CN111159482A - Data verification method and system - Google Patents

Data verification method and system Download PDF

Info

Publication number
CN111159482A
CN111159482A CN201911319303.9A CN201911319303A CN111159482A CN 111159482 A CN111159482 A CN 111159482A CN 201911319303 A CN201911319303 A CN 201911319303A CN 111159482 A CN111159482 A CN 111159482A
Authority
CN
China
Prior art keywords
configuration data
field
field set
verification
data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201911319303.9A
Other languages
Chinese (zh)
Inventor
孙培尧
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beike Technology Co Ltd
Original Assignee
Beike Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beike Technology Co Ltd filed Critical Beike Technology Co Ltd
Priority to CN201911319303.9A priority Critical patent/CN111159482A/en
Publication of CN111159482A publication Critical patent/CN111159482A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/08Error detection or correction by redundancy in data representation, e.g. by using checking codes
    • G06F11/10Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
    • G06F11/1004Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's to protect a block of data words, e.g. CRC or checksum
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • G06F16/90344Query processing by using string matching techniques

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Computational Linguistics (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Quality & Reliability (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention provides a data verification method and a system, comprising the following steps: acquiring reference configuration data, and determining whether the reference configuration data exists in historical configuration data; determining a first field set corresponding to a preset execution strategy in the reference configuration data, and inquiring a second field set corresponding to the preset execution strategy in the historical configuration data; and comparing partial fields belonging to the same storage structure in the first field set and the second field set by using different verification rules according to the storage structure of the historical configuration data to obtain a verification result of the historical configuration data. The method is used for checking the historical configuration data in various data platforms and positioning the historical configuration data with errors.

