| Combining with the actual business, the division of reasonable business function s, the establishment of a whole network of functional architecture and the overall func tion model view. According to the content of business model of marketing business m odel specification, in accordance with the "business model does not take shape, does n ot change" the work principle, business process and function of one-to-one correspond ence, business activities on the basis of the characteristics of information of demand a nalysis, combing. The main contributions of this dissertation are as follows:Focus on the system requirements analysis, take the flow chart to analyze the ori ginal business process and point out the shortcomings. The business process reenginee ring, the advantages and benefits of the business process reengineering. Use case desc ription of the main use cases. Analysis of functional data analysis, given the marketing costs control business management thumbnail graphs, given entity relationship diagra ms, entity relationship.Focus on solving the problem and shortage of electricity risk prevention in power grid enterprise management, the traditional "first use electricity, post fee" manageme nt mode, which is widely used in power, if not from the fundamental reform of electri city charge management business, innovation management mode, the traditional mana gement will lead to the rapid development of information era.In order to meet the electric power enterprise cost control of business demand, es tablish and improve the cost control function of the business management system; inte lligent electric energy meter remote power purchase, remote stop complex and cost co ntrol functions to achieve 100% rate, fee charged business application rate of more tha n 80%, to achieve economic, intelligent grid applications. The traditional electricity c harge management mode of power grid enterprise is established, which realizes the m anagement process, process information and information entity form of information e ntity.At the same time, the paper concludes with a summary and outlook, the system s ecurity to do a further thinking. |