CN105589885B - A kind of method and system of consistency verification of data - Google Patents

A kind of method and system of consistency verification of data Download PDF

Info

Publication number
CN105589885B
CN105589885B CN201410578635.XA CN201410578635A CN105589885B CN 105589885 B CN105589885 B CN 105589885B CN 201410578635 A CN201410578635 A CN 201410578635A CN 105589885 B CN105589885 B CN 105589885B
Authority
CN
China
Prior art keywords
feature information
information
instance object
legal
fisrt feature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410578635.XA
Other languages
Chinese (zh)
Other versions
CN105589885A (en
Inventor
龙斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Advanced Nova Technology Singapore Holdings Ltd
Original Assignee
Alibaba Group Holding Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alibaba Group Holding Ltd filed Critical Alibaba Group Holding Ltd
Priority to CN201410578635.XA priority Critical patent/CN105589885B/en
Publication of CN105589885A publication Critical patent/CN105589885A/en
Application granted granted Critical
Publication of CN105589885B publication Critical patent/CN105589885B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the present application provides a kind of method and system of consistency verification of data, wherein, the described method includes: receiving the form data of input, the form data includes user information, fisrt feature information and second feature information, wherein, the fisrt feature information has associated first instance object identity, and the second feature information has associated second instance object identity;After the verification user information and the fisrt feature information are legal, whether legal the second feature information is verified, wherein the legal second feature information includes that the first instance object identity is identical as the second instance object identity;If the second feature information is legal, determine that the form data is legal.The application can have found mistake present in form data in time, improve verification accuracy rate, save user operation time, improve data-handling efficiency.

Description

A kind of method and system of consistency verification of data
Technical field
This application involves technical field of information processing, method and a kind of number more particularly to a kind of consistency verification of data According to the system of consistency desired result.
Background technique
With the rapid development of information technology and popularizing for network technology, more and more business can pass through in life Web handling is gone to corresponding department's queuing without people and is handled, and save business handles the time, brings greatly to people's life Convenience.
In web handling business, user only needs to fill in application in corresponding webpage and handles other corresponding entries, corresponding Client receive user it is online application after, it will usually to user it is online application verify, verification it is legal after User is allowed to handle corresponding business.
Currently, the verification mode of client is to verify respectively to the value of each control in online application.But this The verification mode of the independent value for verifying each control of kind is relatively simple, it is easy to certain hiding mistakes be caused not verify out Come, influence the accuracy of request for data, further results in the application failure of user, expend user time, influence operating efficiency.
For example, when applying for cross-border remittance, after user fills in remittance information, funds transfer system only to every remittance information into Row individually verification, verification mode is single to be led to some mistakes there is no verifications to come out, and every remittance information such as is occurred and is examined correctly But the problem of remittance failure, since user does not know remittance failure reason for it, user can only repeatedly input remittance information, To can correctly submit information.Will appear following problem in this way: on the one hand multiple interactive process increases funds transfer system Data processing pressure, reduces the data-handling efficiency of funds transfer system, affects the performance of funds transfer system on the whole;Another party Face, user repeatedly input remittance information, and consuming time is long, affect remittance efficiency, or even also result in user's service charge and be damaged, Poor user experience.
Therefore, a technical problem that needs to be urgently solved by technical personnel in the field at present is exactly: providing a kind of data one Cause property verification mode improves verification accuracy rate, saves user operation time, improve at data to find existing mistake in time Manage efficiency.
Summary of the invention
The technical problem to be solved in the embodiments of the present application is that a kind of method of consistency verification of data is provided, to send out in time Existing existing mistake, improves verification accuracy rate, saves user operation time, improve data-handling efficiency.
Correspondingly, the embodiment of the present application also provides a kind of systems of consistency verification of data, to guarantee the above method Realization and application.
To solve the above-mentioned problems, this application discloses a kind of methods of consistency verification of data, which comprises
The form data of input is received, the form data includes user information, fisrt feature information and second feature Information, wherein the fisrt feature information has associated first instance object identity, and the second feature information has association Second instance object identity;
After the verification user information and the fisrt feature information are legal, whether the second feature information is verified It is legal, wherein the legal second feature information includes the first instance object identity and the second instance object identity It is identical;
If the second feature information is legal, determine that the form data is legal.
Preferably, described after the verification user information and the fisrt feature information are legal, verification described second The whether legal step of characteristic information includes:
Whether legal verify the user information;
If the user information is legal, whether legal the fisrt feature information is verified;
If the fisrt feature information is legal, first instance object mark corresponding with the fisrt feature information is obtained Know, and
Whether the first character string for judging to form the second feature information includes preset first forbidden character, and, Whether the length of first character string is equal to first threshold or in the first numerical intervals;
If first character string does not include first forbidden character, also, the length of first character string is equal to First threshold or in the first numerical intervals then obtains second instance object identity corresponding with the second feature information;
If the second instance object identity is identical as the first instance object identity, the second feature letter is determined It is legal to cease.
Preferably, it if the fisrt feature information is legal, obtains and the fisrt feature information corresponding first Entity object identify the step of include:
If the fisrt feature information is legal, first instance object acquisition is generated according to the fisrt feature information and is asked It asks;
The first instance object acquisition request is sent to server;
The first instance object identity corresponding with the first instance object acquisition request that the server returns is received, The first instance object identity is after the server receives the first instance object acquisition request, from preset relationship The data obtained after the fisrt feature information are matched in database;The relational database stores the fisrt feature information With the incidence relation of the first instance object identity.
Preferably, if first character string does not include first forbidden character, also, first character string Length be equal to first threshold or in the first numerical intervals, then obtain second instance corresponding with the second feature information The step of object identity includes:
If first character string does not include first forbidden character, also, the length of first character string is equal to First threshold or in the first numerical intervals then generates second instance object acquisition request according to the second feature information;
The second instance object acquisition request is sent to server;
The second instance object identity corresponding with the second instance object acquisition request that the server returns is received, The second instance object identity is after the server receives the second instance object acquisition request, from preset relationship The data obtained after the second feature information are matched in database;The relational database stores the second feature information With the incidence relation of the second instance object identity.
Preferably, the whether legal step of the verification user information includes:
Whether the second character string for judging to form the user information includes preset second forbidden character, and, it is described Whether the length of the second character string is equal to second threshold or in second value section;
If second character string does not include the second forbidden character, also, the length of second character string is equal to second Threshold value or in second value section, then determine that the user information is legal.
Preferably, if the user information is legal, the whether legal step packet of the fisrt feature information is verified It includes:
If the user information is legal, whether the third character string for judging to form the fisrt feature information includes preset Third forbidden character, and, whether the length of the third character string is equal to third threshold value or in third value section;
If the third character string does not include third forbidden character, also, the length of the third character string is equal to third Threshold value or in third value section, judges whether the fisrt feature information is effective information;
If the fisrt feature information is effective information, determine that the fisrt feature information is legal.
Preferably, the method also includes:
Determining that the user information is illegal, and/or, the fisrt feature information is illegal, and/or, described second When characteristic information is illegal, prompt information is generated according to the illegal judging result, the prompt information includes the use Family information, and/or, the fisrt feature information, and/or, the illegal reason of second feature information;
Show the prompt information.
Preferably, the form data is the remittance information of cross-border remittance;The user information is sender information;It is described Fisrt feature information is receiving bank's account information;The second feature information is receiving bank's cognizance code;Described first is real Body object identity and/or the second instance object identity are receiving bank's authority identification.
The embodiment of the present application also provides a kind of system of consistency verification of data, the system comprises:
Data reception module, form data for receiving input, the form data include user information, fisrt feature Information and second feature information, wherein the fisrt feature information have associated first instance object identity, described second Characteristic information has associated second instance object identity;
Correction verification module, for verify the user information and the fisrt feature information it is legal after, verify described the Whether two characteristic informations are legal, wherein the legal second feature information includes the first instance object identity and described the Two entity objects mark is identical;
Determination module, for determining that the form data is legal when the second feature information is legal.
Preferably, the correction verification module includes:
First verification submodule, it is whether legal for verifying the user information;
Second verification submodule, for whether legal verifying the fisrt feature information when the user information is legal;
First identifier acquisition submodule, for obtaining and believing with the fisrt feature when the fisrt feature information is legal Corresponding first instance object identity is ceased, and
Third verifies submodule, forms whether the first character string of the second feature information includes preset for judging First forbidden character, and, whether the length of first character string is equal to first threshold or in the first numerical intervals;
Second identifier acquisition submodule, for not including first forbidden character, also, institute in first character string When stating the length of the first character string equal to first threshold or in the first numerical intervals, obtain and the second feature information pair The second instance object identity answered;
Legal decision sub-module, for identical as the first instance object identity in the second instance object identity When, determine that the second feature information is legal.
Preferably, the first identifier acquisition submodule includes:
First request generation unit, is used for when the fisrt feature information is legal, raw according to the fisrt feature information At first instance object acquisition request;
First transmission unit, for the first instance object acquisition request to be sent to server;
First receiving unit, for receiving the corresponding with the first instance object acquisition request of the server return First instance object identity, the first instance object identity receive the first instance object acquisition for the server and ask After asking, from being matched to the data obtained after the fisrt feature information in preset relational database;The relation data inventory Store up the incidence relation of the fisrt feature information Yu the first instance object identity.
Preferably, the second identifier acquisition submodule includes:
Second request generation unit, for not including first forbidden character in first character string, also, it is described The length of first character string is equal to first threshold or when in the first numerical intervals, generates the according to the second feature information Two entity object acquisition requests;
Second transmission unit, for the second instance object acquisition request to be sent to server;
Second receiving unit, for receiving the corresponding with the second instance object acquisition request of the server return Second instance object identity, the second instance object identity receive the second instance object acquisition for the server and ask After asking, from being matched to the data obtained after the second feature information in preset relational database;The relation data inventory Store up the incidence relation of the second feature information Yu the second instance object identity.
Preferably, the first verification submodule includes:
First judging unit, whether the second character string for judging to form the user information includes preset second non- Method character, and, whether the length of second character string is equal to second threshold or in second value section;
First judging unit, for not including the second forbidden character, also, second character in second character string When the length of string is equal to second threshold or in second value section, determine that the user information is legal.
Preferably, the second verification submodule includes:
Second judgment unit, for judging the third for forming the fisrt feature information when the user information is legal Whether character string includes preset third forbidden character, and, the length of the third character string whether be equal to third threshold value or Person is in third value section;
Third judging unit, for not including third forbidden character, also, the third character in the third character string When the length of string is equal to third threshold value or in third value section, judge whether the fisrt feature information is effectively to believe Breath;
Second judging unit, for determining the fisrt feature information when the fisrt feature information is effective information It is legal.
Preferably, the system also includes:
Prompt information generation module, for determining that the user information is illegal, and/or, the fisrt feature information It is illegal, and/or, when the second feature information is illegal, prompt information, institute are generated according to the illegal judging result Stating prompt information includes the user information, and/or, the fisrt feature information, and/or, the second feature information does not conform to The reason of method;
Display module, for showing the prompt information.
Preferably, the form data is the remittance information of cross-border remittance;The user information is sender information;It is described Fisrt feature information is receiving bank's account information;The second feature information is receiving bank's cognizance code;Described first is real Body object identity and/or the second instance object identity are receiving bank's authority identification.
Compared with the background art, the embodiment of the present application includes the following advantages:
It in the embodiment of the present application, can be for every in form data after receiving the form data of user's input One, i.e. user information, fisrt feature information and second feature information, verify its legitimacy, and wherein fisrt feature information has Related first instance object identity, second feature information have associated second instance object identity, special in verification second During reference ceases, it can be got up verify by the application with fisrt feature information association, determine first instance pair When as identifying identical as the second instance object identity, that is, it can determine that second feature information is legal, verification side enriched with this Formula improves the probability of discovery mistake, improves information accuracy rate and success rate, reduces due to the data of input inaccuracy Lead to the case where re-entering information generation, reduce interaction times, increases data-handling efficiency.
In addition, treatment effeciency increases since interaction times reduce, user is avoided because of the time caused by multi-pass operation Loss and economic loss, the user experience is improved.
Detailed description of the invention
Fig. 1 is a kind of step flow chart of the embodiment of the method one of consistency verification of data of the application;
Fig. 2 is a kind of step flow chart of the embodiment of the method two of consistency verification of data of the application;
Fig. 3 is a kind of structural block diagram of the system embodiment of consistency verification of data of the application;
Fig. 4 is a kind of structural block diagram of embodiment of the correction verification module of the application.
Specific embodiment
In order to make the above objects, features, and advantages of the present application more apparent, with reference to the accompanying drawing and it is specific real Applying mode, the present application will be further described in detail.
Referring to Fig.1, a kind of step flow chart of the embodiment of the method one of consistency verification of data of the application is shown, is had Body may include steps of:
Step 101, receive the form data of input, the form data include user information, fisrt feature information and Second feature information, wherein the fisrt feature information has associated first instance object identity, the second feature information With associated second instance object identity;
Step 102, after the verification user information and the fisrt feature information are legal, the second feature is verified Whether information is legal, wherein the legal second feature information includes the first instance object identity and the second instance Object identity is identical;
Step 103, if the second feature information is legal, determine that the form data is legal.
It in the embodiment of the present application, can be for every in form data after receiving the form data of user's input One, i.e. user information, fisrt feature information and second feature information, verify its legitimacy, and wherein fisrt feature information has Related first instance object identity, second feature information have associated second instance object identity, special in verification second During reference ceases, it can be got up verify by the application with fisrt feature information association, determine first instance pair When as identifying identical as the second instance object identity, that is, it can determine that second feature information is legal, verification side enriched with this Formula improves the probability of discovery mistake, improves information accuracy rate and success rate, reduces due to the data of input inaccuracy Lead to the case where re-entering information generation, reduce interaction times, increases data-handling efficiency.
Referring to Fig. 2, a kind of step flow chart of the embodiment of the method two of consistency verification of data of the application is shown, is had Body may include steps of:
Step 201, receive the form data of input, the form data include user information, fisrt feature information and Second feature information, wherein the fisrt feature information has associated first instance object identity, the second feature information With associated second instance object identity;
In the concrete realization, form data can be user in Webpage or APP (Application, application program) The data inputted in the list of the page.Wherein, list is mainly responsible for data acquisition function in the page, and a list can have three A element: first is that form tags, CGI (Common used in processing form data is contained in form tags Gateway Interface, Common Gateway Interface) program URL (Uniform Resoure Locator, unified resource positioning Symbol) and the data method that is submitted to server;Second is that form fields, form fields may include text box, password box, Hidden field, Multiline text frame, check box, radio box, drop-down choice box and file upload frame etc.;Third is that list button, list button be can wrap Submitting button, reset button and general button are included, the CGI scripting or take that list button is used to transfer data on server Disappear input, other processing work for defining processing script can also be controlled with list button.
Applied to the embodiment of the present application, form data may include user inputted in form fields user information, first Characteristic information and second feature information etc., wherein user information may include user's name, user identity identification code (such as body Part card number), telephone number, contact address, nationality, the information such as postcode;Fisrt feature information and second feature information can be with For the business datum for the business that user needs to handle;For the business datum with receiving-transmitting sides, if user information is hair A side of business datum is sent, then fisrt feature information and second feature information can be the letter of a side of reception business datum Breath, for example, for the business of cross-border remittance, user information can be the information of transferor, including remitter in financial field Name, remitter's ID card No. or organization mechanism code, remitter's contact method, contact address, remittance bank account etc., then Fisrt feature information and second feature information can be the information of beneficiary, including payee name, receiving bank's account, receipts Money bank cognizance code swift code, etc..
Further, fisrt feature information has associated first instance object identity, and second feature information has association Second instance object identity, wherein entity object mark is the mark of the corresponding carrier of business datum that user needs to handle, Or to receive the mark of the corresponding carrier of information of a side of business datum, for example, if fisrt feature information is receiving bank's account Number, then first instance object identity can be the title of banking institution corresponding with receiving bank's account;If second feature is believed Breath is receiving bank's cognizance code swift code, then second instance object identity can be and receiving bank's cognizance code The title of the corresponding banking institution of swift code.
Step 202, it whether legal verifies the user information, if so, thening follow the steps 203, otherwise, executes step 207;
In practical applications, the user information that user fills in form fields can be verified by foreground (or client) It is whether legal.Specifically, specific pattern can be set for the form fields when creating form fields, for example, it is directed to text box, Length limitation can be carried out to the number of characters inputted in text box (for example, no more than 50 characters or character in 10-20 Between, etc.), and, limitation input text box character types, including can only input Chinese character, can only input English character, only Number can be inputted, number and English character can only be inputted, be only number and " _ ", etc..Then inputted in receiving form fields Form data when, before form data is sent to server, foreground can according to corresponding pattern to form data input Format verified, i.e. progress length check and improper command check.
In a kind of preferred embodiment of the embodiment of the present application, if user information is the list letter filled in text box Breath, step 202 may include following sub-step:
Sub-step S11, whether the second character string for judging to form the user information includes preset second forbidden character, And whether the length of second character string is equal to second threshold or in second value section;
Sub-step S12, if second character string does not include the second forbidden character, also, the length of second character string Degree is equal to second threshold or in second value section, then determines that the user information is legal.
It, can be (such as defeated according to the character length of the corresponding text box of user information after receiving the user information of input Enter string length equal to second threshold or in second value section) and character types restrictive condition, to composition use Second character string of family information carries out length check and improper command check, if the second character string does not include the second illegal word Symbol and length in second value section or are equal to second threshold, then determine that user information input is legal.
For example, constraining its input rule in text box can be English only to allow to input if user information is user's name Letter (containing upper and lower case letter), number, part spcial character (such as dot, slash, branch), of length no more than 34 words of name Symbol.It is verified when if then user inputting John Smith as legal name, if input is John Than&d, verifies it as not Legal name, because it includes forbidden character &.For another example, if user information is telephone number, constraining its input rule in text box is It is only number and " _ ", for length no more than 11 characters, then it is illegal input that it is verified when user inputs 111-12-a, Because it includes English character " a " (forbidden characters).
If it should be noted that being related to the information of user identity or communication in user information, in addition to carrying out format check Outside, validity check can also be carried out, for example, if carrying out the verification of E-mail address when user information is E-mail address;If user Information is that user identity demonstrate,proves number, can carry out validity check to ID card No..
Step 203, whether verification fisrt feature information is legal, if so, thening follow the steps 204, otherwise, executes step 207;
After verification user information is legal, whether legal fisrt feature information can be further verified.In the embodiment of the present application A kind of preferred embodiment in, step 203 may include following sub-step:
Sub-step S21, whether the third character string for judging to form the fisrt feature information includes that preset third is illegal Character, and, whether the length of the third character string is equal to third threshold value or in third value section;
Sub-step S22, if the third character string does not include third forbidden character, also, the length of the third character string Degree is equal to third threshold value or in third value section, judges whether the fisrt feature information is effective information;
Sub-step S23 determines that the fisrt feature information is legal if the fisrt feature information is effective information.
If fisrt feature information is the form information filled in text box, for the format check of fisrt feature information It can be executed by foreground.Specifically, after receiving the fisrt feature information of input, foreground can believe according to fisrt feature Cease corresponding text box character length (as input string length be equal to third threshold value or in third value section) with And the restrictive condition of character types, length check and forbidden character school are carried out to the third character string of composition fisrt feature information It tests, if third character string does not include third forbidden character and length in third value section or is equal to third threshold value, sentences The format for determining the first information is legal.For example, constraining its input in text box if fisrt feature information is bank card account number information Rule can be entirely numerical character, of length no more than 34 characters, etc., if the fisrt feature information of input meets for input Input rule, then the format of the fisrt feature information is legal;If inputting space, automatic fitration can be carried out;If input English The non-numeric character such as character, spcial character, then the format of the fisrt feature information is illegal;If the character length of input is more than 34 characters, then do not allow subsequent input.
Since fisrt feature information can be business datum, then when verifying fisrt feature information, in addition to carrying out format school It tests, the validity check of the identity of fisrt feature information can also be carried out.For the validity check of fisrt feature information, then may be used To be carried out by corresponding validity check algorithm.Verifying fisrt feature information format is legal and identity it is legal after, then Determine that fisrt feature information is legal.
For example, Luhn algorithm (Luhn Check Digit can be used if fisrt feature information is bank card account number information Algorithm examines digital algorithm) it is verified, wherein Luhn algorithm is also referred to as " mould 10 " (Mod 10) algorithm, is a kind of Simple checksum algorithm is generally used for verifying identity code, such as credit card issuer identification code, international mobile device identification code (IMEI) etc..The rule of Luhn algorithm are as follows: since the last one-bit digital of card number, even bit is multiplied by 2, if multiplied by 2 result It is double figures, number on two positions is added and is saved;All numbers are added, summation is obtained;If bank card number or credit Card number code be it is legal, summation can be divided exactly by 10.
Step 204, first instance object identity corresponding with the fisrt feature information is obtained, step 205 is continued to execute;
After carrying out format check and validity check to fisrt feature information, if verifying fisrt feature information is legal, It then can further obtain the first first instance object identity corresponding with fisrt feature information.In one kind of the embodiment of the present application In preferred embodiment, step 204 may include following sub-step:
Sub-step S31 generates first instance object acquisition request according to the fisrt feature information;
The first instance object acquisition request is sent to server by sub-step S32;
It is real to receive the server returns corresponding with the first instance object acquisition request first by sub-step S33 Body object identity.
Wherein, the first instance object identity is that the server receives the first instance object acquisition request Afterwards, from being matched to the data obtained after the fisrt feature information in preset relational database;The relational database storage The incidence relation of the fisrt feature information and the first instance object identity.
It is taken specifically, the process for obtaining the corresponding first instance object identity of fisrt feature information is related to foreground and backstage The process of business device interaction.In background server, being associated with for storage fisrt feature information and first instance object identity is preserved The relational database of relationship, wherein the data in relational database can be obtained by the third-party institution, can also be looked into from network Ask obtain, the embodiment of the present application to the data source in relational database with no restriction.
After foreground verification fisrt feature information is legal, the first instance object comprising fisrt feature information can be generated and obtain Request is taken, and the first instance object acquisition request is sent to background server, background server receives first instance pair After acquisition request, parsing is carried out to first instance object acquisition request and obtains fisrt feature information, then in relational database Middle lookup fisrt feature information can obtain and the if searching successfully according to the incidence relation that saves in relational database The corresponding first instance object identity of one characteristic information, if searching unsuccessful, then it represents that there is no should in background relational database Fisrt feature information can then search corresponding first instance object identity by other approach, and such as networking is searched, and request third Square mechanism lookup etc..
After foreground receives the first instance object identity of background server return, it can be shown behind corresponding text box Show the first instance object identity.
For example, Bank Account Number is usually 16 or 19, by as follows if fisrt feature information is bank card account number information Three parts are constituted: (1) first six digits are: publisher's authentication code (Issuer Identification Number, abbreviation IIN), Wherein the first bit digital is major industry identifier (Major Industry Identifier, abbreviation MII).IIN is used to indicate A set of bank card number of issuing bank or mechanism coding, can allow card holder to identify the issuer of bank card;(2) intermediate Digit be: personal account number (since card number the 7th), intermediate digit is customized by credit card issuer, generally by 6-12 Number composition, at most can be used 12 bit digitals, the personal account number rule of each bank is different;(3) last position Digit is check bit, and the number before card number is calculated to the last one digit number of credit card or debit card using Luhn algorithm Word.
The incidence relation that bank card number first six digits IIN is identified with corresponding banking institution is saved in background data base, when Foreground receive bank account information and verify the bank account information it is legal after, foreground passes the IIN of bank account information It is handed to background server, background server matches the IIN received in the database, if being matched to, returns corresponding unique Banking institution mark;It, can be behind the text box of input bank account information after foreground receives banking institution's mark Show banking institution's mark corresponding with bank account information.
Step 205, it whether legal verifies the second feature information, if so, thening follow the steps 206, otherwise, executes step 207;
After verification fisrt feature information is legal, whether legal, in the application if can further verify second feature information In a kind of preferred embodiment of embodiment, step 205 may include following sub-step:
Sub-step S41, whether the first character string for judging to form the second feature information includes preset first illegal Character, and, whether the length of first character string is equal to first threshold or in the first numerical intervals;
Sub-step S42, if first character string does not include first forbidden character, also, first character string Length be equal to first threshold or in the first numerical intervals, then obtain second instance corresponding with the second feature information Object identity;
Sub-step S43, if the second instance object identity is identical as the first instance object identity, described in judgement Second feature information is legal.
If second feature information is the form information filled in text box, for the format check of second feature information It can be executed by foreground.Specifically, after receiving the second feature information of input, foreground can believe according to second feature Cease corresponding text box character length (as input string length be equal to first threshold or in the first numerical intervals) with And the restrictive condition of character types, length check and forbidden character school are carried out to the first character string of composition fisrt feature information It tests, if the first character string does not include the first forbidden character and length in the first numerical intervals or is equal to first threshold, sentences The format of fixed second information is legal.
For example, if second feature information is bank's cognizance code swift code, wherein swift code is by computer It can be formed with 8 of automatic interpretation or 11 English alphabets or Arabic numerals, in SWIFT (Society for Worldwide Interbank Financial Telecommunication, global bank finance telecommunications industry association) it is bright in text Really distinguish relevant different financial institution in financial transaction.The composition rule of swift code is as follows: 1) Routing Number (Bank Code): You Siwei English alphabet forms, every only one Routing Number of bank, and is made by oneself by it, usually the row name of the row Acronym, the branch all suitable for its;2) country code (Country Code): You Liangwei English alphabet composition, To distinguish country and geographic area where user;3) area code (Location Code): by the double figures other than 0,1 Word or two letter compositions, to distinguish the geographical location for being located at the country in which it is located, such as time zone, province, state, city;4) generation in lines Code (Branch Code): You Sanwei letter or number composition, for distinguishing a certain branch, tissue or department in a country.Then Swift code can be verified according to above-mentioned composition rule, if the swift code length of input is 8 or 11, and And first six digits are English characters, latter 2 or 5 be numerical character and English character combination, then determine that swift code is legal; Otherwise, swift code is illegal, for example, if the swift code of user's input is CITI2212, because occurring in its first 6 Numerical character, therefore can be determined that its is illegal.
After the format for determining second feature information is legal, the corresponding second instance object of available second feature information Mark, sub-step S42 can further include following sub-step:
Sub-step S421, if first character string does not include first forbidden character, also, first character string Length be equal to first threshold or in the first numerical intervals, then generate second instance object according to the second feature information Acquisition request;
The second instance object acquisition request is sent to server by sub-step S422;
It is real to receive the server returns corresponding with the second instance object acquisition request second by sub-step S423 Body object identity, after the second instance object identity receives the second instance object acquisition request for the server, From being matched to the data obtained after the second feature information in preset relational database;Described in the relational database storage The incidence relation of second feature information and the second instance object identity.
It should be noted that the process for obtaining the corresponding second instance object identity of second feature information is related to foreground with after The process of platform server interaction, in above-mentioned steps 204 according to the corresponding first instance object identity of fisrt feature information Principle is substantially similar, is specifically referred to the description of step 204, details are not described herein for the embodiment of the present application.
In the embodiment of the present application, other than carrying out format check to second feature information, second feature can also be believed Breath gets up with fisrt feature information association, carries out linkage verification, in the form of abundant verification, finds mistake in time, improve operate at Power and accuracy rate are further reduced interaction times, improve operating efficiency.The process of linkage verification can be to judge second Whether entity object mark is identical as the first instance object identity, if they are the same, then determines that the second feature information is legal.
For example, the bank account information that user fills in is 4392268314492555, the corresponding swift code filled in is CITISGSG.If the method in application background technology, independent forbidden character judgement is carried out to the two, then the judgement result of the two It is all legal.China Merchants Bank is identified as however, inquiring to obtain its corresponding banking institution from the first six digits of bank account information; And preceding four inquiries according to swift code obtain its corresponding banking institution and are identified as the Citibank, the embodiment of the present application exists After determining that the corresponding banking institution's mark of swift code banking institution's mark corresponding with bank account information is inconsistent, most Determine that swift code is illegal eventually, by checking the relevance of bank account information and swift code, help identifies wrong Remittance information, come to find mistake in time with this, improve sender information accuracy, promote cross-border remittance success rate, into And promote operation processing efficiency, meanwhile, reduce remitter because remit money it is unsuccessful caused by remit money service charge loss the case where send out It is raw.
Step 206, determine that the form data is legal;
In all data for successively verifying form data, such as user information, fisrt feature information and second feature information After all legal, then judge that form data is legal.It is operated in next step at this point it is possible to enter, for example, for cross-border money transfer transactions, Verify form information, i.e., remittance information it is all legal after, then the remittance information can be submitted, into remittance process.
Step 207, prompt information is generated, and shows the prompt information.
In verifying user information, and/or, fisrt feature information, and/or, it, can foundation when second feature information is illegal The illegal judging result generates prompt information, wherein and prompt information includes user information, and/or, fisrt feature information, And/or the illegal reason of second feature information, for prompting and guiding user to fill in the anti-data of exact list.
For example, prompt information can be " the name character that you input if the user's name filled in is John Than&d Containing forbidden character, whether your input of PLSCONFM is correct ";For another example, it if bank account information includes nonnumeric character, prompts Information can for " bank account information may input it is wrong, please reaffirm input it is whether correct ";For another example, if swift The corresponding banking institution's mark of code banking institution's mark corresponding with bank account information is inconsistent, then prompt information can be " swift code and bank account information mismatch, and whether PLSCONFM swift code fills in correct ";
In the embodiment of the present application, after receiving the form data of user's input, for each single item in form data, That is user information, fisrt feature information and second feature information can be with while carrying out improper command check to it respectively The verification of being associated property, judges legitimacy in conjunction with relevance verification, enriches verification mode with this, improves discovery mistake Probability improves information accuracy rate and success rate, and reduce causes to re-enter information because of the data of input inaccuracy It happens, reduces interaction times, increase data-handling efficiency.
In addition, treatment effeciency increases since interaction times reduce, user is avoided because of the time caused by multi-pass operation Loss and economic loss, the user experience is improved.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method It closes, but those skilled in the art should understand that, the embodiment of the present application is not limited by the described action sequence, because according to According to the embodiment of the present application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should Know, the embodiments described in the specification are all preferred embodiments, and related movement not necessarily the application is implemented Necessary to example.
Referring to Fig. 3, a kind of structural block diagram of the system embodiment of consistency verification of data of the application is shown, it specifically can be with Including following module:
Data reception module 301, form data for receiving input, the form data include user information, first Characteristic information and second feature information, wherein the fisrt feature information has associated first instance object identity, described Second feature information has associated second instance object identity;
Correction verification module 302 is used for after the verification user information and the fisrt feature information are legal, described in verification Whether second feature information legal, wherein the second feature information it is legal include the first instance object identity with it is described Second instance object identity is identical;
Determination module 303, for determining that the form data is legal when the second feature information is legal.
Referring to Fig. 4, a kind of structural block diagram of embodiment of the correction verification module of the application is shown, may include following son Module:
First verification submodule 3021, it is whether legal for verifying the user information;
Second verification submodule 3022, for whether verifying the fisrt feature information when the user information is legal It is legal;
First identifier acquisition submodule 3023, for when the fisrt feature information is legal, obtaining and first spy Reference ceases corresponding first instance object identity;
Third verifies submodule 3024, forms whether the first character string of the second feature information includes pre- for judging If the first forbidden character, and, whether the length of first character string is equal to first threshold or in the first numerical intervals It is interior;
Second identifier acquisition submodule 3025, for not including first forbidden character in first character string, and And the length of first character string is equal to first threshold or when in the first numerical intervals, obtains and the second feature The corresponding second instance object identity of information;
Legal decision sub-module 3026, in the second instance object identity and the first instance object identity phase Meanwhile determining that the second feature information is legal.
In a kind of preferred embodiment of the embodiment of the present application, first identifier acquisition submodule 3023 be can further include Such as lower unit:
First request generation unit, is used for when the fisrt feature information is legal, raw according to the fisrt feature information At first instance object acquisition request;
First transmission unit, for the first instance object acquisition request to be sent to server;
First receiving unit, for receiving the corresponding with the first instance object acquisition request of the server return First instance object identity, the first instance object identity receive the first instance object acquisition for the server and ask After asking, from being matched to the data obtained after the fisrt feature information in preset relational database;The relation data inventory Store up the incidence relation of the fisrt feature information Yu the first instance object identity.
In a kind of preferred embodiment of the embodiment of the present application, second identifier acquisition submodule 3025 be can further include Such as lower unit:
Second request generation unit, for not including first forbidden character in first character string, also, it is described The length of first character string is equal to first threshold or when in the first numerical intervals, generates the according to the second feature information Two entity object acquisition requests;
Second transmission unit, for the second instance object acquisition request to be sent to server;
Second receiving unit, for receiving the corresponding with the second instance object acquisition request of the server return Second instance object identity, the second instance object identity receive the second instance object acquisition for the server and ask After asking, from being matched to the data obtained after the second feature information in preset relational database;The relation data inventory Store up the incidence relation of the second feature information Yu the second instance object identity.
In a kind of preferred embodiment of the embodiment of the present application, the first verification submodule 3021 be can further include Such as lower unit:
First judging unit, whether the second character string for judging to form the user information includes preset second non- Method character, and, whether the length of second character string is equal to second threshold or in second value section;
First judging unit, for not including the second forbidden character, also, second character in second character string When the length of string is equal to second threshold or in second value section, determine that the user information is legal.
In a kind of preferred embodiment of the embodiment of the present application, the second verification submodule 3022 be can further include Such as lower unit:
Second judgment unit, for judging the third for forming the fisrt feature information when the user information is legal Whether character string includes preset third forbidden character, and, the length of the third character string whether be equal to third threshold value or Person is in third value section;
Third judging unit, for not including third forbidden character, also, the third character in the third character string When the length of string is equal to third threshold value or in third value section, judge whether the fisrt feature information is effectively to believe Breath;
Second judging unit, for determining the fisrt feature information when the fisrt feature information is effective information It is legal.
In a kind of preferred embodiment of the embodiment of the present application, the system can also include:
Prompt information generation module, for determining that the user information is illegal, and/or, the fisrt feature information It is illegal, and/or, when the second feature information is illegal, prompt information, institute are generated according to the illegal judging result Stating prompt information includes the user information, and/or, the fisrt feature information, and/or, the second feature information does not conform to The reason of method;
Display module, for showing the prompt information.
As a kind of preferable example of the embodiment of the present application, the form data can be the remittance information of cross-border remittance; The user information can be sender information;The fisrt feature information can be receiving bank's account information;Described second Characteristic information can be receiving bank's cognizance code;The first instance object identity and/or the second instance object identity It can be receiving bank's authority identification.
For the system embodiment described in Fig. 3, since it is substantially similar to above method embodiment, so description Fairly simple, the relevent part can refer to the partial explaination of embodiments of method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiments of the present application may be provided as method, apparatus or calculating Machine program product.Therefore, the embodiment of the present application can be used complete hardware embodiment, complete software embodiment or combine software and The form of the embodiment of hardware aspect.Moreover, the embodiment of the present application can be used one or more wherein include computer can With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code The form of the computer program product of implementation.
In a typical configuration, the computer equipment includes one or more processors (CPU), input/output Interface, network interface and memory.Memory may include the non-volatile memory in computer-readable medium, random access memory The forms such as device (RAM) and/or Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is to calculate The example of machine readable medium.Computer-readable medium includes that permanent and non-permanent, removable and non-removable media can be with Realize that information is stored by any method or technique.Information can be computer readable instructions, data structure, the module of program or Other data.The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, CD-ROM are read-only Memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or Other magnetic storage devices or any other non-transmission medium, can be used for storage can be accessed by a computing device information.According to Herein defines, and computer-readable medium does not include non-persistent computer readable media (transitory media), such as The data-signal and carrier wave of modulation.
The embodiment of the present application is referring to according to the method for the embodiment of the present application, terminal device (system) and computer program The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart And/or in one or more blocks of the block diagram specify function the step of.
Although preferred embodiments of the embodiments of the present application have been described, once a person skilled in the art knows bases This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as Including preferred embodiment and all change and modification within the scope of the embodiments of the present application.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
The method to a kind of consistency verification of data provided herein and a kind of consistency verification of data is above System, is described in detail, specific examples are used herein to illustrate the principle and implementation manner of the present application, above The explanation of embodiment is merely used to help understand the present processes and its core concept;Meanwhile for the general skill of this field Art personnel, according to the thought of the application, there will be changes in the specific implementation manner and application range, in conclusion this Description should not be construed as the limitation to the application.

Claims (16)

1. a kind of method of consistency verification of data, which is characterized in that the described method includes:
The form data of input is received, the form data includes user information, fisrt feature information and second feature information, Wherein, the fisrt feature information has associated first instance object identity, and the second feature information has associated the Two entity objects mark;Wherein, the fisrt feature information is receiving bank's account information;The second feature information is gathering Bank's cognizance code;The first instance object identity and/or the second instance object identity are receiving bank's authority identification;
After the verification user information and the fisrt feature information are legal, verify whether the second feature information closes Method, wherein the legal second feature information includes the first instance object identity and the second instance object identity phase Together;
If the second feature information is legal, determine that the form data is legal.
2. the method according to claim 1, wherein described verifying the user information and first spy After reference breath is legal, verifying the second feature information, whether legal step includes:
Whether legal verify the user information;
If the user information is legal, whether legal the fisrt feature information is verified;
If the fisrt feature information is legal, first instance object identity corresponding with the fisrt feature information is obtained, with And
Whether the first character string for judging to form the second feature information includes preset first forbidden character, and, it is described Whether the length of the first character string is equal to first threshold or in the first numerical intervals;
If first character string does not include first forbidden character, also, the length of first character string is equal to first Threshold value or in the first numerical intervals then obtains second instance object identity corresponding with the second feature information;
If the second instance object identity is identical as the first instance object identity, determine that the second feature information is closed Method.
If 3. according to the method described in claim 2, it is characterized in that, the fisrt feature information is legal, obtain with The step of fisrt feature information corresponding first instance object identity includes:
If the fisrt feature information is legal, first instance object acquisition request is generated according to the fisrt feature information;
The first instance object acquisition request is sent to server;
The first instance object identity corresponding with the first instance object acquisition request that the server returns is received, it is described First instance object identity is after the server receives the first instance object acquisition request, from preset relation data The data obtained after the fisrt feature information are matched in library;The relational database stores the fisrt feature information and institute State the incidence relation of first instance object identity.
4. according to the method in claim 2 or 3, which is characterized in that if first character string does not include described the One forbidden character, also, the length of first character string is equal to first threshold or in the first numerical intervals, then obtain with The step of second feature information corresponding second instance object identity includes:
If first character string does not include first forbidden character, also, the length of first character string is equal to first Threshold value or in the first numerical intervals then generates second instance object acquisition request according to the second feature information;
The second instance object acquisition request is sent to server;
The second instance object identity corresponding with the second instance object acquisition request that the server returns is received, it is described Second instance object identity is after the server receives the second instance object acquisition request, from preset relation data The data obtained after the second feature information are matched in library;The relational database stores the second feature information and institute State the incidence relation of second instance object identity.
5. according to the method described in claim 2, it is characterized in that, described verify the whether legal step packet of the user information It includes:
Whether the second character string for judging to form the user information includes preset second forbidden character, and, described second Whether the length of character string is equal to second threshold or in second value section;
If second character string does not include the second forbidden character, also, the length of second character string is equal to second threshold Or in second value section, then determine that the user information is legal.
6. if according to the method described in claim 2, verify described it is characterized in that, the user information is legal The whether legal step of one characteristic information includes:
If the user information is legal, whether the third character string for judging to form the fisrt feature information includes preset third Forbidden character, and, whether the length of the third character string is equal to third threshold value or in third value section;
If the third character string does not include third forbidden character, also, the length of the third character string is equal to third threshold value Or in third value section, judge whether the fisrt feature information is effective information;
If the fisrt feature information is effective information, determine that the fisrt feature information is legal.
7. method described according to claim 1 or 2 or 5 or 6, which is characterized in that further include:
Determining that the user information is illegal, and/or, the fisrt feature information is illegal, and/or, the second feature When information is illegal, prompt information is generated according to the illegal judging result, the prompt information includes user's letter Breath, and/or, the fisrt feature information, and/or, the illegal reason of second feature information;
Show the prompt information.
8. method described according to claim 1 or 2 or 5 or 6, which is characterized in that the form data is the remittance of cross-border remittance Money information;The user information is sender information.
9. a kind of system of consistency verification of data, which is characterized in that the system comprises:
Data reception module, form data for receiving input, the form data include user information, fisrt feature information And second feature information, wherein the fisrt feature information has associated first instance object identity, the second feature Information has associated second instance object identity;Wherein, the fisrt feature information is receiving bank's account information;Described Two characteristic informations are receiving bank's cognizance code;The first instance object identity and/or the second instance object identity are Receiving bank's authority identification;
Correction verification module, for it is special to verify described second after the verification user information and the fisrt feature information are legal Whether reference breath is legal, wherein the legal second feature information includes that the first instance object identity and described second are real Body object identity is identical;
Determination module, for determining that the form data is legal when the second feature information is legal.
10. system according to claim 9, which is characterized in that the correction verification module includes:
First verification submodule, it is whether legal for verifying the user information;
Second verification submodule, for whether legal verifying the fisrt feature information when the user information is legal;
First identifier acquisition submodule, for obtaining and the fisrt feature information pair when the fisrt feature information is legal The first instance object identity answered, and
Third verifies submodule, and whether the first character string for judging to form the second feature information includes preset first Forbidden character, and, whether the length of first character string is equal to first threshold or in the first numerical intervals;
Second identifier acquisition submodule, for not including first forbidden character, also, described the in first character string When the length of one character string is equal to first threshold or in the first numerical intervals, obtain corresponding with the second feature information Second instance object identity;
Legal decision sub-module, for sentencing when the second instance object identity is identical as the first instance object identity The fixed second feature information is legal.
11. system according to claim 10, which is characterized in that the first identifier acquisition submodule includes:
First request generation unit generates the according to the fisrt feature information for when the fisrt feature information is legal One entity object acquisition request;
First transmission unit, for the first instance object acquisition request to be sent to server;
First receiving unit is returning with the first instance object acquisition request corresponding first for receiving the server Entity object mark, the first instance object identity are that the server receives the first instance object acquisition request Afterwards, from being matched to the data obtained after the fisrt feature information in preset relational database;The relational database storage The incidence relation of the fisrt feature information and the first instance object identity.
12. system described in 0 or 11 according to claim 1, which is characterized in that the second identifier acquisition submodule includes:
Second request generation unit, for not including first forbidden character, also, described first in first character string When the length of character string is equal to first threshold or in the first numerical intervals, it is real that second is generated according to the second feature information Body object acquisition request;
Second transmission unit, for the second instance object acquisition request to be sent to server;
Second receiving unit is returning with the second instance object acquisition request corresponding second for receiving the server Entity object mark, the second instance object identity are that the server receives the second instance object acquisition request Afterwards, from being matched to the data obtained after the second feature information in preset relational database;The relational database storage The incidence relation of the second feature information and the second instance object identity.
13. system according to claim 10, which is characterized in that described first, which verifies submodule, includes:
First judging unit, whether the second character string for judging to form the user information includes the preset second illegal word Symbol, and, whether the length of second character string is equal to second threshold or in second value section;
First judging unit, for not including the second forbidden character, also, second character string in second character string When length is equal to second threshold or in second value section, determine that the user information is legal.
14. system according to claim 10, which is characterized in that described second, which verifies submodule, includes:
Second judgment unit, for judging the third character for forming the fisrt feature information when the user information is legal String whether include preset third forbidden character, and, the length of the third character string whether be equal to third threshold value or In third value section;
Third judging unit, for not including third forbidden character, also, the third character string in the third character string When length is equal to third threshold value or in third value section, judge whether the fisrt feature information is effective information;
Second judging unit, for determining that the fisrt feature information is legal when the fisrt feature information is effective information.
15. according to system described in claim 9 or 10 or 13 or 14, which is characterized in that further include:
Prompt information generation module, for determining that the user information is illegal, and/or, the fisrt feature information does not conform to Method, and/or, when the second feature information is illegal, prompt information is generated according to the illegal judging result, it is described to mention Show that information includes the user information, and/or, the fisrt feature information, and/or, the second feature information is illegal Reason;
Display module, for showing the prompt information.
16. according to system described in claim 9 or 10 or 13 or 14, which is characterized in that the form data is cross-border remittance Remittance information;The user information is sender information.
CN201410578635.XA 2014-10-24 2014-10-24 A kind of method and system of consistency verification of data Active CN105589885B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410578635.XA CN105589885B (en) 2014-10-24 2014-10-24 A kind of method and system of consistency verification of data

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410578635.XA CN105589885B (en) 2014-10-24 2014-10-24 A kind of method and system of consistency verification of data

Publications (2)

Publication Number Publication Date
CN105589885A CN105589885A (en) 2016-05-18
CN105589885B true CN105589885B (en) 2019-07-02

Family

ID=55929471

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410578635.XA Active CN105589885B (en) 2014-10-24 2014-10-24 A kind of method and system of consistency verification of data

Country Status (1)

Country Link
CN (1) CN105589885B (en)

Families Citing this family (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108287811B (en) * 2017-01-10 2021-08-17 阿里巴巴集团控股有限公司 Character checking method and device
CN107451802B (en) * 2017-08-11 2021-04-06 中国银行股份有限公司 Method and device for transferring money and remitting money by internet bank
CN107977404B (en) * 2017-11-15 2020-08-28 深圳壹账通智能科技有限公司 User information screening method, server and computer readable storage medium
CN108133148B (en) * 2017-12-22 2019-05-21 北京明朝万达科技股份有限公司 Data safety inspection method and system
CN108304503A (en) * 2018-01-18 2018-07-20 阿里巴巴集团控股有限公司 A kind of processing method of data, device and equipment
CN108470404B (en) * 2018-03-05 2020-11-17 深圳怡化电脑股份有限公司 Gate control method and device for card reader, financial equipment and storage medium
CN108764239B (en) * 2018-05-31 2020-07-24 平安科技(深圳)有限公司 Invoice verification method and device, computer equipment and storage medium
CN109376341A (en) * 2018-09-26 2019-02-22 海南新软软件有限公司 A kind of preservation of long list and method of calibration, apparatus and system
CN109299719B (en) * 2018-09-30 2021-07-23 武汉斗鱼网络科技有限公司 Bullet screen checking method and device based on character segmentation, terminal and storage medium
CN109636493A (en) * 2018-12-13 2019-04-16 西安艾润物联网技术服务有限责任公司 Vehicle billing method and device
CN110020640B (en) * 2019-04-19 2021-08-24 厦门商集网络科技有限责任公司 Method and terminal for correcting identity card information
CN112488729A (en) * 2020-11-30 2021-03-12 上海中商网络股份有限公司 Data verification method and device, computer equipment and readable storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101557406A (en) * 2009-06-01 2009-10-14 杭州华三通信技术有限公司 User terminal authentication method, device and system thereof
CN102867269A (en) * 2012-08-29 2013-01-09 福建联迪商用设备有限公司 Synchronous transmission system and method for financial service data
CN103391311A (en) * 2013-06-24 2013-11-13 北京奇虎科技有限公司 Method and system for consistency verification of data among multiple platforms
CN103581040A (en) * 2013-11-26 2014-02-12 深圳中兴网信科技有限公司 Server distributing device and server distributing method

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8332327B2 (en) * 2006-10-31 2012-12-11 Core Wireless Licensing S.A.R.L. Legal text distribution and processing in mobile broadcasting

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101557406A (en) * 2009-06-01 2009-10-14 杭州华三通信技术有限公司 User terminal authentication method, device and system thereof
CN102867269A (en) * 2012-08-29 2013-01-09 福建联迪商用设备有限公司 Synchronous transmission system and method for financial service data
CN103391311A (en) * 2013-06-24 2013-11-13 北京奇虎科技有限公司 Method and system for consistency verification of data among multiple platforms
CN103581040A (en) * 2013-11-26 2014-02-12 深圳中兴网信科技有限公司 Server distributing device and server distributing method

Also Published As

Publication number Publication date
CN105589885A (en) 2016-05-18

Similar Documents

Publication Publication Date Title
CN105589885B (en) A kind of method and system of consistency verification of data
US11615362B2 (en) Universal model scoring engine
US10433128B2 (en) Methods and systems for provisioning multiple devices
US8020766B2 (en) Verification of portable consumer devices
US9747598B2 (en) Dynamic security code push
US8326759B2 (en) Verification of portable consumer devices
US20080133403A1 (en) Mobile-To-Mobile Payment System And Method
US11442804B2 (en) Anomaly detection in data object text using natural language processing (NLP)
WO2019118939A1 (en) Self learning data loading optimization for a rule engine
CN107294999A (en) Information Authentication processing method, device, system, client and server
US20230274278A1 (en) Adaptable messaging
CN111242462B (en) Data processing method and device, computer storage medium and electronic equipment
US20210233066A1 (en) Systems and methods for payment token provisioning with variable risk evaluation
US11227220B2 (en) Automatic discovery of data required by a rule engine
US20190236558A1 (en) Systems and methods for dynamic transaction processing
CN110865797A (en) Method and device for processing dynamic attributes of services
EP4040322A1 (en) Method and system for creating rapid searchable altered data in a database
US20230068468A1 (en) Systems and methods for conducting transactions using a surrogate pin
CN114036364B (en) Method, apparatus, device, medium, and system for identifying crawlers
US11853920B2 (en) Methods and systems for implementing hierarchy of rule-based security authentication modes
CN107493289A (en) A kind of Network Bank security authentication method and device
CN109345215B (en) Digital currency processing method, device, computer equipment and storage medium
CN112561518A (en) Information identification method, device and storage medium
US11409590B2 (en) Proactive outreach platform for error resolution based on user intent in server-driven communication channels
KR20190124062A (en) Method and server for providing financial service

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Innovative advanced technology Co.,Ltd.

Address before: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee before: Advanced innovation technology Co.,Ltd.

Effective date of registration: 20200924

Address after: Cayman Enterprise Centre, 27 Hospital Road, George Town, Grand Cayman Islands

Patentee after: Advanced innovation technology Co.,Ltd.

Address before: A four-storey 847 mailbox in Grand Cayman Capital Building, British Cayman Islands

Patentee before: Alibaba Group Holding Ltd.

TR01 Transfer of patent right
TR01 Transfer of patent right

Effective date of registration: 20240218

Address after: Guohao Times City # 20-01, 128 Meizhi Road, Singapore

Patentee after: Advanced Nova Technology (Singapore) Holdings Ltd.

Country or region after: Singapore

Address before: 27 Hospital Road, George Town, Grand Cayman ky1-9008

Patentee before: Innovative advanced technology Co.,Ltd.

Country or region before: Cayman Islands