Description

Data verification method and system
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a data verification method, a storage method for a verification script, a data verification system, a data verification device, and a computer-readable storage medium.
Background
At present, various service data interaction processing among data platforms of different entities is realized, and configuration data entry needs to be carried out on the data platforms of the entities in advance; specifically, the historical configuration data is usually input according to different cities, data platforms of different entities (such as a data platform of a bank and a data platform requiring financial information), different backlogs and different fields; in consideration of factors such as information safety and the like, historical configuration data has to be manually input, once the input error or the historical configuration data is overdue, various online problems and error reporting can be caused at the later stage of operation of a data platform, and most of error reporting is caused by the error of the historical configuration data.
Disclosure of Invention
The invention aims to provide a data verification method and a data verification system, and aims to solve the technical problems that in the prior art, all reference fields are uniformly compared and verified indiscriminately, for example, hash codes of configuration files are verified, so that a verification script is difficult to locate wrong configuration in historical configuration data, and the like.
In order to achieve the above object, an embodiment of the present invention provides a data verification method, where the data verification method includes:
acquiring reference configuration data, and determining whether the reference configuration data exists in historical configuration data;
determining a first field set corresponding to a preset execution strategy in the reference configuration data, and inquiring a second field set corresponding to the preset execution strategy in the historical configuration data;
and comparing partial fields belonging to the same storage structure in the first field set and the second field set by using different verification rules according to the storage structure of the historical configuration data to obtain a verification result of the historical configuration data.
Specifically, the obtaining of the reference configuration data specifically includes:
defining an item field class and a field subset belonging to the item field class according to different processing service data;
selecting partial fields in the field subset as key fields, and determining dictionary values of the key fields;
using the transaction field class, the field subset, and the dictionary value as reference configuration data.
Specifically, determining that the reference configuration data exists in the historical configuration data specifically includes:
defining a first verification rule, wherein the first verification rule comprises: a character string sampling comparison rule or a character string consistency check rule;
and determining that the reference configuration data exists in the historical configuration data by using the first check rule.
Specifically, querying a second field set corresponding to the preset execution policy in the historical configuration data includes:
according to the field class and the field of the first field set, in combination with the type of the preset execution strategy, defining a query request with a callback function, wherein the callback function is configured to assemble the field class and the field of the response by an array;
and obtaining a second field set corresponding to the preset execution strategy in the historical configuration data through the query request, wherein the preset execution strategy comprises a push execution strategy.
Specifically, comparing partial fields belonging to the same storage structure in the first field set and the second field set using different verification rules to obtain a verification result of the historical configuration data, including:
judging that part of fields in the first field set and the second field set belong to a keyword storage structure, performing comparison operation on part of fields in the first field set and the second field set belonging to the keyword storage structure by using a character string consistency check rule and a character string skip check rule to obtain a keyword check result, wherein,
the character string skipping check rule is configured to skip a field having a first preset character string in a part of fields belonging to the keyword storage structure before performing a comparison operation corresponding to the character string consistency check rule, or the character string skipping check rule is configured to ignore a check result corresponding to the first preset character string after performing the comparison operation corresponding to the character string consistency check rule.
Specifically, comparing partial fields belonging to the same storage structure in the first field set and the second field set using different verification rules to obtain a verification result of the historical configuration data, including:
judging that part of fields in the first field set and the second field set belong to a value class storage structure, performing comparison operation on the part of fields in the first field set and the second field set belonging to the value class storage structure by using a character string consistency check rule and a character string prefix check rule to obtain a value class check result, wherein,
the string prefix check rule is configured to map a field in which a second preset string exists in a part of fields belonging to the value class storage structure before performing a comparison operation corresponding to the string consistency check rule, or the string skip check rule is configured to ignore a check result corresponding to the second preset string after performing the comparison operation corresponding to the string consistency check rule.
Specifically, the querying of the preset execution policy in the second field set corresponding to the preset execution policy in the historical configuration data further includes writing back the execution policy;
the data verification method further comprises the following steps:
determining a third field set corresponding to the write-back execution policy in the reference configuration data, and querying a fourth field set corresponding to the write-back execution policy in the historical configuration data;
and defining a second check rule, comparing the third field set with the fourth field set according to the second check rule, and updating the check result after the comparison is completed, wherein the second check rule is configured to extract the keyword storage structure distribution of each field set participating in the comparison and check whether the keyword storage structure distribution is the same.
