CN104378207B - A kind of Information Authentication processing method and processing device - Google Patents

A kind of Information Authentication processing method and processing device Download PDF

Info

Publication number
CN104378207B
CN104378207B CN201410594394.8A CN201410594394A CN104378207B CN 104378207 B CN104378207 B CN 104378207B CN 201410594394 A CN201410594394 A CN 201410594394A CN 104378207 B CN104378207 B CN 104378207B
Authority
CN
China
Prior art keywords
rule
information
dimensional information
combination
atomic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410594394.8A
Other languages
Chinese (zh)
Other versions
CN104378207A (en
Inventor
吴泽童
周小伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Construction Bank Corp
Original Assignee
China Construction Bank Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Construction Bank Corp filed Critical China Construction Bank Corp
Priority to CN201410594394.8A priority Critical patent/CN104378207B/en
Publication of CN104378207A publication Critical patent/CN104378207A/en
Application granted granted Critical
Publication of CN104378207B publication Critical patent/CN104378207B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Storage Device Security (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The embodiment of the invention discloses a kind of Information Authentication processing method and processing devices, comprising: receives the checking request for carrying the first dimensional information and Information Authentication parameter for being verified to target information that request equipment is sent;Response verification request obtains the corresponding rule of combination of the first dimensional information as objective cross rule from least one rule of combination obtained in advance;Objective cross rule is parsed, it is regular as target atoms to obtain the atomic rule that the rule of combination includes;Information Authentication parameter is verified using target atoms rule, obtains target atoms rule to the verification result of Information Authentication parameter;Verification result is assembled according to objective cross rule, to obtain the implementing result of objective cross rule, and returns to implementing result to request equipment.It can avoid carrying out different Information Authentications according to different dimensional informations using largely branch is judged in service code, improve the readability of service code, be conducive to optimization and maintenance of the later period to service code.

Description

A kind of Information Authentication processing method and processing device
Technical field
The present invention relates to a kind of Internet technical field more particularly to a kind of Information Authentication processing method and processing devices.
Background technique
With the development of computer technology, business to be treated is more and more on computers also becomes increasingly complex, In many typical business processing scenes, before real processing business, need to carry out many Information Authentications, it is logical in Information Authentication After crossing, just allow to handle the business.Such as: in banking system, when handling transferred account service, need first to verify the user that transfers accounts Account balance it is whether sufficient, then verify input user account to be transferred accounts it is whether correct, verifying is all by could really hold Row transfer operation.In actual application, Information Authentication can be different with the difference of dimensional information.Such as: in banking system In, dimensional information may include associated agency, product code, transaction code, trustee, when dimensional information difference, the letter of progress Breath verifying is also different.This will generate in service code during system implements and largely judge branch, pass through this Judge that branch judges dimensional information a bit, then according to different dimensional informations, to carry out different Information Authentications.
It, will although can be realized by above method according to different dimensional informations and carry out different Information Authentications These a large amount of branch's judgements are hard-coded in service code, have both been reduced the readability of service code, have also been given later period business generation The optimization of code brings many and diverse maintenance.
Summary of the invention
The embodiment of the invention provides a kind of Information Authentication processing method and processing device, can avoid in service code using big Amount judges branch to carry out different Information Authentications according to different dimensional informations, improves the readability of service code, has Optimization and maintenance conducive to the later period to service code.
First aspect of the embodiment of the present invention provides a kind of Information Authentication processing method, comprising:
Receive the checking request for being verified to target information that request equipment is sent, checking request carrying the Dimension information and Information Authentication parameter;
The checking request is responded, first dimensional information pair is obtained from least one rule of combination obtained in advance The rule of combination answered is made of as objective cross rule, the rule of combination at least one atomic rule obtained in advance;
The objective cross rule is parsed, it is regular as target atoms to obtain the atomic rule that the rule of combination includes;
The Information Authentication parameter is verified using the target atoms rule, it is right to obtain the target atoms rule The verification result of the Information Authentication parameter;
The verification result is assembled according to the objective cross rule, to obtain holding for the objective cross rule Row is as a result, and return to the implementing result to the request equipment.
Second aspect of the embodiment of the present invention provides a kind of Information Authentication processing unit, comprising:
Receiving module, the checking request for being verified to target information sent for receiving request equipment are described Checking request carries the first dimensional information and Information Authentication parameter;
Respond module, for responding the checking request, from least one rule of combination obtained in advance described in acquisition The corresponding rule of combination of first dimensional information as objective cross rule, the rule of combination by obtain in advance at least one is former Sub-rule composition;
Parsing module obtains atomic rule that the rule of combination includes as mesh for parsing objective cross rule Mark atomic rule;
Authentication module is obtained described for being verified using the target atoms rule to the Information Authentication parameter Verification result of the target atoms rule to the Information Authentication parameter;
Module is assembled, for assembling the verification result according to the objective cross rule, to obtain the mesh The implementing result of rule of combination is marked, and returns to the implementing result to the request equipment.
The implementation of the embodiments of the present invention has the following beneficial effects:
The checking request for being verified to target information that the embodiment of the present invention is sent by receiving request equipment, should Checking request carries the first dimensional information and Information Authentication parameter, and by responding the checking request, from obtaining in advance at least The corresponding rule of combination of the first dimensional information is obtained in one rule of combination as objective cross rule, rule of combination by obtaining in advance At least one atomic rule composition taken, then objective cross rule is parsed, obtain the atomic rule conduct that the rule of combination includes Target atoms rule, verifies Information Authentication parameter by using target atoms rule, obtains target atoms rule to letter The verification result for ceasing certificate parameter, finally assembles verification result according to objective cross rule, to obtain objective cross rule Implementing result then, and implementing result is returned to request equipment.The embodiment of the present invention can avoid in service code using a large amount of Judge branch to carry out different Information Authentications according to different dimensional informations, improve the readability of service code, favorably In optimization and maintenance of the later period to service code.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is a kind of flow diagram of Information Authentication processing method disclosed by the embodiments of the present invention;
Fig. 2 is the flow diagram of another Information Authentication processing method disclosed by the embodiments of the present invention;
Fig. 3 is a kind of structural schematic diagram of Information Authentication processing unit disclosed by the embodiments of the present invention;
Fig. 4 is the structural schematic diagram of another Information Authentication processing unit disclosed by the embodiments of the present invention.
Specific embodiment
Following will be combined with the drawings in the embodiments of the present invention, and technical solution in the embodiment of the present invention carries out clear, complete Site preparation description, it is clear that described embodiments are only a part of the embodiments of the present invention, instead of all the embodiments.It is based on Embodiment in the present invention, it is obtained by those of ordinary skill in the art without making creative efforts every other Embodiment shall fall within the protection scope of the present invention.
Referring to Fig. 1, Fig. 1 is a kind of flow diagram of Information Authentication processing method disclosed by the embodiments of the present invention.Its In, method shown in FIG. 1 can be applied to the self-service device for needing to carry out Information Authentication processing, banking system (such as bank counter And electronic channel bank etc.) computer equipment and mobile terminal device etc., the embodiment of the present invention is without limitation.Such as Fig. 1 Shown, which may comprise steps of:
S101, the checking request for being verified to target information that request equipment is sent is received, which takes The first dimensional information of band and Information Authentication parameter.
In the embodiment of the present invention, the first dimensional information can be a dimension values, or be made of multiple dimension values Compound dimension values, such as first dimensional information can be transaction code, or by transaction code, trustee, associated agency The compound dimension values formed with dimension values such as product codes, the embodiment of the present invention is without limitation.Above- mentioned information certificate parameter can be with For one or more parameter values of information to be verified.For example, for example in certain banking system, when request equipment has received When closing the information verification request for business of opening an account, whether information to be verified is to repeat to open an account, pay whether ratio limits in examination & approval Within the scope of and open an account user identity card number it is whether correct when, the checking request carry the first dimensional information may include but It is not limited to transaction code, trustee, associated agency and product code, the Information Authentication parameter which carries may include but not It is limited to user account, pays ratio and user identity card number.
S102, response verification request, it is corresponding to obtain the first dimensional information from least one rule of combination obtained in advance Rule of combination as objective cross rule.
In the embodiment of the present invention, said combination rule is composed of at least one atomic rule, and atomic rule is used It is verified in Information Authentication parameter.Such as rule of combination can be composed for atomic rule by logical operator connection Expression formula, the embodiment of the present invention is without limitation.For example, when atomic rule is Rule1, Rule2 and Rule3, wherein Atomic rule Rule1 repeats to open an account for verifying whether, atomic rule Rule2 is used to verify whether ratio of paying to limit in examination & approval Within the scope of, atomic rule Rule3 demonstrate,proves whether number is correct, then rule of combination can be for verifying user identity of opening an account (Rule1&&Rule2) | | Rule3, Rule1 | | Rule2 | | the expression formulas form such as Rule3, the embodiment of the present invention is without limitation.
In the embodiment of the present invention, each rule of combination is uniquely determined by dimensional information, so can by dimensional information To navigate to rule of combination, for example, working as rule of combination (Rule1&&Rule2) | | the corresponding dimensional information of Rule3 is by tieing up Angle value transaction code " TJ0001 ", trustee " 10000 ", associated agency " 9949 " and product code " 2012 " are composed compound Dimension values, rule of combination Rule1 | | Rule2 | | the corresponding dimensional information of Rule3 is by dimension values transaction code " MJ9999 ", commission When the compound dimension values that people " 20000 ", associated agency " 1999 " and product code " 2010 " are composed, when the first dimensional information To be composed of dimension values transaction code " TJ0001 ", trustee " 10000 ", associated agency " 9949 " and product code " 2012 " Compound dimension values when, so that it may rule of combination (Rule1&&Rule2) is got by first dimensional information | | Rule3, and When the first dimensional information is by dimension values transaction code " MJ9999 ", trustee " 20000 ", associated agency " 1999 " and product code It is exactly Rule1 by the rule of combination that first dimensional information is got when the compound dimension values that " 2010 " are composed | | Rule2||Rule3。
S103, parsing objective cross rule, it is regular as target atoms to obtain the atomic rule that the rule of combination includes.
In the embodiment of the present invention, rule of combination is made of atomic rule, so can be obtained by by parsing rule of combination Form its atomic rule.For example, when objective cross rule is (Rule1&&Rule2) | | it, should by parsing when Rule3 Objective cross rule can be obtained by atomic rule Rule1, the atomic rule Rule2 that the objective cross rule includes and atom rule Then Rule3.
S104, Information Authentication parameter is verified using target atoms rule, obtains target atoms rule and information is tested Demonstrate,prove the verification result of parameter.
In the embodiment of the present invention, corresponding Information Authentication parameter can be verified using atomic rule, to obtain Verification result of the atomic rule to corresponding information certificate parameter.For example, for example when atomic rule be Rule1, Rule2 and When Rule3, wherein atomic rule Rule1 repeats to open an account for verifying whether, atomic rule Rule2 pays ratio for verifying Whether within the scope of examining restriction, whether atomic rule Rule3 is correct for verifying user identity card number of opening an account, and works as information Certificate parameter is user account " 260033333 ", pays ratio " 40% " and user identity card number When " 502311118273941234 ", whether atomic rule Rule1 just verifies the user that user account is 260033333 and repeats out Family, atomic rule Rule2 just verify ratio of paying be 40% when, if meet examine limit within the scope of, atomic rule Whether Rule3 just verifies correct when user identity card number is 502311118273941234.
S105, verification result is assembled according to objective cross rule, to obtain the implementing result of objective cross rule, And implementing result is returned to request equipment.
In the embodiment of the present invention, because objective cross rule is made of atomic rule, obtained when executing atomic rule After the implementing result of atomic rule, can by the way that the implementing result of atomic rule is assembled according to objective cross rule, then into Row calculates, and obtains the implementing result of objective cross rule.For example, for example when objective cross rule is (Rule1&&Rule2) | | when Rule3, the implementing result of atomic rule Rule1 is "true", and the implementing result of atomic rule Rule2 is "true", atom rule When then the implementing result of Rule3 is "false", so that it may the implementing result of atomic rule is assembled according to objective cross rule, Obtain assembling result (Zhen && is true) | | it is false, it is "true" so as to obtain the implementing result of objective cross rule.
The checking request for being verified to target information that the embodiment of the present invention is sent by receiving request equipment, should Checking request carries the first dimensional information and Information Authentication parameter, and by responding the checking request, from obtaining in advance at least The corresponding rule of combination of the first dimensional information is obtained in one rule of combination as objective cross rule, rule of combination by obtaining in advance At least one atomic rule composition taken, then objective cross rule is parsed, obtain the atomic rule conduct that the rule of combination includes Target atoms rule, verifies Information Authentication parameter by using target atoms rule, obtains target atoms rule to letter The verification result for ceasing certificate parameter, finally assembles verification result according to objective cross rule, to obtain objective cross rule Implementing result then, and implementing result is returned to request equipment.The embodiment of the present invention can avoid in service code using a large amount of Judge branch to carry out different Information Authentications according to different dimensional informations, improve the readability of service code, favorably In optimization and maintenance of the later period to service code.
Referring to Fig. 2, Fig. 2 is the flow diagram of another Information Authentication processing method disclosed by the embodiments of the present invention. Wherein, method shown in Fig. 2 can be applied to the self-service device for needing to carry out Information Authentication processing, banking system (such as bank's cabinet Platform and electronic channel bank etc.) computer equipment and mobile terminal device etc., the embodiment of the present invention is without limitation.Such as figure Shown in 2, which be may comprise steps of:
S201, at least one dimensional information, atomic rule and rule of combination are obtained.
In the embodiment of the present invention, receive the checking request for being verified to target information that request equipment is sent it Before, need to obtain at least one dimensional information, at least one atomic rule and at least one rule of combination, wherein one obtained Dimensional information can be a dimension values, be also possible to the compound dimension values being made of multiple dimension values, a dimension of acquisition Information uniquely determines a rule of combination.
S202, the checking request for being verified to target information that request equipment is sent is received, which takes The first dimensional information of band and Information Authentication parameter.
In the embodiment of the present invention, the first dimensional information can be a dimension values, or be made of multiple dimension values Compound dimension values, such as first dimensional information can be transaction code, or by transaction code, trustee, associated agency The compound dimension values formed with dimension values such as product codes, the embodiment of the present invention is without limitation.Above- mentioned information certificate parameter can be with For one or more parameter values of information to be verified.
S203, response verification request, search whether that there are the first dimensions at least one dimensional information obtained in advance Information.
S204, if it exists the first dimensional information then select the first dimension from least one rule of combination obtained in advance The corresponding rule of combination of information is as objective cross rule.
In the embodiment of the present invention, said combination rule is composed of at least one atomic rule, and atomic rule is used It is verified in Information Authentication parameter.Such as rule of combination can be composed for atomic rule by logical operator connection Expression formula, the embodiment of the present invention is without limitation.For example, when atomic rule is Rule1, Rule2 and Rule3, wherein Atomic rule Rule1 repeats to open an account for verifying whether, atomic rule Rule2 is used to verify whether ratio of paying to limit in examination & approval Within the scope of, atomic rule Rule3 demonstrate,proves whether number is correct, then rule of combination can be for verifying user identity of opening an account (Rule1&&Rule2) | | Rule3, Rule1 | | Rule2 | | the expression formulas form such as Rule3, the embodiment of the present invention is without limitation.
In the embodiment of the present invention, each rule of combination is uniquely determined by dimensional information, so can by dimensional information To navigate to rule of combination, for example, working as rule of combination (Rule1&&Rule2) | | the corresponding dimensional information of Rule3 is by tieing up Angle value transaction code " TJ0001 ", trustee " 10000 ", associated agency " 9949 " and product code " 2012 " are composed compound Dimension values, rule of combination Rule1 | | Rule2 | | the corresponding dimensional information of Rule3 is by dimension values transaction code " MJ9999 ", commission When the compound dimension values that people " 20000 ", associated agency " 1999 " and product code " 2010 " are composed, when the first dimensional information To be composed of dimension values transaction code " TJ0001 ", trustee " 10000 ", associated agency " 9949 " and product code " 2012 " Compound dimension values when, so that it may rule of combination (Rule1&&Rule2) is got by first dimensional information | | Rule3, and When the first dimensional information is by dimension values transaction code " MJ9999 ", trustee " 20000 ", associated agency " 1999 " and product code It is exactly Rule1 by the rule of combination that first dimensional information is got when the compound dimension values that " 2010 " are composed | | Rule2||Rule3。
If S205, the first dimensional information are not present, according to the acquisition rule for presetting the second dimensional information, obtained in advance Dimensional information in search whether that there are the second dimensional informations.
In the present embodiment, if the first dimensional information is not present in the dimensional information obtained in advance, basis is preset The second dimensional information the second dimensional information of acquisition Rule, then search whether that there are second in default dimensional information Dimensional information.For example, for example in certain banking system, if the dimensional information obtained in advance is the commission machine by indicating head office The compound dimension values of structure " 1100 " and transaction code " TJ0001 " composition, the first dimensional information are the associated agency by indicating subbranch The compound dimension values of " 1101 " and transaction code " TJ0001 " composition, corresponding default second dimensional information of first dimensional information Obtaining rule is first to obtain to be made by the compound dimension values that the associated agency " 1102 " and transaction code " TJ0001 " of expression branch form For the second dimensional information, if second dimensional information is not present in the dimensional information obtained in advance, then obtain by indicating total The compound dimension values of capable associated agency " 1100 " and transaction code " TJ0001 " composition are as the second dimensional information, in this example, The first dimensional information is not present in the dimensional information obtained in advance, so according to corresponding second dimensional information of the first dimensional information Rule is obtained, the compound dimension values that associated agency " 1102 " and transaction code " TJ0001 " by indicating branch form is obtained first and makees For the second dimensional information, which is also not present in the dimensional information obtained in advance, further according to the first dimensional information Corresponding second dimensional information obtains rule, obtains associated agency " 1100 " and transaction code " TJ0001 " by indicating head office and forms Compound dimension values as the second dimensional information, searched in the dimensional information obtained in advance and learn that second dimensional information exists In the dimensional information obtained in advance.
S206, if it exists the second dimensional information then select the second dimensional information corresponding from the rule of combination obtained in advance Rule of combination as objective cross rule.
S207, if it does not exist the second dimensional information, then to the output of request equipment for prompting the input of the first dimensional information to have Prompt information accidentally.
In the embodiment of the present invention, if not existed according to the second dimensional information that default second dimensional information obtains Rule In the dimensional information obtained in advance, then to request equipment output for prompting the first dimensional information to input wrong prompt information.
The step S203- step S207 of the present embodiment can be the specific refinement step of the step S102 of embodiment illustrated in fig. 1 Suddenly.
S208, parsing objective cross rule, it is regular as target atoms to obtain the atomic rule that the rule of combination includes.
S209, Information Authentication parameter is verified using target atoms rule, obtains target atoms rule and information is tested Demonstrate,prove the verification result of parameter.
S210, verification result is assembled according to objective cross rule, to obtain the implementing result of objective cross rule, And implementing result is returned to request equipment.
The step S208- step S210 of the present embodiment can be found in the step S103- step S105 of embodiment illustrated in fig. 1, This is not repeated.
The checking request for being verified to target information that the embodiment of the present invention is sent by receiving request equipment, should Checking request carries the first dimensional information and Information Authentication parameter, and by responding the checking request, from obtaining in advance at least The corresponding rule of combination of the first dimensional information is obtained in one rule of combination as objective cross rule, rule of combination by obtaining in advance At least one atomic rule composition taken, then objective cross rule is parsed, obtain the atomic rule conduct that the rule of combination includes Target atoms rule, verifies Information Authentication parameter by using target atoms rule, obtains target atoms rule to letter The verification result for ceasing certificate parameter, finally assembles verification result according to objective cross rule, to obtain objective cross rule Implementing result then, and implementing result is returned to request equipment.The embodiment of the present invention can avoid in service code using a large amount of Judge branch to carry out different Information Authentications according to different dimensional informations, improve the readability of service code, favorably In optimization and maintenance of the later period to service code.
It is detailed to a kind of Information Authentication processing unit progress provided in an embodiment of the present invention below in conjunction with attached drawing 3- attached drawing 4 It is thin to introduce.It should be noted that Information Authentication processing unit described in attached drawing 3- attached drawing 4 can be applied to execute above-mentioned attached drawing 1- it is attached Method shown in Fig. 2.
Referring to Fig. 3, Fig. 3 is a kind of structural schematic diagram of Information Authentication processing unit disclosed by the embodiments of the present invention.Such as Shown in Fig. 3, which may include: receiving module 301, respond module 302, parsing module 303, tests Demonstrate,prove module 304 and assembling module 305, in which:
Receiving module 301, the checking request for being verified to target information sent for receiving request equipment, should Checking request carries the first dimensional information and Information Authentication parameter.
In the embodiment of the present invention, the first dimensional information can be a dimension values, or be made of multiple dimension values Compound dimension values, such as first dimensional information can be transaction code, or by transaction code, trustee, associated agency The compound dimension values formed with dimension values such as product codes, the embodiment of the present invention is without limitation.Above- mentioned information certificate parameter can be with For one or more parameter values of information to be verified.For example, for example in certain banking system, when request equipment has received When closing the information verification request for business of opening an account, whether information to be verified is to repeat to open an account, pay whether ratio limits in examination & approval Within the scope of and open an account user identity card number it is whether correct when, the checking request carry the first dimensional information may include but It is not limited to transaction code, trustee, associated agency and product code, the Information Authentication parameter which carries may include but not It is limited to user account, pays ratio and user identity card number.
Respond module 302 is requested for response verification, and the first dimension is obtained from least one rule of combination obtained in advance The corresponding rule of combination of information is spent as objective cross rule.
In the embodiment of the present invention, said combination rule is composed of at least one atomic rule, and atomic rule is used It is verified in Information Authentication parameter.Such as rule of combination can be composed for atomic rule by logical operator connection Expression formula, the embodiment of the present invention is without limitation.For example, when atomic rule is Rule1, Rule2 and Rule3, wherein Atomic rule Rule1 repeats to open an account for verifying whether, atomic rule Rule2 is used to verify whether ratio of paying to limit in examination & approval Within the scope of, atomic rule Rule3 demonstrate,proves whether number is correct, then rule of combination can be for verifying user identity of opening an account (Rule1&&Rule2) | | Rule3, Rule1 | | Rule2 | | the expression formulas form such as Rule3, the embodiment of the present invention is without limitation.
In the embodiment of the present invention, each rule of combination is uniquely determined by dimensional information, so can by dimensional information To navigate to rule of combination, for example, working as rule of combination (Rule1&&Rule2) | | the corresponding dimensional information of Rule3 is by tieing up Angle value transaction code " TJ0001 ", trustee " 10000 ", associated agency " 9949 " and product code " 2012 " are composed compound Dimension values, rule of combination Rule1 | | Rule2 | | the corresponding dimensional information of Rule3 is by dimension values transaction code " MJ9999 ", commission When the compound dimension values that people " 20000 ", associated agency " 1999 " and product code " 2010 " are composed, when the first dimensional information To be composed of dimension values transaction code " TJ0001 ", trustee " 10000 ", associated agency " 9949 " and product code " 2012 " Compound dimension values when, so that it may rule of combination (Rule1&&Rule2) is got by first dimensional information | | Rule3, and When the first dimensional information is by dimension values transaction code " MJ9999 ", trustee " 20000 ", associated agency " 1999 " and product code It is exactly Rule1 by the rule of combination that first dimensional information is got when the compound dimension values that " 2010 " are composed | | Rule2||Rule3。
Parsing module 303 obtains atomic rule that the rule of combination includes as target for parsing objective cross rule Atomic rule.
In the embodiment of the present invention, rule of combination is made of atomic rule, so can be obtained by by parsing rule of combination Form its atomic rule.For example, when objective cross rule is (Rule1&&Rule2) | | it, should by parsing when Rule3 Objective cross rule can be obtained by atomic rule Rule1, the atomic rule Rule2 that the objective cross rule includes and atom rule Then Rule3.
Authentication module 304 obtains target atoms rule for verifying using target atoms rule to Information Authentication parameter Then to the verification result of Information Authentication parameter.
In the embodiment of the present invention, corresponding Information Authentication parameter can be verified using atomic rule, to obtain Verification result of the atomic rule to corresponding information certificate parameter.For example, for example when atomic rule be Rule1, Rule2 and When Rule3, wherein atomic rule Rule1 repeats to open an account for verifying whether, atomic rule Rule2 pays ratio for verifying Whether within the scope of examining restriction, whether atomic rule Rule3 is correct for verifying user identity card number of opening an account, and works as information Certificate parameter is user account " 260033333 ", pays ratio " 40% " and user identity card number When " 502311118273941234 ", whether atomic rule Rule1 just verifies the user that user account is 260033333 and repeats out Family, atomic rule Rule2 just verify ratio of paying be 40% when, if meet examine limit within the scope of, atomic rule Whether Rule3 just verifies correct when user identity card number is 502311118273941234.
Module 305 is assembled, for assembling verification result according to objective cross rule, to obtain objective cross rule Implementing result, and to request equipment return implementing result.
In the embodiment of the present invention, because objective cross rule is made of atomic rule, obtained when executing atomic rule After the implementing result of atomic rule, can by the way that the implementing result of atomic rule is assembled according to objective cross rule, then into Row calculates, and obtains the implementing result of objective cross rule.For example, for example when objective cross rule is (Rule1&&Rule2) | | when Rule3, the implementing result of atomic rule Rule1 is "true", and the implementing result of atomic rule Rule2 is "true", atom rule When then the implementing result of Rule3 is "false", so that it may the implementing result of atomic rule is assembled according to objective cross rule, Obtain assembling result (Zhen && is true) | | it is false, it is "true" so as to obtain the implementing result of objective cross rule.
The checking request for being verified to target information that the embodiment of the present invention is sent by receiving request equipment, should Checking request carries the first dimensional information and Information Authentication parameter, and by responding the checking request, from obtaining in advance at least The corresponding rule of combination of the first dimensional information is obtained in one rule of combination as objective cross rule, rule of combination by obtaining in advance At least one atomic rule composition taken, then objective cross rule is parsed, obtain the atomic rule conduct that the rule of combination includes Target atoms rule, verifies Information Authentication parameter by using target atoms rule, obtains target atoms rule to letter The verification result for ceasing certificate parameter, finally assembles verification result according to objective cross rule, to obtain objective cross rule Implementing result then, and implementing result is returned to request equipment.The embodiment of the present invention can avoid in service code using a large amount of Judge branch to carry out different Information Authentications according to different dimensional informations, improve the readability of service code, favorably In optimization and maintenance of the later period to service code.
Referring to Fig. 4, Fig. 4 is the structural schematic diagram of another Information Authentication processing unit disclosed by the embodiments of the present invention. As shown in figure 4, the Information Authentication processing unit 400 may include: obtain module 401, receiving module 402, respond module 403, Parsing module 404, authentication module 405, assembling module 406, in which:
Module 401 is obtained, for obtaining at least one dimensional information, atomic rule and rule of combination.
In the embodiment of the present invention, receive the checking request for being verified to target information that request equipment is sent it Before, need to obtain at least one dimensional information, at least one atomic rule and at least one rule of combination, wherein one obtained Dimensional information can be a dimension values, be also possible to the compound dimension values being made of multiple dimension values, a dimension of acquisition Information uniquely determines a rule of combination.
Receiving module 402 receives the checking request for being verified to target information that request equipment is sent, the verifying Request carries the first dimensional information and Information Authentication parameter.
Respond module 403 is requested for response verification, and the first dimension is obtained from least one rule of combination obtained in advance The corresponding rule of combination of information is spent as objective cross rule.
Above-mentioned respond module 403 includes:
Response unit 4301 is requested for response verification, is searched whether at least one dimensional information obtained in advance There are the first dimensional informations.
Selecting unit 4302, for the first dimensional information if it exists, then from least one rule of combination obtained in advance Select the corresponding rule of combination of the first dimensional information as objective cross rule.
In the embodiment of the present invention, said combination rule is composed of at least one atomic rule, and atomic rule is used It is verified in Information Authentication parameter.Such as rule of combination can be composed for atomic rule by logical operator connection Expression formula, the embodiment of the present invention is without limitation.
Searching unit 4303, if being not present for the first dimensional information, according to the acquisition rule for presetting the second dimensional information Then, search whether that there are the second dimensional informations in the dimensional information obtained in advance.
In the present embodiment, if the first dimensional information is not present in the dimensional information obtained in advance, basis is preset The second dimensional information the second dimensional information of acquisition Rule, then search whether that there are second in default dimensional information Dimensional information.
Second selecting unit 4304 is then selected from the rule of combination obtained in advance for the second dimensional information if it exists The corresponding rule of combination of second dimensional information is as objective cross rule.
Output unit 4305, for the second dimensional information if it does not exist, then to the output of request equipment for prompting the first dimension Spend the wrong prompt information of information input.
In the embodiment of the present invention, if not existed according to the second dimensional information that default second dimensional information obtains Rule In the dimensional information obtained in advance, then to request equipment output for prompting the first dimensional information to input wrong prompt information.
Parsing module 404 obtains atomic rule that the rule of combination includes as target for parsing objective cross rule Atomic rule.
Authentication module 405 obtains target atoms rule for verifying using target atoms rule to Information Authentication parameter Then to the verification result of Information Authentication parameter.
Module 406 is assembled, for assembling verification result according to objective cross rule, to obtain objective cross rule Implementing result, and to request equipment return implementing result.
The checking request for being verified to target information that the embodiment of the present invention is sent by receiving request equipment, should Checking request carries the first dimensional information and Information Authentication parameter, and by responding the checking request, from obtaining in advance at least The corresponding rule of combination of the first dimensional information is obtained in one rule of combination as objective cross rule, rule of combination by obtaining in advance At least one atomic rule composition taken, then objective cross rule is parsed, obtain the atomic rule conduct that the rule of combination includes Target atoms rule, verifies Information Authentication parameter by using target atoms rule, obtains target atoms rule to letter The verification result for ceasing certificate parameter, finally assembles verification result according to objective cross rule, to obtain objective cross rule Implementing result then, and implementing result is returned to request equipment.The embodiment of the present invention can avoid in service code using a large amount of Judge branch to carry out different Information Authentications according to different dimensional informations, improve the readability of service code, favorably In optimization and maintenance of the later period to service code.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the program can be stored in a computer-readable storage medium In, the program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, the storage medium can be magnetic Dish, CD, read-only memory (Read-Only Memory, ROM) or random access memory (Random Access Memory, RAM) etc..
The step of method of the embodiment of the present invention, sequentially can be adjusted according to actual needs, merges or delete.This hair The module of the terminal of bright embodiment can be integrated according to actual needs, further division or deletion.
Module described in the embodiment of the present invention can pass through universal integrated circuit, such as CPU (Central Processing Unit, central processing unit), or pass through ASIC (Application Specific Integrated Circuit, specific integrated circuit) Lai Shixian.
The above disclosure is only the preferred embodiments of the present invention, cannot limit the right model of the present invention with this certainly It encloses, therefore equivalent changes made in accordance with the claims of the present invention, is still within the scope of the present invention.

Claims (2)

1. a kind of Information Authentication processing method, which is characterized in that the described method includes:
Obtain at least one dimensional information, atomic rule and rule of combination;
The checking request for being verified to target information that request equipment is sent is received, the checking request carries the first dimension Spend information and Information Authentication parameter;
The checking request is responded, searches whether that there are first dimension letters at least one dimensional information obtained in advance Breath;
First dimensional information if it exists then selects first dimension to believe from least one rule of combination obtained in advance Corresponding rule of combination is ceased as objective cross rule, and the rule of combination is by least one atomic rule group for obtaining in advance At the rule of combination is the expression formula that atomic rule is composed by logical operator connection, and the atomic rule is used for Information Authentication parameter is verified;
If first dimensional information is not present, according to the acquisition rule for presetting the second dimensional information, in the preparatory acquisition Dimensional information in search whether that there are second dimensional informations;
Second dimensional information if it exists then selects second dimensional information pair from the rule of combination obtained in advance The rule of combination answered is as the objective cross rule;
Second dimensional information if it does not exist, then to request equipment output for prompting the first dimensional information to input wrong mention Show information;
The objective cross rule is parsed, it is regular as target atoms to obtain the atomic rule that the rule of combination includes;
The Information Authentication parameter is verified using the target atoms rule, obtains the target atoms rule to described The verification result of Information Authentication parameter;
The verification result is assembled according to the objective cross rule, to obtain the execution knot of the objective cross rule Fruit, and the implementing result is returned to the request equipment.
2. a kind of Information Authentication processing unit, which is characterized in that described device includes:
Module is obtained, for obtaining at least one dimensional information, atomic rule and rule of combination;
Receiving module, the checking request for being verified to target information sent for receiving request equipment, the verifying Request carries the first dimensional information and Information Authentication parameter;
Response unit responds the checking request, searches whether to exist at least one dimensional information obtained in advance described First dimensional information;
Selecting unit selects the corresponding rule of combination of first dimensional information from least one rule of combination obtained in advance As objective cross rule, the rule of combination is made of at least one atomic rule obtained in advance, and the rule of combination is Atomic rule connects the expression formula being composed by logical operator, and the atomic rule is used to carry out Information Authentication parameter Verifying;
Searching unit, it is regular according to the acquisition for presetting the second dimensional information if being not present for first dimensional information, Search whether that there are second dimensional informations in the dimensional information obtained in advance;
Second selecting unit is then selected from the rule of combination obtained in advance for second dimensional information if it exists The corresponding rule of combination of second dimensional information is as the objective cross rule;
Output unit, for second dimensional information if it does not exist, then to the output of request equipment for prompting the first dimension letter Breath inputs wrong prompt information;
It is former as target to obtain the atomic rule that the rule of combination includes for parsing the objective cross rule for parsing module Sub-rule;
Authentication module obtains the target for verifying using the target atoms rule to the Information Authentication parameter Verification result of the atomic rule to the Information Authentication parameter;
Module is assembled, for assembling the verification result according to the objective cross rule, to obtain the target group Implementing result normally, and the implementing result is returned to the request equipment.
CN201410594394.8A 2014-10-29 2014-10-29 A kind of Information Authentication processing method and processing device Active CN104378207B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410594394.8A CN104378207B (en) 2014-10-29 2014-10-29 A kind of Information Authentication processing method and processing device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410594394.8A CN104378207B (en) 2014-10-29 2014-10-29 A kind of Information Authentication processing method and processing device

Publications (2)

Publication Number Publication Date
CN104378207A CN104378207A (en) 2015-02-25
CN104378207B true CN104378207B (en) 2019-05-07

Family

ID=52556888

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410594394.8A Active CN104378207B (en) 2014-10-29 2014-10-29 A kind of Information Authentication processing method and processing device

Country Status (1)

Country Link
CN (1) CN104378207B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111835714A (en) * 2017-07-11 2020-10-27 创新先进技术有限公司 Information verification processing method, client and server
CN111652644A (en) * 2020-06-01 2020-09-11 湖南快乐阳光互动娱乐传媒有限公司 Advertisement strategy configuration method and system

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101727466A (en) * 2008-10-31 2010-06-09 北大方正集团有限公司 Method and device for verifying service data object
CN103020269A (en) * 2012-12-26 2013-04-03 广州市西美信息科技有限公司 Method and device for verifying data

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103793486B (en) * 2014-01-20 2017-07-11 中国建设银行股份有限公司 Seal data splitting is stored, the method and system of print test

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101727466A (en) * 2008-10-31 2010-06-09 北大方正集团有限公司 Method and device for verifying service data object
CN103020269A (en) * 2012-12-26 2013-04-03 广州市西美信息科技有限公司 Method and device for verifying data

Also Published As

Publication number Publication date
CN104378207A (en) 2015-02-25

Similar Documents

Publication Publication Date Title
JP6782778B2 (en) Data processing method and equipment
CN104169952B (en) A kind of method of network payment, apparatus and system
CN107392618A (en) It is implanted into the method and apparatus of intelligent contract
CN108183838B (en) Method and device for testing source NAT function
CN110245475B (en) Identity verification method and device
CN106034149A (en) Account identification method and device
KR20180004224A (en) Payment methods, devices and systems
CN106469261A (en) A kind of auth method and device
CN104753909B (en) Method for authenticating after information updating, Apparatus and system
CN106789844B (en) Malicious user identification method and device
KR20190095099A (en) Transaction system error detection method, apparatus, storage medium and computer device
CN110175833B (en) Computer device, method, system and medium for binding bank card information
CN111475402B (en) Program function testing method and related device
CN105528399B (en) Multi-source terminal parameter data fusion method and device
CN110247857A (en) Current-limiting method and device
CN104378207B (en) A kind of Information Authentication processing method and processing device
CN109587669A (en) A kind of Bluetooth pairing methods, device, readable storage medium storing program for executing and terminal device
CN113128168A (en) Pad parameter checking and correcting method and device, computer equipment and storage medium
CN110414197A (en) The bank-user auth method and device of Behavior-based control feature
KR102370519B1 (en) Data transmission method and device
CN112541823A (en) Transaction risk control method, device and equipment based on block chain and storage medium
CN107769929A (en) Identifying code complexity method of adjustment and server
CN104536887B (en) communication data detection method and device
CN110209572A (en) Ui testing method, ui testing system and terminal
CN108632348B (en) Service checking method and device

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant