CN104378207B - A kind of Information Authentication processing method and processing device - Google Patents
A kind of Information Authentication processing method and processing device Download PDFInfo
- Publication number
- CN104378207B CN104378207B CN201410594394.8A CN201410594394A CN104378207B CN 104378207 B CN104378207 B CN 104378207B CN 201410594394 A CN201410594394 A CN 201410594394A CN 104378207 B CN104378207 B CN 104378207B
- Authority
- CN
- China
- Prior art keywords
- rule
- information
- dimensional information
- combination
- atomic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Landscapes
- Storage Device Security (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
The embodiment of the invention discloses a kind of Information Authentication processing method and processing devices, comprising: receives the checking request for carrying the first dimensional information and Information Authentication parameter for being verified to target information that request equipment is sent;Response verification request obtains the corresponding rule of combination of the first dimensional information as objective cross rule from least one rule of combination obtained in advance;Objective cross rule is parsed, it is regular as target atoms to obtain the atomic rule that the rule of combination includes;Information Authentication parameter is verified using target atoms rule, obtains target atoms rule to the verification result of Information Authentication parameter;Verification result is assembled according to objective cross rule, to obtain the implementing result of objective cross rule, and returns to implementing result to request equipment.It can avoid carrying out different Information Authentications according to different dimensional informations using largely branch is judged in service code, improve the readability of service code, be conducive to optimization and maintenance of the later period to service code.
Description
Technical field
The present invention relates to a kind of Internet technical field more particularly to a kind of Information Authentication processing method and processing devices.
Background technique
With the development of computer technology, business to be treated is more and more on computers also becomes increasingly complex,
In many typical business processing scenes, before real processing business, need to carry out many Information Authentications, it is logical in Information Authentication
After crossing, just allow to handle the business.Such as: in banking system, when handling transferred account service, need first to verify the user that transfers accounts
Account balance it is whether sufficient, then verify input user account to be transferred accounts it is whether correct, verifying is all by could really hold
Row transfer operation.In actual application, Information Authentication can be different with the difference of dimensional information.Such as: in banking system
In, dimensional information may include associated agency, product code, transaction code, trustee, when dimensional information difference, the letter of progress
Breath verifying is also different.This will generate in service code during system implements and largely judge branch, pass through this
Judge that branch judges dimensional information a bit, then according to different dimensional informations, to carry out different Information Authentications.
It, will although can be realized by above method according to different dimensional informations and carry out different Information Authentications
These a large amount of branch's judgements are hard-coded in service code, have both been reduced the readability of service code, have also been given later period business generation
The optimization of code brings many and diverse maintenance.
Summary of the invention
The embodiment of the invention provides a kind of Information Authentication processing method and processing device, can avoid in service code using big
Amount judges branch to carry out different Information Authentications according to different dimensional informations, improves the readability of service code, has
Optimization and maintenance conducive to the later period to service code.
First aspect of the embodiment of the present invention provides a kind of Information Authentication processing method, comprising:
Receive the checking request for being verified to target information that request equipment is sent, checking request carrying the
Dimension information and Information Authentication parameter;
The checking request is responded, first dimensional information pair is obtained from least one rule of combination obtained in advance
The rule of combination answered is made of as objective cross rule, the rule of combination at least one atomic rule obtained in advance;
The objective cross rule is parsed, it is regular as target atoms to obtain the atomic rule that the rule of combination includes;
The Information Authentication parameter is verified using the target atoms rule, it is right to obtain the target atoms rule
The verification result of the Information Authentication parameter;
The verification result is assembled according to the objective cross rule, to obtain holding for the objective cross rule
Row is as a result, and return to the implementing result to the request equipment.
Second aspect of the embodiment of the present invention provides a kind of Information Authentication processing unit, comprising:
Receiving module, the checking request for being verified to target information sent for receiving request equipment are described
Checking request carries the first dimensional information and Information Authentication parameter;
Respond module, for responding the checking request, from least one rule of combination obtained in advance described in acquisition
The corresponding rule of combination of first dimensional information as objective cross rule, the rule of combination by obtain in advance at least one is former
Sub-rule composition;
Parsing module obtains atomic rule that the rule of combination includes as mesh for parsing objective cross rule
Mark atomic rule;
Authentication module is obtained described for being verified using the target atoms rule to the Information Authentication parameter
Verification result of the target atoms rule to the Information Authentication parameter;
Module is assembled, for assembling the verification result according to the objective cross rule, to obtain the mesh
The implementing result of rule of combination is marked, and returns to the implementing result to the request equipment.