Specifically, the data verification method further includes:
and comparing partial fields belonging to different storage structures in the first field set and the second field set by using the same verification rule, and updating the verification result after the comparison is completed.
Specifically, the data verification method further includes:
and selectively generating prompt information corresponding to a preset receiving object according to the verification result.
The embodiment of the invention provides a storage method for a verification script, which comprises the following steps:
writing a timestamp and a check script with a version identifier into block data, and recording the block data by using a storage network with any one consensus algorithm, wherein the check script has instructions corresponding to the method.
An embodiment of the present invention provides a data verification system, including:
the verification service is configured to obtain reference configuration data and determine that the reference configuration data exists in historical configuration data;
the verification service is configured to determine a first field set corresponding to a preset execution policy in the reference configuration data, and query a second field set corresponding to the preset execution policy in the historical configuration data;
the verification service is configured to compare partial fields belonging to the same storage structure in the first field set and the second field set using different verification rules according to the storage structure of the historical configuration data, so as to obtain a verification result of the historical configuration data.
In another aspect, an embodiment of the present invention provides a data verification apparatus, including:
at least one processor;
a memory coupled to the at least one processor;
wherein the memory stores instructions executable by the at least one processor, the at least one processor implements the aforementioned method by executing the instructions stored by the memory.
In yet another aspect, an embodiment of the present invention provides a computer-readable storage medium storing computer instructions, which, when executed on a computer, cause the computer to perform the foregoing method.
The method and the device can find out multiple kinds of error fields in historical configuration data in a current data platform in batch and obtain specific positioning of the error fields, improve the accuracy of error checking, and support quick query and correction of wrong configuration data.
Additional features and advantages of embodiments of the invention will be set forth in the detailed description which follows.
Drawings
The accompanying drawings, which are included to provide a further understanding of the embodiments of the invention and are incorporated in and constitute a part of this specification, illustrate embodiments of the invention and together with the description serve to explain the embodiments of the invention without limiting the embodiments of the invention. In the drawings:
FIG. 1 is a schematic diagram of an exemplary main flow of an embodiment of the present invention;
FIG. 2 is a schematic diagram of an exemplary first type array in accordance with an embodiment of the present invention;
fig. 3 is a diagram illustrating an exemplary second class of arrays in accordance with an embodiment of the present invention.
Detailed Description
The following detailed description of embodiments of the invention refers to the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating embodiments of the invention, are given by way of illustration and explanation only, not limitation.
Example 1
The embodiment of the invention provides a data verification method which can be used for configuration verification of various data platforms.
The data verification method comprises the following steps:
acquiring reference configuration data, and determining whether the reference configuration data exists in historical configuration data;
there may be a plurality of implementations, one of which, whether or not there is a determination operation, only the determination operation is performed, and the result of the determination operation here may be recorded and also added to the final check result, for example, for some entered historical configuration data, there is a variable value, but the variable string corresponding to the variable value does not exist in the reference variable string (belonging to the reference configuration data), and the variable value may be further checked by the check rule;
secondly, when the reference configuration data does not exist in the historical configuration data, outputting a verification result, and selectively generating prompt information corresponding to a preset receiving object, wherein the prompt information indicates that the verification fails and the reference configuration data does not exist in error,
when the reference configuration data exists in the historical configuration data, then determining a first field set corresponding to a preset execution strategy in the reference configuration data, and inquiring a second field set corresponding to the preset execution strategy in the historical configuration data;
according to the storage structure of the historical configuration data, comparing partial fields belonging to the same type of storage structure in the first field set and the second field set by using different check rules to obtain a check result of the historical configuration data, wherein the different check rules at least comprise any two of a character string consistency check rule, a character string exclusion check rule, a character string skipping check rule, a character string tree (a leaf-type character string exists, namely the leaf-type character string is considered as a root-type character string to be compared and passed), a check rule and a check rule of the number of character strings (the number of specific character strings is only large, small or equal relative to a threshold number).
The reference configuration data can be obtained from financial institutions such as banks interacting with a data platform with historical configuration data, the historical configuration data can comprise configuration data (which can be of a table type) used for bank data access, and whether fields of the historical configuration data exist or not and whether dictionary values of certain specific fields exist or not are mainly checked; the preset execution strategy comprises a push execution strategy (push _ bank for short) and a write-back execution strategy (write _ back for short); the storage structure is a key-value storage structure.
Specifically, defining an item field class and a field subset belonging to the item field class according to different processing service data;
selecting partial fields in the field subset as key fields, and determining dictionary values of the key fields;
using the transaction field class, the field subset, and the dictionary value as reference configuration data;
as shown in fig. 1, the historical configuration data may be bank data access configuration data (bank _ access _ con-fig), the reference configuration data includes check indexes, each check index may be a field type, and the main check indexes are: the dictionary values of the backlog key, various field keys of the loan service item and the specific field key; the specific fields that need to check the dictionary values are: pcrtnmod (data platform configuration registration mode), housefeature (house property), repaymentMode (repayment staging type), floatType (floating point type); the check index can be set by different processing service data, for example, for a data platform with an inquiry service, the inquiry service can have a plurality of items, for example, for an approval inquiry service, a loan application result data entry item can be provided.
Specifically, a first check rule is defined, where the first check rule includes: a character string sampling comparison rule or a character string consistency check rule;
determining that the reference configuration data exists in the historical configuration data by using the first check rule;
the first verification rule can use all or part of verification indexes to participate in the verification process of the historical configuration data, selectively sample and extract part of the historical configuration data which may have errors, and can improve the verification efficiency.
Specifically, querying a second field set corresponding to the preset execution policy in the historical configuration data includes:
according to the field class and the field of the first field set, in combination with the type of the preset execution strategy, defining a query request with a callback function, wherein the callback function is configured to assemble the field class and the field of the response by an array;
and obtaining a second field set corresponding to the preset execution strategy in the historical configuration data through the query request, wherein the preset execution strategy comprises a push execution strategy.
Specifically, for the verification process, it is determined that some fields in the first field set and the second field set belong to a keyword storage structure, and a comparison operation is performed on some fields belonging to the keyword storage structure in the first field set and the second field set by using a string consistency verification rule and a string skip verification rule to obtain a keyword verification result, wherein,
the character string skipping check rule is configured to skip a field having a first preset character string in a part of fields belonging to the keyword storage structure before performing a comparison operation corresponding to the character string consistency check rule, or the character string skipping check rule is configured to ignore a check result corresponding to the first preset character string after performing the comparison operation corresponding to the character string consistency check rule.
Specifically, for the verification process, it is determined that some fields in the first field set and the second field set belong to a value class storage structure, and a comparison operation is performed on some fields belonging to the value class storage structure in the first field set and the second field set by using a string consistency verification rule and a string prefix verification rule to obtain a value class verification result, where,
the string prefix check rule is configured to map a field in which a second preset string exists in a part of fields belonging to the value class storage structure before performing a comparison operation corresponding to the string consistency check rule, or the string skip check rule is configured to ignore a check result corresponding to the second preset string after performing the comparison operation corresponding to the string consistency check rule.
For array assembly, for example, an array of "to-do item key, field key, dictionary value" is constructed, in the checking process, since it is necessary to check whether the to-do item key and various loan service item field keys exist for many times, in order to reduce the number of table lookup, task definition job _ definitions table and variable definition variable _ definitions table are associated through callback function, and a new variable array (first array) is added, that is, all the required information can be taken through one query, as shown in fig. 2, the array structure may be as follows:
Figure BDA0002326707180000091
wherein n, x, y and z are positive integers.
During pushing, if the character string key (a first preset character string, a keyword class) is totalAmt, totalAmount and totalArea used for representing the amount of money, the verification can be skipped in advance or the corresponding field key verification result can be ignored after the verification;
for some specific banks, such as the chinese bank, the to-do field must have a "JIE _ KUAN _ REN" field when pushing; for example, the industrial and commercial bank, when pushing, the to-do field must have a "going _ HANG _ JIE _ crank _ REN" field;
an array of field sub-types "entity _ name (field corresponding to entity name)" and entity _ key (field corresponding to entity name) "may also be constructed in the same manner
In order to reduce the number of times of querying the entity name configuration data entry _ config table in the historical configuration data, all field keys under the fund and house entities are also obtained through one query and assigned to the entry array (array of the second type), as shown in fig. 3, and the number corresponding to the field key is an index value.
In the verification process, the sequence of verifying the to-be-handled item key, verifying the fields of the head office and the branch office, verifying the push field (the field corresponding to the push execution policy) and verifying the write-back field (the field corresponding to the write-back execution policy) can be adopted;
the log recording mode of the data platform can be configured, whether the field key exists or not can be judged for more conveniently analyzing the log, different error configuration information can be recorded according to different types of error data, and the specific error field position can be positioned, and the log recording mode can be 'app _ id (data platform application instance identification), backlog key, field key (backlog field, entity field) and dictionary value';
since the configuration storage structure of the push field is a key-value structure, the key and value structures need to be checked respectively, and the processing or mapping used in the check process can be operations such as adding character strings, deleting character strings, updating character strings, designating index values, comparing using check indexes and the like; processing the key character string: checking the corresponding field key dictionary value of the specific character string; processing the key character string: the field key is not required to be checked for the specific character string; processing value string: processing a prefix JOB _ VARS; processing value string: a special field key (second preset character string) of the Chinese bank/the industrial and commercial bank; processing value string: processing a value string prefix JOB _ VARS;
for the verification processing of the write-back field, since the configuration storage structure of the write-back field is also a key-value structure, the key structure and the value structure need to be verified respectively; determining a third field set corresponding to the write-back execution policy in the reference configuration data, and querying a fourth field set corresponding to the write-back execution policy in the historical configuration data;
defining a second check rule, comparing the third field set with the fourth field set according to the second check rule (character string consistency check rule), and updating the check result after the comparison is completed, wherein the second check rule is configured to extract the keyword storage structure distribution of each field set participating in the comparison and check whether the keyword storage structure distribution is the same.
Comparing partial fields belonging to different storage structures in the first field set and the second field set by using the same check rule (for example, character string consistency check is used for all the partial fields), updating the check result after the comparison is completed, jumping to the beginning, and reacquiring new reference configuration data (that is, the previous reference configuration data does not need to include all the reference configuration data for checking the historical configuration data), so as to form a cyclic check process, reduce the data amount processed by each check process, and further configure a parallel process or a concurrency mechanism to realize synchronous multi-batch historical configuration data check, improve the check accuracy and more easily locate wrong configuration data; the same check rule may at least include any one of a string consistency check rule, a string exclusion check rule, a string skip check rule, a string tree check rule, and a string quantity check rule.
If the comparison of various types in the verification process is not passed, the verification result can be of a type and content which are not matched and have errors, corresponding historical configuration data are marked, and prompt information corresponding to a preset receiving object is generated according to the verification result selectively (if the comparison is passed, the generation is not selected); for example, mail notification is carried out, mailbox information of related personnel is configured, and a mail sending interface is called to carry out mail notification on error configuration information.
Example 2
Based on embodiment 1, an embodiment of the present invention provides a storage method for a verification script, where the storage method includes:
writing a timestamp and a check script with a version identifier into block data, and recording the block data by using a storage network with any one consensus algorithm, wherein the check script has an instruction corresponding to the method;
because a large amount of sensitive data related to finance exists in some data platforms (such as data platforms of banks), in order to prevent other processes such as non-verification fields (such as malicious code injection) and the like from being realized by tampering the verification script, the verification script of each approval version can be placed in block data of a private network environment, so that the integrity and consistency of the verification script are ensured; the storage network can belong to a private network environment of a data platform with historical configuration data, a plurality of storage nodes can be arranged in the storage network, the storage nodes complete block data recording through synchronization, verification and other operations by utilizing a consensus algorithm, and the verification server has storage network access authority and can read and execute verification scripts from the block data.
Example 3
Based on embodiment 1, the embodiment of the present invention provides a data verification system, which can be used for configuration verification of various data platforms. The data verification system includes: one or more programs that may perform one or more steps; in some implementations, one or more programs may be a service through some form of processing such as compilation or encryption; the service includes:
the verification service is configured to obtain reference configuration data and determine that the reference configuration data exists in historical configuration data;
the verification service is configured to determine a first field set corresponding to a preset execution policy in the reference configuration data, and query a second field set corresponding to the preset execution policy in the historical configuration data;
the verification service is configured to compare partial fields belonging to the same storage structure in the first field set and the second field set using different verification rules according to the storage structure of the historical configuration data, so as to obtain a verification result of the historical configuration data.
Although the embodiments of the present invention have been described in detail with reference to the accompanying drawings, the embodiments of the present invention are not limited to the details of the above embodiments, and various simple modifications can be made to the technical solutions of the embodiments of the present invention within the technical idea of the embodiments of the present invention, and the simple modifications all belong to the protection scope of the embodiments of the present invention.
It should be noted that the various features described in the above embodiments may be combined in any suitable manner without departing from the scope of the invention. In order to avoid unnecessary repetition, the embodiments of the present invention do not describe every possible combination.
Those skilled in the art will understand that all or part of the steps in the method according to the above embodiments may be implemented by a program, which is stored in a storage medium and includes several instructions to enable a single chip, a chip, or a processor (processor) to execute all or part of the steps in the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
In addition, any combination of various different implementation manners of the embodiments of the present invention is also possible, and the embodiments of the present invention should be considered as disclosed in the embodiments of the present invention as long as the combination does not depart from the spirit of the embodiments of the present invention.

Claims (10)

1. A data verification method is characterized by comprising the following steps:
acquiring reference configuration data, and determining whether the reference configuration data exists in historical configuration data;
determining a first field set corresponding to a preset execution strategy in the reference configuration data, and inquiring a second field set corresponding to the preset execution strategy in the historical configuration data;
and comparing partial fields belonging to the same storage structure in the first field set and the second field set by using different verification rules according to the storage structure of the historical configuration data to obtain a verification result of the historical configuration data.
2. The data verification method according to claim 1, wherein obtaining the reference configuration data specifically comprises:
defining an item field class and a field subset belonging to the item field class according to different processing service data;
selecting partial fields in the field subset as key fields, and determining dictionary values of the key fields;
using the transaction field class, the field subset, and the dictionary value as reference configuration data.
3. The data verification method according to claim 1, wherein determining that the reference configuration data exists in historical configuration data specifically comprises:
defining a first verification rule, wherein the first verification rule comprises: a character string sampling comparison rule or a character string consistency check rule;
and determining that the reference configuration data exists in the historical configuration data by using the first check rule.
4. The data verification method of claim 1, wherein querying a second set of fields in the historical configuration data corresponding to the preset execution policy comprises:
according to the field class and the field of the first field set, in combination with the type of the preset execution strategy, defining a query request with a callback function, wherein the callback function is configured to assemble the field class and the field of the response by an array;
and obtaining a second field set corresponding to the preset execution strategy in the historical configuration data through the query request, wherein the preset execution strategy comprises a push execution strategy.
5. The data verification method of claim 1, wherein comparing partial fields belonging to the same class of storage structures in the first field set and the second field set using different verification rules to obtain verification results of the historical configuration data comprises:
judging that part of fields in the first field set and the second field set belong to a keyword storage structure, performing comparison operation on part of fields in the first field set and the second field set belonging to the keyword storage structure by using a character string consistency check rule and a character string skip check rule to obtain a keyword check result, wherein,
the character string skipping check rule is configured to skip a field having a first preset character string in a part of fields belonging to the keyword storage structure before performing a comparison operation corresponding to the character string consistency check rule, or the character string skipping check rule is configured to ignore a check result corresponding to the first preset character string after performing the comparison operation corresponding to the character string consistency check rule.
6. The data verification method of claim 1, wherein comparing partial fields belonging to the same class of storage structures in the first field set and the second field set using different verification rules to obtain verification results of the historical configuration data comprises:
judging that part of fields in the first field set and the second field set belong to a value class storage structure, performing comparison operation on the part of fields in the first field set and the second field set belonging to the value class storage structure by using a character string consistency check rule and a character string prefix check rule to obtain a value class check result, wherein,
the string prefix check rule is configured to map a field in which a second preset string exists in a part of fields belonging to the value class storage structure before performing a comparison operation corresponding to the string consistency check rule, or the string skip check rule is configured to ignore a check result corresponding to the second preset string after performing the comparison operation corresponding to the string consistency check rule.
7. The data verification method of claim 4, wherein querying for the preset execution policy in the second set of fields in the historical configuration data that corresponds to the preset execution policy further comprises writing back the execution policy;
the data verification method further comprises the following steps:
determining a third field set corresponding to the write-back execution policy in the reference configuration data, and querying a fourth field set corresponding to the write-back execution policy in the historical configuration data;
and defining a second check rule, comparing the third field set with the fourth field set according to the second check rule, and updating the check result after the comparison is completed, wherein the second check rule is configured to extract the keyword storage structure distribution of each field set participating in the comparison and check whether the keyword storage structure distribution is the same.
8. The data verification method of claim 1, further comprising:
and comparing partial fields belonging to different storage structures in the first field set and the second field set by using the same verification rule, and updating the verification result after the comparison is completed.
9. A data verification device, comprising:
at least one processor;
a memory coupled to the at least one processor;
wherein the memory stores instructions executable by the at least one processor, the at least one processor implementing the method of any one of claims 1 to 8 by executing the instructions stored by the memory.
10. A computer readable storage medium storing computer instructions which, when executed on a computer, cause the computer to perform the method of any one of claims 1 to 8.
CN201911319303.9A 2019-12-19 2019-12-19 Data verification method and system Pending CN111159482A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911319303.9A CN111159482A (en) 2019-12-19 2019-12-19 Data verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911319303.9A CN111159482A (en) 2019-12-19 2019-12-19 Data verification method and system

Publications (1)

Publication Number Publication Date
CN111159482A true CN111159482A (en) 2020-05-15

Family

ID=70557358

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911319303.9A Pending CN111159482A (en) 2019-12-19 2019-12-19 Data verification method and system

Country Status (1)

Country Link
CN (1) CN111159482A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112134734A (en) * 2020-09-15 2020-12-25 网宿科技股份有限公司 Configuration method and device of network equipment
CN113064909A (en) * 2021-06-03 2021-07-02 广州宸祺出行科技有限公司 Data synchronization verification method and device
CN113742322A (en) * 2020-11-17 2021-12-03 北京沃东天骏信息技术有限公司 Data quality detection method and device

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105357311A (en) * 2015-11-23 2016-02-24 中国南方电网有限责任公司 Secondary equipment big data storage and processing method by utilizing cloud computing technology
CN107864677A (en) * 2015-07-22 2018-03-30 爱维士软件私人有限公司 Access to content verifies system and method
CN108363640A (en) * 2018-03-01 2018-08-03 深圳市道通智能航空技术有限公司 Data verification method and device, computer readable storage medium
CN109582907A (en) * 2018-12-06 2019-04-05 深圳前海微众银行股份有限公司 Method of calibration, device, equipment and the readable storage medium storing program for executing of web page resources integrality
CN109614327A (en) * 2018-12-06 2019-04-12 北京字节跳动网络技术有限公司 Method and apparatus for output information
CN110287383A (en) * 2019-06-28 2019-09-27 深圳前海微众银行股份有限公司 A kind of field information method of inspection and device
CN110389941A (en) * 2019-06-19 2019-10-29 平安国际智慧城市科技股份有限公司 Database method of calibration, device, equipment and storage medium
CN110442756A (en) * 2019-06-27 2019-11-12 平安科技(深圳)有限公司 Data verification method, device, computer equipment and storage medium

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107864677A (en) * 2015-07-22 2018-03-30 爱维士软件私人有限公司 Access to content verifies system and method
CN105357311A (en) * 2015-11-23 2016-02-24 中国南方电网有限责任公司 Secondary equipment big data storage and processing method by utilizing cloud computing technology
CN108363640A (en) * 2018-03-01 2018-08-03 深圳市道通智能航空技术有限公司 Data verification method and device, computer readable storage medium
CN109582907A (en) * 2018-12-06 2019-04-05 深圳前海微众银行股份有限公司 Method of calibration, device, equipment and the readable storage medium storing program for executing of web page resources integrality
CN109614327A (en) * 2018-12-06 2019-04-12 北京字节跳动网络技术有限公司 Method and apparatus for output information
CN110389941A (en) * 2019-06-19 2019-10-29 平安国际智慧城市科技股份有限公司 Database method of calibration, device, equipment and storage medium
CN110442756A (en) * 2019-06-27 2019-11-12 平安科技(深圳)有限公司 Data verification method, device, computer equipment and storage medium
CN110287383A (en) * 2019-06-28 2019-09-27 深圳前海微众银行股份有限公司 A kind of field information method of inspection and device

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
董渊等: "《Linux系统Motif/OpenGL程序开发》", 机械工业出版社, pages: 125 - 134 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112134734A (en) * 2020-09-15 2020-12-25 网宿科技股份有限公司 Configuration method and device of network equipment
CN113742322A (en) * 2020-11-17 2021-12-03 北京沃东天骏信息技术有限公司 Data quality detection method and device
CN113064909A (en) * 2021-06-03 2021-07-02 广州宸祺出行科技有限公司 Data synchronization verification method and device

Similar Documents

Publication Publication Date Title
US20190327094A1 (en) Information authentication method and system
KR101755365B1 (en) Managing record format information
CN106796585B (en) Conditional validation rules
US20140229456A1 (en) Data quality assessment
CN111159482A (en) Data verification method and system
CN110474900B (en) Game protocol testing method and device
US8904352B2 (en) Systems and methods for processing source code during debugging operations
US20060101452A1 (en) Method and apparatus for preserving dependancies during data transfer and replication
US20230205755A1 (en) Methods and systems for improved search for data loss prevention
US10339035B2 (en) Test DB data generation apparatus
US11086906B2 (en) System and method for reconciliation of data in multiple systems using permutation matching
CN116094849B (en) Application access authentication method, device, computer equipment and storage medium
CN112579591B (en) Data verification method, device, electronic equipment and computer readable storage medium
CN116993523A (en) Configurable account checking method, device, equipment and storage medium
CN114490415A (en) Service testing method, computer device, storage medium, and computer program product
CN110609790A (en) Analytic program test method, device, medium and computer equipment
CN110517010A (en) A kind of data processing method, system and storage medium
CN109165208A (en) It is a kind of for loading data into the method and system in database
CN115203057B (en) Low code test automation method, device, equipment and storage medium
CN108763363B (en) Method and device for checking record to be written
Chen et al. Who Needs the Most Research Effort? Investigating the Importance of Smart Contract Weaknesses
CN117370160A (en) Code auditing method, apparatus, computer device, storage medium and program product
CN116340430A (en) Data synchronization verification method and related equipment
CN117271487A (en) Service data verification method, device, equipment and storage medium
CN116881164A (en) Verification and correction method, device and equipment for test data in financial information system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination