A method and a system device based on a remote connection operation strategy
A technology of operation strategy and remote connection, applied in transmission systems, software testing/debugging, electrical components, etc., can solve problems such as the inability to ensure the absolute security of user code, and achieve the effect of ensuring security
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0058] Such as figure 1 As shown in , it is a sequence diagram of the method for running a strategy based on a remote connection. Taking the user's general operation process as an example, the running sequence of the method is as follows:
[0059] 1. The user logs in on the web side, and the web side requests the policy service to verify the user information and whether to allow the user to log in.
[0060] 2. After the policy service verifies the user information successfully, it feeds back to the web terminal, and the web terminal prompts the user to log in successfully.
[0061] 3. The user creates a new policy on the web side, and the web side requests the policy service to create a policy backtest instance. The policy service creates the policy backtest instance and feeds it back to the web side, and the web side feeds back the created policy backtest instance to the user.
[0062] 4. The user writes the strategy execution code on the local strategy side and runs the st...
Embodiment 2
[0068] The web end creates a backtest instance and generates a corresponding backtest instance ID. The backtest instance ID is the unique identification operation code of the backtest instance, and the system can identify its strategy code according to the identification operation code and run the backtest according to its corresponding backtest instance. The specific steps are as figure 2 Shown:
[0069] Step 201, the user creates a policy on the web. The strategy may be a combined strategy formed by combining multiple strategies according to logical relationships.
[0070] Step 202, the web terminal selects parameters such as backtesting interval, initial capital, fee rate, and backtesting frequency according to the strategy to create a backtesting instance, and generates a backtesting instance ID at the same time.
[0071] Step 203, writing the strategy code on the local strategy side and associating the backtest instance.
[0072] Step 204, the local strategy end invo...
Embodiment 3
[0077] The web end can directly create a simulation instance from a strategy, or use a backtest instance to create a simulation instance. When creating a simulation instance directly created by a backtest instance strategy, parameters can be changed, or some parameters set in the backtest instance can be directly copied , such as the name of the simulated transaction, matching frequency, etc. After the simulation instance is created, the strategy simulation module generates a simulation instance ID. The simulation instance ID is the unique identification operation code of the simulation instance. The system can identify its strategy code according to the identification operation code and run the simulation according to its corresponding simulation instance. The specific steps are as image 3 Shown:
[0078] In step 301, the user creates a policy on the web, and performs step 303. The strategy may be a combined strategy formed by combining multiple strategies according to log...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com