The implementation of the embodiments of the present invention has the following beneficial effects:
The checking request for being verified to target information that the embodiment of the present invention is sent by receiving request equipment, should
Checking request carries the first dimensional information and Information Authentication parameter, and by responding the checking request, from obtaining in advance at least
The corresponding rule of combination of the first dimensional information is obtained in one rule of combination as objective cross rule, rule of combination by obtaining in advance
At least one atomic rule composition taken, then objective cross rule is parsed, obtain the atomic rule conduct that the rule of combination includes
Target atoms rule, verifies Information Authentication parameter by using target atoms rule, obtains target atoms rule to letter
The verification result for ceasing certificate parameter, finally assembles verification result according to objective cross rule, to obtain objective cross rule
Implementing result then, and implementing result is returned to request equipment.The embodiment of the present invention can avoid in service code using a large amount of
Judge branch to carry out different Information Authentications according to different dimensional informations, improve the readability of service code, favorably
In optimization and maintenance of the later period to service code.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below
There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this
Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with
It obtains other drawings based on these drawings.
Fig. 1 is a kind of flow diagram of Information Authentication processing method disclosed by the embodiments of the present invention;
Fig. 2 is the flow diagram of another Information Authentication processing method disclosed by the embodiments of the present invention;
Fig. 3 is a kind of structural schematic diagram of Information Authentication processing unit disclosed by the embodiments of the present invention;
Fig. 4 is the structural schematic diagram of another Information Authentication processing unit disclosed by the embodiments of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete
Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on
Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other
Embodiment shall fall within the protection scope of the present invention.
Referring to Fig. 1, Fig. 1 is a kind of flow diagram of Information Authentication processing method disclosed by the embodiments of the present invention.Its
In, method shown in FIG. 1 can be applied to the self-service device for needing to carry out Information Authentication processing, banking system (such as bank counter
And electronic channel bank etc.) computer equipment and mobile terminal device etc., the embodiment of the present invention is without limitation.Such as Fig. 1
Shown, which may comprise steps of:
S101, the checking request for being verified to target information that request equipment is sent is received, which takes
The first dimensional information of band and Information Authentication parameter.
In the embodiment of the present invention, the first dimensional information can be a dimension values, or be made of multiple dimension values
Compound dimension values, such as first dimensional information can be transaction code, or by transaction code, trustee, associated agency
The compound dimension values formed with dimension values such as product codes, the embodiment of the present invention is without limitation.Above- mentioned information certificate parameter can be with
For one or more parameter values of information to be verified.For example, for example in certain banking system, when request equipment has received
When closing the information verification request for business of opening an account, whether information to be verified is to repeat to open an account, pay whether ratio limits in examination & approval
Within the scope of and open an account user identity card number it is whether correct when, the checking request carry the first dimensional information may include but
It is not limited to transaction code, trustee, associated agency and product code, the Information Authentication parameter which carries may include but not
It is limited to user account, pays ratio and user identity card number.
S102, response verification request, it is corresponding to obtain the first dimensional information from least one rule of combination obtained in advance
Rule of combination as objective cross rule.
In the embodiment of the present invention, said combination rule is composed of at least one atomic rule, and atomic rule is used
It is verified in Information Authentication parameter.Such as rule of combination can be composed for atomic rule by logical operator connection
Expression formula, the embodiment of the present invention is without limitation.For example, when atomic rule is Rule1, Rule2 and Rule3, wherein
Atomic rule Rule1 repeats to open an account for verifying whether, atomic rule Rule2 is used to verify whether ratio of paying to limit in examination & approval
Within the scope of, atomic rule Rule3 demonstrate,proves whether number is correct, then rule of combination can be for verifying user identity of opening an account
(Rule1&&Rule2) | | Rule3, Rule1 | | Rule2 | | the expression formulas form such as Rule3, the embodiment of the present invention is without limitation.
In the embodiment of the present invention, each rule of combination is uniquely determined by dimensional information, so can by dimensional information
To navigate to rule of combination, for example, working as rule of combination (Rule1&&Rule2) | | the corresponding dimensional information of Rule3 is by tieing up
Angle value transaction code " TJ0001 ", trustee " 10000 ", associated agency " 9949 " and product code " 2012 " are composed compound
Dimension values, rule of combination Rule1 | | Rule2 | | the corresponding dimensional information of Rule3 is by dimension values transaction code " MJ9999 ", commission
When the compound dimension values that people " 20000 ", associated agency " 1999 " and product code " 2010 " are composed, when the first dimensional information
To be composed of dimension values transaction code " TJ0001 ", trustee " 10000 ", associated agency " 9949 " and product code " 2012 "
Compound dimension values when, so that it may rule of combination (Rule1&&Rule2) is got by first dimensional information | | Rule3, and
When the first dimensional information is by dimension values transaction code " MJ9999 ", trustee " 20000 ", associated agency " 1999 " and product code
It is exactly Rule1 by the rule of combination that first dimensional information is got when the compound dimension values that " 2010 " are composed | |
Rule2||Rule3。
S103, parsing objective cross rule, it is regular as target atoms to obtain the atomic rule that the rule of combination includes.
In the embodiment of the present invention, rule of combination is made of atomic rule, so can be obtained by by parsing rule of combination
Form its atomic rule.For example, when objective cross rule is (Rule1&&Rule2) | | it, should by parsing when Rule3
Objective cross rule can be obtained by atomic rule Rule1, the atomic rule Rule2 that the objective cross rule includes and atom rule
Then Rule3.
S104, Information Authentication parameter is verified using target atoms rule, obtains target atoms rule and information is tested
Demonstrate,prove the verification result of parameter.
In the embodiment of the present invention, corresponding Information Authentication parameter can be verified using atomic rule, to obtain
Verification result of the atomic rule to corresponding information certificate parameter.For example, for example when atomic rule be Rule1, Rule2 and
When Rule3, wherein atomic rule Rule1 repeats to open an account for verifying whether, atomic rule Rule2 pays ratio for verifying
Whether within the scope of examining restriction, whether atomic rule Rule3 is correct for verifying user identity card number of opening an account, and works as information
Certificate parameter is user account " 260033333 ", pays ratio " 40% " and user identity card number
When " 502311118273941234 ", whether atomic rule Rule1 just verifies the user that user account is 260033333 and repeats out
Family, atomic rule Rule2 just verify ratio of paying be 40% when, if meet examine limit within the scope of, atomic rule
Whether Rule3 just verifies correct when user identity card number is 502311118273941234.
S105, verification result is assembled according to objective cross rule, to obtain the implementing result of objective cross rule,
And implementing result is returned to request equipment.
In the embodiment of the present invention, because objective cross rule is made of atomic rule, obtained when executing atomic rule
After the implementing result of atomic rule, can by the way that the implementing result of atomic rule is assembled according to objective cross rule, then into
Row calculates, and obtains the implementing result of objective cross rule.For example, for example when objective cross rule is (Rule1&&Rule2)
| | when Rule3, the implementing result of atomic rule Rule1 is "true", and the implementing result of atomic rule Rule2 is "true", atom rule
When then the implementing result of Rule3 is "false", so that it may the implementing result of atomic rule is assembled according to objective cross rule,
Obtain assembling result (Zhen && is true) | | it is false, it is "true" so as to obtain the implementing result of objective cross rule.
The checking request for being verified to target information that the embodiment of the present invention is sent by receiving request equipment, should
Checking request carries the first dimensional information and Information Authentication parameter, and by responding the checking request, from obtaining in advance at least
The corresponding rule of combination of the first dimensional information is obtained in one rule of combination as objective cross rule, rule of combination by obtaining in advance
At least one atomic rule composition taken, then objective cross rule is parsed, obtain the atomic rule conduct that the rule of combination includes
Target atoms rule, verifies Information Authentication parameter by using target atoms rule, obtains target atoms rule to letter
The verification result for ceasing certificate parameter, finally assembles verification result according to objective cross rule, to obtain objective cross rule
Implementing result then, and implementing result is returned to request equipment.The embodiment of the present invention can avoid in service code using a large amount of
Judge branch to carry out different Information Authentications according to different dimensional informations, improve the readability of service code, favorably
In optimization and maintenance of the later period to service code.
Referring to Fig. 2, Fig. 2 is the flow diagram of another Information Authentication processing method disclosed by the embodiments of the present invention.
Wherein, method shown in Fig. 2 can be applied to the self-service device for needing to carry out Information Authentication processing, banking system (such as bank's cabinet
Platform and electronic channel bank etc.) computer equipment and mobile terminal device etc., the embodiment of the present invention is without limitation.Such as figure
Shown in 2, which be may comprise steps of:
S201, at least one dimensional information, atomic rule and rule of combination are obtained.
In the embodiment of the present invention, receive the checking request for being verified to target information that request equipment is sent it
Before, need to obtain at least one dimensional information, at least one atomic rule and at least one rule of combination, wherein one obtained
Dimensional information can be a dimension values, be also possible to the compound dimension values being made of multiple dimension values, a dimension of acquisition
Information uniquely determines a rule of combination.
S202, the checking request for being verified to target information that request equipment is sent is received, which takes
The first dimensional information of band and Information Authentication parameter.
In the embodiment of the present invention, the first dimensional information can be a dimension values, or be made of multiple dimension values
Compound dimension values, such as first dimensional information can be transaction code, or by transaction code, trustee, associated agency
The compound dimension values formed with dimension values such as product codes, the embodiment of the present invention is without limitation.Above- mentioned information certificate parameter can be with
For one or more parameter values of information to be verified.
S203, response verification request, search whether that there are the first dimensions at least one dimensional information obtained in advance
Information.
S204, if it exists the first dimensional information then select the first dimension from least one rule of combination obtained in advance
The corresponding rule of combination of information is as objective cross rule.
In the embodiment of the present invention, said combination rule is composed of at least one atomic rule, and atomic rule is used
It is verified in Information Authentication parameter.Such as rule of combination can be composed for atomic rule by logical operator connection
Expression formula, the embodiment of the present invention is without limitation.For example, when atomic rule is Rule1, Rule2 and Rule3, wherein
Atomic rule Rule1 repeats to open an account for verifying whether, atomic rule Rule2 is used to verify whether ratio of paying to limit in examination & approval
Within the scope of, atomic rule Rule3 demonstrate,proves whether number is correct, then rule of combination can be for verifying user identity of opening an account
(Rule1&&Rule2) | | Rule3, Rule1 | | Rule2 | | the expression formulas form such as Rule3, the embodiment of the present invention is without limitation.
In the embodiment of the present invention, each rule of combination is uniquely determined by dimensional information, so can by dimensional information
To navigate to rule of combination, for example, working as rule of combination (Rule1&&Rule2) | | the corresponding dimensional information of Rule3 is by tieing up
Angle value transaction code " TJ0001 ", trustee " 10000 ", associated agency " 9949 " and product code " 2012 " are composed compound
Dimension values, rule of combination Rule1 | | Rule2 | | the corresponding dimensional information of Rule3 is by dimension values transaction code " MJ9999 ", commission
When the compound dimension values that people " 20000 ", associated agency " 1999 " and product code " 2010 " are composed, when the first dimensional information
To be composed of dimension values transaction code " TJ0001 ", trustee " 10000 ", associated agency " 9949 " and product code " 2012 "
Compound dimension values when, so that it may rule of combination (Rule1&&Rule2) is got by first dimensional information | | Rule3, and
When the first dimensional information is by dimension values transaction code " MJ9999 ", trustee " 20000 ", associated agency " 1999 " and product code
It is exactly Rule1 by the rule of combination that first dimensional information is got when the compound dimension values that " 2010 " are composed | |
Rule2||Rule3。
If S205, the first dimensional information are not present, according to the acquisition rule for presetting the second dimensional information, obtained in advance
Dimensional information in search whether that there are the second dimensional informations.
In the present embodiment, if the first dimensional information is not present in the dimensional information obtained in advance, basis is preset
The second dimensional information the second dimensional information of acquisition Rule, then search whether that there are second in default dimensional information
Dimensional information.For example, for example in certain banking system, if the dimensional information obtained in advance is the commission machine by indicating head office
The compound dimension values of structure " 1100 " and transaction code " TJ0001 " composition, the first dimensional information are the associated agency by indicating subbranch
The compound dimension values of " 1101 " and transaction code " TJ0001 " composition, corresponding default second dimensional information of first dimensional information
Obtaining rule is first to obtain to be made by the compound dimension values that the associated agency " 1102 " and transaction code " TJ0001 " of expression branch form
For the second dimensional information, if second dimensional information is not present in the dimensional information obtained in advance, then obtain by indicating total
The compound dimension values of capable associated agency " 1100 " and transaction code " TJ0001 " composition are as the second dimensional information, in this example,
The first dimensional information is not present in the dimensional information obtained in advance, so according to corresponding second dimensional information of the first dimensional information
Rule is obtained, the compound dimension values that associated agency " 1102 " and transaction code " TJ0001 " by indicating branch form is obtained first and makees
For the second dimensional information, which is also not present in the dimensional information obtained in advance, further according to the first dimensional information
Corresponding second dimensional information obtains rule, obtains associated agency " 1100 " and transaction code " TJ0001 " by indicating head office and forms
Compound dimension values as the second dimensional information, searched in the dimensional information obtained in advance and learn that second dimensional information exists
In the dimensional information obtained in advance.
S206, if it exists the second dimensional information then select the second dimensional information corresponding from the rule of combination obtained in advance
Rule of combination as objective cross rule.
S207, if it does not exist the second dimensional information, then to the output of request equipment for prompting the input of the first dimensional information to have
Prompt information accidentally.
In the embodiment of the present invention, if not existed according to the second dimensional information that default second dimensional information obtains Rule
In the dimensional information obtained in advance, then to request equipment output for prompting the first dimensional information to input wrong prompt information.
The step S203- step S207 of the present embodiment can be the specific refinement step of the step S102 of embodiment illustrated in fig. 1
Suddenly.
S208, parsing objective cross rule, it is regular as target atoms to obtain the atomic rule that the rule of combination includes.
S209, Information Authentication parameter is verified using target atoms rule, obtains target atoms rule and information is tested
Demonstrate,prove the verification result of parameter.
S210, verification result is assembled according to objective cross rule, to obtain the implementing result of objective cross rule,
And implementing result is returned to request equipment.
The step S208- step S210 of the present embodiment can be found in the step S103- step S105 of embodiment illustrated in fig. 1,
This is not repeated.
The checking request for being verified to target information that the embodiment of the present invention is sent by receiving request equipment, should
Checking request carries the first dimensional information and Information Authentication parameter, and by responding the checking request, from obtaining in advance at least
The corresponding rule of combination of the first dimensional information is obtained in one rule of combination as objective cross rule, rule of combination by obtaining in advance
At least one atomic rule composition taken, then objective cross rule is parsed, obtain the atomic rule conduct that the rule of combination includes
Target atoms rule, verifies Information Authentication parameter by using target atoms rule, obtains target atoms rule to letter
The verification result for ceasing certificate parameter, finally assembles verification result according to objective cross rule, to obtain objective cross rule
Implementing result then, and implementing result is returned to request equipment.The embodiment of the present invention can avoid in service code using a large amount of
Judge branch to carry out different Information Authentications according to different dimensional informations, improve the readability of service code, favorably
In optimization and maintenance of the later period to service code.
It is detailed to a kind of Information Authentication processing unit progress provided in an embodiment of the present invention below in conjunction with attached drawing 3- attached drawing 4
It is thin to introduce.It should be noted that Information Authentication processing unit described in attached drawing 3- attached drawing 4 can be applied to execute above-mentioned attached drawing 1- it is attached
Method shown in Fig. 2.
Referring to Fig. 3, Fig. 3 is a kind of structural schematic diagram of Information Authentication processing unit disclosed by the embodiments of the present invention.Such as
Shown in Fig. 3, which may include: receiving module 301, respond module 302, parsing module 303, tests
Demonstrate,prove module 304 and assembling module 305, in which:
Receiving module 301, the checking request for being verified to target information sent for receiving request equipment, should
Checking request carries the first dimensional information and Information Authentication parameter.
In the embodiment of the present invention, the first dimensional information can be a dimension values, or be made of multiple dimension values
Compound dimension values, such as first dimensional information can be transaction code, or by transaction code, trustee, associated agency
The compound dimension values formed with dimension values such as product codes, the embodiment of the present invention is without limitation.Above- mentioned information certificate parameter can be with
For one or more parameter values of information to be verified.For example, for example in certain banking system, when request equipment has received
When closing the information verification request for business of opening an account, whether information to be verified is to repeat to open an account, pay whether ratio limits in examination & approval
Within the scope of and open an account user identity card number it is whether correct when, the checking request carry the first dimensional information may include but
It is not limited to transaction code, trustee, associated agency and product code, the Information Authentication parameter which carries may include but not
It is limited to user account, pays ratio and user identity card number.
Respond module 302 is requested for response verification, and the first dimension is obtained from least one rule of combination obtained in advance
The corresponding rule of combination of information is spent as objective cross rule.
In the embodiment of the present invention, said combination rule is composed of at least one atomic rule, and atomic rule is used
It is verified in Information Authentication parameter.Such as rule of combination can be composed for atomic rule by logical operator connection
Expression formula, the embodiment of the present invention is without limitation.For example, when atomic rule is Rule1, Rule2 and Rule3, wherein
Atomic rule Rule1 repeats to open an account for verifying whether, atomic rule Rule2 is used to verify whether ratio of paying to limit in examination & approval
Within the scope of, atomic rule Rule3 demonstrate,proves whether number is correct, then rule of combination can be for verifying user identity of opening an account
(Rule1&&Rule2) | | Rule3, Rule1 | | Rule2 | | the expression formulas form such as Rule3, the embodiment of the present invention is without limitation.
In the embodiment of the present invention, each rule of combination is uniquely determined by dimensional information, so can by dimensional information
To navigate to rule of combination, for example, working as rule of combination (Rule1&&Rule2) | | the corresponding dimensional information of Rule3 is by tieing up
Angle value transaction code " TJ0001 ", trustee " 10000 ", associated agency " 9949 " and product code " 2012 " are composed compound
Dimension values, rule of combination Rule1 | | Rule2 | | the corresponding dimensional information of Rule3 is by dimension values transaction code " MJ9999 ", commission
When the compound dimension values that people " 20000 ", associated agency " 1999 " and product code " 2010 " are composed, when the first dimensional information
To be composed of dimension values transaction code " TJ0001 ", trustee " 10000 ", associated agency " 9949 " and product code " 2012 "
Compound dimension values when, so that it may rule of combination (Rule1&&Rule2) is got by first dimensional information | | Rule3, and
When the first dimensional information is by dimension values transaction code " MJ9999 ", trustee " 20000 ", associated agency " 1999 " and product code
It is exactly Rule1 by the rule of combination that first dimensional information is got when the compound dimension values that " 2010 " are composed | |
Rule2||Rule3。
Parsing module 303 obtains atomic rule that the rule of combination includes as target for parsing objective cross rule
Atomic rule.
In the embodiment of the present invention, rule of combination is made of atomic rule, so can be obtained by by parsing rule of combination
Form its atomic rule.For example, when objective cross rule is (Rule1&&Rule2) | | it, should by parsing when Rule3
Objective cross rule can be obtained by atomic rule Rule1, the atomic rule Rule2 that the objective cross rule includes and atom rule
Then Rule3.
Authentication module 304 obtains target atoms rule for verifying using target atoms rule to Information Authentication parameter
Then to the verification result of Information Authentication parameter.
In the embodiment of the present invention, corresponding Information Authentication parameter can be verified using atomic rule, to obtain
Verification result of the atomic rule to corresponding information certificate parameter.For example, for example when atomic rule be Rule1, Rule2 and
When Rule3, wherein atomic rule Rule1 repeats to open an account for verifying whether, atomic rule Rule2 pays ratio for verifying
Whether within the scope of examining restriction, whether atomic rule Rule3 is correct for verifying user identity card number of opening an account, and works as information
Certificate parameter is user account " 260033333 ", pays ratio " 40% " and user identity card number
When " 502311118273941234 ", whether atomic rule Rule1 just verifies the user that user account is 260033333 and repeats out
Family, atomic rule Rule2 just verify ratio of paying be 40% when, if meet examine limit within the scope of, atomic rule
Whether Rule3 just verifies correct when user identity card number is 502311118273941234.
Module 305 is assembled, for assembling verification result according to objective cross rule, to obtain objective cross rule
Implementing result, and to request equipment return implementing result.
In the embodiment of the present invention, because objective cross rule is made of atomic rule, obtained when executing atomic rule
After the implementing result of atomic rule, can by the way that the implementing result of atomic rule is assembled according to objective cross rule, then into
Row calculates, and obtains the implementing result of objective cross rule.For example, for example when objective cross rule is (Rule1&&Rule2)
| | when Rule3, the implementing result of atomic rule Rule1 is "true", and the implementing result of atomic rule Rule2 is "true", atom rule
When then the implementing result of Rule3 is "false", so that it may the implementing result of atomic rule is assembled according to objective cross rule,
Obtain assembling result (Zhen && is true) | | it is false, it is "true" so as to obtain the implementing result of objective cross rule.
The checking request for being verified to target information that the embodiment of the present invention is sent by receiving request equipment, should
Checking request carries the first dimensional information and Information Authentication parameter, and by responding the checking request, from obtaining in advance at least
The corresponding rule of combination of the first dimensional information is obtained in one rule of combination as objective cross rule, rule of combination by obtaining in advance
At least one atomic rule composition taken, then objective cross rule is parsed, obtain the atomic rule conduct that the rule of combination includes
Target atoms rule, verifies Information Authentication parameter by using target atoms rule, obtains target atoms rule to letter
The verification result for ceasing certificate parameter, finally assembles verification result according to objective cross rule, to obtain objective cross rule
Implementing result then, and implementing result is returned to request equipment.The embodiment of the present invention can avoid in service code using a large amount of
Judge branch to carry out different Information Authentications according to different dimensional informations, improve the readability of service code, favorably
In optimization and maintenance of the later period to service code.
Referring to Fig. 4, Fig. 4 is the structural schematic diagram of another Information Authentication processing unit disclosed by the embodiments of the present invention.
As shown in figure 4, the Information Authentication processing unit 400 may include: obtain module 401, receiving module 402, respond module 403,
Parsing module 404, authentication module 405, assembling module 406, in which:
Module 401 is obtained, for obtaining at least one dimensional information, atomic rule and rule of combination.
In the embodiment of the present invention, receive the checking request for being verified to target information that request equipment is sent it
Before, need to obtain at least one dimensional information, at least one atomic rule and at least one rule of combination, wherein one obtained
Dimensional information can be a dimension values, be also possible to the compound dimension values being made of multiple dimension values, a dimension of acquisition
Information uniquely determines a rule of combination.
Receiving module 402 receives the checking request for being verified to target information that request equipment is sent, the verifying
Request carries the first dimensional information and Information Authentication parameter.
Respond module 403 is requested for response verification, and the first dimension is obtained from least one rule of combination obtained in advance
The corresponding rule of combination of information is spent as objective cross rule.
Above-mentioned respond module 403 includes:
Response unit 4301 is requested for response verification, is searched whether at least one dimensional information obtained in advance
There are the first dimensional informations.
Selecting unit 4302, for the first dimensional information if it exists, then from least one rule of combination obtained in advance
Select the corresponding rule of combination of the first dimensional information as objective cross rule.
In the embodiment of the present invention, said combination rule is composed of at least one atomic rule, and atomic rule is used
It is verified in Information Authentication parameter.Such as rule of combination can be composed for atomic rule by logical operator connection
Expression formula, the embodiment of the present invention is without limitation.
Searching unit 4303, if being not present for the first dimensional information, according to the acquisition rule for presetting the second dimensional information
Then, search whether that there are the second dimensional informations in the dimensional information obtained in advance.
In the present embodiment, if the first dimensional information is not present in the dimensional information obtained in advance, basis is preset
The second dimensional information the second dimensional information of acquisition Rule, then search whether that there are second in default dimensional information
Dimensional information.
Second selecting unit 4304 is then selected from the rule of combination obtained in advance for the second dimensional information if it exists
The corresponding rule of combination of second dimensional information is as objective cross rule.
Output unit 4305, for the second dimensional information if it does not exist, then to the output of request equipment for prompting the first dimension
Spend the wrong prompt information of information input.
In the embodiment of the present invention, if not existed according to the second dimensional information that default second dimensional information obtains Rule
In the dimensional information obtained in advance, then to request equipment output for prompting the first dimensional information to input wrong prompt information.
Parsing module 404 obtains atomic rule that the rule of combination includes as target for parsing objective cross rule
Atomic rule.
Authentication module 405 obtains target atoms rule for verifying using target atoms rule to Information Authentication parameter
Then to the verification result of Information Authentication parameter.
Module 406 is assembled, for assembling verification result according to objective cross rule, to obtain objective cross rule
Implementing result, and to request equipment return implementing result.
The checking request for being verified to target information that the embodiment of the present invention is sent by receiving request equipment, should
Checking request carries the first dimensional information and Information Authentication parameter, and by responding the checking request, from obtaining in advance at least
The corresponding rule of combination of the first dimensional information is obtained in one rule of combination as objective cross rule, rule of combination by obtaining in advance
At least one atomic rule composition taken, then objective cross rule is parsed, obtain the atomic rule conduct that the rule of combination includes
Target atoms rule, verifies Information Authentication parameter by using target atoms rule, obtains target atoms rule to letter
The verification result for ceasing certificate parameter, finally assembles verification result according to objective cross rule, to obtain objective cross rule
Implementing result then, and implementing result is returned to request equipment.The embodiment of the present invention can avoid in service code using a large amount of
Judge branch to carry out different Information Authentications according to different dimensional informations, improve the readability of service code, favorably
In optimization and maintenance of the later period to service code.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium
In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic
Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access
Memory, RAM) etc..
The step of method of the embodiment of the present invention, sequentially can be adjusted according to actual needs, merges or delete.This hair
The module of the terminal of bright embodiment can be integrated according to actual needs, further division or deletion.
Module described in the embodiment of the present invention can pass through universal integrated circuit, such as CPU (Central
Processing Unit, central processing unit), or pass through ASIC (Application Specific Integrated
Circuit, specific integrated circuit) Lai Shixian.
The above disclosure is only the preferred embodiments of the present invention, cannot limit the right model of the present invention with this certainly
It encloses, therefore equivalent changes made in accordance with the claims of the present invention, is still within the scope of the present invention.
Claims (2)
1. a kind of Information Authentication processing method, which is characterized in that the described method includes:
Obtain at least one dimensional information, atomic rule and rule of combination;
The checking request for being verified to target information that request equipment is sent is received, the checking request carries the first dimension
Spend information and Information Authentication parameter;
The checking request is responded, searches whether that there are first dimension letters at least one dimensional information obtained in advance
Breath;
First dimensional information if it exists then selects first dimension to believe from least one rule of combination obtained in advance
Corresponding rule of combination is ceased as objective cross rule, and the rule of combination is by least one atomic rule group for obtaining in advance
At the rule of combination is the expression formula that atomic rule is composed by logical operator connection, and the atomic rule is used for
Information Authentication parameter is verified;
If first dimensional information is not present, according to the acquisition rule for presetting the second dimensional information, in the preparatory acquisition
Dimensional information in search whether that there are second dimensional informations;
Second dimensional information if it exists then selects second dimensional information pair from the rule of combination obtained in advance
The rule of combination answered is as the objective cross rule;
Second dimensional information if it does not exist, then to request equipment output for prompting the first dimensional information to input wrong mention
Show information;
The objective cross rule is parsed, it is regular as target atoms to obtain the atomic rule that the rule of combination includes;
The Information Authentication parameter is verified using the target atoms rule, obtains the target atoms rule to described
The verification result of Information Authentication parameter;
The verification result is assembled according to the objective cross rule, to obtain the execution knot of the objective cross rule
Fruit, and the implementing result is returned to the request equipment.
2. a kind of Information Authentication processing unit, which is characterized in that described device includes:
Module is obtained, for obtaining at least one dimensional information, atomic rule and rule of combination;
Receiving module, the checking request for being verified to target information sent for receiving request equipment, the verifying
Request carries the first dimensional information and Information Authentication parameter;
Response unit responds the checking request, searches whether to exist at least one dimensional information obtained in advance described
First dimensional information;
Selecting unit selects the corresponding rule of combination of first dimensional information from least one rule of combination obtained in advance
As objective cross rule, the rule of combination is made of at least one atomic rule obtained in advance, and the rule of combination is
Atomic rule connects the expression formula being composed by logical operator, and the atomic rule is used to carry out Information Authentication parameter
Verifying;
Searching unit, it is regular according to the acquisition for presetting the second dimensional information if being not present for first dimensional information,
Search whether that there are second dimensional informations in the dimensional information obtained in advance;
Second selecting unit is then selected from the rule of combination obtained in advance for second dimensional information if it exists
The corresponding rule of combination of second dimensional information is as the objective cross rule;
Output unit, for second dimensional information if it does not exist, then to the output of request equipment for prompting the first dimension letter
Breath inputs wrong prompt information;
It is former as target to obtain the atomic rule that the rule of combination includes for parsing the objective cross rule for parsing module
Sub-rule;
Authentication module obtains the target for verifying using the target atoms rule to the Information Authentication parameter
Verification result of the atomic rule to the Information Authentication parameter;
Module is assembled, for assembling the verification result according to the objective cross rule, to obtain the target group
Implementing result normally, and the implementing result is returned to the request equipment.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410594394.8A CN104378207B (en) | 2014-10-29 | 2014-10-29 | A kind of Information Authentication processing method and processing device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201410594394.8A CN104378207B (en) | 2014-10-29 | 2014-10-29 | A kind of Information Authentication processing method and processing device |
Publications (2)
Publication Number | Publication Date |
---|---|
CN104378207A CN104378207A (en) | 2015-02-25 |
CN104378207B true CN104378207B (en) | 2019-05-07 |
Family
ID=52556888
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201410594394.8A Active CN104378207B (en) | 2014-10-29 | 2014-10-29 | A kind of Information Authentication processing method and processing device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN104378207B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111835714A (en) * | 2017-07-11 | 2020-10-27 | 创新先进技术有限公司 | Information verification processing method, client and server |
CN111652644A (en) * | 2020-06-01 | 2020-09-11 | 湖南快乐阳光互动娱乐传媒有限公司 | Advertisement strategy configuration method and system |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101727466A (en) * | 2008-10-31 | 2010-06-09 | 北大方正集团有限公司 | Method and device for verifying service data object |
CN103020269A (en) * | 2012-12-26 | 2013-04-03 | 广州市西美信息科技有限公司 | Method and device for verifying data |
Family Cites Families (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103793486B (en) * | 2014-01-20 | 2017-07-11 | 中国建设银行股份有限公司 | Seal data splitting is stored, the method and system of print test |
-
2014
- 2014-10-29 CN CN201410594394.8A patent/CN104378207B/en active Active
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101727466A (en) * | 2008-10-31 | 2010-06-09 | 北大方正集团有限公司 | Method and device for verifying service data object |
CN103020269A (en) * | 2012-12-26 | 2013-04-03 | 广州市西美信息科技有限公司 | Method and device for verifying data |
Also Published As
Publication number | Publication date |
---|---|
CN104378207A (en) | 2015-02-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
JP6782778B2 (en) | Data processing method and equipment | |
CN104169952B (en) | A kind of method of network payment, apparatus and system | |
CN107392618A (en) | It is implanted into the method and apparatus of intelligent contract | |
CN108183838B (en) | Method and device for testing source NAT function | |
CN110245475B (en) | Identity verification method and device | |
CN106034149A (en) | Account identification method and device | |
KR20180004224A (en) | Payment methods, devices and systems | |
CN106469261A (en) | A kind of auth method and device | |
CN104753909B (en) | Method for authenticating after information updating, Apparatus and system | |
CN106789844B (en) | Malicious user identification method and device | |
KR20190095099A (en) | Transaction system error detection method, apparatus, storage medium and computer device | |
CN110175833B (en) | Computer device, method, system and medium for binding bank card information | |
CN111475402B (en) | Program function testing method and related device | |
CN105528399B (en) | Multi-source terminal parameter data fusion method and device | |
CN110247857A (en) | Current-limiting method and device | |
CN104378207B (en) | A kind of Information Authentication processing method and processing device | |
CN109587669A (en) | A kind of Bluetooth pairing methods, device, readable storage medium storing program for executing and terminal device | |
CN113128168A (en) | Pad parameter checking and correcting method and device, computer equipment and storage medium | |
CN110414197A (en) | The bank-user auth method and device of Behavior-based control feature | |
KR102370519B1 (en) | Data transmission method and device | |
CN112541823A (en) | Transaction risk control method, device and equipment based on block chain and storage medium | |
CN107769929A (en) | Identifying code complexity method of adjustment and server | |
CN104536887B (en) | communication data detection method and device | |
CN110209572A (en) | Ui testing method, ui testing system and terminal | |
CN108632348B (en) | Service checking method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |