Summary of the invention
The technical problem to be solved in the embodiments of the present application is that a kind of method of consistency verification of data is provided, to send out in time
Existing existing mistake, improves verification accuracy rate, saves user operation time, improve data-handling efficiency.
Correspondingly, the embodiment of the present application also provides a kind of systems of consistency verification of data, to guarantee the above method
Realization and application.
To solve the above-mentioned problems, this application discloses a kind of methods of consistency verification of data, which comprises
The form data of input is received, the form data includes user information, fisrt feature information and second feature
Information, wherein the fisrt feature information has associated first instance object identity, and the second feature information has association
Second instance object identity;
After the verification user information and the fisrt feature information are legal, whether the second feature information is verified
It is legal, wherein the legal second feature information includes the first instance object identity and the second instance object identity
It is identical;
If the second feature information is legal, determine that the form data is legal.
Preferably, described after the verification user information and the fisrt feature information are legal, verification described second
The whether legal step of characteristic information includes:
Whether legal verify the user information;
If the user information is legal, whether legal the fisrt feature information is verified;
If the fisrt feature information is legal, first instance object mark corresponding with the fisrt feature information is obtained
Know, and
Whether the first character string for judging to form the second feature information includes preset first forbidden character, and,
Whether the length of first character string is equal to first threshold or in the first numerical intervals;
If first character string does not include first forbidden character, also, the length of first character string is equal to
First threshold or in the first numerical intervals then obtains second instance object identity corresponding with the second feature information;
If the second instance object identity is identical as the first instance object identity, the second feature letter is determined
It is legal to cease.
Preferably, it if the fisrt feature information is legal, obtains and the fisrt feature information corresponding first
Entity object identify the step of include:
If the fisrt feature information is legal, first instance object acquisition is generated according to the fisrt feature information and is asked
It asks;
The first instance object acquisition request is sent to server;
The first instance object identity corresponding with the first instance object acquisition request that the server returns is received,
The first instance object identity is after the server receives the first instance object acquisition request, from preset relationship
The data obtained after the fisrt feature information are matched in database;The relational database stores the fisrt feature information
With the incidence relation of the first instance object identity.
Preferably, if first character string does not include first forbidden character, also, first character string
Length be equal to first threshold or in the first numerical intervals, then obtain second instance corresponding with the second feature information
The step of object identity includes:
If first character string does not include first forbidden character, also, the length of first character string is equal to
First threshold or in the first numerical intervals then generates second instance object acquisition request according to the second feature information;
The second instance object acquisition request is sent to server;
The second instance object identity corresponding with the second instance object acquisition request that the server returns is received,
The second instance object identity is after the server receives the second instance object acquisition request, from preset relationship
The data obtained after the second feature information are matched in database;The relational database stores the second feature information
With the incidence relation of the second instance object identity.
Preferably, the whether legal step of the verification user information includes:
Whether the second character string for judging to form the user information includes preset second forbidden character, and, it is described
Whether the length of the second character string is equal to second threshold or in second value section;
If second character string does not include the second forbidden character, also, the length of second character string is equal to second
Threshold value or in second value section, then determine that the user information is legal.
Preferably, if the user information is legal, the whether legal step packet of the fisrt feature information is verified
It includes:
If the user information is legal, whether the third character string for judging to form the fisrt feature information includes preset
Third forbidden character, and, whether the length of the third character string is equal to third threshold value or in third value section;
If the third character string does not include third forbidden character, also, the length of the third character string is equal to third
Threshold value or in third value section, judges whether the fisrt feature information is effective information;
If the fisrt feature information is effective information, determine that the fisrt feature information is legal.
Preferably, the method also includes:
Determining that the user information is illegal, and/or, the fisrt feature information is illegal, and/or, described second
When characteristic information is illegal, prompt information is generated according to the illegal judging result, the prompt information includes the use
Family information, and/or, the fisrt feature information, and/or, the illegal reason of second feature information;
Show the prompt information.
Preferably, the form data is the remittance information of cross-border remittance;The user information is sender information;It is described
Fisrt feature information is receiving bank's account information;The second feature information is receiving bank's cognizance code;Described first is real
Body object identity and/or the second instance object identity are receiving bank's authority identification.
The embodiment of the present application also provides a kind of system of consistency verification of data, the system comprises:
Data reception module, form data for receiving input, the form data include user information, fisrt feature
Information and second feature information, wherein the fisrt feature information have associated first instance object identity, described second
Characteristic information has associated second instance object identity;
Correction verification module, for verify the user information and the fisrt feature information it is legal after, verify described the
Whether two characteristic informations are legal, wherein the legal second feature information includes the first instance object identity and described the
Two entity objects mark is identical;
Determination module, for determining that the form data is legal when the second feature information is legal.
Preferably, the correction verification module includes:
First verification submodule, it is whether legal for verifying the user information;
Second verification submodule, for whether legal verifying the fisrt feature information when the user information is legal;
First identifier acquisition submodule, for obtaining and believing with the fisrt feature when the fisrt feature information is legal
Corresponding first instance object identity is ceased, and
Third verifies submodule, forms whether the first character string of the second feature information includes preset for judging
First forbidden character, and, whether the length of first character string is equal to first threshold or in the first numerical intervals;
Second identifier acquisition submodule, for not including first forbidden character, also, institute in first character string
When stating the length of the first character string equal to first threshold or in the first numerical intervals, obtain and the second feature information pair
The second instance object identity answered;
Legal decision sub-module, for identical as the first instance object identity in the second instance object identity
When, determine that the second feature information is legal.
Preferably, the first identifier acquisition submodule includes:
First request generation unit, is used for when the fisrt feature information is legal, raw according to the fisrt feature information
At first instance object acquisition request;
First transmission unit, for the first instance object acquisition request to be sent to server;
First receiving unit, for receiving the corresponding with the first instance object acquisition request of the server return
First instance object identity, the first instance object identity receive the first instance object acquisition for the server and ask
After asking, from being matched to the data obtained after the fisrt feature information in preset relational database;The relation data inventory
Store up the incidence relation of the fisrt feature information Yu the first instance object identity.
Preferably, the second identifier acquisition submodule includes:
Second request generation unit, for not including first forbidden character in first character string, also, it is described
The length of first character string is equal to first threshold or when in the first numerical intervals, generates the according to the second feature information
Two entity object acquisition requests;
Second transmission unit, for the second instance object acquisition request to be sent to server;
Second receiving unit, for receiving the corresponding with the second instance object acquisition request of the server return
Second instance object identity, the second instance object identity receive the second instance object acquisition for the server and ask
After asking, from being matched to the data obtained after the second feature information in preset relational database;The relation data inventory
Store up the incidence relation of the second feature information Yu the second instance object identity.
Preferably, the first verification submodule includes:
First judging unit, whether the second character string for judging to form the user information includes preset second non-
Method character, and, whether the length of second character string is equal to second threshold or in second value section;
First judging unit, for not including the second forbidden character, also, second character in second character string
When the length of string is equal to second threshold or in second value section, determine that the user information is legal.
Preferably, the second verification submodule includes:
Second judgment unit, for judging the third for forming the fisrt feature information when the user information is legal
Whether character string includes preset third forbidden character, and, the length of the third character string whether be equal to third threshold value or
Person is in third value section;
Third judging unit, for not including third forbidden character, also, the third character in the third character string
When the length of string is equal to third threshold value or in third value section, judge whether the fisrt feature information is effectively to believe
Breath;
Second judging unit, for determining the fisrt feature information when the fisrt feature information is effective information
It is legal.
Preferably, the system also includes:
Prompt information generation module, for determining that the user information is illegal, and/or, the fisrt feature information
It is illegal, and/or, when the second feature information is illegal, prompt information, institute are generated according to the illegal judging result
Stating prompt information includes the user information, and/or, the fisrt feature information, and/or, the second feature information does not conform to
The reason of method;
Display module, for showing the prompt information.
Preferably, the form data is the remittance information of cross-border remittance;The user information is sender information;It is described
Fisrt feature information is receiving bank's account information;The second feature information is receiving bank's cognizance code;Described first is real
Body object identity and/or the second instance object identity are receiving bank's authority identification.
Compared with the background art, the embodiment of the present application includes the following advantages:
It in the embodiment of the present application, can be for every in form data after receiving the form data of user's input
One, i.e. user information, fisrt feature information and second feature information, verify its legitimacy, and wherein fisrt feature information has
Related first instance object identity, second feature information have associated second instance object identity, special in verification second
During reference ceases, it can be got up verify by the application with fisrt feature information association, determine first instance pair
When as identifying identical as the second instance object identity, that is, it can determine that second feature information is legal, verification side enriched with this
Formula improves the probability of discovery mistake, improves information accuracy rate and success rate, reduces due to the data of input inaccuracy
Lead to the case where re-entering information generation, reduce interaction times, increases data-handling efficiency.
In addition, treatment effeciency increases since interaction times reduce, user is avoided because of the time caused by multi-pass operation
Loss and economic loss, the user experience is improved.
Specific embodiment
In order to make the above objects, features, and advantages of the present application more apparent, with reference to the accompanying drawing and it is specific real
Applying mode, the present application will be further described in detail.
Referring to Fig.1, a kind of step flow chart of the embodiment of the method one of consistency verification of data of the application is shown, is had
Body may include steps of:
Step 101, receive the form data of input, the form data include user information, fisrt feature information and
Second feature information, wherein the fisrt feature information has associated first instance object identity, the second feature information
With associated second instance object identity;
Step 102, after the verification user information and the fisrt feature information are legal, the second feature is verified
Whether information is legal, wherein the legal second feature information includes the first instance object identity and the second instance
Object identity is identical;
Step 103, if the second feature information is legal, determine that the form data is legal.
It in the embodiment of the present application, can be for every in form data after receiving the form data of user's input
One, i.e. user information, fisrt feature information and second feature information, verify its legitimacy, and wherein fisrt feature information has
Related first instance object identity, second feature information have associated second instance object identity, special in verification second
During reference ceases, it can be got up verify by the application with fisrt feature information association, determine first instance pair
When as identifying identical as the second instance object identity, that is, it can determine that second feature information is legal, verification side enriched with this
Formula improves the probability of discovery mistake, improves information accuracy rate and success rate, reduces due to the data of input inaccuracy
Lead to the case where re-entering information generation, reduce interaction times, increases data-handling efficiency.
Referring to Fig. 2, a kind of step flow chart of the embodiment of the method two of consistency verification of data of the application is shown, is had
Body may include steps of:
Step 201, receive the form data of input, the form data include user information, fisrt feature information and
Second feature information, wherein the fisrt feature information has associated first instance object identity, the second feature information
With associated second instance object identity;
In the concrete realization, form data can be user in Webpage or APP (Application, application program)
The data inputted in the list of the page.Wherein, list is mainly responsible for data acquisition function in the page, and a list can have three
A element: first is that form tags, CGI (Common used in processing form data is contained in form tags
Gateway Interface, Common Gateway Interface) program URL (Uniform Resoure Locator, unified resource positioning
Symbol) and the data method that is submitted to server;Second is that form fields, form fields may include text box, password box, Hidden field,
Multiline text frame, check box, radio box, drop-down choice box and file upload frame etc.;Third is that list button, list button be can wrap
Submitting button, reset button and general button are included, the CGI scripting or take that list button is used to transfer data on server
Disappear input, other processing work for defining processing script can also be controlled with list button.
Applied to the embodiment of the present application, form data may include user inputted in form fields user information, first
Characteristic information and second feature information etc., wherein user information may include user's name, user identity identification code (such as body
Part card number), telephone number, contact address, nationality, the information such as postcode;Fisrt feature information and second feature information can be with
For the business datum for the business that user needs to handle;For the business datum with receiving-transmitting sides, if user information is hair
A side of business datum is sent, then fisrt feature information and second feature information can be the letter of a side of reception business datum
Breath, for example, for the business of cross-border remittance, user information can be the information of transferor, including remitter in financial field
Name, remitter's ID card No. or organization mechanism code, remitter's contact method, contact address, remittance bank account etc., then
Fisrt feature information and second feature information can be the information of beneficiary, including payee name, receiving bank's account, receipts
Money bank cognizance code swift code, etc..
Further, fisrt feature information has associated first instance object identity, and second feature information has association
Second instance object identity, wherein entity object mark is the mark of the corresponding carrier of business datum that user needs to handle,
Or to receive the mark of the corresponding carrier of information of a side of business datum, for example, if fisrt feature information is receiving bank's account
Number, then first instance object identity can be the title of banking institution corresponding with receiving bank's account;If second feature is believed
Breath is receiving bank's cognizance code swift code, then second instance object identity can be and receiving bank's cognizance code
The title of the corresponding banking institution of swift code.
Step 202, it whether legal verifies the user information, if so, thening follow the steps 203, otherwise, executes step 207;
In practical applications, the user information that user fills in form fields can be verified by foreground (or client)
It is whether legal.Specifically, specific pattern can be set for the form fields when creating form fields, for example, it is directed to text box,
Length limitation can be carried out to the number of characters inputted in text box (for example, no more than 50 characters or character in 10-20
Between, etc.), and, limitation input text box character types, including can only input Chinese character, can only input English character, only
Number can be inputted, number and English character can only be inputted, be only number and " _ ", etc..Then inputted in receiving form fields
Form data when, before form data is sent to server, foreground can according to corresponding pattern to form data input
Format verified, i.e. progress length check and improper command check.
In a kind of preferred embodiment of the embodiment of the present application, if user information is the list letter filled in text box
Breath, step 202 may include following sub-step:
Sub-step S11, whether the second character string for judging to form the user information includes preset second forbidden character,
And whether the length of second character string is equal to second threshold or in second value section;
Sub-step S12, if second character string does not include the second forbidden character, also, the length of second character string
Degree is equal to second threshold or in second value section, then determines that the user information is legal.
It, can be (such as defeated according to the character length of the corresponding text box of user information after receiving the user information of input
Enter string length equal to second threshold or in second value section) and character types restrictive condition, to composition use
Second character string of family information carries out length check and improper command check, if the second character string does not include the second illegal word
Symbol and length in second value section or are equal to second threshold, then determine that user information input is legal.
For example, constraining its input rule in text box can be English only to allow to input if user information is user's name
Letter (containing upper and lower case letter), number, part spcial character (such as dot, slash, branch), of length no more than 34 words of name
Symbol.It is verified when if then user inputting John Smith as legal name, if input is John Than&d, verifies it as not
Legal name, because it includes forbidden character &.For another example, if user information is telephone number, constraining its input rule in text box is
It is only number and " _ ", for length no more than 11 characters, then it is illegal input that it is verified when user inputs 111-12-a,
Because it includes English character " a " (forbidden characters).
If it should be noted that being related to the information of user identity or communication in user information, in addition to carrying out format check
Outside, validity check can also be carried out, for example, if carrying out the verification of E-mail address when user information is E-mail address;If user
Information is that user identity demonstrate,proves number, can carry out validity check to ID card No..
Step 203, whether verification fisrt feature information is legal, if so, thening follow the steps 204, otherwise, executes step 207;
After verification user information is legal, whether legal fisrt feature information can be further verified.In the embodiment of the present application
A kind of preferred embodiment in, step 203 may include following sub-step:
Sub-step S21, whether the third character string for judging to form the fisrt feature information includes that preset third is illegal
Character, and, whether the length of the third character string is equal to third threshold value or in third value section;
Sub-step S22, if the third character string does not include third forbidden character, also, the length of the third character string
Degree is equal to third threshold value or in third value section, judges whether the fisrt feature information is effective information;
Sub-step S23 determines that the fisrt feature information is legal if the fisrt feature information is effective information.
If fisrt feature information is the form information filled in text box, for the format check of fisrt feature information
It can be executed by foreground.Specifically, after receiving the fisrt feature information of input, foreground can believe according to fisrt feature
Cease corresponding text box character length (as input string length be equal to third threshold value or in third value section) with
And the restrictive condition of character types, length check and forbidden character school are carried out to the third character string of composition fisrt feature information
It tests, if third character string does not include third forbidden character and length in third value section or is equal to third threshold value, sentences
The format for determining the first information is legal.For example, constraining its input in text box if fisrt feature information is bank card account number information
Rule can be entirely numerical character, of length no more than 34 characters, etc., if the fisrt feature information of input meets for input
Input rule, then the format of the fisrt feature information is legal;If inputting space, automatic fitration can be carried out;If input English
The non-numeric character such as character, spcial character, then the format of the fisrt feature information is illegal;If the character length of input is more than
34 characters, then do not allow subsequent input.
Since fisrt feature information can be business datum, then when verifying fisrt feature information, in addition to carrying out format school
It tests, the validity check of the identity of fisrt feature information can also be carried out.For the validity check of fisrt feature information, then may be used
To be carried out by corresponding validity check algorithm.Verifying fisrt feature information format is legal and identity it is legal after, then
Determine that fisrt feature information is legal.
For example, Luhn algorithm (Luhn Check Digit can be used if fisrt feature information is bank card account number information
Algorithm examines digital algorithm) it is verified, wherein Luhn algorithm is also referred to as " mould 10 " (Mod 10) algorithm, is a kind of
Simple checksum algorithm is generally used for verifying identity code, such as credit card issuer identification code, international mobile device identification code
(IMEI) etc..The rule of Luhn algorithm are as follows: since the last one-bit digital of card number, even bit is multiplied by 2, if multiplied by 2 result
It is double figures, number on two positions is added and is saved;All numbers are added, summation is obtained;If bank card number or credit
Card number code be it is legal, summation can be divided exactly by 10.
Step 204, first instance object identity corresponding with the fisrt feature information is obtained, step 205 is continued to execute;
After carrying out format check and validity check to fisrt feature information, if verifying fisrt feature information is legal,
It then can further obtain the first first instance object identity corresponding with fisrt feature information.In one kind of the embodiment of the present application
In preferred embodiment, step 204 may include following sub-step:
Sub-step S31 generates first instance object acquisition request according to the fisrt feature information;
The first instance object acquisition request is sent to server by sub-step S32;
It is real to receive the server returns corresponding with the first instance object acquisition request first by sub-step S33
Body object identity.
Wherein, the first instance object identity is that the server receives the first instance object acquisition request
Afterwards, from being matched to the data obtained after the fisrt feature information in preset relational database;The relational database storage
The incidence relation of the fisrt feature information and the first instance object identity.
It is taken specifically, the process for obtaining the corresponding first instance object identity of fisrt feature information is related to foreground and backstage
The process of business device interaction.In background server, being associated with for storage fisrt feature information and first instance object identity is preserved
The relational database of relationship, wherein the data in relational database can be obtained by the third-party institution, can also be looked into from network
Ask obtain, the embodiment of the present application to the data source in relational database with no restriction.
After foreground verification fisrt feature information is legal, the first instance object comprising fisrt feature information can be generated and obtain
Request is taken, and the first instance object acquisition request is sent to background server, background server receives first instance pair
After acquisition request, parsing is carried out to first instance object acquisition request and obtains fisrt feature information, then in relational database
Middle lookup fisrt feature information can obtain and the if searching successfully according to the incidence relation that saves in relational database
The corresponding first instance object identity of one characteristic information, if searching unsuccessful, then it represents that there is no should in background relational database
Fisrt feature information can then search corresponding first instance object identity by other approach, and such as networking is searched, and request third
Square mechanism lookup etc..
After foreground receives the first instance object identity of background server return, it can be shown behind corresponding text box
Show the first instance object identity.
For example, Bank Account Number is usually 16 or 19, by as follows if fisrt feature information is bank card account number information
Three parts are constituted: (1) first six digits are: publisher's authentication code (Issuer Identification Number, abbreviation IIN),
Wherein the first bit digital is major industry identifier (Major Industry Identifier, abbreviation MII).IIN is used to indicate
A set of bank card number of issuing bank or mechanism coding, can allow card holder to identify the issuer of bank card;(2) intermediate
Digit be: personal account number (since card number the 7th), intermediate digit is customized by credit card issuer, generally by 6-12
Number composition, at most can be used 12 bit digitals, the personal account number rule of each bank is different;(3) last position
Digit is check bit, and the number before card number is calculated to the last one digit number of credit card or debit card using Luhn algorithm
Word.
The incidence relation that bank card number first six digits IIN is identified with corresponding banking institution is saved in background data base, when
Foreground receive bank account information and verify the bank account information it is legal after, foreground passes the IIN of bank account information
It is handed to background server, background server matches the IIN received in the database, if being matched to, returns corresponding unique
Banking institution mark;It, can be behind the text box of input bank account information after foreground receives banking institution's mark
Show banking institution's mark corresponding with bank account information.
Step 205, it whether legal verifies the second feature information, if so, thening follow the steps 206, otherwise, executes step
207;
After verification fisrt feature information is legal, whether legal, in the application if can further verify second feature information
In a kind of preferred embodiment of embodiment, step 205 may include following sub-step:
Sub-step S41, whether the first character string for judging to form the second feature information includes preset first illegal
Character, and, whether the length of first character string is equal to first threshold or in the first numerical intervals;
Sub-step S42, if first character string does not include first forbidden character, also, first character string
Length be equal to first threshold or in the first numerical intervals, then obtain second instance corresponding with the second feature information
Object identity;
Sub-step S43, if the second instance object identity is identical as the first instance object identity, described in judgement
Second feature information is legal.
If second feature information is the form information filled in text box, for the format check of second feature information
It can be executed by foreground.Specifically, after receiving the second feature information of input, foreground can believe according to second feature
Cease corresponding text box character length (as input string length be equal to first threshold or in the first numerical intervals) with
And the restrictive condition of character types, length check and forbidden character school are carried out to the first character string of composition fisrt feature information
It tests, if the first character string does not include the first forbidden character and length in the first numerical intervals or is equal to first threshold, sentences
The format of fixed second information is legal.
For example, if second feature information is bank's cognizance code swift code, wherein swift code is by computer
It can be formed with 8 of automatic interpretation or 11 English alphabets or Arabic numerals, in SWIFT (Society for
Worldwide Interbank Financial Telecommunication, global bank finance telecommunications industry association) it is bright in text
Really distinguish relevant different financial institution in financial transaction.The composition rule of swift code is as follows: 1) Routing Number (Bank
Code): You Siwei English alphabet forms, every only one Routing Number of bank, and is made by oneself by it, usually the row name of the row
Acronym, the branch all suitable for its;2) country code (Country Code): You Liangwei English alphabet composition,
To distinguish country and geographic area where user;3) area code (Location Code): by the double figures other than 0,1
Word or two letter compositions, to distinguish the geographical location for being located at the country in which it is located, such as time zone, province, state, city;4) generation in lines
Code (Branch Code): You Sanwei letter or number composition, for distinguishing a certain branch, tissue or department in a country.Then
Swift code can be verified according to above-mentioned composition rule, if the swift code length of input is 8 or 11, and
And first six digits are English characters, latter 2 or 5 be numerical character and English character combination, then determine that swift code is legal;
Otherwise, swift code is illegal, for example, if the swift code of user's input is CITI2212, because occurring in its first 6
Numerical character, therefore can be determined that its is illegal.
After the format for determining second feature information is legal, the corresponding second instance object of available second feature information
Mark, sub-step S42 can further include following sub-step:
Sub-step S421, if first character string does not include first forbidden character, also, first character string
Length be equal to first threshold or in the first numerical intervals, then generate second instance object according to the second feature information
Acquisition request;
The second instance object acquisition request is sent to server by sub-step S422;
It is real to receive the server returns corresponding with the second instance object acquisition request second by sub-step S423
Body object identity, after the second instance object identity receives the second instance object acquisition request for the server,
From being matched to the data obtained after the second feature information in preset relational database;Described in the relational database storage
The incidence relation of second feature information and the second instance object identity.
It should be noted that the process for obtaining the corresponding second instance object identity of second feature information is related to foreground with after
The process of platform server interaction, in above-mentioned steps 204 according to the corresponding first instance object identity of fisrt feature information
Principle is substantially similar, is specifically referred to the description of step 204, details are not described herein for the embodiment of the present application.
In the embodiment of the present application, other than carrying out format check to second feature information, second feature can also be believed
Breath gets up with fisrt feature information association, carries out linkage verification, in the form of abundant verification, finds mistake in time, improve operate at
Power and accuracy rate are further reduced interaction times, improve operating efficiency.The process of linkage verification can be to judge second
Whether entity object mark is identical as the first instance object identity, if they are the same, then determines that the second feature information is legal.
For example, the bank account information that user fills in is 4392268314492555, the corresponding swift code filled in is
CITISGSG.If the method in application background technology, independent forbidden character judgement is carried out to the two, then the judgement result of the two
It is all legal.China Merchants Bank is identified as however, inquiring to obtain its corresponding banking institution from the first six digits of bank account information;
And preceding four inquiries according to swift code obtain its corresponding banking institution and are identified as the Citibank, the embodiment of the present application exists
After determining that the corresponding banking institution's mark of swift code banking institution's mark corresponding with bank account information is inconsistent, most
Determine that swift code is illegal eventually, by checking the relevance of bank account information and swift code, help identifies wrong
Remittance information, come to find mistake in time with this, improve sender information accuracy, promote cross-border remittance success rate, into
And promote operation processing efficiency, meanwhile, reduce remitter because remit money it is unsuccessful caused by remit money service charge loss the case where send out
It is raw.
Step 206, determine that the form data is legal;
In all data for successively verifying form data, such as user information, fisrt feature information and second feature information
After all legal, then judge that form data is legal.It is operated in next step at this point it is possible to enter, for example, for cross-border money transfer transactions,
Verify form information, i.e., remittance information it is all legal after, then the remittance information can be submitted, into remittance process.
Step 207, prompt information is generated, and shows the prompt information.
In verifying user information, and/or, fisrt feature information, and/or, it, can foundation when second feature information is illegal
The illegal judging result generates prompt information, wherein and prompt information includes user information, and/or, fisrt feature information,
And/or the illegal reason of second feature information, for prompting and guiding user to fill in the anti-data of exact list.
For example, prompt information can be " the name character that you input if the user's name filled in is John Than&d
Containing forbidden character, whether your input of PLSCONFM is correct ";For another example, it if bank account information includes nonnumeric character, prompts
Information can for " bank account information may input it is wrong, please reaffirm input it is whether correct ";For another example, if swift
The corresponding banking institution's mark of code banking institution's mark corresponding with bank account information is inconsistent, then prompt information can be
" swift code and bank account information mismatch, and whether PLSCONFM swift code fills in correct ";
In the embodiment of the present application, after receiving the form data of user's input, for each single item in form data,
That is user information, fisrt feature information and second feature information can be with while carrying out improper command check to it respectively
The verification of being associated property, judges legitimacy in conjunction with relevance verification, enriches verification mode with this, improves discovery mistake
Probability improves information accuracy rate and success rate, and reduce causes to re-enter information because of the data of input inaccuracy
It happens, reduces interaction times, increase data-handling efficiency.
In addition, treatment effeciency increases since interaction times reduce, user is avoided because of the time caused by multi-pass operation
Loss and economic loss, the user experience is improved.
It should be noted that for simple description, therefore, it is stated as a series of action groups for embodiment of the method
It closes, but those skilled in the art should understand that, the embodiment of the present application is not limited by the described action sequence, because according to
According to the embodiment of the present application, some steps may be performed in other sequences or simultaneously.Secondly, those skilled in the art also should
Know, the embodiments described in the specification are all preferred embodiments, and related movement not necessarily the application is implemented
Necessary to example.
Referring to Fig. 3, a kind of structural block diagram of the system embodiment of consistency verification of data of the application is shown, it specifically can be with
Including following module:
Data reception module 301, form data for receiving input, the form data include user information, first
Characteristic information and second feature information, wherein the fisrt feature information has associated first instance object identity, described
Second feature information has associated second instance object identity;
Correction verification module 302 is used for after the verification user information and the fisrt feature information are legal, described in verification
Whether second feature information legal, wherein the second feature information it is legal include the first instance object identity with it is described
Second instance object identity is identical;
Determination module 303, for determining that the form data is legal when the second feature information is legal.
Referring to Fig. 4, a kind of structural block diagram of embodiment of the correction verification module of the application is shown, may include following son
Module:
First verification submodule 3021, it is whether legal for verifying the user information;
Second verification submodule 3022, for whether verifying the fisrt feature information when the user information is legal
It is legal;
First identifier acquisition submodule 3023, for when the fisrt feature information is legal, obtaining and first spy
Reference ceases corresponding first instance object identity;
Third verifies submodule 3024, forms whether the first character string of the second feature information includes pre- for judging
If the first forbidden character, and, whether the length of first character string is equal to first threshold or in the first numerical intervals
It is interior;
Second identifier acquisition submodule 3025, for not including first forbidden character in first character string, and
And the length of first character string is equal to first threshold or when in the first numerical intervals, obtains and the second feature
The corresponding second instance object identity of information;
Legal decision sub-module 3026, in the second instance object identity and the first instance object identity phase
Meanwhile determining that the second feature information is legal.
In a kind of preferred embodiment of the embodiment of the present application, first identifier acquisition submodule 3023 be can further include
Such as lower unit:
First request generation unit, is used for when the fisrt feature information is legal, raw according to the fisrt feature information
At first instance object acquisition request;
First transmission unit, for the first instance object acquisition request to be sent to server;
First receiving unit, for receiving the corresponding with the first instance object acquisition request of the server return
First instance object identity, the first instance object identity receive the first instance object acquisition for the server and ask
After asking, from being matched to the data obtained after the fisrt feature information in preset relational database;The relation data inventory
Store up the incidence relation of the fisrt feature information Yu the first instance object identity.
In a kind of preferred embodiment of the embodiment of the present application, second identifier acquisition submodule 3025 be can further include
Such as lower unit:
Second request generation unit, for not including first forbidden character in first character string, also, it is described
The length of first character string is equal to first threshold or when in the first numerical intervals, generates the according to the second feature information
Two entity object acquisition requests;
Second transmission unit, for the second instance object acquisition request to be sent to server;
Second receiving unit, for receiving the corresponding with the second instance object acquisition request of the server return
Second instance object identity, the second instance object identity receive the second instance object acquisition for the server and ask
After asking, from being matched to the data obtained after the second feature information in preset relational database;The relation data inventory
Store up the incidence relation of the second feature information Yu the second instance object identity.
In a kind of preferred embodiment of the embodiment of the present application, the first verification submodule 3021 be can further include
Such as lower unit:
First judging unit, whether the second character string for judging to form the user information includes preset second non-
Method character, and, whether the length of second character string is equal to second threshold or in second value section;
First judging unit, for not including the second forbidden character, also, second character in second character string
When the length of string is equal to second threshold or in second value section, determine that the user information is legal.
In a kind of preferred embodiment of the embodiment of the present application, the second verification submodule 3022 be can further include
Such as lower unit:
Second judgment unit, for judging the third for forming the fisrt feature information when the user information is legal
Whether character string includes preset third forbidden character, and, the length of the third character string whether be equal to third threshold value or
Person is in third value section;
Third judging unit, for not including third forbidden character, also, the third character in the third character string
When the length of string is equal to third threshold value or in third value section, judge whether the fisrt feature information is effectively to believe
Breath;
Second judging unit, for determining the fisrt feature information when the fisrt feature information is effective information
It is legal.
In a kind of preferred embodiment of the embodiment of the present application, the system can also include:
Prompt information generation module, for determining that the user information is illegal, and/or, the fisrt feature information
It is illegal, and/or, when the second feature information is illegal, prompt information, institute are generated according to the illegal judging result
Stating prompt information includes the user information, and/or, the fisrt feature information, and/or, the second feature information does not conform to
The reason of method;
Display module, for showing the prompt information.
As a kind of preferable example of the embodiment of the present application, the form data can be the remittance information of cross-border remittance;
The user information can be sender information;The fisrt feature information can be receiving bank's account information;Described second
Characteristic information can be receiving bank's cognizance code;The first instance object identity and/or the second instance object identity
It can be receiving bank's authority identification.
For the system embodiment described in Fig. 3, since it is substantially similar to above method embodiment, so description
Fairly simple, the relevent part can refer to the partial explaination of embodiments of method.
All the embodiments in this specification are described in a progressive manner, the highlights of each of the examples are with
The difference of other embodiments, the same or similar parts between the embodiments can be referred to each other.
It should be understood by those skilled in the art that, the embodiments of the present application may be provided as method, apparatus or calculating
Machine program product.Therefore, the embodiment of the present application can be used complete hardware embodiment, complete software embodiment or combine software and
The form of the embodiment of hardware aspect.Moreover, the embodiment of the present application can be used one or more wherein include computer can
With in the computer-usable storage medium (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) of program code
The form of the computer program product of implementation.
In a typical configuration, the computer equipment includes one or more processors (CPU), input/output
Interface, network interface and memory.Memory may include the non-volatile memory in computer-readable medium, random access memory
The forms such as device (RAM) and/or Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is to calculate
The example of machine readable medium.Computer-readable medium includes that permanent and non-permanent, removable and non-removable media can be with
Realize that information is stored by any method or technique.Information can be computer readable instructions, data structure, the module of program or
Other data.The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory
(SRAM), dynamic random access memory (DRAM), other kinds of random access memory (RAM), read-only memory
(ROM), electrically erasable programmable read-only memory (EEPROM), flash memory or other memory techniques, CD-ROM are read-only
Memory (CD-ROM), digital versatile disc (DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or
Other magnetic storage devices or any other non-transmission medium, can be used for storage can be accessed by a computing device information.According to
Herein defines, and computer-readable medium does not include non-persistent computer readable media (transitory media), such as
The data-signal and carrier wave of modulation.
The embodiment of the present application is referring to according to the method for the embodiment of the present application, terminal device (system) and computer program
The flowchart and/or the block diagram of product describes.It should be understood that flowchart and/or the block diagram can be realized by computer program instructions
In each flow and/or block and flowchart and/or the block diagram in process and/or box combination.It can provide these
Computer program instructions are set to general purpose computer, special purpose computer, Embedded Processor or other programmable data processing terminals
Standby processor is to generate a machine, so that being held by the processor of computer or other programmable data processing terminal devices
Capable instruction generates for realizing in one or more flows of the flowchart and/or one or more blocks of the block diagram
The device of specified function.
These computer program instructions, which may also be stored in, is able to guide computer or other programmable data processing terminal devices
In computer-readable memory operate in a specific manner, so that instruction stored in the computer readable memory generates packet
The manufacture of command device is included, which realizes in one side of one or more flows of the flowchart and/or block diagram
The function of being specified in frame or multiple boxes.
These computer program instructions can also be loaded into computer or other programmable data processing terminal devices, so that
Series of operation steps are executed on computer or other programmable terminal equipments to generate computer implemented processing, thus
The instruction executed on computer or other programmable terminal equipments is provided for realizing in one or more flows of the flowchart
And/or in one or more blocks of the block diagram specify function the step of.
Although preferred embodiments of the embodiments of the present application have been described, once a person skilled in the art knows bases
This creative concept, then additional changes and modifications can be made to these embodiments.So the following claims are intended to be interpreted as
Including preferred embodiment and all change and modification within the scope of the embodiments of the present application.
Finally, it is to be noted that, herein, relational terms such as first and second and the like be used merely to by
One entity or operation are distinguished with another entity or operation, without necessarily requiring or implying these entities or operation
Between there are any actual relationship or orders.Moreover, the terms "include", "comprise" or its any other variant meaning
Covering non-exclusive inclusion, so that process, method, article or terminal device including a series of elements not only wrap
Those elements are included, but also including other elements that are not explicitly listed, or further includes for this process, method, article
Or the element that terminal device is intrinsic.In the absence of more restrictions, being wanted by what sentence "including a ..." limited
Element, it is not excluded that there is also other identical elements in process, method, article or the terminal device for including the element.
The method to a kind of consistency verification of data provided herein and a kind of consistency verification of data is above
System, is described in detail, specific examples are used herein to illustrate the principle and implementation manner of the present application, above
The explanation of embodiment is merely used to help understand the present processes and its core concept;Meanwhile for the general skill of this field
Art personnel, according to the thought of the application, there will be changes in the specific implementation manner and application range, in conclusion this
Description should not be construed as the limitation to the application.