CN109543942A - Data verification method, device, computer equipment and storage medium - Google Patents
Data verification method, device, computer equipment and storage medium Download PDFInfo
- Publication number
- CN109543942A CN109543942A CN201811204234.2A CN201811204234A CN109543942A CN 109543942 A CN109543942 A CN 109543942A CN 201811204234 A CN201811204234 A CN 201811204234A CN 109543942 A CN109543942 A CN 109543942A
- Authority
- CN
- China
- Prior art keywords
- rule
- data
- verified
- current
- node
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000000034 method Methods 0.000 title claims abstract description 119
- 238000013524 data verification Methods 0.000 title claims abstract description 24
- 238000012795 verification Methods 0.000 claims abstract description 41
- 238000001514 detection method Methods 0.000 claims abstract description 8
- 238000004590 computer program Methods 0.000 claims description 17
- 230000015572 biosynthetic process Effects 0.000 claims description 15
- 238000003786 synthesis reaction Methods 0.000 claims description 15
- 238000012360 testing method Methods 0.000 claims description 13
- 238000004364 calculation method Methods 0.000 claims description 12
- 238000012937 correction Methods 0.000 claims description 3
- 238000010586 diagram Methods 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 2
- 238000004422 calculation algorithm Methods 0.000 description 2
- 239000012141 concentrate Substances 0.000 description 2
- 235000013399 edible fruits Nutrition 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 210000004556 brain Anatomy 0.000 description 1
- 238000004140 cleaning Methods 0.000 description 1
- 238000004891 communication Methods 0.000 description 1
- 230000005611 electricity Effects 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000002708 enhancing effect Effects 0.000 description 1
- 238000001914 filtration Methods 0.000 description 1
- 238000007726 management method Methods 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 238000012856 packing Methods 0.000 description 1
- 238000012545 processing Methods 0.000 description 1
- 230000001105 regulatory effect Effects 0.000 description 1
- 230000003014 reinforcing effect Effects 0.000 description 1
- 238000012216 screening Methods 0.000 description 1
- 230000011218 segmentation Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
- 230000001360 synchronised effect Effects 0.000 description 1
- 238000010998 test method Methods 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
- G06Q10/063—Operations research, analysis or management
- G06Q10/0635—Risk analysis of enterprise or organisation activities
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/07—Responding to the occurrence of a fault, e.g. fault tolerance
Abstract
This application involves a kind of data verification method, device, computer equipment and storage mediums.Method includes: to receive data check request;Data check request carries Data Identification and current process node identification;Obtain data to be verified corresponding with Data Identification;Obtain current rule set corresponding with current process node identification;Verification data are treated based on current rule set to be verified, and node check results are obtained;Detection current process node identifies whether that there are downstream node identifications, when it is present, returns and obtains current rule set corresponding with current process node identification, treats verification data based on current rule set and is verified, obtains node check results;When it be not present, summarize each flow nodes and identify corresponding node check results, obtain overall calibration result.Data checking procedure is optimized using this method, quickly data can be verified.
Description
Technical field
This application involves field of computer technology, more particularly to a kind of data verification method, device, computer equipment and
Storage medium.
Background technique
The reinforcing realized with enterprise's air control, it will usually school be carried out to data according to air control rule in multiple flow nodes
It tests.Such as enterprise into part system other than special air control system is set and carries out regular verification to data, there are also into part system
System included interior careful link rule verification, the rule verification of signing flow nodes and the rule verification in the case of other.Tradition side
It is identical when needing to increase newly in multiple flow nodes since the regular checking procedure of each flow nodes is independent of each other in formula
Rule when, needing to expend the time repeats to create identical rule for different flow nodes, leads to not quickly update rule
Then carry out data check.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of data school that can be quickly verified to data
Test method, apparatus, computer equipment and storage medium.
A kind of data verification method, which comprises receive data check request;The data check request carries number
According to mark and current process node identification;Obtain data to be verified corresponding with the Data Identification;It obtains and current process section
The corresponding current rule set of point identification;The data to be verified are verified based on the current rule set, obtain node school
Test result;That detects the current process node identifies whether that there are downstream node identifications, when it is present, obtains described in return
Current rule set corresponding with current process node identification is taken, school is carried out to the data to be verified based on the current rule set
It tests, obtains node check results;When it be not present, summarize each flow nodes and identify corresponding node check results, obtain comprehensive
Close check results.
It in one of the embodiments, include multiple rules to be verified in the current rule set;It is described to be worked as based on described
Preceding rule set verifies the data to be verified, obtains node check results, comprising: from the current rule set successively
Search rule to be verified;Detect the status indicator that the rule to be verified found carries;When the status indicator is to open mark
When knowledge, the data to be verified are verified according to the rule to be verified searched, obtain regular check results;According to rule
Check results obtain node check results.
The data check request carries service identification to be matched in one of the embodiments,;The acquisition with it is current
Flow nodes identify corresponding current rule set, comprising: when current process node identification corresponds to multiple current rule sets, detection
The target service mark that each current rule set carries;By multiple target services mark with the service identification to be matched into
Row matching;Obtain current rule set corresponding with the matched target service mark of service identification to be matched.
In one of the embodiments, the method also includes: identify corresponding original rule set from each flow nodes
It is middle to obtain multiple initial rules;Similarity calculation is carried out to every two initial rules, is obtained between corresponding two initial rules
Similarity;The rule to be verified in multiple initial rules is extracted according to multiple similarities, generates synthesis rule collection;The synthesis
The similarity between any two rule to be verified in rule set is less than default similarity threshold;According to the synthesis rule collection
In include rule to be verified, the current rule set of combination producing each flow nodes mark.
It is described in one of the embodiments, that similarity calculation is carried out to every two initial rules, it obtains at the beginning of corresponding two
Similarity between the rule that begins, comprising: the first initial rules and the second initial rules are chosen from multiple initial rules;Obtain institute
State the Second Rule vector of the corresponding first regular vector of the first initial rules and second initial rules;According to default
Similarity formula similarity calculation is carried out to the described first regular vector sum majority Second Rule vector, obtain selected two
Similarity between a initial rules.
