CN109493080A - A kind of checking method of user data, device, server and storage medium - Google Patents

A kind of checking method of user data, device, server and storage medium Download PDF

Info

Publication number
CN109493080A
CN109493080A CN201811415509.7A CN201811415509A CN109493080A CN 109493080 A CN109493080 A CN 109493080A CN 201811415509 A CN201811415509 A CN 201811415509A CN 109493080 A CN109493080 A CN 109493080A
Authority
CN
China
Prior art keywords
data
audit
nodes
collage
external
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811415509.7A
Other languages
Chinese (zh)
Inventor
张�杰
张璐
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Lexin Software Technology Co Ltd
Original Assignee
Shenzhen Lexin Software Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Lexin Software Technology Co Ltd filed Critical Shenzhen Lexin Software Technology Co Ltd
Priority to CN201811415509.7A priority Critical patent/CN109493080A/en
Publication of CN109493080A publication Critical patent/CN109493080A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists

Abstract

The invention discloses a kind of checking method of user data, device, server and storage mediums.This method comprises: obtaining user data, the user data includes the personal information for being divided into two or more nodes and the external collage-credit data for being divided into two or more nodes;Audit the personal information of described two or more than two nodes and the external collage-credit data of two or more nodes;It reacquires the corresponding external collage-credit data of the abnormal node of audit and audit passes through and the personal information of other nodes passes through with external collage-credit data audit, then provide corresponding business service to user.Through the above technical solutions, audit while realizing the external collage-credit data to normal node data and exception, improves review efficiency.

Description

A kind of checking method of user data, device, server and storage medium
Technical field
The present embodiments relate to technical field of risk control more particularly to a kind of checking method of user data, device, Server and storage medium.
Background technique
With the rapid development of financial industry, credit has become one of most important business, and credit refers to by a series of Audit link, finally authorize trusted users certain amount, and refuse risky user, to carry out risk control.Right During user data is audited, user is needed to submit personal information (such as name/identity card/educational background/address/correspondent party Formula etc.), while also to obtain external collage-credit data (public security/student status/blacklist/sesame point/with shield data etc.), air control rule mould Type rejects risky user using these data, gives the certain amount of high-quality user.This process be it is continuous obtain data and The process constantly audited, once some rule or node refuse user, then credit Flow ends can not be to user's credit.
Current checking method has very strong dependence to external collage-credit data source, that is, has to by external reference The audit one by one of data, but the reliability of external data source be it is uncontrollable, any data source failure can all block full platform User's credit, external data sources can only be waited to restore, credit platform could normal operation, this causes user experience very poor, even It is serious to will cause customer churn.Such as public security collage-credit data source failure, the giving credit of credit platform is unavailable, needs user etc. To continue to audit after the recovery of public security data source, review efficiency is low.
Summary of the invention
The present invention provides a kind of checking method of user data, device, server and storage mediums, to realize to normal Node data and abnormal external collage-credit data while audit, raising review efficiency.
In a first aspect, the embodiment of the invention provides a kind of checking methods of user data, comprising:
User data is obtained, the user data includes being divided into the personal information of two or more nodes and being divided into two The external collage-credit data of a or more than two nodes;
Audit the personal information of described two or more than two nodes and the external reference number of two or more nodes According to;
It reacquires the corresponding external collage-credit data of the abnormal node of audit and audit passes through and of other nodes People's information and external collage-credit data audit pass through, then provide corresponding business service to user.
Further, the personal information and two or more nodes for auditing described two or more than two nodes External collage-credit data, comprising:
The successively external reference of the personal information to described two or more than two nodes and two or more nodes Data are audited;
Resource pool is added in the abnormal node data of audit.
Further, resource pool is added in the node data that audit is abnormal, comprising:
That user is established in the resource pool is not carried out chained list;
Chained list is not carried out by what the abnormal node of audit was added corresponding user.
Further, after reacquiring to the corresponding external collage-credit data of the abnormal node of audit and auditing and passing through, Further include:
The abnormal node data of the audit is deleted from the resource pool.
Further, the personal information and two or more nodes for auditing described two or more than two nodes External collage-credit data, comprising:
By the external collage-credit data of the personal information of described two or more than two nodes and two or more nodes It is alternately arranged;
The successively external reference of the personal information to described two or more than two nodes and two or more nodes Data are audited.
Second aspect, the embodiment of the invention provides a kind of audit devices of user data, comprising:
Data acquisition module, for obtaining user data, the user data includes being divided into two or more nodes Personal information and be divided into the external collage-credit datas of two or more nodes;
Auditing module, for auditing the personal information and two or more nodes of described two or more than two nodes External collage-credit data;
Service module passes through for reacquiring the corresponding external collage-credit data of node to audit exception and auditing, with And the personal information of other nodes and external collage-credit data audit pass through, then provide corresponding business service to user.
Further, the auditing module, comprising:
Unit is audited, for the personal information and two or more sections successively to described two or more than two nodes The external collage-credit data of point is audited;
Resource pool is added for that will audit abnormal node data in processing unit.
Further, the processing unit, comprising:
Chained list establishes subelement, is not carried out chained list for establish user in the resource pool;
Node processing subelement is not carried out chained list for what the abnormal node of audit was added corresponding user.
The third aspect, the embodiment of the invention provides a kind of servers, comprising:
One or more processors;
Memory, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processing Device realizes the checking method of user data as described in relation to the first aspect.
Fourth aspect, the embodiment of the invention also provides a kind of computer readable storage mediums, are stored thereon with computer Program realizes the checking method of user data as described in relation to the first aspect when the program is executed by processor.
The embodiment of the invention provides a kind of checking method of user data, device, server and storage medium, this method It include: acquisition user data, the user data includes being divided into the personal information of two or more nodes and being divided into two Or the external collage-credit data of more than two nodes;Audit described two or more than two nodes personal information and two or two The external collage-credit data of the above node;It reacquires the corresponding external collage-credit data of the abnormal node of audit and audit passes through, And the personal information of other nodes and external collage-credit data audit pass through, then provide corresponding business service to user.Pass through Above-mentioned technical proposal, audit while realizing the external collage-credit data to normal node data and exception improve audit effect Rate.
Detailed description of the invention
Fig. 1 is a kind of flow chart of the checking method for user data that the embodiment of the present invention one provides;
Fig. 2 is the schematic diagram that the user data that the embodiment of the present invention one provides audits scene;
Fig. 3 is a kind of flow chart of the checking method of user data provided by Embodiment 2 of the present invention;
Fig. 4 is a kind of implementation flow chart of the main thread of the checking method for user data that the embodiment of the present invention three provides;
Fig. 5 is a kind of implementation process of the asynchronous thread of the checking method for user data that the embodiment of the present invention three provides Figure;
Fig. 6 is a kind of structural schematic diagram of the audit device for user data that the embodiment of the present invention four provides;
Fig. 7 is a kind of hardware structural diagram for server that the embodiment of the present invention five provides.
Specific embodiment
The present invention is described in further detail with reference to the accompanying drawings and examples.It is understood that this place is retouched The specific embodiment stated is used only for explaining the present invention rather than limiting the invention.It also should be noted that in order to just Only the parts related to the present invention are shown in description, attached drawing rather than entire infrastructure.
Embodiment one
Fig. 1 is a kind of flow chart of the checking method for user data that the embodiment of the present invention one provides, and the present embodiment can fit For being audited user data to carry out risk control, and the case where provide a user business service according to auditing result. Specifically, the checking method of the user data can be executed by the audit device of user data, the audit device of the user data It can be realized, and be integrated in the server by way of software and/or hardware.Further, server includes but does not limit In: industrial integrating server, system background server and cloud server.
Fig. 2 is the schematic diagram that the user data that the embodiment of the present invention one provides audits scene.As shown in Fig. 2, to number of users According to audit can be divided into the audit to personal information and the audit to external collage-credit data, wherein personal information is by user It fills in, external collage-credit data needs to obtain by external network server, when there are unstable networks, external network server failure When, it will lead to external collage-credit data and obtain failure, the auditing flow to user data can be blocked.The present embodiment is by building A vertical asynchronous thread dedicated for handling abnormal external collage-credit data in real time, from external network server constantly again External collage-credit data is obtained, at the same time, the audit of main thread is synchronous to be executed, and codetermines credit as a result, so as to improve audit Efficiency.
With reference to Fig. 1, this method specifically comprises the following steps:
S110, obtain user data, the user data include be divided into two or more nodes personal information and It is divided into the external collage-credit data of two or more nodes;
Specifically, user data includes personal information and external collage-credit data, wherein personal information refers to what user filled in The acquisition process of personal information, such as name, identity card, educational background, application project etc., personal information is not necessarily to reference cost;It is external Collage-credit data refers to the collage-credit data called from external data systems, for example, public security collage-credit data and educational information collage-credit data Deng the acquisition process of external collage-credit data needs certain reference cost.Different application projects corresponds to different audits and patrols Volume or auditing rule, for example, needing to carry out personal information and external collage-credit data when user applies for the higher accrediting amount Comprehensive audit;When user applies for general service permission (such as member's permission, logon rights, interior brake access right), Basic personal information and external collage-credit data are audited.
Further, user data is divided into multiple nodes, each node corresponds to certain audit logic.For example, User data is divided into 6 nodes according to name, identity card, educational background, application project, public security, student status, forms data link table, Different data are stored in each node, the data of each node in data link table are audited respectively, to judge whether pair Whether user's credit provides business service.
The external sign of S120, the personal information for auditing described two or more than two nodes and two or more nodes Letter data.
Specifically, successively auditing to the data of node each in data link table, audit logic includes: confirmation present node Whether data format correct, whether data of verifying present node match with other node datas, judge present node data Whether credit condition is met.If the data of present node meet credit condition, i.e. present node is continued under audit by audit One node;If present node is the tail portion node in data link table and passes through audit, illustrate all nodes in data link table Data all pass through audit, then to user carry out credit, provide corresponding business service for user, such as give user's membership Limit, interior brake access right etc.;If present node is unsatisfactory for credit condition, not by audit, then auditing flow is terminated, is refused Absolute user's credit;If present node audit is abnormal, i.e., node data is abnormal, typically refers to external collage-credit data source failure, The corresponding external collage-credit data of the node can not be obtained, then is abnormal nodes by the vertex ticks, again by asynchronous process timing The corresponding external collage-credit data of the abnormal nodes is obtained, while skipping the abnormal nodes in host process, continues to audit next Node;When the data of asynchronous process reacquisition to abnormal nodes, the data of the abnormal nodes got again are examined Core.
It should be noted that process (Process) is primary operation work of the program in computer about certain data acquisition system Dynamic, above-mentioned host process is audited for the node data in data link table, and asynchronous process is for abnormal nodes data It is audited, different threads is respectively adopted from the audit of the data to abnormal nodes to the audit of data link table interior joint data It carries out simultaneously, to realize the review efficiency for improving user data.
S130, reacquisition is to the corresponding external collage-credit data of the abnormal node of audit and audit passes through and other are saved The personal information of point and external collage-credit data audit pass through, then provide corresponding business service to user.
Specifically, the mode that timing can be used in asynchronous thread reacquires external collage-credit data, for example, setting every Every the primary external collage-credit data source of access in 1 minute, external collage-credit data is reacquired, it is corresponding to abnormal nodes when reacquiring When external collage-credit data, it is audited, if the corresponding external collage-credit data of abnormal nodes passes through audit, and other are non- The personal information of abnormal nodes and external collage-credit data are also by audit, then the user meets credit condition, provide phase to user The business service answered gives the certain accrediting amount of user or opens the permission etc. of specific transactions to it.If non-abnormal nodes Or the arbitrary node in abnormal nodes does not pass through audit, then it can not credit.
Further, the personal information and two or more nodes for auditing described two or more than two nodes External collage-credit data, comprising:
The successively external reference of the personal information to described two or more than two nodes and two or more nodes Data are audited;
Resource pool is added in the abnormal node data of audit.
Specifically, the successively personal information to described two or more than two nodes and two or more nodes is outer Portion's collage-credit data is audited, and present node can be the non-abnormal node in data link table, is audited in main thread , it is also possible to for the node that audit is abnormal, then needs this node being transferred to asynchronous thread and audit, main thread and asynchronous All it is successively to be audited in a certain order to each node in thread, has audited current node, has executed audit and patrolled Next node can just be audited by collecting, when any one node data is unsatisfactory for credit condition, does not pass through audit, auditing flow knot Beam refuses credit.When auditing in main thread to the node data in data link table, the abnormal section of audit can be found in time Abnormal nodes are put and be marked as, resource pool is added in this node (node data).Resource pool (Resources Pool) is Cache pool for being reprocessed to node data, when a resource can store the resource after use, in resource pool with quilt Next thread request uses, i.e., asynchronous thread can pull audit abnormal nodes data from resource pool and be handled.
It should be noted that is stored in resource pool is all the external collage-credit data of the abnormal node of audit, and these External collage-credit data corresponds to different user, when resource pool is added in the abnormal node data of audit, corresponding user It is marked as the abnormal user of audit.
Further, do not blocking auditing flow when the external collage-credit data node of discovery audit exception in main thread Under the premise of, the abnormal user of record audit, and the abnormal nodes set of audit logic is not carried out into resource pool.For User data in resource pool is constantly retried using timed task asynchronous thread, is handled the user data of resource pool, packet It includes and reacquires the corresponding external collage-credit data of abnormal nodes and audited, until auditing successfully simultaneously credit or refusal credit. It should be noted that when the non-abnormal nodes in the audit in resource pool abnormal node and data link table all pass through audit, Meet credit requirement, can just provide user corresponding business service, and by auditing result (credit or refusal credit) with short message Form notify user.
The checking method for a kind of user data that the embodiment of the present invention one provides, comprising: obtain user data, the user Data include the personal information for being divided into two or more nodes and the external reference number for being divided into two or more nodes According to;Audit the personal information of described two or more than two nodes and the external collage-credit data of two or more nodes;Weight It newly gets the corresponding external collage-credit data of the abnormal node of audit and audit passes through and the personal information of other nodes and outer Collage-credit data audit in portion's passes through, then provides corresponding business service to user.Through the above technical solutions, realizing to normal It is audited while node data and abnormal external collage-credit data, improves review efficiency.
Embodiment two
Fig. 3 be a kind of flow chart of the checking method of user data provided by Embodiment 2 of the present invention, the present embodiment be On the basis of above-described embodiment, specifically optimized.With reference to Fig. 3, this method specifically comprises the following steps:
S210, obtain user data, the user data include be divided into two or more nodes personal information and It is divided into the external collage-credit data of two or more nodes.
It should be noted that the technical detail of detailed description not can be found in above-mentioned any embodiment in the present embodiment.
The outside of S220, the successively personal information to described two or more than two nodes and two or more nodes Collage-credit data is audited.
S230, establish user in resource pool be not carried out chained list;
Chained list is not carried out specifically, establishing in resource pool for the corresponding user of the abnormal node of audit.It is not carried out chained list Refer to the data link table that the node for the abnormal external collage-credit data being not carried out in resource pool for each user is constituted, is not carried out chain What is stored in table is the abnormal node of data to be reacquired and audit, the abnormal user of different audits have it is different not Chained list is executed, respectively the node of the abnormal external collage-credit data of storage audit.
S240, the abnormal node of audit is added to corresponding user be not carried out chained list.
Specifically, being not carried out the node corresponding user of addition of the abnormal external collage-credit data of audit in chained list, is convenient for The abnormal nodes that asynchronous thread pulls a user every time from resource pool are handled, and are reacquired to each abnormal nodes outer Portion's collage-credit data.Asynchronous thread simultaneously can successively be handled the abnormal nodes of each user being not carried out in chained list, when weight It newly gets the external collage-credit data of abnormal nodes and completes the label that can eliminate this node after audit as abnormal nodes, and continue The data for being not carried out next node in chained list of this user are handled, until being not carried out in chained list for this user be not different Chang Jiedian then completes the audit to this user, carries out credit or refusal credit to user.
S250, reacquisition is to the corresponding external collage-credit data of the abnormal node of audit and audit passes through and other are saved The personal information of point and external collage-credit data audit pass through, then provide corresponding business service to user.
Further, after reacquiring to the corresponding external collage-credit data of the abnormal node of audit and auditing and passing through, Further include:
The abnormal node data of the audit is deleted from the resource pool.
Specifically, after reacquiring to the corresponding external collage-credit data of the abnormal node of audit and auditing and passing through, the section Point has been carried out audit logic, is that the label of the abnormal node of audit is eliminated by it, resource pool is not carried out in chained list and is audited The label of abnormal node is eliminated, and is corresponded to being not carried out in chained list for user from resource pool and deleted this node.
Further, the personal information and two or more nodes for auditing described two or more than two nodes External collage-credit data, comprising:
By the external collage-credit data of the personal information of described two or more than two nodes and two or more nodes It is alternately arranged;
The successively external reference of the personal information to described two or more than two nodes and two or more nodes Data are audited.
Specifically, alternately to the audit of the node of personal information node and external collage-credit data.Specifically, by personal Information data and external collage-credit data node are alternately arranged, such as: personal information node shares m, be denoted as Ai (i=1,2 ..., M), external collage-credit data node shares n, is denoted as Bj (j=1,2 ..., n), then is alternately arranged two class nodes to be formed completely Main thread data link table, the data link table can be described as:
A1- > A2- > B1- > B2- > Ai ... -> Bj ... -> Am ... -> Bn- > End (credit or refusal credit).
Node in above-mentioned data link table is successively audited, if present node takes next node to continue by audit Audit, if the audit fails, auditing flow terminates, and refuses credit.Wherein, if external collage-credit data node (Bj) is audited It is abnormal, i.e., external collage-credit data source failure, when not getting effective external collage-credit data, by the outside collage-credit data node Resource pool is added and corresponds to being not carried out in chained list of user, while skip this section point, continues that next node is taken to be audited.
A kind of checking method of user data provided by Embodiment 2 of the present invention carries out excellent on the basis of the above embodiments Change, by being that each user's creation is not carried out chained list in resource pool, together by the abnormal node set of the audit of each user, It carries out retrying processing in an orderly manner convenient for unified;By the way that the personal information node of user data and external reference node are alternately arranged Column, are successively audited, and audit abnormal nodes are added in resource pool carry out asynchronous processing in time, while main thread skips this The abnormal node of audit continues to audit next node, realizes to the external collage-credit data of normal node data and exception It audits simultaneously, improves review efficiency.
Embodiment three
Fig. 4 is a kind of implementation flow chart of the main thread of the checking method for user data that the embodiment of the present invention three provides. The present embodiment on the basis of the above embodiments, is described the specific implementation flow of the checking method of user data, does not exist The technical detail of detailed description can be found in above-mentioned any embodiment in the present embodiment.
With reference to Fig. 4, under the implementation process of the main thread of the checking method of user data specifically enters:
1) main thread starts, and takes head node as present node from data link table, is denoted as cur_node, initializes cur_ Node=A1;
2) cur_node is audited, first determines whether the node type of cur_node, if cur_node is personal letter Node is ceased, then is executed 3);If cur_node is external collage-credit data node, execute 4);
3) the audit logic for executing personal information node, if this node data is unsatisfactory for credit condition, not by audit, then Refuse credit, terminates auditing flow;If this node is the tail node of data link table, waits the node in resource pool to audit and finish Later, final review result (credit or refusal credit) is obtained, auditing flow is terminated;If this node is not tail node and number of nodes According to credit condition is met, then follow the steps 5).
4) judge whether the outside collage-credit data node is 6) audit abnormal nodes are executed if it is abnormal nodes;If It is not the abnormal node of audit, executes 7);
5) node is removed from data link table as present node, i.e. Cur_node=cur_node- > next, is returned It executes 2).
6) abnormal nodes are added in resource pool and correspond to being not carried out in chained list of user, execution is 8);
7) the audit logic for executing external collage-credit data node, if this node data is unsatisfactory for credit condition, not by examining Core then refuses credit, terminates auditing flow;If this node is the tail node of data link table, the node in resource pool is waited to examine After core finishes, final review result (credit or refusal credit) is obtained, auditing flow is terminated;If this node be not tail node and Node data meets credit condition, thens follow the steps 5).
If 8) abnormal nodes are not the tail nodes in data link table, the abnormal nodes are skipped, it are not executed outer 5) portion's collage-credit data node logical turns to;Otherwise wait for the external sign that asynchronous thread reacquires the abnormal nodes to resource pool Letter data and audited as a result, terminate auditing flow.
Further, after the auditing flow of host process, auditing result (credit or refusal credit) is submitted into artificial examine Core system is confirmed, and sends auditing result to user.
Fig. 5 is a kind of implementation process of the asynchronous thread of the checking method for user data that the embodiment of the present invention three provides Figure.With reference to Fig. 5, under the implementation process of the asynchronous thread of the checking method of user data specifically enters:
1) user is pulled from resource pool and corresponding is not carried out node linked list;
2) it is not carried out in chained list and takes head node as present node, be denoted as unexec_cur_node, initialize Unexec_cur_node=unexec_first_node;
3) present node is judged whether still for the node of audit exception, if can not still reacquire the outside of present node Collage-credit data, then the node is still abnormal nodes, by active user and is not carried out chained list and is reentered into resource pool, continues from resource Pond pulls other untreated users, executes 1);If reacquiring the external collage-credit data for arriving present node, the node is no longer It is abnormal nodes, executes 4);
4) the audit logic for executing present node, audits present node, and be not carried out in list and delete the section Point terminates auditing flow if the node does not pass through audit, refuses credit;If 5) node is executed by audit;
5) judge that the user's is not carried out whether chained list is empty, if being not sky, that is, be not carried out in chained list that there are also not again 6) node for getting data and being audited then executes;If being not carried out chained list as sky, i.e., all of the user are not carried out chain Node in table has all passed through audit, then to user's credit, and deletes the user from resource pool and be not carried out chained list, executes 1);
6) the next node unexec_cur_node=unexec_cur_node- > next being not carried out in chained list is taken, is executed 3)。
A kind of checking method for user data that the embodiment of the present invention three provides, it is right respectively using main thread and asynchronous thread The data of homophony chained list and user being not carried out in chained list are audited, and are realized to normal node data and abnormal outer It is audited while portion's collage-credit data, improves review efficiency.
Example IV
Fig. 6 is a kind of structure chart of the audit device for user data that the embodiment of the present invention four provides.The present embodiment provides The audit device of user data include:
Data acquisition module 410, for obtaining user data, the user data includes being divided into two or more sections The personal information of point and the external collage-credit data for being divided into two or more nodes;
Auditing module 420, for audit described two or more than two nodes personal information and two or more The external collage-credit data of node;
Service module 430 passes through for reacquiring the corresponding external collage-credit data of node to audit exception and auditing, And the personal information of other nodes and external collage-credit data audit pass through, then provide corresponding business service to user.
A kind of audit device for user data that the embodiment of the present invention four provides, obtains number of users by data acquisition module According to the user data includes being divided into the personal information of two or more nodes and being divided into two or more nodes External collage-credit data;By auditing module audit described two or more than two nodes personal information and two or more The external collage-credit data of node;It reacquires to the corresponding external collage-credit data of the abnormal node of audit and examines by service module Core passes through and the personal information of other nodes passes through with external collage-credit data audit, then provides corresponding business to user and take Business.Through the above technical solutions, audit while realizing the external collage-credit data to normal node data and exception, is improved Review efficiency.
On the basis of the above embodiments, the auditing module 420, comprising:
First audit unit, for successively to described two or more than two nodes personal information and two or two with The external collage-credit data of upper node is audited;
Resource pool is added for that will audit abnormal node data in processing unit.
On the basis of the above embodiments, the processing unit, comprising:
Chained list establishes subelement, is not carried out chained list for establish user in the resource pool;
Node processing subelement is not carried out chained list for what the abnormal node of audit was added corresponding user.
Further, described device further include:
Removing module, for the corresponding external collage-credit data of the node in reacquisition to audit exception and audit passes through it Afterwards, the abnormal node data of the audit is deleted from the resource pool.
Further, the auditing module 420, comprising:
Arrangement units, for by the personal information of described two or more than two nodes and two or more nodes External collage-credit data is alternately arranged;
Second instance nuclear unit, for successively to described two or more than two nodes personal information and two or two with The external collage-credit data of upper node is audited.
The audit device for the user data that the embodiment of the present invention four provides can be used for executing above-mentioned any embodiment and provide User data checking method, have corresponding function and beneficial effect.
Embodiment five
Fig. 7 is a kind of hardware structural diagram for server that the embodiment of the present invention five provides.As shown in fig. 7, this implementation A kind of server that example provides, comprising: processor 510 and storage device 520.Processor in the server can be one or Multiple, in Fig. 7 by taking a processor 510 as an example, processor 510 and storage device 520 in the server can be by total Line or other modes connect, in Fig. 7 for being connected by bus.
One or more of programs are executed by one or more of processors 510, so that one or more of places Reason device realizes the checking method of any user data in above-described embodiment.
Storage device 520 in the server is used as a kind of computer readable storage medium, can be used for storing one or more A program, described program can be software program, computer executable program and module, such as number of users in the embodiment of the present invention According to the corresponding program instruction/module of checking method (for example, attached user data shown in fig. 5 audit device in module, packet It includes: data acquisition module 510, auditing module 520 and service module 430).Processor 510 is stored in storage dress by operation Software program, instruction and the module in 520 are set, thereby executing the various function application and data processing of server, i.e., in fact The checking method of user data in existing above method embodiment.
Storage device 520 mainly includes storing program area and storage data area, wherein storing program area can store operation system Application program needed for system, at least one function;Storage data area, which can be stored, uses created data etc. (such as according to equipment Personal information, external collage-credit data in above-described embodiment etc.).In addition, storage device 520 may include that high random access is deposited Reservoir, can also include nonvolatile memory, a for example, at least disk memory, flush memory device or other are non-volatile Property solid-state memory.In some instances, storage device 520 can further comprise remotely located relative to processor 510 Memory, these remote memories can pass through network connection to server.The example of above-mentioned network includes but is not limited to interconnect Net, intranet, local area network, mobile radio communication and combinations thereof.
Also, when one or more program included in above-mentioned server is by one or more of processors 510 When execution, program is proceeded as follows:
User data is obtained, the user data includes being divided into the personal information of two or more nodes and being divided into two The external collage-credit data of a or more than two nodes;Audit described two or more than two nodes personal information and two or two The external collage-credit data of a above node;It reacquires the corresponding external collage-credit data of the abnormal node of audit and audit is logical It crosses and the personal information of other nodes passes through with external collage-credit data audit, then provide corresponding business service to user.
The checking method for the user data that the equipment and above-described embodiment that the present embodiment proposes propose belongs to same invention structure Think, the technical detail of detailed description not can be found in above-mentioned any embodiment in the present embodiment, and the present embodiment has and holds The identical beneficial effect of the checking method of row user data.
On the basis of the above embodiments, the present embodiment also provides a kind of computer readable storage medium, is stored thereon with Computer program, the program realize the number of users in the above-mentioned any embodiment of the present invention when being executed by the audit device of user data According to checking method, this method comprises:
User data is obtained, the user data includes being divided into the personal information of two or more nodes and being divided into two The external collage-credit data of a or more than two nodes;Audit described two or more than two nodes personal information and two or two The external collage-credit data of a above node;It reacquires the corresponding external collage-credit data of the abnormal node of audit and audit is logical It crosses and the personal information of other nodes passes through with external collage-credit data audit, then provide corresponding business service to user.
Certainly, a kind of storage medium comprising computer executable instructions, computer provided by the embodiment of the present invention The checking method for the user data that executable instruction is not limited to the described above operates, and any embodiment of that present invention institute can also be performed Relevant operation in the checking method of the user data of offer, and have corresponding function and beneficial effect.
By the description above with respect to embodiment, it is apparent to those skilled in the art that, the present invention It can be realized by software and required common hardware, naturally it is also possible to which by hardware realization, but in many cases, the former is more Good embodiment.Based on this understanding, technical solution of the present invention substantially in other words contributes to the prior art Part can be embodied in the form of software products, which can store in computer readable storage medium In, floppy disk, read-only memory (Read-Only Memory, ROM), random access memory (Random such as computer Access Memory, RAM), flash memory (FLASH), hard disk or CD etc., including some instructions are with so that a computer is set Standby (can be personal computer, server or the network equipment etc.) executes user data described in each embodiment of the present invention Checking method.
Note that the above is only a better embodiment of the present invention and the applied technical principle.It will be appreciated by those skilled in the art that The invention is not limited to the specific embodiments described herein, be able to carry out for a person skilled in the art it is various it is apparent variation, It readjusts and substitutes without departing from protection scope of the present invention.Therefore, although being carried out by above embodiments to the present invention It is described in further detail, but the present invention is not limited to the above embodiments only, without departing from the inventive concept, also It may include more other equivalent embodiments, and the scope of the invention is determined by the scope of the appended claims.

Claims (10)

1. a kind of checking method of user data characterized by comprising
Obtain user data, the user data include be divided into two or more nodes personal information and be divided into two or The external collage-credit data of more than two nodes;
Audit the personal information of described two or more than two nodes and the external collage-credit data of two or more nodes;
It reacquires the corresponding external collage-credit data of the abnormal node of audit and audit passes through and the personal letter of other nodes Breath and external collage-credit data audit pass through, then provide corresponding business service to user.
2. the method according to claim 1, wherein the individual for auditing described two or more than two nodes The external collage-credit data of information and two or more nodes, comprising:
The successively external collage-credit data of the personal information to described two or more than two nodes and two or more nodes It is audited;
Resource pool is added in the abnormal node data of audit.
3. according to the method described in claim 2, it is characterized in that, described be added resource pool for the abnormal node data of audit, Include:
That user is established in the resource pool is not carried out chained list;
Chained list is not carried out by what the abnormal node of audit was added corresponding user.
4. according to the method described in claim 2, it is characterized in that, reacquiring the node corresponding outside abnormal to audit After collage-credit data and audit pass through, further includes:
The abnormal node data of the audit is deleted from the resource pool.
5. the method according to claim 1, wherein the individual for auditing described two or more than two nodes The external collage-credit data of information and two or more nodes, comprising:
The external collage-credit data of the personal information of described two or more than two nodes and two or more nodes is replaced Arrangement;
The successively external collage-credit data of the personal information to described two or more than two nodes and two or more nodes It is audited.
6. a kind of audit device of user data characterized by comprising
Data acquisition module, for obtaining user data, the user data includes for being divided into two or more nodes People's information and the external collage-credit data for being divided into two or more nodes;
Auditing module, for audit described two or more than two nodes personal information and two or more nodes it is outer Portion's collage-credit data;
Service module passes through, Yi Jiqi for reacquiring the corresponding external collage-credit data of node to audit exception and auditing The personal information of his node and external collage-credit data audit pass through, then provide corresponding business service to user.
7. device according to claim 6, which is characterized in that the auditing module, comprising:
First audit unit, for the personal information and two or more sections successively to described two or more than two nodes The external collage-credit data of point is audited;
Resource pool is added for that will audit abnormal node data in processing unit.
8. device according to claim 6, which is characterized in that the processing unit, comprising:
Chained list establishes subelement, is not carried out chained list for establish user in the resource pool;
Node processing subelement is not carried out chained list for what the abnormal node of audit was added corresponding user.
9. a kind of server characterized by comprising
One or more processors;
Memory, for storing one or more programs;
When one or more of programs are executed by one or more of processors, so that one or more of processors are real Now such as the checking method of user data as claimed in any one of claims 1 to 5.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the program is by processor The checking method such as user data as claimed in any one of claims 1 to 5 is realized when execution.
CN201811415509.7A 2018-11-26 2018-11-26 A kind of checking method of user data, device, server and storage medium Pending CN109493080A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811415509.7A CN109493080A (en) 2018-11-26 2018-11-26 A kind of checking method of user data, device, server and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811415509.7A CN109493080A (en) 2018-11-26 2018-11-26 A kind of checking method of user data, device, server and storage medium

Publications (1)

Publication Number Publication Date
CN109493080A true CN109493080A (en) 2019-03-19

Family

ID=65696703

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811415509.7A Pending CN109493080A (en) 2018-11-26 2018-11-26 A kind of checking method of user data, device, server and storage medium

Country Status (1)

Country Link
CN (1) CN109493080A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111882470A (en) * 2020-06-03 2020-11-03 武汉达梦数据技术有限公司 Distributed public credit investigation method and device
CN113411224A (en) * 2021-08-19 2021-09-17 飞狐信息技术(天津)有限公司 Data processing method and device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106355924A (en) * 2016-09-06 2017-01-25 江苏智通交通科技有限公司 Traffic data quality monitoring system
CN107708102A (en) * 2017-09-22 2018-02-16 烽火通信科技股份有限公司 A kind of system and method for ZigBee gateway query node facility informations
CN107784205A (en) * 2017-10-17 2018-03-09 百度在线网络技术(北京)有限公司 A kind of method, apparatus, server and the storage medium of consumer products examination & verification
CN108711101A (en) * 2018-05-22 2018-10-26 考拉征信服务有限公司 A kind of loan transaction method, apparatus, system and electronic equipment

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106355924A (en) * 2016-09-06 2017-01-25 江苏智通交通科技有限公司 Traffic data quality monitoring system
CN107708102A (en) * 2017-09-22 2018-02-16 烽火通信科技股份有限公司 A kind of system and method for ZigBee gateway query node facility informations
CN107784205A (en) * 2017-10-17 2018-03-09 百度在线网络技术(北京)有限公司 A kind of method, apparatus, server and the storage medium of consumer products examination & verification
CN108711101A (en) * 2018-05-22 2018-10-26 考拉征信服务有限公司 A kind of loan transaction method, apparatus, system and electronic equipment

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111882470A (en) * 2020-06-03 2020-11-03 武汉达梦数据技术有限公司 Distributed public credit investigation method and device
CN113411224A (en) * 2021-08-19 2021-09-17 飞狐信息技术(天津)有限公司 Data processing method and device, electronic equipment and storage medium
CN113411224B (en) * 2021-08-19 2021-11-23 飞狐信息技术(天津)有限公司 Data processing method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110096857B (en) Authority management method, device, equipment and medium for block chain system
CN103761161B (en) Recover the method for data, server and system
CN110784331B (en) Consensus process recovery method and related nodes
CN110691077B (en) Service verification method of alliance chain and alliance chain system
CN109493080A (en) A kind of checking method of user data, device, server and storage medium
CN106708608A (en) Distributed lock service method and acquisition method, and corresponding device
CN111563820A (en) Intelligent contract parallel execution method and device
CN107065616A (en) Inter-linked controlling method and device, computer-readable recording medium
CN112734272A (en) Business flow approval method and device, electronic equipment and readable storage medium
CN101383814A (en) Device and method implementing data access based on connection pool
CN102014376B (en) Attaching method, paging method, detaching method and relevant equipment
CN103514164A (en) Data migration method and system
CN108173665A (en) A kind of method and device of Backup Data
CN112035062B (en) Migration method of local storage of cloud computing, computer equipment and storage medium
CN109408477A (en) A kind of method, system and associated component that setting group document is locked
CN109617929A (en) Node and user's interactive authentication method and system under block chain network mode
CN107770037A (en) By group chat Content Transformation into the method for seminar, server, terminal and system
CN106612193A (en) Network deployment configuration method and device in virtualization technology
CN106656522A (en) Data calculation method and system of cross-data center
CN106775468A (en) The method and system of distributed transaction
CN107040509A (en) A kind of file transmitting method and device
CN114971598B (en) Wind-controlled approval system, method, equipment and medium
CN109245941A (en) A kind of service compensation method and device
CN103546569B (en) Method for processing business based on Policies sharing, node and system
CN107357808A (en) Data managing method, device and equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190319