CN102103639A - Data verification method and device - Google Patents

Data verification method and device Download PDF

Info

Publication number
CN102103639A
CN102103639A CN 201110035062 CN201110035062A CN102103639A CN 102103639 A CN102103639 A CN 102103639A CN 201110035062 CN201110035062 CN 201110035062 CN 201110035062 A CN201110035062 A CN 201110035062A CN 102103639 A CN102103639 A CN 102103639A
Authority
CN
China
Prior art keywords
identifying object
proof
configuration file
proof rule
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN 201110035062
Other languages
Chinese (zh)
Inventor
姚博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN 201110035062 priority Critical patent/CN102103639A/en
Publication of CN102103639A publication Critical patent/CN102103639A/en
Priority to PCT/CN2012/070268 priority patent/WO2012100681A1/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Bioethics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Health & Medical Sciences (AREA)
  • Storage Device Security (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention provides a data verification method and a data verification device. The data verification method comprises the following steps of: receiving information to be verified; constructing a verification object by using the received information to be verified; acquiring a verification rule configuration file corresponding to the verification object; and verifying the verification object by using the acquired verification rule configuration file. The data verification method and the data verification device improve the reusability and the maintainability of verification.

Description

Data verification method and device
Technical field
The present invention relates to a kind of data verification method and device.
Background technology
In the network correlative technology field, often need verify the information of user's input.In common Information Authentication method, each field that need verify is carried out one by one.For example,, then utilize verification method B that field B is verified, utilize verification method C that field C is verified at last when judgement exists A, B, when three fields of C need be verified, at first utilizes verification method A that field A is verified.Therefore, when needs are verified some fields, need safeguard a large amount of verification methods, cause maintenance cost to increase in the day after tomorrow.
Adopt multiple-limb checking flow process in above-mentioned verification method, field is many more, and branch is many more, and the verification method that system need safeguard is also many more.It is too fat to move and difficult in maintenance that system can become, and be difficult to expansion, and efficient is not high yet.
In order to overcome the problem that above-mentioned verification method exists, in application number is the patented claim of CN 200810227933.9, disclose a kind of data verification method and improved maintainability and extensibility.
At application number is in the patented claim disclosed method of CN 200810227933.9, adopts unified checking label and unified checking interface to realize unified data verification mechanism.This method at first utilizes unified checking label isNameExist to identify the field that all need carry out the checking of data repeatability, obtain the unified checking interface of the field that need carry out the repeatability checking then, and call the pairing proof rule of unified checking interface the field that needs carry out the checking of data repeatability is verified.
Yet, in above-mentioned verification method, still have following subject matter.First, because a plurality of fields are adopted a unified checking interface, so can't adopt optimal proof rule to each field in these a plurality of fields, for example may have a lot of names in each checking is the field information of name, but each verifying logic is all incomplete same, so unified checking interface is difficult to these field informations are adopted optimal proof rule.The second, this method is still verified label by the reference unification and each field of needs checking is called unification verify interface, thereby reduced verification efficiency.
Summary of the invention
In order to solve above-mentioned shortcoming of the prior art and problem the present invention is proposed.
According to an aspect of the present invention, provide a kind of data verification method, described method can comprise:
Receive information to be verified;
Utilize the information architecture identifying object to be verified that is received;
Obtain and the corresponding proof rule configuration file of described identifying object; And
Utilize the proof rule configuration file that is obtained that described identifying object is verified.
According to this aspect of the present invention, described proof rule configuration file can comprise a plurality of proof rules, and an attribute of the one or more and described identifying object in described a plurality of proof rules is associated.Described a plurality of proof rule can comprise default authentication rule and self-defined proof rule.
In addition, when to described identifying object authentication failed, can output error message.Described error message can be derived from described proof rule configuration file.
According to another aspect of the present invention, provide a kind of data verification device, described device can comprise:
The verification msg input block is used to receive information to be verified;
The identifying object construction unit is used to receive the information of submitting to from described verification msg input block described to be verified and utilizes described information architecture identifying object to be verified;
Proof rule is provided with the unit, is used to safeguard at least one proof rule configuration file; And
Authentication unit, be used for the unit being set and obtain and the corresponding proof rule configuration file of described identifying object that makes up by described identifying object construction unit, and utilize the proof rule configuration file that is obtained that described identifying object is verified from described proof rule.
According to this aspect of the present invention, described proof rule configuration file can comprise a plurality of proof rules, and an attribute of the one or more and described identifying object in described a plurality of proof rules is associated.Described a plurality of proof rule can comprise default authentication rule and self-defined proof rule.
In addition, described data verification device may further include checking result treatment unit, and when described authentication unit during to described identifying object authentication failed, output error message.And described error message is derived from described proof rule configuration file.
Description of drawings
By the description of carrying out below in conjunction with accompanying drawing, above-mentioned and other aspects of some one exemplary embodiment of the present invention, feature and advantage will become apparent to those skilled in the art, wherein:
Fig. 1 is the block diagram of diagram according to data verification device of the present invention;
Fig. 2 is that diagram is used for the synoptic diagram according to the checking configuration file of data verification device of the present invention; And
Fig. 3 is the process flow diagram of diagram according to data verification method of the present invention.
Embodiment
Describing below to help complete understanding one exemplary embodiment of the present invention with reference to the accompanying drawings is provided.It comprises various details to help understanding, and they should be thought it only is exemplary.Therefore, those of ordinary skills will be appreciated that, can make various changes and modification to the embodiments described herein, and can not deviate from scope and spirit of the present invention.Equally, for clarity and conciseness, omitted description to known function and structure.
Describe the present invention below with reference to the accompanying drawings in detail.
Fig. 1 is the block diagram of diagram according to data verification device of the present invention.As shown in fig. 1, data verification device comprises that verification msg input block 110, identifying object construction unit 120, authentication unit 130 and proof rule are provided with unit 140.
Verification msg input block 110 can generate the graphic user interface that is used for input validation information.The graphic user interface that is generated can comprise a plurality of fields of importing various information for the user, be registered as example with the user, verification msg input block 110 can generate user's enrollment page, and user's register interface can comprise fields such as user name, password, mailbox, identifying code.After graphic user interface was imported various information, verification msg input block 110 can be submitted to identifying object construction unit 120 with the various information of being imported the user.Register in the example above-mentioned user, can the user after user's register interface is imported various information, the various information of being imported be submitted to identifying object construction unit 120 by clicking " registration " button on user's register interface.
Receiving after the information that verification msg input block 110 is submitted to, identifying object construction unit 120 for example can be that the property value of the corresponding attribute of identifying object makes up identifying object by the information setting that will import in each field according to the information architecture identifying object that is received.
Authentication unit 130 is used for the identifying object that identifying object construction unit 120 makes up is verified.Authentication unit 130 can obtain and the corresponding proof rule configuration file of constructed identifying object from proof rule dispensing unit 140.Wherein, proof rule dispensing unit 140 can be safeguarded at least one proof rule configuration file, and described at least one proof rule configuration file is by filename and corresponding with identifying object.In addition, each proof rule configuration file can comprise a plurality of proof rules, an attribute of the one or more and described identifying object in described a plurality of proof rule is associated, subsequently will with reference to one or more how being associated with an attribute of described identifying object in a plurality of proof rules of figure 2 detailed descriptions.
Authentication unit 130 can adopt variety of way to obtain and the corresponding proof rule configuration file of constructed identifying object from proof rule dispensing unit 140, for example can obtain and the corresponding proof rule configuration file of constructed identifying object according to following example code:
<bean id=″formService″
class=″com.jd.website.commons.validator.DefaultFormService?″>
<property?name=″filePath″>
<list>
<!--configuration file--〉
<value>form/registerForm.xml</value>
</list>
</property>
</bean>
Wherein, indicate the identifying object title, and indicate the pairing proof rule configuration file of this identifying object by form/registerForm.xml by id=" formService ".
Certainly authentication unit 130 obtains with the corresponding proof rule configuration file of constructed identifying object from proof rule dispensing unit 140 and is not limited to aforesaid way.
After obtaining the proof rule configuration file, authentication unit 130 is verified identifying object according to the proof rule (being described below with reference to Fig. 2) that each attribute that is identifying object in the proof rule configuration file is provided with, and output checking result.For example, after identifying object was proved to be successful, the checking result can be " true ", and after to the identifying object authentication failed, verifies that the result can be authentication error information, and this authentication error information can be from the proof rule configuration file.
Data verification device may further include checking result treatment unit 150, and it is handled according to the checking result from authentication unit 130.For example, when being proved to be successful, can continue other process, for example register in the example, can forward to and only allow in the interface that the registered user checks the user; When authentication failed, can export authentication error information, for example will roll back to front end and show error message behind the authentication error information secondary rendering as the checking result.
Below, with reference to figure 2 the checking configuration file is described.Fig. 2 diagram is used for the synoptic diagram according to the proof rule configuration file of data verification device of the present invention.Checking configuration file shown in Figure 2 comprises the configuration block 1-configuration block 4 that is used for the corresponding proof rule of each attribute configuration of identifying object.
Configuration block 1 is provided with the proof rule that is associated with the attribute " username " of identifying object, wherein by<validator required=" true "〉this attribute is set sky can not be be, by<validator minLength=" 4 " maxLength=" 20 "〉length that this attribute is set must be greater than 4 and less than 20.
Configuration block 2 is provided with the proof rule that is associated with the attribute " password " of identifying object, wherein by<validator required=" true "〉this attribute is set sky can not be be, by<validator minLength=" 6 " maxLength=" 16 "〉length that this attribute is set must be greater than 6 and less than 16.
Configuration block 3 is provided with the proof rule that is associated with the attribute " email " of identifying object, wherein by<validator required=" true "〉this attribute is set sky can not be be, by<validator maxLength=" 50 "〉length that this attribute is set must be less than 50 characters, by<validator pattern=" ^[A-Za-z0-9]+([+._] w*) * w+ ([.] w+) *. w+ ([.] w+) * " be provided with this attribute is carried out the regular expression verification.
Configuration block 4 is provided with the proof rule that is associated with the attribute " checkCode " of identifying object, wherein by<validator required=" true "〉this attribute is set sky can not be be, by<validator type=" com.jd.website.apply.web.validator.CheckCode Validator "〉be provided with this attribute is carried out self-defined checking (will describe in detail after a while).
In addition, configuration block 1-configuration block 4 respectively by " message " node definition the error message that when authentication failed, will export, “ ${displayName} wherein " corresponding to the title of attribute.
From top description as can be known, the proof rule of each attribute of identifying object is provided with by " type " attribute in " validator " node, has adopted 4 default authentication devices (being equal to the implication of proof rule) as follows in the present invention:
Figure BSA00000431476100071
When be not suitable for adopting in above-mentioned 4 default authentication devices any one the time, can adopt self-defined validator, for example the self-defined validator that adopts in Shang Mian the configuration block 4.Can define self-defined validator as required arbitrarily, following example is the self-defined validator that has defined the proof rule that adopts in configuration block 4:
package?com.jd.website.apply.web.validator;
import?org.apache.commons.lang.StringUtils;
import?com.jd.website.commons.validator.check.DefaultValidator;
import?com.jd.website.commons.validator.form.Field;
public?class?CheckCodeValidator?extends?DefaultValidator{
private?final?static?String?CHECK_CODE?=″8888″;
@Override
protected?boolean?validator(Field?field){
String?value=field.getStringValue();
if(StringUtils.isNotBlank(value)&&StringUtils.equals
(CHECK_CODE,value)){
return?true;
}
return?false;
}
}
Above exemplary definition only accept the self-defined validator CheckCodeValidator of identifying code " 8888 ".Can define other self-defined validator in a similar fashion.
In addition, in order to increase the applicability, dirigibility etc. of checking configuration rule, can realize configuration by the succession mode to the proof rule of similar identifying object.
For example, when superincumbent user registers in the example, need to increase checking " age " and verifying logic of other checking remains unchanged, then can be by with the realization of getting off:
<?xml?version=″1.0″encoding=″GBK″?>
<forms>
<!--registration--〉
<form?name=″registerForm″></form>
<form?name=”registerForm2”extends=”registerForm”>
<field name=" age " displayName=" age "
<validator?required=”true”>
<message〉${displayname} could not be sky!</message 〉
</validator>
……
</field>
</form>
</forms>
By above description as can be seen, data verification device according to the present invention has in detail accurately defined the proof rule that is associated with each attribute of corresponding identifying object by the proof rule configuration file.At first, owing to one or more proof rules are associated with each attribute, so can carry out optimal checking to each attribute of identifying object.In addition, when needs change verifying logic, only need to change the proof rule in the configuration file.The 3rd, when existing a plurality of registrations to enter the mouth, only need multiplexing configuration file to get final product.Therefore, the reusability and the maintainability of checking have been improved.
Describe according to data verification method of the present invention with reference to Fig. 3 below.Fig. 3 is the process flow diagram of diagram according to data verification method of the present invention.
At step S310, receive information to be verified.Information to be verified can be that the user passes through the information imported in each field of graphic user interface.Its detailed process can be with reference to the description of carrying out about verification msg input block 110.
At step S320, utilize the information architecture identifying object to be verified that is received.For example, can be by will being that the property value of the corresponding attribute of identifying object makes up identifying object by information setting in each field input of graphic user interface.
At step S330, obtain and the corresponding proof rule configuration file of constructed identifying object.For example can obtain by the file filename of proof rule configuration file and the corresponding proof rule configuration file of identifying object.As described above, each proof rule configuration file can comprise a plurality of proof rules, and an attribute of the one or more and described identifying object in described a plurality of proof rules is associated.Its detailed process can be with reference to the description of carrying out about proof rule dispensing unit 140 and Fig. 2.
At step S340, utilize the proof rule configuration file that is obtained that described identifying object is verified.Its detailed process can be with reference to the description of carrying out about authentication unit 130 and Fig. 2.
At step S350, the result has handled according to checking.For example, when being proved to be successful, can continue other process, for example register in the example, can forward to and only allow in the interface that the registered user checks the user; When authentication failed, can export authentication error information, for example will roll back to front end and show error message behind the authentication error information secondary rendering as the checking result.
Respectively apparatus and method embodiment of the present invention is described above being to be noted that, but the details that an embodiment is described also can be applicable to another embodiment.
Ultimate principle of the present invention has below been described in conjunction with specific embodiments, but, it is to be noted, for those of ordinary skill in the art, can understand the whole or any steps or the parts of method and apparatus of the present invention can be realized with software, hardware, firmware or their combination, and this is that those of ordinary skills use their basic programming skill just can realize under the situation of having read explanation of the present invention.
Therefore, purpose of the present invention can also realize by a software module of operation or one group of software module on any calculation element.Described calculation element can be known fexible unit.Therefore, purpose of the present invention also can be only by providing the program product that comprises the program code of realizing described method or device to realize.That is to say that such program product also constitutes the present invention, and the storage medium that stores such program product also constitutes the present invention.Obviously, described storage medium can be any storage medium that is developed in any known storage medium or future.
Though this instructions comprises many specific implementations details, but these details should be interpreted as the restriction of the scope of the content that maybe can advocate any invention, and should be interpreted as can be specific to the description of the feature of the specific embodiment of specific invention.Some characteristics combination of describing in the situation of the embodiment that separates in this manual can also be realized in single embodiment.On the contrary, also each feature of describing in the situation of single embodiment can be realized in a plurality of embodiments discretely or in any suitable sub-portfolio, realizes.In addition, work although may describe feature as in the above in some combination, even initial opinion so, but can in some cases the one or more features from the combination of being advocated be left out from combination, and the combination of being advocated can be pointed to the variant of sub-portfolio or sub-portfolio.
Similarly, though described operation with certain order in the accompanying drawings, this should be interpreted as need with shown in certain order or carry out such operation or need to carry out the result that all illustrated operations just can reach expectation with continuous order.In some cases, multitask and parallel processing can be favourable.In addition, the separation of in the above-described embodiments various system components should be interpreted as and all need such separation in all embodiments, and should be understood that, usually can be with described program assembly and the system integration to becoming single software product together or being encapsulated as a plurality of software products.
Computer program (being also referred to as program, software, software application, script or code) can be write by programming language in any form, described programming language comprises compiling or interpretative code or illustrative or procedural language, and it can be disposed in any form, comprises as stand-alone program or as module, assembly, subroutine or other unit of being suitable for using in computing environment.Computer program there is no need corresponding to the file in the file system.Can be at the file that keeps other program or data (for example with procedure stores, be stored in the one or more scripts in the marking language document) a part, the single file that is exclusively used in question program or a plurality of coordinative file (for example, storing the file of one or more modules, subroutine or partial code) in.
Above-mentioned embodiment does not constitute limiting the scope of the invention.Those skilled in the art should be understood that, depend on designing requirement and other factors, and various modifications, combination, sub-portfolio and alternative can take place.Any modification of being done within the spirit and principles in the present invention, be equal to and replace and improvement etc., all should be included within the protection domain of the present invention.

Claims (10)

1. data verification method, described method comprises:
Receive information to be verified;
Utilize the information architecture identifying object to be verified that is received;
Obtain and the corresponding proof rule configuration file of described identifying object; And
Utilize the proof rule configuration file that is obtained that described identifying object is verified.
2. method according to claim 1, wherein, described proof rule configuration file comprises a plurality of proof rules, an attribute of the one or more and described identifying object in described a plurality of proof rules is associated.
3. method according to claim 2, wherein, described a plurality of proof rules comprise default authentication rule and self-defined proof rule.
4. method according to claim 1, wherein, when to described identifying object authentication failed, output error message.
5. method according to claim 4, wherein, described error message is derived from described proof rule configuration file.
6. data verification device, described device comprises:
The verification msg input block is used to receive information to be verified;
The identifying object construction unit is used to receive the information of submitting to from described verification msg input block described to be verified and utilizes described information architecture identifying object to be verified;
Proof rule is provided with the unit, is used to safeguard at least one proof rule configuration file; And
Authentication unit, be used for the unit being set and obtain and the corresponding proof rule configuration file of described identifying object that makes up by described identifying object construction unit, and utilize the proof rule configuration file that is obtained that described identifying object is verified from described proof rule.
7. device according to claim 6, wherein, described proof rule configuration file comprises a plurality of proof rules, an attribute of the one or more and described identifying object in described a plurality of proof rules is associated.
8. device according to claim 7, wherein, described a plurality of proof rules comprise default authentication rule and self-defined proof rule.
9. device according to claim 6, wherein, described data verification device further comprises checking result treatment unit, and when described authentication unit during to described identifying object authentication failed, output error message.
10. device according to claim 9, wherein, described error message is derived from described proof rule configuration file.
CN 201110035062 2011-01-26 2011-01-26 Data verification method and device Pending CN102103639A (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN 201110035062 CN102103639A (en) 2011-01-26 2011-01-26 Data verification method and device
PCT/CN2012/070268 WO2012100681A1 (en) 2011-01-26 2012-01-12 Data verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN 201110035062 CN102103639A (en) 2011-01-26 2011-01-26 Data verification method and device

Publications (1)

Publication Number Publication Date
CN102103639A true CN102103639A (en) 2011-06-22

Family

ID=44156409

Family Applications (1)

Application Number Title Priority Date Filing Date
CN 201110035062 Pending CN102103639A (en) 2011-01-26 2011-01-26 Data verification method and device

Country Status (2)

Country Link
CN (1) CN102103639A (en)
WO (1) WO2012100681A1 (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012100681A1 (en) * 2011-01-26 2012-08-02 北京京东世纪贸易有限公司 Data verification method and device
CN103106186A (en) * 2013-01-22 2013-05-15 百度在线网络技术(北京)有限公司 Form verification method and form verification system
CN104391934A (en) * 2014-11-21 2015-03-04 深圳市银雁金融配套服务有限公司 Data calibration method and device
CN105760976A (en) * 2014-12-17 2016-07-13 阿里巴巴集团控股有限公司 Method and system for service verification
CN105827563A (en) * 2015-01-04 2016-08-03 中国移动通信集团江西有限公司 Information verification method, intermediate platform and business support system
CN106502992A (en) * 2016-11-10 2017-03-15 四川享宇金信金融服务外包有限公司 A kind of information intersects checking method and device
CN107315958A (en) * 2016-04-26 2017-11-03 北京京东尚科信息技术有限公司 The legality identification method and device of data object
CN107395623A (en) * 2017-08-18 2017-11-24 广州视源电子科技股份有限公司 Interface access data verification method and device, computer-readable storage medium and equipment
CN107423056A (en) * 2017-06-30 2017-12-01 北京五八信息技术有限公司 Input content verification method and device
CN107957871A (en) * 2017-11-15 2018-04-24 杭州安恒信息技术有限公司 A kind of front and back end synchronization canonical method of calibration based on JSR303
CN108009042A (en) * 2016-10-27 2018-05-08 北京京东尚科信息技术有限公司 The method and device of data check
CN108959218A (en) * 2018-04-26 2018-12-07 北京五八信息技术有限公司 Form validation method and device, electronic equipment and computer readable storage medium
CN109118159A (en) * 2018-06-26 2019-01-01 珠海宏桥高科技有限公司 A kind of self-verifying method and device of clearance data
CN109190396A (en) * 2018-08-27 2019-01-11 杭州安恒信息技术股份有限公司 A kind of data automatic verification method, device and equipment
CN109783751A (en) * 2018-12-14 2019-05-21 平安普惠企业管理有限公司 Form validation method and terminal device
CN109901892A (en) * 2017-12-11 2019-06-18 北京京东尚科信息技术有限公司 A kind of method and apparatus of dynamic attribute verifying
CN110020381A (en) * 2018-02-23 2019-07-16 中国平安财产保险股份有限公司 Method of calibration, device, equipment and computer storage medium based on configuration file
CN110233842A (en) * 2019-06-10 2019-09-13 腾讯科技(深圳)有限公司 A kind of method of calibration and relevant apparatus of request

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101576823A (en) * 2009-06-11 2009-11-11 阿里巴巴集团控股有限公司 Method for verifying form control and device
CN101753605A (en) * 2008-12-02 2010-06-23 北大方正集团有限公司 Data validation method and server

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101197875A (en) * 2007-12-26 2008-06-11 华为技术有限公司 Partial data checking method and device
CN101727466A (en) * 2008-10-31 2010-06-09 北大方正集团有限公司 Method and device for verifying service data object
CN102103639A (en) * 2011-01-26 2011-06-22 北京京东世纪贸易有限公司 Data verification method and device

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753605A (en) * 2008-12-02 2010-06-23 北大方正集团有限公司 Data validation method and server
CN101576823A (en) * 2009-06-11 2009-11-11 阿里巴巴集团控股有限公司 Method for verifying form control and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
《中国优秀硕士学位论文全文数据库》 20050915 李扬 扩展与整合Web应用框架的研究与实践 1-10 , *
《中国优秀硕士学位论文全文数据库》 20080915 王飞 Struts轻量级框架研究及其在职业鉴定系统中的应用 第5章 1-10 , *

Cited By (24)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2012100681A1 (en) * 2011-01-26 2012-08-02 北京京东世纪贸易有限公司 Data verification method and device
CN103106186A (en) * 2013-01-22 2013-05-15 百度在线网络技术(北京)有限公司 Form verification method and form verification system
CN104391934A (en) * 2014-11-21 2015-03-04 深圳市银雁金融配套服务有限公司 Data calibration method and device
CN104391934B (en) * 2014-11-21 2016-03-16 深圳市银雁金融服务有限公司 Data verification method and device
CN105760976B (en) * 2014-12-17 2022-04-19 创新先进技术有限公司 Service checking method and system
CN105760976A (en) * 2014-12-17 2016-07-13 阿里巴巴集团控股有限公司 Method and system for service verification
CN105827563A (en) * 2015-01-04 2016-08-03 中国移动通信集团江西有限公司 Information verification method, intermediate platform and business support system
CN105827563B (en) * 2015-01-04 2019-04-02 中国移动通信集团江西有限公司 Information Authentication method, halfpace and business support system
CN107315958A (en) * 2016-04-26 2017-11-03 北京京东尚科信息技术有限公司 The legality identification method and device of data object
CN108009042A (en) * 2016-10-27 2018-05-08 北京京东尚科信息技术有限公司 The method and device of data check
CN106502992A (en) * 2016-11-10 2017-03-15 四川享宇金信金融服务外包有限公司 A kind of information intersects checking method and device
CN107423056A (en) * 2017-06-30 2017-12-01 北京五八信息技术有限公司 Input content verification method and device
CN107395623A (en) * 2017-08-18 2017-11-24 广州视源电子科技股份有限公司 Interface access data verification method and device, computer-readable storage medium and equipment
CN107395623B (en) * 2017-08-18 2020-08-28 广州视源电子科技股份有限公司 Interface access data verification method and device, computer storage medium and equipment
CN107957871A (en) * 2017-11-15 2018-04-24 杭州安恒信息技术有限公司 A kind of front and back end synchronization canonical method of calibration based on JSR303
CN107957871B (en) * 2017-11-15 2020-09-22 杭州安恒信息技术股份有限公司 Front-end and back-end synchronous regular checking method based on JSR303
CN109901892A (en) * 2017-12-11 2019-06-18 北京京东尚科信息技术有限公司 A kind of method and apparatus of dynamic attribute verifying
CN110020381A (en) * 2018-02-23 2019-07-16 中国平安财产保险股份有限公司 Method of calibration, device, equipment and computer storage medium based on configuration file
CN108959218A (en) * 2018-04-26 2018-12-07 北京五八信息技术有限公司 Form validation method and device, electronic equipment and computer readable storage medium
CN109118159A (en) * 2018-06-26 2019-01-01 珠海宏桥高科技有限公司 A kind of self-verifying method and device of clearance data
CN109190396A (en) * 2018-08-27 2019-01-11 杭州安恒信息技术股份有限公司 A kind of data automatic verification method, device and equipment
CN109783751A (en) * 2018-12-14 2019-05-21 平安普惠企业管理有限公司 Form validation method and terminal device
CN110233842A (en) * 2019-06-10 2019-09-13 腾讯科技(深圳)有限公司 A kind of method of calibration and relevant apparatus of request
CN110233842B (en) * 2019-06-10 2021-07-27 腾讯科技(深圳)有限公司 Request verification method and related device

Also Published As

Publication number Publication date
WO2012100681A1 (en) 2012-08-02

Similar Documents

Publication Publication Date Title
CN102103639A (en) Data verification method and device
KR102621900B1 (en) Maintaining transaction account data using blockchain
US10567320B2 (en) Messaging balancing and control on blockchain
TWI820024B (en) Trustless deterministic state machine
CN103026684B (en) For defending the method and apparatus of cross-site scripting attack
US10318285B1 (en) Deployment of infrastructure in pipelines
CN110597925B (en) Cross-chain data processing method and device based on block chain
CN111771354A (en) Single sign-on scheme using blockchains
CN106407795A (en) Data existence authentication system, authentication method and verification method
US20220398592A1 (en) Peer-to-peer money transfers
CN108897691A (en) Data processing method, device, server and medium based on interface analog service
CN102855304A (en) Variable-clause electronic contract automatic generation method in business to customer (B2C) transaction
US20190165950A1 (en) Decoupling and updating pinned certificates on a mobile device
CN110808840B (en) Service processing method and device, electronic equipment and storage medium
US9418241B2 (en) Unified platform for big data processing
CN103152365A (en) Data validation method for validating data and server for validating data
CN106161367A (en) A kind of verifying dynamic password method and system, client and server
US20070143330A1 (en) Processing an XML schema
CN104702677A (en) Method, device and system for treating link
TW201232404A (en) Software development
US9535824B2 (en) Payload generation for computer software testing
US20100223469A1 (en) Method, System and Computer Program Product for Certifying Software Origination
CN108596557A (en) A kind of method and system for realizing event flow based on tree
CN107171808A (en) A kind of verification method and device of electronic record authenticity
CN108710658B (en) Data record storage method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 1154089

Country of ref document: HK

RJ01 Rejection of invention patent application after publication

Application publication date: 20110622

RJ01 Rejection of invention patent application after publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: WD

Ref document number: 1154089

Country of ref document: HK