In one of the embodiments, the method also includes: receive the newly-increased request of rule that terminal is sent;The rule
Newly-increased request carries regular set identifier and goal rule describes text;Rule description document is obtained, the rule is described into document
Text is described with the goal rule to be matched;Text is described comprising multiple historical rules in the rule description document;When
When describing text in the presence of the historical rule for describing text matches with the goal rule, then the matched historical rule is described
The corresponding historical rule of text is added in the corresponding current rule set of the regular set identifier;When there is no advise with the target
When then describing the historical rules of text matches and describing text, then the goal rule is described into the corresponding goal rule of text and added
Into the corresponding current rule set of the rule set identifier.
It is described in one of the embodiments, to summarize the corresponding node check results of each flow nodes mark, it obtains comprehensive
Close check results, comprising: obtain each flow nodes and identify corresponding default impact factor;Obtain each flow nodes mark pair
The node check results answered;The node check results include node value-at-risk;According to by multiple node value-at-risks and phase
The impact factor for answering flow nodes to identify is calculated, and the risk class of data to be verified is obtained.
A kind of data calibration device, described device include: receiving module, for receiving data verification request;The data
Verification request carries Data Identification and current process node identification;Module is obtained, it is corresponding with the Data Identification for obtaining
Data to be verified;Obtain current rule set corresponding with current process node identification;Correction verification module, for working as front lay based on described
Then collection verifies the data to be verified, obtains node check results;Detection module is used for
That detects the current process node identifies whether that there are downstream node identifications, when it is present, described in return
Current rule set corresponding with current process node identification is obtained, the data to be verified are carried out based on the current rule set
Verification, obtains node check results;Summarizing module identifies corresponding node for when it be not present, summarizing each flow nodes
Check results obtain overall calibration result.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing
The step of device realizes above-mentioned each data verification method as described in the examples when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor
The step of above-mentioned each data verification method as described in the examples is realized when row.
Above-mentioned data verification method, device, computer equipment and storage medium, server receive data check request, number
It requests to carry Data Identification and current process node identification according to verification.Server is obtaining number to be verified corresponding with data expression
It is verified according to verification data later, can be treated based on the corresponding current rule set of current process node identification, obtains node school
Test result.By constantly searching the downstream node identification of current process node identification, multiple flow nodes are successively obtained
Node check results.Server can summarize each flow nodes and identify corresponding node school when next node identification is not present
It tests as a result, obtaining overall calibration result.It is preset in the server to have multiple flow nodes, and stored for each flow nodes
Rule set, be managed collectively by the rule set to multiple flow nodes, can be by same rule configuration to be verified to difference
Rule set in, so as to quickly update rule carry out data check.
Detailed description of the invention
Fig. 1 is the application scenario diagram of data verification method in one embodiment;
Fig. 2 is the flow diagram of data verification method in one embodiment;
Fig. 3 is the correspondence diagram of flow nodes and rule set in one embodiment;
Fig. 4 is the flow diagram of data verification method in another embodiment;
Fig. 5 is the structural block diagram of data calibration device in one embodiment;
Fig. 6 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood
The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not
For limiting the application.
It is appreciated that term " first " used in the present invention, " second " etc. can be used to describe various elements herein,
But these elements are not limited by these terms.These terms are only used to distinguish the first element from the other element.Citing
For, without departing from the scope of the invention, the first initial rules can be known as the second initial rules, and similar
Second initial rules can be known as the first initial rules by ground.First initial rules and the second initial rules are both initially advised
Then, but it is not same initial rules.
Data verification method provided by the present application can be applied in application environment as shown in Figure 1.Wherein, terminal 102
It is communicated with server 104 by network.Wherein, terminal 102 can be, but not limited to be various personal computers, notebook electricity
Brain, smart phone, tablet computer and portable wearable device, server 104 can be either multiple with independent server
The server cluster of server composition is realized.Server 104 can receive the data check request of the transmission of terminal 102, data school
It tests request and carries Data Identification and current process node identification.Multiple flow nodes are preset in server 104, and for each
Flow nodes are stored with corresponding rule set.Server 104, can base after obtaining data to be verified corresponding with data expression
Verification data are treated in the corresponding current rule set of current process node identification to be verified, and node check results are obtained.Service
The detection current process node of device 104 identifies whether that there are downstream node identifications, when it is present, returns to obtain and flow with current
The corresponding current rule set of journey node identification is treated verification data based on current rule set and is verified, and node verification knot is obtained
Fruit.After obtaining each flow nodes and identifying corresponding node check results, server 104 can summarize each flow nodes mark
Know corresponding node check results, obtains overall calibration result.
In one embodiment, as shown in Fig. 2, providing a kind of data verification method, it is applied in Fig. 1 in this way
It is illustrated for server 104, comprising the following steps:
Step 202, data check request is received;Data check request carries Data Identification and current process node identification.
Data check request refers to the request for being used to carry out data check that terminal is sent.Data Identification refers to for obtaining
The mark of data to be verified.Data Identification can be the address for obtaining data to be verified.Such as Data Identification can be it is to be verified
The URL (Uniform Resource Locator, uniform resource locator) of data.Data Identification can also be for by letter, number
The character string that at least one of word, punctuation mark are constituted.For example Data Identification can be the number of data to be verified, server can
It goes in preset database to obtain corresponding data to be verified by the number of data to be verified.What data check request carried works as
Preceding flow nodes mark refers to the mark for carrying out the starting flow nodes of data check.
In one embodiment, multiple flow nodes are preset in server.It is verified as with carrying out air control rule to data
Example, flow nodes include but is not limited to special air control system to data carry out regular verification flow nodes, into part system from
The flow nodes etc. of rule verification when the flow nodes of the interior careful link rule verification of band, signing.It is settable between flow nodes
There is fixed process sequence, it can also be for according to the process of data self to be verified sequence.Data check request carries current
Flow nodes mark can be the mark of one of flow nodes.
Step 204, data to be verified corresponding with Data Identification are obtained.
Data to be verified refer to the data verified.Verification data can be treated and carry out risk verification, integrality
The data checks such as verification, legitimacy verifies.Data to be verified can store in preset database, can be the data of terminal
In library, it is also possible in the database of server.
In one embodiment, terminal can provide data upload interface, may include in data upload interface text box, by
The input controls such as button, combobox, user can input data to be verified to terminal by input control.It is acted on when terminal detects
When confirming the clicking operation of control, the data summarization to be verified that can input user is packaged, and the data to be verified of packing are sent out
It send into server, is verified so that server treats verification data.
Step 206, current rule set corresponding with current process node identification is obtained.
Current process node identification refers to current logarithmic according to the mark of the flow nodes verified.Current rule set refers to
The corresponding rule set of current process node identification.Rule set refers to the set for storing multiple rules.It can be stored in current rule set
There are multiple rules to be verified, and can be preset with for multiple rules to be verified and execute sequence.
In one embodiment, data check request carries service identification to be matched;It obtains and current process node identification
Corresponding current rule set, comprising: when current process node identification corresponds to multiple current rule sets, detect each current rule
The target service mark that collection carries;Multiple target services are identified and are matched with service identification to be matched;Obtain with it is to be matched
The matched target service of service identification identifies corresponding current rule set.
Multiple current rule sets can be preset for each flow nodes, and each rule set can be determined from different attribute dimension
Justice, and different rule sets is distinguished with target service mark.Such as target service mark can be channel mark, field
Scape mark, product identification can be directed to the corresponding different business channel of data, business scenario or service product, take different work as
Preceding rule set carries out data check.It can be in the rule set of all or part of the process node setting various dimensions.
Fig. 3 is the correspondence diagram of flow nodes and rule set.Flow nodes 1 and flow nodes 3 have respectively corresponded
Multiple rule sets, and it is only corresponding with a rule set respectively in flow nodes 2 and flow nodes 4.It is asked when receiving data check
After asking, need to identify data check request carry service identification to be matched, make it possible to each flow nodes determine with
The corresponding rule set of service identification to be matched.It can be different to distinguish for the corresponding regular set identifier of each rule set label
Rule set.Such as service identification product A to be matched, current rule set that data check process obtains can for rule set 1.1,
Rule set 2.1, rule set 3.1, rule set 4.1;And it is directed to service identification product B to be matched, what data check process obtained works as
Preceding rule set can be rule set 1.2, rule set 2.1, rule set 3.2, rule set 4.1.It is being flowed by different target service identification
Cheng Jiedian distinguishing rule collection makes it possible to configure personalized rule set more flexiblely for different attribute dimension.
Step 208, verification data are treated based on current rule set to be verified, obtains node check results.
Regular execution sequence, which can be, successively to be executed, and is also possible to execute side by side, be can also be selective execution.Such as
It says, includes three rules to be verified in current rule set, respectively rule 1, rule 2 and rule 3, it can be suitable by preset execution
Sequence successively executes three rules, can also execute three rules side by side, can also be after executing rule 1, according to holding for rule 1
Row result selectivity executing rule 2 or rule 3.Risk verification, completeness check, legitimacy verifies can be carried out by treating verification data
Equal data checks.Correspondingly, node check results are venture entrepreneur, integrality degree, legitimacy result etc..
It in one embodiment, include multiple rules to be verified in current rule set;Based on current rule set to be verified
Data are verified, and node check results are obtained, comprising: rule to be verified is successively searched from current rule set;Detection is looked into
The status indicator that the rule to be verified found carries;When status indicator is to open mark, according to the rule to be verified searched
It treats verification data to be verified, obtains regular check results;According to regular check results, node check results are obtained.
Each corresponding status indicator of rule setting to be verified can be directed to.Such as when status indicator be open mark, than
When for example Y, the rule to be verified can be performed;When status indicator is to close mark, for example when for N, can skip the rule to be verified.
Such as the data check of authentication process, different rule sets, and rule can be set for different business channels
Concentration may include identical rule to be verified, but the corresponding status indicator of rule to be verified that Different Rule is concentrated can not phase
Together.For the business channel of webpage, need to verify name, identification card number, cell-phone number, IP address;And it is directed to the industry of application program
The rule setting to be verified for verifying cell-phone number and IP address can be to close mark, then only need to verify name and body by business channel
Part card number.The switch state of rule to be verified is set by status indicator, can more easily be controlled in increase and decrease rule set
Rule to be verified, so that carrying out independent configuration to distinctive rule to be verified.
Step 210, that detects current process node identifies whether that there are downstream node identifications, when it is present, returns
Current rule set corresponding with current process node identification is obtained, verification data are treated based on current rule set and are verified, are obtained
To node check results.
Multiple flow nodes, and the process sequence of settable flow nodes can be preset in server.It can be directed to different
Data to be verified execute wherein all or part of the process node.As shown in figure 3, whole process sections can be executed according to process sequence
Point 1, flow nodes 2, flow nodes 3 and flow nodes 4.Part flow nodes therein can also be executed, for example only execute stream
Cheng Jiedian 1 and flow nodes 3.When downstream node identification is not present in current process node identification, illustrate current process section
Point identification is the mark of the last one flow nodes, then without returning again to execution circulation step.
After executing as the corresponding current rule set of current process node identification, current process node identification can be searched
Downstream node identification, and using the downstream node identification found as current process node identification.Such as it is holding
It has gone the rule to be verified in the rule set 1.1 of flow nodes 1 and after obtaining node check results, flow nodes 1 can be searched
Downstream node identification flow nodes 2, and again obtain flow nodes 2 current rule set 2.1 data are verified.
In one embodiment, after receiving data check request, each flow nodes and process sequence are first determined.It can
Process sequence different between different flow nodes and flow nodes is set for every kind of different business.Some business need
The data check of whole flow nodes is carried out, and some business only need to carry out the data check of part flow nodes.Therefore,
Can sequence be executed for what different business was arranged corresponding flow nodes and flow nodes in advance.It can be taken in data check request
With service identification to be matched, first choice is to obtain flow nodes mark sequence corresponding with service identification to be matched, according to process section
Point identification sequence, which determines, works as future node identification, and determines that each flow nodes identify corresponding downstream node identification.
Step 212, when it be not present, summarize each flow nodes and identify corresponding node check results, obtain comprehensive school
Test result.
According to each flow nodes mark searched and executed, corresponding node check results can be respectively obtained, are passed through
Summarizing multiple node check results can be obtained overall calibration result.For risk verification, each process section can be passed through
The rule set of point obtains data to be verified in the venture entrepreneur of each flow nodes, and multiple venture entrepreneurs can be weighted
Obtain comprehensive venture entrepreneur;For completeness check, it can be obtained by the rule set of each flow nodes to school
Data are tested in the integrality degree of each flow nodes, multiple integrality degree can be carried out score value be calculated it is comprehensive complete
Property degree;For another example for for legitimacy verifies, data to be verified can be obtained by the rule set of each flow nodes every
As a result, when data to be verified are when each flow nodes are all legal, overall calibration result is just the legitimacy of a flow nodes
Legitimacy verifies pass through.
In above-mentioned data verification method, server receive data check request, data check request carry Data Identification and
Current process node identification.Server can be based on current process section after obtaining data to be verified corresponding with data expression
The corresponding current rule set of point identification is treated verification data and is verified, and node check results are obtained.It is current by constantly searching
The downstream node identification of flow nodes mark, successively obtains the node check results of multiple flow nodes.Server can be
There is no when downstream node identification, summarizing each flow nodes to identify corresponding node check results, overall calibration is obtained
As a result.It is preset in the server to have multiple flow nodes, and for the rule set of each flow nodes storage, by multiple
The rule set of flow nodes is managed collectively, and can configure same rule to be verified into different rule sets, so as to
It quickly updates rule and carries out data check.
In one embodiment, this method further include: identify in corresponding original rule set and obtain from each flow nodes
Multiple initial rules;Similarity calculation is carried out to every two initial rules, obtains the similarity between corresponding two initial rules;
The rule to be verified in multiple initial rules is extracted according to multiple similarities, generates synthesis rule collection;What synthesis rule was concentrated
Similarity between any two rule to be verified is less than default similarity threshold;According to synthesis rule concentrate include it is to be verified
Rule, the current rule set of each flow nodes mark of combination producing.
Before being managed collectively to the rule of multiple flow nodes, needs to carry out initial rules regular cleaning, reject
Duplicate rule.Original rule set is obtained from the corresponding database of multiple original flow nodes, includes in original rule set
Multiple initial rules.After calculating the similarity between any two initial rules, when similarity is greater than default similarity threshold
When, then illustrate that corresponding two initial rules are recurring rule, therefore duplicate initial rules can be rejected according to similarity, so that
Obtained synthesis rule is concentrated comprising a plurality of mutually independent rule to be verified.
In one embodiment, server can receive the rule set configuring request that configurating terminal is sent, and rule set configuration is asked
Seek the rule mark that can carry flow nodes mark and multiple rules to be verified;Server can by it is multiple rule mark it is corresponding to
Verification rule set is configured to a rule set;And the flow nodes for carrying the configured rule set and rule set configuring request
Mark is associated.
In one embodiment, to every two initial rules carry out similarity calculation, obtain corresponding two initial rules it
Between similarity, comprising: the first initial rules and the second initial rules are chosen from multiple initial rules;First is obtained initially to advise
Then the corresponding first regular vector and the Second Rule vector of the second initial rules;According to preset similarity formula to
One regular vector sum majority Second Rule vector carries out similarity calculation, obtains similar between two selected initial rules
Degree.
First initial rules and the second initial rules are in the corresponding multiple initial rules of multiple original flow nodes
Any two initial rules.First regular vector be using multiple characteristic values of the first initial rules as divide vector it is regular to
Amount, Second Rule vector is using multiple characteristic values of the second initial rules as the regular vector for dividing vector.Pass through similarity public affairs
Formula can accurately determine the similarity between two initial rules, so as to be convenient for filtering out duplicate rule.By picking
Except the initial rules of redundancy, synthesis rule collection can be simplified, so as to efficiently be managed to rule to be verified.
In one embodiment, the corresponding first regular vector of the first initial rules and the second initial rules are obtained
Second Rule vector, comprising: obtain the corresponding keyword of the first initial rules and the corresponding keyword of the second initial rules;It obtains
Predetermined keyword weight corresponding with each keyword;Based on corresponding pre- with each keyword corresponding in the first initial rules
If keyword weight, the corresponding first regular vector of the first initial rules is generated according to the corresponding keyword of the first initial rules;
It is corresponding according to the second initial rules based on predetermined keyword weight corresponding with each keyword corresponding in the second initial rules
Keyword generate the corresponding Second Rule vector of the second initial rules.
Each initial rules can be segmented according to preset segmentation methods, generate corresponding multiple initial words.It will
In each initial rules with the matched initial word of predetermined keyword in predetermined keyword library, as keyword.Preset point
Word algorithm includes but is not limited to the segmenting method based on string matching, the segmenting method based on understanding and the participle based on statistics
The combinational algorithm of the one or more of them such as method.It can be after removing the stop words in initial word, according to preliminary screening
The corresponding frequency of initial word out determines keyword.Can be according to formula: frequency=N/m be calculated, and obtains each residue
The frequency of initial word.Wherein, N is the frequency that initial word occurs, and m is word in the corresponding term database of synthesis rule collection
Sum, using frequency be greater than preset threshold initial word as keyword.
It can be according to formula W=log (D/DW) calculated, obtain the predetermined keyword weight of each keyword, wherein W
For predetermined keyword weight, D is the rule sum for including, D in all initial rulesWFor the initial rules comprising the keyword
Quantity.If rule R includes n keyword, regular RxBeing represented by with the corresponding predetermined keyword weight of each keyword is point
The n-dimensional vector R of vectorx(W1, W2, W3……Wn), wherein W1To WnFor the corresponding predetermined keyword weight of each keyword.It can
According to preset similarity formulaTo the first regular vectorIt is advised with majority second
Then vectorSimilarity calculation is carried out, the similarity between two selected initial rules is obtainedWherein, W0k
For the first regular vectorN corresponding predetermined keyword weight, WAkFor Second Rule vectorCorresponding n are default
Keyword weight.
In one embodiment, method further include: receive the newly-increased request of rule that terminal is sent;The newly-increased request of rule carries
Regular set identifier and goal rule describe text;Rule description document is obtained, rule description document and goal rule are described into text
This is matched;Text is described comprising multiple historical rules in rule description document;Text is described with goal rule when existing
When the historical rule matched describes text, then matched historical rule is described into the corresponding historical rule of text and be added to rule set mark
Know in corresponding current rule set;When describing text there is no the historical rule for describing text matches with goal rule, then will
Goal rule describes the corresponding goal rule of text and is added in the corresponding current rule set of regular set identifier.
After creating synthesis rule collection, all historical rules building rule description that can include based on synthesis rule collection is literary
Shelves have corresponding description text for each historical rule.By the way that goal rule is described text and rule description document progress
Matching, can determine rule description document in whether include and the matched historical rule of goal rule.When presence and goal rule
When the historical rule of description text matches describes text, illustrate without adding the goal rule, and only need to be new by the historical rule
It increases in the corresponding current rule set of regular set identifier.When there is no the historical rules for describing text matches with goal rule to describe
When text, explanation can add goal rule into the corresponding current rule set of regular set identifier, and goal rule is added to comprehensive
Normally concentrate.It is matched by the way that goal rule is described text with rule description document, can avoid increasing duplicate rule,
The utilization rate of each historical rule is improved, to efficiently update the rule in rule set.
In one embodiment, summarize each flow nodes and identify corresponding node check results, obtain overall calibration knot
Fruit, comprising: obtain each flow nodes and identify corresponding default impact factor;It obtains each flow nodes and identifies corresponding node
Check results;Node check results include node value-at-risk;According to by multiple node value-at-risks and corresponding process node identification
Impact factor is calculated, and the risk class of data to be verified is obtained.
When data check is to verify to the risk of data, air control rule set can be set in each flow nodes, pass through wind
The air control rule that regulatory control is then concentrated is treated verification data and is verified.Impact factor can be set for each flow nodes, influence
The factor representation significance level of flow nodes can refer to degree.By the air control rule set of each flow nodes can obtain to
Data are verified in the node value-at-risk of each flow nodes.Multiple node value-at-risks can be weighted with corresponding impact factor
It calculates, obtains integrated risk value, determine value-at-risk section locating for integrated risk value to determine the risk class of data to be verified.
In one embodiment, as shown in figure 4, providing another data verification method, it is applied in Fig. 1 in this way
Server 104 for be illustrated, comprising the following steps:
Step 402, data check request is received;Data check request carry Data Identification, current process node identification and
Service identification to be matched.
Step 404, data to be verified corresponding with Data Identification are obtained.
Step 406, it when current process node identification corresponds to multiple current rule sets, detects each current rule set and carries
Target service mark.
Step 408, multiple target services are identified and is matched with service identification to be matched.
Step 410, current rule set corresponding with the matched target service mark of service identification to be matched is obtained.
Step 412, rule to be verified is successively searched from current rule set.
Step 414, the status indicator that the rule to be verified that detection is found carries.
Step 416, when status indicator is to open mark, verification data is treated according to the rule to be verified searched and are carried out
Verification, obtains regular check results.
Step 418, according to regular check results, node check results are obtained.
Step 420, that detects current process node identifies whether that there are downstream node identifications, when it is present, returns
Current rule set corresponding with the matched target service mark of service identification to be matched is obtained, based on current rule set to be verified
Data are verified, and node check results are obtained.
Step 422, when it be not present, summarize each flow nodes and identify corresponding node check results, obtain comprehensive school
Test result.
In above-mentioned data verification method, server receive data check request, data check request carry Data Identification and
Current process node identification.Server can be based on current process section after obtaining data to be verified corresponding with data expression
Point identification and the corresponding current rule set of service identification to be matched are treated verification data and are verified, and node check results are obtained.
Different rule sets, and the status indicator carried by rule to be verified, energy are configured with for different service identifications to be matched
Enough verification data of easily and flexibly treating carry out personalized verification.By the lower one stream for constantly searching current process node identification
Journey node identification successively obtains the node check results of multiple flow nodes.Downstream node mark can be not present in server
When knowledge, summarizes each flow nodes and identify corresponding node check results, obtain overall calibration result.It is preset in the server
There are multiple flow nodes, and for the rule set of each flow nodes storage, is carried out by the rule set to multiple flow nodes
Unified management can carry out data by same rule configuration to be verified into different rule sets so as to quickly update rule
Verification.
It should be understood that although each step in the flow chart of Fig. 2 and 4 is successively shown according to the instruction of arrow,
It is these steps is not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps
There is no stringent sequences to limit for rapid execution, these steps can execute in other order.Moreover, in Fig. 2 and 4 at least
A part of step may include that perhaps these sub-steps of multiple stages or stage are not necessarily in same a period of time to multiple sub-steps
Quarter executes completion, but can execute at different times, the execution in these sub-steps or stage be sequentially also not necessarily according to
Secondary progress, but in turn or can replace at least part of the sub-step or stage of other steps or other steps
Ground executes.
In one embodiment, as shown in figure 5, providing a kind of data calibration device 500, comprising: receiving module 502,
Verification request for receiving data;Data check request carries Data Identification and current process node identification;Module 504 is obtained,
For obtaining data to be verified corresponding with Data Identification;Obtain current rule set corresponding with current process node identification;School
Module 506 is tested, is verified for treating verification data based on current rule set, obtains node check results;Detection module
508, it identifies whether that there are downstream node identifications for detect current process node, when it is present, returns and obtain and work as
Preceding flow nodes identify corresponding current rule set, treat verification data based on current rule set and are verified, obtain node school
Test result;Summarizing module 510 identifies corresponding node check results for when it be not present, summarizing each flow nodes, obtains
Overall calibration result.
It in one embodiment, include multiple rules to be verified in current rule set;Correction verification module 506 is also used to from current
Rule to be verified is successively searched in rule set;Detect the status indicator that the rule to be verified found carries;Work as status indicator
When to open mark, verification data being treated according to the rule to be verified searched and are verified, regular check results are obtained;According to
Regular check results obtain node check results.
In one embodiment, data check request carries service identification to be matched;Module 504 is obtained to be also used to when current
When flow nodes identify corresponding multiple current rule sets, the target service mark that each current rule set carries is detected;It will be multiple
Target service mark is matched with service identification to be matched;It obtains and the matched target service mark pair of service identification to be matched
The current rule set answered.
In one embodiment, which further includes configuration module, corresponding original for identifying from each flow nodes
Multiple initial rules are obtained in rule set;Similarity calculation is carried out to every two initial rules, obtains corresponding two initial rules
Between similarity;The rule to be verified in multiple initial rules is extracted according to multiple similarities, generates synthesis rule collection;It is comprehensive
Similarity between any two normally concentrated rule to be verified is less than default similarity threshold;It is concentrated according to synthesis rule
The rule to be verified for including, the current rule set of each flow nodes mark of combination producing.
In one embodiment, at the beginning of configuration module is also used to choose the first initial rules and second from multiple initial rules
Begin rule;Obtain the Second Rule vector of the corresponding first regular vector of the first initial rules and the second initial rules;According to
Preset similarity formula carries out similarity calculation to the first regular vector sum majority Second Rule vector, obtains selected two
Similarity between a initial rules.
In one embodiment, which further includes newly-increased module, the newly-increased request of the rule for receiving terminal transmission;Rule
It then increases the regular set identifier of request carrying newly and goal rule describes text;Obtain rule description document, by rule description document with
Goal rule describes text and is matched;Text is described comprising multiple historical rules in rule description document;When presence and target
When the historical rule of rule description text matches describes text, then the corresponding historical rule of text is described into matched historical rule
It is added in the corresponding current rule set of regular set identifier;When there is no the historical rules for describing text matches with goal rule to retouch
When stating text, then goal rule is described into the corresponding goal rule of text and be added to the corresponding current rule set of regular set identifier
In.
In one embodiment, summarizing module 510 be also used to obtain each flow nodes identify corresponding default influence because
Son;It obtains each flow nodes and identifies corresponding node check results;Node check results include node value-at-risk;According to will be more
A node value-at-risk and the impact factor of corresponding process node identification are calculated, and the risk class of data to be verified is obtained.
Specific about data calibration device limits the restriction that may refer to above for data verification method, herein not
It repeats again.Modules in above-mentioned data calibration device can be realized fully or partially through software, hardware and combinations thereof.On
Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form
In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction
Composition can be as shown in Figure 6.The computer equipment include by system bus connect processor, memory, network interface and
Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment
Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data
Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating
The database of machine equipment is for data such as Stored Procedure node identification, rule sets.The network interface of the computer equipment be used for
External terminal passes through network connection communication.To realize a kind of data verification method when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Fig. 6, only part relevant to application scheme is tied
The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment
It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with
The step of computer program, which realizes the data verification method in above-mentioned each embodiment when executing computer program.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated
Machine program realizes the step of data verification method in above-mentioned each embodiment when being executed by processor.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with
Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer
In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein,
To any reference of memory, storage, database or other media used in each embodiment provided herein,
Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM
(PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include
Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms,
Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing
Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM
(RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment
In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance
Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously
It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art
It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application
Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.
Claims (10)
1. a kind of data verification method, which comprises
Receive data check request;The data check request carries Data Identification and current process node identification;
Obtain data to be verified corresponding with the Data Identification;
Obtain current rule set corresponding with current process node identification;
The data to be verified are verified based on the current rule set, obtain node check results;
That detects the current process node identifies whether that there are downstream node identifications, when it is present, returns to the acquisition
Current rule set corresponding with current process node identification carries out school to the data to be verified based on the current rule set
It tests, obtains node check results;
When it be not present, summarize each flow nodes and identify corresponding node check results, obtain overall calibration result.
2. the method according to claim 1, wherein including multiple rules to be verified in the current rule set;
It is described that the data to be verified are verified based on the current rule set, obtain node check results, comprising:
Rule to be verified is successively searched from the current rule set;
Detect the status indicator that the rule to be verified found carries;
When the status indicator is to open mark, school is carried out to the data to be verified according to the rule to be verified searched
It tests, obtains regular check results;
According to regular check results, node check results are obtained.
3. the method according to claim 1, wherein data check request carries service identification to be matched;
It is described to obtain current rule set corresponding with current process node identification, comprising:
When current process node identification corresponds to multiple current rule sets, the target industry that each current rule set carries is detected
Business mark;
Multiple target services are identified and are matched with the service identification to be matched;
Obtain current rule set corresponding with the matched target service mark of service identification to be matched.
4. the method according to claim 1, wherein the method also includes:
It is identified in corresponding original rule set from each flow nodes and obtains multiple initial rules;
Similarity calculation is carried out to every two initial rules, obtains the similarity between corresponding two initial rules;
The rule to be verified in multiple initial rules is extracted according to multiple similarities, generates synthesis rule collection;The comprehensive rule
Similarity between any two then concentrated rule to be verified is less than default similarity threshold;
The rule to be verified for including, the current rule of each flow nodes mark of combination producing are concentrated according to the synthesis rule
Collection.
5. according to the method described in claim 4, it is characterized in that, it is described to every two initial rules carry out similarity calculation,
Obtain the similarity between corresponding two initial rules, comprising:
The first initial rules and the second initial rules are chosen from multiple initial rules;
Obtain the Second Rules of the corresponding first regular vector of first initial rules and second initial rules to
Amount;
Similarity calculation is carried out to the described first regular vector sum majority Second Rule vector according to preset similarity formula, is obtained
Similarity between two selected initial rules.
6. the method according to claim 1, wherein the method also includes:
Receive the newly-increased request of rule that terminal is sent;The newly-increased request of rule carries regular set identifier and goal rule description text
This;
Rule description document is obtained, the rule description document is described into text with the goal rule and is matched;The rule
It then describes to describe text comprising multiple historical rules in document;
When describing text in the presence of the historical rule for describing text matches with the goal rule, then the matched history is advised
The corresponding historical rule of text is then described to be added in the corresponding current rule set of the regular set identifier;
When describing text there is no the historical rule for describing text matches with the goal rule, then the goal rule is retouched
The corresponding goal rule of text is stated to be added in the corresponding current rule set of the regular set identifier.
7. the method according to claim 1, wherein described summarize the corresponding node school of each flow nodes mark
It tests as a result, obtaining overall calibration result, comprising:
It obtains each flow nodes and identifies corresponding default impact factor;
It obtains each flow nodes and identifies corresponding node check results;The node check results include node value-at-risk;
It is calculated according to by multiple node value-at-risks and the impact factor of corresponding process node identification, obtains number to be verified
According to risk class.
8. a kind of data calibration device, which is characterized in that described device includes:
Receiving module, for receiving data verification request;The data check request carries Data Identification and current process node
Mark;
Module is obtained, for obtaining data to be verified corresponding with the Data Identification;It obtains and current process node identification pair
The current rule set answered;
Correction verification module obtains node check results for verifying based on the current rule set to the data to be verified;
Detection module identifies whether that there are downstream node identifications for detect the current process node, when it is present,
Acquisition current rule set corresponding with current process node identification is returned to, based on the current rule set to described to be verified
Data are verified, and node check results are obtained;
Summarizing module identifies corresponding node check results for when it be not present, summarizing each flow nodes, obtains comprehensive school
Test result.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists
In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program
The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811204234.2A CN109543942A (en) | 2018-10-16 | 2018-10-16 | Data verification method, device, computer equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201811204234.2A CN109543942A (en) | 2018-10-16 | 2018-10-16 | Data verification method, device, computer equipment and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109543942A true CN109543942A (en) | 2019-03-29 |
Family
ID=65843895
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201811204234.2A Pending CN109543942A (en) | 2018-10-16 | 2018-10-16 | Data verification method, device, computer equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109543942A (en) |
Cited By (25)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110134929A (en) * | 2019-04-17 | 2019-08-16 | 深圳壹账通智能科技有限公司 | Document verification method, apparatus, computer equipment and storage medium |
CN110245049A (en) * | 2019-06-06 | 2019-09-17 | 深圳前海微众银行股份有限公司 | Monitoring method, device, equipment and the storage medium of product configuration data |
CN110442756A (en) * | 2019-06-27 | 2019-11-12 | 平安科技(深圳)有限公司 | Data verification method, device, computer equipment and storage medium |
CN110728501A (en) * | 2019-09-30 | 2020-01-24 | 口碑(上海)信息技术有限公司 | Incoming part processing method and incoming part system |
CN110766160A (en) * | 2019-10-21 | 2020-02-07 | 北京明略软件系统有限公司 | Data verification method and device, storage medium and electronic equipment |
CN111291054A (en) * | 2020-02-21 | 2020-06-16 | 苏宁云计算有限公司 | Data processing method and device, computer equipment and storage medium |
CN111427571A (en) * | 2020-03-16 | 2020-07-17 | 北京明略软件系统有限公司 | Data verification method and device |
CN111444224A (en) * | 2020-03-24 | 2020-07-24 | 政采云有限公司 | Service data verification method and device |
CN111666340A (en) * | 2020-05-27 | 2020-09-15 | 中国平安财产保险股份有限公司 | Synchronous data proofreading method and device based on big data and computer equipment |
CN111680305A (en) * | 2020-07-31 | 2020-09-18 | 支付宝(杭州)信息技术有限公司 | Data processing method, device and equipment based on block chain |
CN111709035A (en) * | 2020-06-12 | 2020-09-25 | 北京思特奇信息技术股份有限公司 | Business process security verification method and system |
CN111798245A (en) * | 2020-06-29 | 2020-10-20 | 平安国际智慧城市科技股份有限公司 | Data monitoring method and device, computer equipment and storage medium |
CN112364381A (en) * | 2020-11-25 | 2021-02-12 | 广州三叠纪元智能科技有限公司 | Authority management method, electronic box, server and storage medium |
CN112416648A (en) * | 2020-06-03 | 2021-02-26 | 上海哔哩哔哩科技有限公司 | Data verification method and device |
CN112581134A (en) * | 2020-12-25 | 2021-03-30 | 中国农业银行股份有限公司 | Data verification method, device and system |
CN113011989A (en) * | 2021-03-23 | 2021-06-22 | 腾讯科技(深圳)有限公司 | Object verification method, device, equipment and storage medium |
CN113240351A (en) * | 2021-06-28 | 2021-08-10 | 平安信托有限责任公司 | Business data consistency checking method and device, electronic equipment and medium |
CN113240266A (en) * | 2021-05-11 | 2021-08-10 | 北京沃东天骏信息技术有限公司 | Risk management method and device |
CN113378549A (en) * | 2021-06-29 | 2021-09-10 | 平安普惠企业管理有限公司 | Document verification method and device, computer equipment and storage medium |
CN113938388A (en) * | 2021-10-14 | 2022-01-14 | 工银科技有限公司 | Parameter verification method and device for service interface |
CN114338102A (en) * | 2021-12-14 | 2022-04-12 | 北京安天网络安全技术有限公司 | Security detection method and device, electronic equipment and storage medium |
CN114364017A (en) * | 2021-12-21 | 2022-04-15 | 威海北洋电气集团股份有限公司 | Method, device, medium and equipment for automatically calibrating and calibrating physical position of cascade node |
CN114780595A (en) * | 2022-05-09 | 2022-07-22 | 马上消费金融股份有限公司 | Verification method, device and system |
CN115242349A (en) * | 2022-06-21 | 2022-10-25 | 苏州盈数智能科技有限公司 | Enterprise-level data verification method and device, computer equipment and storage medium |
CN113011989B (en) * | 2021-03-23 | 2024-04-23 | 腾讯科技(深圳)有限公司 | Object verification method, device, equipment and storage medium |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103544074A (en) * | 2012-07-09 | 2014-01-29 | 阿里巴巴集团控股有限公司 | Method and device for verifying service |
CN108346191A (en) * | 2018-02-06 | 2018-07-31 | 中国平安人寿保险股份有限公司 | Work attendance method, device, computer equipment and storage medium |
-
2018
- 2018-10-16 CN CN201811204234.2A patent/CN109543942A/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103544074A (en) * | 2012-07-09 | 2014-01-29 | 阿里巴巴集团控股有限公司 | Method and device for verifying service |
CN108346191A (en) * | 2018-02-06 | 2018-07-31 | 中国平安人寿保险股份有限公司 | Work attendance method, device, computer equipment and storage medium |
Cited By (36)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110134929A (en) * | 2019-04-17 | 2019-08-16 | 深圳壹账通智能科技有限公司 | Document verification method, apparatus, computer equipment and storage medium |
CN110245049A (en) * | 2019-06-06 | 2019-09-17 | 深圳前海微众银行股份有限公司 | Monitoring method, device, equipment and the storage medium of product configuration data |
CN110442756A (en) * | 2019-06-27 | 2019-11-12 | 平安科技(深圳)有限公司 | Data verification method, device, computer equipment and storage medium |
WO2020258655A1 (en) * | 2019-06-27 | 2020-12-30 | 平安科技(深圳)有限公司 | Data verification method and apparatus, and computer device and storage medium |
CN110728501A (en) * | 2019-09-30 | 2020-01-24 | 口碑(上海)信息技术有限公司 | Incoming part processing method and incoming part system |
CN110766160A (en) * | 2019-10-21 | 2020-02-07 | 北京明略软件系统有限公司 | Data verification method and device, storage medium and electronic equipment |
CN111291054A (en) * | 2020-02-21 | 2020-06-16 | 苏宁云计算有限公司 | Data processing method and device, computer equipment and storage medium |
CN111291054B (en) * | 2020-02-21 | 2023-05-16 | 苏宁云计算有限公司 | Data processing method, device, computer equipment and storage medium |
CN111427571A (en) * | 2020-03-16 | 2020-07-17 | 北京明略软件系统有限公司 | Data verification method and device |
CN111444224A (en) * | 2020-03-24 | 2020-07-24 | 政采云有限公司 | Service data verification method and device |
CN111444224B (en) * | 2020-03-24 | 2023-08-15 | 政采云有限公司 | Service data verification method and device |
CN111666340A (en) * | 2020-05-27 | 2020-09-15 | 中国平安财产保险股份有限公司 | Synchronous data proofreading method and device based on big data and computer equipment |
CN111666340B (en) * | 2020-05-27 | 2023-10-27 | 中国平安财产保险股份有限公司 | Synchronous data proofreading method and device based on big data and computer equipment |
CN112416648A (en) * | 2020-06-03 | 2021-02-26 | 上海哔哩哔哩科技有限公司 | Data verification method and device |
CN111709035A (en) * | 2020-06-12 | 2020-09-25 | 北京思特奇信息技术股份有限公司 | Business process security verification method and system |
CN111709035B (en) * | 2020-06-12 | 2022-03-29 | 北京思特奇信息技术股份有限公司 | Business process security verification method and system |
CN111798245A (en) * | 2020-06-29 | 2020-10-20 | 平安国际智慧城市科技股份有限公司 | Data monitoring method and device, computer equipment and storage medium |
CN111798245B (en) * | 2020-06-29 | 2023-09-26 | 深圳赛安特技术服务有限公司 | Data monitoring method, device, computer equipment and storage medium |
CN111680305A (en) * | 2020-07-31 | 2020-09-18 | 支付宝(杭州)信息技术有限公司 | Data processing method, device and equipment based on block chain |
CN112364381A (en) * | 2020-11-25 | 2021-02-12 | 广州三叠纪元智能科技有限公司 | Authority management method, electronic box, server and storage medium |
CN112581134A (en) * | 2020-12-25 | 2021-03-30 | 中国农业银行股份有限公司 | Data verification method, device and system |
CN113011989A (en) * | 2021-03-23 | 2021-06-22 | 腾讯科技(深圳)有限公司 | Object verification method, device, equipment and storage medium |
CN113011989B (en) * | 2021-03-23 | 2024-04-23 | 腾讯科技(深圳)有限公司 | Object verification method, device, equipment and storage medium |
CN113240266A (en) * | 2021-05-11 | 2021-08-10 | 北京沃东天骏信息技术有限公司 | Risk management method and device |
CN113240351A (en) * | 2021-06-28 | 2021-08-10 | 平安信托有限责任公司 | Business data consistency checking method and device, electronic equipment and medium |
CN113378549B (en) * | 2021-06-29 | 2023-02-14 | 平安普惠企业管理有限公司 | Document verification method and device, computer equipment and storage medium |
CN113378549A (en) * | 2021-06-29 | 2021-09-10 | 平安普惠企业管理有限公司 | Document verification method and device, computer equipment and storage medium |
CN113938388A (en) * | 2021-10-14 | 2022-01-14 | 工银科技有限公司 | Parameter verification method and device for service interface |
CN114338102A (en) * | 2021-12-14 | 2022-04-12 | 北京安天网络安全技术有限公司 | Security detection method and device, electronic equipment and storage medium |
CN114338102B (en) * | 2021-12-14 | 2024-03-19 | 北京安天网络安全技术有限公司 | Security detection method, security detection device, electronic equipment and storage medium |
CN114364017A (en) * | 2021-12-21 | 2022-04-15 | 威海北洋电气集团股份有限公司 | Method, device, medium and equipment for automatically calibrating and calibrating physical position of cascade node |
CN114364017B (en) * | 2021-12-21 | 2024-03-01 | 威海北洋电气集团股份有限公司 | Cascade node physical position automatic calibration method, device, medium and equipment |
CN114780595B (en) * | 2022-05-09 | 2023-08-15 | 马上消费金融股份有限公司 | Verification method, verification device and verification system |
CN114780595A (en) * | 2022-05-09 | 2022-07-22 | 马上消费金融股份有限公司 | Verification method, device and system |
CN115242349A (en) * | 2022-06-21 | 2022-10-25 | 苏州盈数智能科技有限公司 | Enterprise-level data verification method and device, computer equipment and storage medium |
CN115242349B (en) * | 2022-06-21 | 2023-11-14 | 苏州盈数智能科技有限公司 | Enterprise-level data verification method, enterprise-level data verification device, computer equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN109543942A (en) | Data verification method, device, computer equipment and storage medium | |
CN110069449B (en) | File processing method, device, computer equipment and storage medium | |
US10305776B2 (en) | Network verification | |
CN109800258B (en) | Data file deployment method, device, computer equipment and storage medium | |
CN108985934B (en) | Block chain modification method and device | |
CN110442756A (en) | Data verification method, device, computer equipment and storage medium | |
CN112100071B (en) | Test case generation method and device, computer equipment and storage medium | |
CN112181804A (en) | Parameter checking method, equipment and storage medium | |
CN105187230B (en) | The switching method and device of server | |
US20190180057A1 (en) | Fingerprint-based configuration typing and classification | |
CN110648180B (en) | Method and device for adjusting delivery channel and electronic equipment | |
CN113946546B (en) | Abnormality detection method, computer storage medium, and program product | |
CN109815231A (en) | Data fragmentation method, device, computer equipment and storage medium | |
CN105989457A (en) | Information query method and apparatus thereof | |
CN105630667A (en) | Test method and terminal equipment | |
EP2784692A1 (en) | Filter regular expression | |
CN112579472B (en) | Automatic generation method and device for test cases | |
CN115756598A (en) | Component detection method, system and device applied to low-code platform | |
CN110020040A (en) | Inquire the methods, devices and systems of data | |
CN115098362A (en) | Page testing method and device, electronic equipment and storage medium | |
CN115130043A (en) | Database-based data processing method, device, equipment and storage medium | |
CN105512020A (en) | Method and device for test | |
US11113268B2 (en) | Method and device for restoring missing operational data | |
CN113342647A (en) | Test data generation method and device | |
CN111971931B (en) | Method for verifying transactions in a blockchain network and nodes constituting the network |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |