment, in response to a creation operation on a workflow instruction creation interface, obtaining a new workflow and a new workflow call instruction created through the workflow instruction creation interface includes: and if the instruction name of the newly added workflow call instruction is detected to be the same as the instruction name of the existing workflow call instruction, displaying the prompt information that the instruction name of the newly added workflow call instruction is repeated in a workflow instruction creating interface.
Wherein, the existing workflow calling instruction may refer to the workflow calling instruction which has been created.
In the specific implementation, in the process of obtaining a newly added workflow created through a workflow instruction creation interface and a newly added workflow call instruction in response to a creation operation on the workflow instruction creation interface, the terminal may further detect whether an instruction name of the newly added workflow call instruction is the same as an instruction name of an existing workflow call instruction, and if the instruction name of the newly added workflow call instruction is the same as the instruction name of the existing workflow call instruction, the terminal displays prompt information that the instruction name of the newly added workflow call instruction is repeated in the workflow instruction creation interface to prompt a current user to re-create the instruction name of the newly added workflow call instruction.
According to the technical scheme, by detecting that the instruction name of the newly added workflow call instruction is the same as the instruction name of the existing workflow call instruction, prompt information that the instruction name of the newly added workflow call instruction is repeated is displayed in the workflow instruction creation interface, so that the current user is prompted to re-create the instruction name of the newly added workflow call instruction, the fact that the instruction name of the workflow call instruction corresponds to the unique workflow is guaranteed, and the corresponding target workflow can be accurately called based on the workflow call instruction.
In another embodiment, as shown in fig. 7, a workflow invoking method is provided, which is described by taking the application of the method to the terminal in fig. 1 as an example, and includes the following steps: step S710, displaying a target session interface in the target application; the target conversation interface includes a message input box. Step S720, if it is detected that the session message has the instruction identifier, determining that the session message is the workflow invocation instruction. Step S730, determining that the workflow calling instruction is an effective instruction or an ineffective instruction. Step S740, if the workflow calling instruction is an effective instruction and the current user has the right to trigger the target application to call the workflow corresponding to the workflow calling instruction, calling the target workflow corresponding to the target workflow calling instruction. And step S750, displaying the execution result of the target workflow in the target session interface. It should be noted that, for the specific limitations of the above steps, reference may be made to the above specific limitations of a workflow execution method, which are not described herein again.
It should be understood that although the steps in the flowcharts of fig. 2 and 7 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2 and 7 may include multiple steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of performing the steps or stages is not necessarily sequential, but may be performed alternately or alternately with other steps or at least some of the steps or stages in other steps.
To facilitate understanding by those skilled in the art, FIG. 8 provides an overall flow diagram of a workflow invocation; taking the target application as the enterprise wechat as an example, the system firstly provides a callback URL and registers in the enterprise wechat platform, and at this time, the enterprise wechat platform, i.e. the cloud platform server, allocates a corresponding Token (password) and an EncodingAESKey (encoding key). It should be noted that the data callback URL and the instruction callback URL are not the same URL, and the data callback URL is only used in the present application, and the callback URL is used for receiving the notification message. Wherein, Token is used to calculate signature, which can distinguish whether it is the target application source and whether the content of the pushed message is tampered. The EncodingAESKey is used for encrypting the message content, so that sensitive information leakage caused by interception of the message during internet transmission is prevented.
When a user creates an instruction, the user needs to set an instruction name, configure corresponding member authority, and design a workflow corresponding to instruction response to store and submit. After receiving a command creating request submitted by a user, the system checks whether the command name is repeated, if so, the system prompts failure, and if so, creates a saving workflow. When creating and saving the workflow, the system also records the workflow corresponding to the instruction name and records the member list corresponding to the instruction.
After the user inputs an instruction through the enterprise WeChat, the enterprise WeChat receives the message content, finds a corresponding callback URL according to the enterprise WeChat customer service robot information registered by the system, signs the message content, generates a ciphertext and pushes the ciphertext through the callback URL. After the callback service of the system receives the data, the messages at this time are all ciphertext and need to be verified through Token and EncodingAESKey generated by system registration. If the Token verification signature is invalid, the message content is possible to be tampered or is not sent by the enterprise WeChat, and is ignored; if decryption of the ciphertext by EncodingAESKey fails, it also indicates that the message may have been tampered with and ignored. After the ciphertext is decrypted through Token signature verification and EncodingAESKey, the message content (the name of the enterprise WeChat call and the name of the instruction) can be obtained. After the instruction name is obtained, if the instruction name does not have the "/" beginning, the instruction is considered to be operated in a non-instruction mode, otherwise, the system can search whether the instruction is created, and if the instruction is not created, an invalid instruction is prompted; and simultaneously checking a member list corresponding to the instruction, and if the sender of the current message is not in the instruction member list, prompting that no execution authority exists.
And if the instruction check and the authority check pass, searching the corresponding workflow and executing. To facilitate understanding by those skilled in the art, fig. 9 also provides a schematic diagram of the results of a workflow execution.
In one embodiment, as shown in fig. 10, there is provided a workflow invoking apparatus, which may be a part of a computer device using a software module or a hardware module, or a combination of the two modules, and specifically includes: display module, calling module and receiving module, wherein:
a display module 1010, configured to display a target session interface in a target application; the target session interface comprises a message input box;
a calling module 1020, configured to send a workflow calling instruction to a cloud platform server if it is detected that a session message sent by a current user through the message input box is a preset workflow calling instruction; the cloud platform server is used for responding to the workflow calling instruction and executing a target workflow corresponding to the workflow calling instruction; the workflow calling instruction is an instruction for triggering the target application to call a corresponding workflow;
a receiving module 1030, configured to receive an execution result returned by the cloud platform server after executing the target workflow, and display the execution result in the target session interface.
In another embodiment, the invoking module 1020 is specifically configured to determine that the session message is the workflow invoking instruction and determine that the workflow invoking instruction is an effective instruction or an invalid instruction if it is detected that the session message has an instruction identifier; and if the workflow calling instruction is an invalid instruction, displaying prompt information that the workflow calling instruction is the invalid instruction in the target session interface.
In another embodiment, if the workflow calling instruction is an effective instruction, the cloud platform server is further configured to execute a target workflow corresponding to the workflow calling instruction if it is detected that the current user has a right to trigger the target application to call the workflow corresponding to the workflow calling instruction.
In another embodiment, the workflow invoking device further includes: and the prompt module is used for displaying prompt information that the current user does not have the authority in the target session interface if the current user is detected not to have the authority.
In another embodiment, the workflow invoking device further includes: the acquisition module is used for acquiring executable instruction information aiming at the current user if the session message is detected to be a workflow query instruction; the executable instruction information is information of a workflow calling instruction corresponding to a workflow which can be called by the target application and can be triggered by the current user; and the display module is used for displaying the executable instruction information in the target session interface.
In another embodiment, the workflow invoking apparatus further includes: the detection module is used for displaying a workflow creation interface if the session message is detected to be a workflow creation instruction; the response module is used for responding to the creation operation of the workflow creation interface and obtaining a newly added workflow, a newly added workflow calling instruction and an authorized user list which are created through the workflow creation interface; the authorized user list is a user list with the authority of triggering the target application to call the newly added workflow; and the establishing module is used for establishing a mapping relation among the newly added workflow calling instruction, the newly added workflow and the authorized user list.
In another embodiment, the response module is specifically configured to display, in the workflow instruction creation interface, prompt information that an instruction name of the newly added workflow call instruction is repeated if it is detected that the instruction name of the newly added workflow call instruction is the same as an instruction name of an existing workflow call instruction.
For the specific definition of a workflow invoking device, refer to the above definition of a workflow invoking method, which is not described herein again. The modules in the workflow invoking device can be wholly or partially realized by software, hardware and a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a terminal, and its internal structure diagram may be as shown in fig. 11. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The communication interface of the computer device is used for communicating with an external terminal in a wired or wireless manner, and the wireless manner can be realized through WIFI, an operator network, NFC (near field communication) or other technologies. The computer program when executed by a processor implements a workflow invocation method. The display screen of the computer equipment can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, a key, a track ball or a touch pad arranged on the shell of the computer equipment, an external keyboard, a touch pad or a mouse and the like.
Those skilled in the art will appreciate that the architecture shown in fig. 11 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is further provided, which includes a memory and a processor, the memory stores a computer program, and the processor implements the steps of the above method embodiments when executing the computer program.
In an embodiment, a computer-readable storage medium is provided, in which a computer program is stored which, when being executed by a processor, carries out the steps of the above-mentioned method embodiments.
In one embodiment, a computer program product or computer program is provided that includes computer instructions stored in a computer readable storage medium. The computer instructions are read by a processor of a computer device from a computer-readable storage medium, and the computer instructions are executed by the processor to cause the computer device to perform the steps in the above-mentioned method embodiments.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database or other medium used in the embodiments provided herein can include at least one of non-volatile and volatile memory. Non-volatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical storage, or the like. Volatile Memory can include Random Access Memory (RAM) or external cache Memory. By way of illustration and not limitation, RAM can take many forms, such as Static Random Access Memory (SRAM) or Dynamic Random Access Memory (DRAM), among others.
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.
Claims (10)
1. A workflow invocation method, characterized in that said method comprises:
displaying a target session interface in a target application; the target session interface comprises a message input box;
if the session message sent by the current user through the message input box is detected to be a preset workflow calling instruction, sending the workflow calling instruction to a cloud platform server; the cloud platform server is used for responding to the workflow calling instruction and executing a target workflow corresponding to the workflow calling instruction; the workflow calling instruction is an instruction for triggering the target application to call a corresponding workflow;
and receiving an execution result returned after the cloud platform server executes the target workflow, and displaying the execution result in the target session interface.
2. The method according to claim 1, wherein if it is detected that the session message sent by the current user through the message input box is a preset workflow call instruction, sending the workflow call instruction to the cloud platform server includes:
if the conversation message is detected to have the instruction identification, determining that the conversation message is the workflow calling instruction, and determining that the workflow calling instruction is an effective instruction or an invalid instruction;
and if the workflow calling instruction is an invalid instruction, displaying prompt information that the workflow calling instruction is the invalid instruction in the target session interface.
3. The method according to claim 2, wherein if the workflow calling instruction is a valid instruction, the cloud platform server is further configured to execute a target workflow corresponding to the workflow calling instruction if it is detected that the current user has a right to trigger the target application to call the workflow corresponding to the workflow calling instruction.
4. The method of claim 3, further comprising:
and if the current user does not have the authority, displaying prompt information of no authority of the current user in the target session interface.
5. The method of claim 1, further comprising:
if the conversation message is detected to be a workflow query instruction, acquiring executable instruction information of the current user; the executable instruction information is information of a workflow calling instruction corresponding to a workflow which can be called by the target application and can be triggered by the current user;
and displaying the executable instruction information in the target session interface.
6. The method of claim 1, further comprising:
if the conversation message is detected to be a workflow creating instruction, displaying a workflow creating interface;
responding to the creation operation of the workflow creation interface, and acquiring a newly added workflow, a newly added workflow calling instruction and an authorized user list which are created through the workflow creation interface; the authorized user list is a user list with the authority of triggering the target application to call the newly added workflow;
and establishing a mapping relation among the newly added workflow calling instruction, the newly added workflow and the authorized user list.
7. The method according to claim 6, wherein the obtaining of the newly added workflow and the newly added workflow call instruction created through the workflow instruction creation interface in response to the creation operation of the workflow instruction creation interface comprises:
and if the instruction name of the newly added workflow call instruction is detected to be the same as the instruction name of the existing workflow call instruction, displaying the prompt information that the instruction name of the newly added workflow call instruction is repeated in the workflow instruction creating interface.
8. An apparatus for workflow invocation, the apparatus comprising:
the display module is used for displaying a target session interface in the target application; the target session interface comprises a message input box;
the calling module is used for sending the workflow calling instruction to the cloud platform server if the conversation message sent by the current user through the message input box is detected to be a preset workflow calling instruction; the cloud platform server is used for responding to the workflow calling instruction and executing a target workflow corresponding to the workflow calling instruction; the workflow calling instruction is an instruction for triggering the target application to call a corresponding workflow;
and the receiving module is used for receiving an execution result returned by the cloud platform server after the target workflow is executed and displaying the execution result in the target session interface.
9. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor, when executing the computer program, implements the steps of the method of any of claims 1 to 7.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the steps of the method according to any one of claims 1 to 7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110217460.XA CN114971505A (en) | 2021-02-26 | 2021-02-26 | Workflow calling method and device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110217460.XA CN114971505A (en) | 2021-02-26 | 2021-02-26 | Workflow calling method and device, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN114971505A true CN114971505A (en) | 2022-08-30 |
Family
ID=82972531
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110217460.XA Pending CN114971505A (en) | 2021-02-26 | 2021-02-26 | Workflow calling method and device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114971505A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118409681A (en) * | 2023-10-27 | 2024-07-30 | 北京字跳网络技术有限公司 | Method, apparatus, device and medium for managing workflow |
-
2021
- 2021-02-26 CN CN202110217460.XA patent/CN114971505A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN118409681A (en) * | 2023-10-27 | 2024-07-30 | 北京字跳网络技术有限公司 | Method, apparatus, device and medium for managing workflow |
US12333341B2 (en) | 2023-10-27 | 2025-06-17 | Beijing Zitiao Network Technology Co., Ltd. | Managing a digital assistant workflow |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20200285978A1 (en) | Model training system and method, and storage medium | |
US11916920B2 (en) | Account access security using a distributed ledger and/or a distributed file system | |
CN110535971B (en) | Interface configuration processing method, device, equipment and storage medium based on block chain | |
CN110263585A (en) | Test monitoring and managing method, device, equipment and storage medium | |
CN104506487B (en) | The credible execution method of privacy policy under cloud environment | |
CN111191210A (en) | Data access right control method and device, computer equipment and storage medium | |
CN109347625B (en) | Password operation method, work key creation method, password service platform and equipment | |
CN112187931A (en) | Session management method, device, computer equipment and storage medium | |
US11418499B2 (en) | Password security | |
CN112464117A (en) | Request processing method and device, computer equipment and storage medium | |
US9934310B2 (en) | Determining repeat website users via browser uniqueness tracking | |
CN110597541B (en) | Interface updating processing method, device, equipment and storage medium based on block chain | |
CN112395133B (en) | Data backup method and device based on virtual machine and computer equipment | |
US11277270B2 (en) | Flexible controls for certificates | |
CN111090581A (en) | Intelligent contract testing method and device, computer equipment and storage medium | |
CN111488372A (en) | Data processing method, device and storage medium | |
CN113315828A (en) | Traffic recording method and device, traffic recording equipment and storage medium | |
CN114971505A (en) | Workflow calling method and device, computer equipment and storage medium | |
CN117390698A (en) | Block chain-based data processing method, device, equipment and storage medium | |
CN115756255A (en) | Method, device and equipment for processing equipment parameters of parking lot equipment and storage medium | |
CN116070191A (en) | Information processing method and device, storage medium, and program product | |
CN116108417A (en) | Interface access control method, device, computer equipment and storage medium | |
US20240104223A1 (en) | Portable verification context | |
CN114567451B (en) | Identity verification method, identity verification device, computer equipment and storage medium | |
HK40039124A (en) | Information sharing method, device and equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |