CN103020269B - A kind of method of data verification and device - Google Patents
A kind of method of data verification and device Download PDFInfo
- Publication number
- CN103020269B CN103020269B CN201210575680.0A CN201210575680A CN103020269B CN 103020269 B CN103020269 B CN 103020269B CN 201210575680 A CN201210575680 A CN 201210575680A CN 103020269 B CN103020269 B CN 103020269B
- Authority
- CN
- China
- Prior art keywords
- verified
- data
- dimension
- unit
- metadata
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Management, Administration, Business Operations System, And Electronic Commerce (AREA)
Abstract
The present invention relates to computer realm, disclose method and the device of a kind of data verification, the method includes: receive information to be verified, according to the data type of described information to be verified, builds object to be verified;According to the data type of described object to be verified, obtain the dimension configuration data of described object to be verified;Configure data according to described dimension, determine at least one dimension to be verified and the default proof rule of described dimension to be verified;According to the default proof rule of described dimension to be verified, obtain the metadata of described dimension to be verified;According to described default proof rule and the metadata of described acquisition, determine the Credential data of described dimension to be verified;According to described Credential data, verify described object to be verified, export the result.Apply this technical program that the accuracy of data verification and the efficiency of checking when data verification, can be improved, reduce human cost.
Description
Technical field
The present invention relates to computer realm, particularly to method and the device of a kind of data verification.
Background technology
In today of network high-speed development, enterprise is required for obtaining various different number in different approach
According to.Due to the difference of Data Source, all there is big and small difference in various data, even there is falseness
Data.And if these data are the association by the sector or government's offer, then these data are relatively
Accurately, but the data type of these data is relatively limited, is not enough to enterprise and formulates decision-making according to these data.
At this moment, enterprise needs to utilize the approach such as extracted line, enterprise or individual and research and analysis statistics,
Obtain more data, but the data precision obtained through these approach is the highest, just can need to make through checking
With.
At present, data are verified by the experience personnel that have that can only lean on association area.But due to association area
Peopleware and experience uneven, the accuracy of data cannot be guaranteed, and human cost
Height, verification efficiency is low with speed.
Summary of the invention
The embodiment of the present invention the first purpose is to provide a kind of data verification method, applies this technical scheme can
With when data verification, improve the accuracy of data verification and the efficiency of checking, reduce human cost.
The embodiment of the present invention the second purpose is to provide a kind of data verification device, applies this technical scheme can
With when data verification, improve the accuracy of data verification and the efficiency of checking, reduce human cost.The
On the one hand, present embodiments provide
First aspect, a kind of method present embodiments providing data verification, including:
Receive information to be verified, according to the data type of described information to be verified, build object to be verified;
According to the data type of described object to be verified, obtain the dimension configuration data of described object to be verified,
Described default dimension configuration data are stored in data base;
Configure data according to described dimension, determine at least one dimension to be verified and described dimension to be verified
The default proof rule of degree;
According to the default proof rule of described dimension to be verified, obtain the metadata of described dimension to be verified;
According to described default proof rule and the metadata of described acquisition, determine described dimension to be verified
Credential data;
According to described Credential data, verify described object to be verified, export the result.
In conjunction with first aspect, under the first implementation, the described data according to described object to be verified
Type, obtains the dimension configuration data of described object to be verified, specifically includes:
According to the data type of described object to be verified, the dimension inquiring about described data type correspondence default is joined
Put data, obtain the dimension configuration data of described object to be verified.
In conjunction with first aspect, under the second implementation, described presetting according to described dimension to be verified
Proof rule, obtains the metadata of described dimension to be verified, specifically includes:
According to the default proof rule of described dimension to be verified, the data that inquiry is stored in data base, obtain
Take the metadata of described dimension to be verified.
In conjunction with first aspect, under the third implementation, described default proof rule includes: described unit
Data acquisition rule and described Credential data determine rule.
In conjunction with first aspect, under the 4th kind of implementation, described according to described Credential data, verify institute
State object to be verified, export the result, specifically include:
According to the span of described Credential data, verify that whether the data value of described object to be verified exists
In described span, if it is, the result that output is verified;Otherwise, treat according to described
The proof rule of checking dimension, the result that output checking is not passed through;
Wherein, the result that described checking is not passed through is checking that described dimension to be verified is pre-seted
Result.
Second aspect, present embodiments provides a kind of data verification device, including:
Information receiving unit, is used for receiving information to be verified;
Object construction unit, electrically connects with described information receiving unit, for according to described information to be verified
Data type, build object to be verified;
Dimension configuration data capture unit, electrically connects with described object construction unit, for treating described in basis
The data type of identifying object, obtains the dimension configuration data of described object to be verified;
Dimensional information determines unit, electrically connects, for according to described dimension with described dimension configuration acquiring unit
Degree configuration data, determine the default checking rule of at least one dimension to be verified and described dimension to be verified
Then;
With described dimensional information, metadata acquiring unit, determines that unit electrically connects, for according to described to be tested
The default proof rule of card dimension, obtains the metadata of described dimension to be verified;
Credential data determines unit, determines unit, metadata acquiring unit electricity respectively with described dimensional information
Connect, for according to described default proof rule and the metadata of described acquisition, determine described to be verified
The Credential data of dimension, described dimension configuration data are stored in advance in data base;
With described Credential data, authentication unit, determines that unit electrically connects, be used for according to described Credential data,
Verify described object to be verified, be verified result.
Output unit, electrically connects with described authentication unit, is used for exporting described the result.
In conjunction with second aspect, under the first implementation, described dimension configuration data capture unit is concrete
For: according to the data type of described object to be verified, inquire about the dimension that described data type correspondence is preset
Configuration data, obtain the dimension configuration data of described object to be verified.
In conjunction with second aspect, under the second implementation, described metadata acquiring unit specifically for:
According to the default proof rule of described dimension to be verified, the data that inquiry is stored in data base, obtain institute
State the metadata of dimension to be verified.
In conjunction with second aspect, under the third implementation, described default proof rule includes: described unit
Data acquisition rule and described Credential data determine rule.
In conjunction with second aspect, under the 4th kind of implementation, described authentication unit specifically for: according to institute
State the span of Credential data, verify that whether the data value of described object to be verified is at described value model
In enclosing, if it is, obtain the result being verified;Otherwise testing according to described dimension to be verified
Card rule, it is thus achieved that the result that checking is not passed through.
In conjunction with the 4th kind of implementation of second aspect, under the 5th kind of implementation, described output unit
Specifically for: the result that the result being verified described in output or described checking are not passed through.
Therefore, use the technical program, when data verification, it is only necessary to by data input to be verified
In checking device, can build object to be verified according to the data type of information to be verified, this is to be tested
Demonstrate,prove the dimension to be verified that object is at least provided with.Each dimension to be verified pre-sets proof rule,
According to this proof rule, from data base, obtain the metadata under this dimension.The metadata of this dimension according to
The proof rule of this dimension, draws the Credential data of this dimension, compares Credential data and object to be verified,
Can show that this object to be verified is the most accurate, so that it is determined that this information to be verified is the most accurate, it is achieved number
According to checking.
Compared to prior art, employee verify that data are whether accurate by rule of thumb, technical solution of the present invention by
Multiple dimensions obtain multiple Credential data, relatively data to be verified and multiple Credential data, thus obtain and test
Card result.Data to be verified more can comprehensively comprehensively be verified by technical solution of the present invention, it is to avoid due to
Peopleware or experience uneven and cause data verification forbidden.Improve data verification accuracy rate and
The efficiency of data verification, reduction human cost.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to reality
Execute the required accompanying drawing used in example or description of the prior art to be briefly described, it should be apparent that below,
Accompanying drawing in description is only some embodiments of the present invention, for those of ordinary skill in the art,
On the premise of not paying creative work, it is also possible to obtain other accompanying drawing according to these accompanying drawings.
The schematic flow sheet of a kind of data verification method that Fig. 1 provides for the embodiment of the present invention 1.
The structural representation of a kind of data verification device that Fig. 2 provides for the embodiment of the present invention 2.
Detailed description of the invention
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out
Clearly and completely describe, it is clear that described embodiment is only a part of embodiment of the present invention, and
It is not all, of embodiment.Based on the embodiment in the present invention, those of ordinary skill in the art are not making
Go out the every other embodiment obtained under creative work premise, broadly fall into the scope of protection of the invention.
Embodiment 1:
Seeing Fig. 1, the present embodiment provides a kind of method of data verification, and its step includes:
Step 101: receive information to be verified.
In the present embodiment, information to be verified can be, but not limited to be inputted by user or according to the data set
Type gathers on the internet and inputs.This information to be verified can be, but not limited to include: extracted line,
The data message that enterprise or individual and research and analysis add up.
When this information to be verified inputs, can be, but not limited to the data type of this information to be verified is carried out
Arrange.
Step 102: according to the data type of information to be verified, builds object to be verified.
In the present embodiment, each information to be verified is owned by a data type, each data type
Pre-set structure rule.This information to be verified is according to the structure rule of affiliated data type, and structure is treated
Checked object.
This object to be verified includes: the data type of information to be verified, the content of this information to be verified.
Step 103: obtain the dimension configuration data of described object to be verified.
In the present embodiment, according to the data type of this object to be verified, the dimension of this identifying object is obtained
Configuration data.This dimension configuration data are stored in data base, and this dimension configuration data include: at least one
Individual dimension to be verified and the default proof rule of this dimension to be verified.Due to each object to be verified
Data type is fixing needs how many dimensions to be verified, therefore needs to obtain dimension configuration data, confirms tool
Which dimension body is.
Step 104: determine the default proof rule of at least one dimension to be verified and this dimension to be verified.
In the present embodiment, different dimensions has different proof rules, and this proof rule is preset in dimension
In degree configuration data.This proof rule includes: metadata obtains rule and described Credential data determines
Rule.
Step 105: according to default proof rule, obtain the metadata of this dimension to be verified.
In the present embodiment, obtain rule according to the metadata in default proof rule, obtain this to be verified
At least one metadata of dimension.Metadata is stored in data base, obtains rule according to metadata, from
Data base obtains metadata.
Step 106: determine the Credential data of this dimension to be verified.
In the present embodiment, determine that rule, statistics obtain according to the Credential data in default proof rule
At least one metadata, this metadata of statistical analysis, it is thus achieved that the Credential data of this dimension to be verified.
Such as, object to be verified is " China's GDP production value 100,000 yuan in 2012 ", setting to be verified
Dimension has time, region, GDP production value three.If metadata corresponding to time dimension arranged obtains
Taking rule is the first five years, and Credential data determines that rule is the rate of increase according to each year, calculates next year
GDP production value, then according to time dimension obtain metadata be respectively 2007 to 2011 China
GDP production value is XX ten thousand yuan, according to the minimum and high growth rate in 5 years, calculates in 2012
The GDP production value scope of state, the scope of this production value calculated is the Credential data of time dimension.
Owing to this object to be verified exists three dimensions to be verified, therefore will there be three Credential data.
In the present embodiment, Credential data can be, but not limited to be a scope value.
Step 107: according to Credential data, verifies object to be verified, exports the result.
In the present embodiment, relatively object to be verified and the Credential data of acquisition, if this object to be verified
Data value in the span of this Credential data, then this object to be verified is by checking, and output is logical
Cross the result of checking.Otherwise, this object to be verified is by checking, and what the checking of output was not passed through tests
Card result, this result not passed through is that this dimension to be verified pre-sets, and represents under this dimension,
The data of this object to be verified are inaccurate.
, there are three different dimensions in example example described above, it is thus achieved that three different Credential data, if
Only one of which dimension is not passed through, then the result exported includes: the checking belonging to this dimension is obstructed
The result crossed and other the results being verified belonging to two dimensions.
In the present embodiment, if the result of output is for being verified, then can be, but not limited to treat
Checking information is directly inputted in data base.
Therefore, use the technical program, when data verification, it is only necessary to by data input to be verified,
Object to be verified can be built according to the data type of information to be verified, this object to be verified at least provided with
The dimension to be verified of one.Each dimension to be verified pre-sets proof rule, advises according to this checking
Then, from data base, the metadata under this dimension is obtained.The metadata of this dimension is according to the checking of this dimension
Rule, draws the Credential data of this dimension, compares Credential data and object to be verified, can show that this is treated
Identifying object is the most accurate, so that it is determined that this information to be verified is the most accurate, it is achieved data verification.
Compared to prior art, employee verifying that data are the most accurate by rule of thumb, technical solution of the present invention is adopted
The proof rule preset with multiple dimensions and each different dimensions, to obtain multiple Credential data, compares
Data to be verified and each Credential data, thus obtain the result.Technical solution of the present invention more can be comprehensive
Comprehensively data to be verified are verified, it is to avoid owing to peopleware or experience are uneven and cause number
Inaccurate according to checking.Improve accuracy rate and the efficiency of data verification of data verification, reduce human cost.
Embodiment 2:
See Fig. 2, present embodiments provide a kind of search material device, specifically include that information receiving unit
201, object construction unit 202, dimension configuration data capture unit 203, dimensional information determine unit 204,
Metadata acquiring unit 205, Credential data determine unit 206, authentication unit 207, output unit 208.
The bindiny mechanism of its each parts is as follows with operation principle:
Information receiving unit 201, is used for receiving information to be verified.
The more operation principle of this unit and flow process can be, but not limited to see step 101 in embodiment 1
Corresponding record.
Object construction unit 202, electrically connects with information receiving unit 201, for according to this information to be verified
Data type, build object to be verified.
The more operation principle of this unit and flow process can be, but not limited to see step 102 in embodiment 1
Corresponding record.
Dimension configuration data capture unit 203, electrically connects with object construction unit 202, for treating according to this
The data type of identifying object, obtains the dimension configuration data of this object to be verified.
The more operation principle of this unit and flow process can be, but not limited to see step 103 in embodiment 1
Corresponding record.
Dimensional information determines unit 204, electrically connects, for according to this dimension with dimension configuration acquiring unit 203
Degree configuration data, determine the information of this dimension to be tested.
In the present embodiment, the information of this dimension to be verified includes: at least one dimension to be verified and
The default proof rule of described dimension to be verified.
The more operation principle of this unit and flow process can be, but not limited to see step 104 in embodiment 1
Corresponding record.
Metadata acquiring unit 205, determines that with dimensional information unit 204 electrically connects, for be tested according to this
The default proof rule of card dimension, obtains the metadata of this dimension to be verified.
The more operation principle of this unit and flow process can be, but not limited to see step 105 in embodiment 1
Corresponding record.
Credential data determines unit 206, determines unit 204, metadata acquiring unit 205 with dimensional information
It is electrically connected, for according to this default proof rule and the metadata of this acquisition, determines that this is to be verified
The Credential data of dimension.
The more operation principle of this unit and flow process can be, but not limited to see step 106 in embodiment 1
Corresponding record.
With object construction unit 202, Credential data, authentication unit 207, determines that unit 206 is electrically connected,
For according to this Credential data, verify object to be verified, be verified result.
Output unit 208, electrically connects with authentication unit 207, is used for exporting this result.
Authentication unit 207 can be, but not limited to see enforcement with flow process with the operation principle of output unit 208
The corresponding record of step 107 in example 1.
Therefore, use the technical program, when data verification, it is only necessary to by data input to be verified
In information receiving unit 201, object construction unit 202 can according to the data type of information to be verified,
Building object to be verified, this object to be verified is at least provided with the dimension to be verified of.Each dimension to be verified
Degree all pre-sets proof rule.Metadata acquiring unit 205 is according to this proof rule, from data base
Metadata under this dimension of middle acquisition.Credential data determine unit 206 by the metadata of this dimension according to this
The proof rule of dimension, draws the Credential data of this dimension.Authentication unit 207 compares Credential data and treats
Identifying object, can draw the result, exports this result for output unit 208.
Compared to prior art, employee verifying that data are the most accurate by rule of thumb, technical solution of the present invention is adopted
The proof rule preset with multiple dimensions and each different dimensions, to obtain multiple Credential data, compares
Data to be verified and each Credential data, thus obtain the result.Technical solution of the present invention more can be comprehensive
Comprehensively data to be verified are verified, it is to avoid owing to peopleware or experience are uneven and cause number
Inaccurate according to checking.Improve accuracy rate and the efficiency of data verification of data verification, reduce human cost.
Device embodiment described above is only schematically, wherein said illustrates as separating component
Unit can be or may not be physically separate, the parts shown as unit can be or
Person may not be physical location, i.e. may be located at a place, or can also be distributed to multiple network
On unit.Some or all of module therein can be selected according to the actual needs to realize the present embodiment
The purpose of scheme.Those of ordinary skill in the art are not in the case of paying performing creative labour, the most permissible
Understand and implement.
Through the above description of the embodiments, those skilled in the art is it can be understood that arrive each reality
The mode of executing can add the mode of required general hardware platform by software and realize, naturally it is also possible to by firmly
Part.Based on such understanding, the portion that prior art is contributed by technique scheme the most in other words
Dividing and can embody with the form of software product, this computer software product can be stored in computer can
Read in storage medium, such as ROM/RAM, magnetic disc, CD etc., including some instructions with so that one
Computer equipment (can be personal computer, server, or the network equipment etc.) performs each to be implemented
The method described in some part of example or embodiment.
Embodiments described above, is not intended that the restriction to this technical scheme protection domain.Any
Amendment, equivalent and the improvement etc. made within the spirit of above-mentioned embodiment and principle, all should comprise
Within the protection domain of this technical scheme.
Claims (11)
1. the method for a data verification, it is characterised in that including:
Receive information to be verified, according to the data type of described information to be verified, build object to be verified;
Wherein, described information to be verified inputted by user or according to set data type gather on the internet and
Input;
According to the data type of described object to be verified, obtain the dimension configuration data of described object to be verified,
Described dimension configuration data are stored in advance in data base;
Configure data according to described dimension, determine at least one dimension to be verified and described dimension to be verified
The default proof rule of degree;
According to the default proof rule of described dimension to be verified, obtain the metadata of described dimension to be verified;
According to described default proof rule and the metadata of described acquisition, determine described dimension to be verified
Credential data;
According to described Credential data, verify described object to be verified, export the result.
Method the most according to claim 1, it is characterised in that
The described data type according to described object to be verified, obtains the dimension configuration of described object to be verified
Data, specifically include:
According to the data type of described object to be verified, the dimension inquiring about described data type correspondence default is joined
Put data, obtain the dimension configuration data of described object to be verified.
Method the most according to claim 1, it is characterised in that
The described default proof rule according to described dimension to be verified, obtains first number of described dimension to be verified
According to, specifically include:
According to the default proof rule of described dimension to be verified, the data that inquiry is stored in data base, obtain
Take the metadata of described dimension to be verified.
Method the most according to claim 1, it is characterised in that
Described default proof rule includes: described metadata obtains rule and described Credential data determines
Rule.
Method the most according to claim 1, it is characterised in that
Described according to described Credential data, verify described object to be verified, export the result, specifically wrap
Include:
According to the span of described Credential data, verify that whether the data value of described object to be verified exists
In described span, if it is, the result that output is verified;Otherwise, treat according to described
The proof rule of checking dimension, the result that output checking is not passed through;
Wherein, the result that described checking is not passed through is checking that described dimension to be verified is pre-seted
Result.
6. a data verification device, it is characterised in that including:
Information receiving unit, is used for receiving information to be verified;Wherein, described information to be verified is defeated by user
Enter or gather on the internet according to the data type set and input;
Object construction unit, electrically connects with described information receiving unit, for according to described information to be verified
Data type, build object to be verified;
Dimension configuration data capture unit, electrically connects with described object construction unit, for treating described in basis
The data type of identifying object, obtains the dimension configuration data of described object to be verified, and described dimension configures
Data are stored in advance in data base;
Dimensional information determines unit, electrically connects, for according to described dimension with described dimension configuration acquiring unit
Degree configuration data, determine the default checking rule of at least one dimension to be verified and described dimension to be verified
Then;
With described dimensional information, metadata acquiring unit, determines that unit electrically connects, for according to described to be tested
The default proof rule of card dimension, obtains the metadata of described dimension to be verified;
Credential data determines unit, determines unit, metadata acquiring unit electricity respectively with described dimensional information
Connect, for according to described default proof rule and the metadata of described acquisition, determine described to be verified
The Credential data of dimension;
With described Credential data, authentication unit, determines that unit electrically connects, be used for according to described Credential data,
Verify described object to be verified, be verified result;
Output unit, electrically connects with described authentication unit, is used for exporting described the result.
Device the most according to claim 6, it is characterised in that
Described dimension configuration data capture unit specifically for: according to the data type of described object to be verified,
Inquiring about the dimension configuration data that described data type correspondence is preset, the dimension obtaining described object to be verified is joined
Put data.
Device the most according to claim 6, it is characterised in that
Described metadata acquiring unit specifically for: according to the default proof rule of described dimension to be verified,
The data that inquiry is stored in data base, obtain the metadata of described dimension to be verified.
Device the most according to claim 6, it is characterised in that
Described default proof rule includes: described metadata obtains rule and described Credential data determines
Rule.
Device the most according to claim 6, it is characterised in that
Described authentication unit specifically for: according to the span of described Credential data, verify described to be tested
Whether the data value of card object is in described span, if it is, obtain the checking being verified
Result;Otherwise according to the proof rule of described dimension to be verified, it is thus achieved that the result that checking is not passed through.
11. devices according to claim 10, it is characterised in that
Described output unit specifically for: the result or the described checking that are verified described in output are obstructed
The result crossed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210575680.0A CN103020269B (en) | 2012-12-26 | 2012-12-26 | A kind of method of data verification and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201210575680.0A CN103020269B (en) | 2012-12-26 | 2012-12-26 | A kind of method of data verification and device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103020269A CN103020269A (en) | 2013-04-03 |
CN103020269B true CN103020269B (en) | 2016-09-07 |
Family
ID=47968872
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201210575680.0A Active CN103020269B (en) | 2012-12-26 | 2012-12-26 | A kind of method of data verification and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103020269B (en) |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN105488061B (en) * | 2014-09-18 | 2019-08-09 | 阿里巴巴集团控股有限公司 | A kind of method and device of verify data validity |
CN104378207B (en) * | 2014-10-29 | 2019-05-07 | 中国建设银行股份有限公司 | A kind of Information Authentication processing method and processing device |
CN104850497B (en) * | 2015-05-15 | 2017-10-31 | 百度在线网络技术(北京)有限公司 | The verification method and device of test result data |
CN106708909B (en) * | 2015-11-18 | 2020-12-08 | 阿里巴巴集团控股有限公司 | Data quality detection method and device |
CN106909604B (en) * | 2015-12-22 | 2022-06-24 | 清华大学 | Automatic checking method and system for EXCEL form and ACCESS database based on rules |
CN107292624A (en) * | 2016-03-30 | 2017-10-24 | 阿里巴巴集团控股有限公司 | The method and device of commodity object information is provided |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6321201B1 (en) * | 1996-06-20 | 2001-11-20 | Anonymity Protection In Sweden Ab | Data security system for a database having multiple encryption levels applicable on a data element value level |
CN101197875A (en) * | 2007-12-26 | 2008-06-11 | 华为技术有限公司 | Partial data checking method and device |
CN101727466A (en) * | 2008-10-31 | 2010-06-09 | 北大方正集团有限公司 | Method and device for verifying service data object |
-
2012
- 2012-12-26 CN CN201210575680.0A patent/CN103020269B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US6321201B1 (en) * | 1996-06-20 | 2001-11-20 | Anonymity Protection In Sweden Ab | Data security system for a database having multiple encryption levels applicable on a data element value level |
CN101197875A (en) * | 2007-12-26 | 2008-06-11 | 华为技术有限公司 | Partial data checking method and device |
CN101727466A (en) * | 2008-10-31 | 2010-06-09 | 北大方正集团有限公司 | Method and device for verifying service data object |
Also Published As
Publication number | Publication date |
---|---|
CN103020269A (en) | 2013-04-03 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN103020269B (en) | A kind of method of data verification and device | |
CN106295983A (en) | Power marketing data visualization statistical analysis technique and system | |
CN105446864B (en) | Method and device for verifying influence of deletion of cache file and mobile terminal | |
CN107369034A (en) | A kind of user investigates the sincere method and apparatus judged | |
CN108062477A (en) | Hardware Trojan horse detection method based on side Multiple Channel Analysis | |
CN105548946B (en) | For the multiple criteria screening method and device of the measurement error of intelligent electric energy meter | |
DE112011103048T5 (en) | A method for certifying a plurality of data processing systems | |
CN110298085A (en) | Analog-circuit fault diagnosis method based on XGBoost and random forests algorithm | |
RU2015107237A (en) | SYSTEM AND METHODS OF DESIGNING, DISASSEMBLING AND JOINT USE OF RESEARCHES | |
CN106240839A (en) | For analyzing the system and method for flutter test data | |
CN104698235A (en) | Method for generating transient fault waveforms in relay protection testing | |
WO2014206131A1 (en) | Method and apparatus for report generation | |
CN109690571A (en) | Group echo system and method based on study | |
CN106651160A (en) | Second-hand vehicle quality assessment method and device | |
CN106199706A (en) | Stereo observing system bin attributes statistical method and device | |
CN105260629A (en) | Identity authentication apparatus for preventing taking examination for others | |
CN109388559A (en) | Visual testing analysis method and device | |
CN106845228A (en) | A kind of method and apparatus for detecting rogue program | |
CN106155866A (en) | A kind of method and device of monitoring CPU core frequency | |
CN104899371B (en) | Survey of Transmission Line method and device | |
CN105842535B (en) | A kind of main syndrome screening technique of harmonic wave based on similar features fusion | |
CN104794397A (en) | Virus detection method and device | |
CN109117202A (en) | A kind of method and system that audit type configuration item is set | |
CN107450973A (en) | A kind of detection method and device | |
CN102789500B (en) | Audio frequency comparison method |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
C14 | Grant of patent or utility model | ||
GR01 | Patent grant | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right | ||
PE01 | Entry into force of the registration of the contract for pledge of patent right |
Denomination of invention: Method and device for verifying data Effective date of registration: 20190321 Granted publication date: 20160907 Pledgee: Bank of China Limited Guangzhou Yuexiu Branch Pledgor: Guangzhou CCM Information Science & Technology Co., Ltd. Registration number: 2019440000109 |