CN109543942A - Data verification method, device, computer equipment and storage medium - Google Patents

Data verification method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN109543942A
CN109543942A CN201811204234.2A CN201811204234A CN109543942A CN 109543942 A CN109543942 A CN 109543942A CN 201811204234 A CN201811204234 A CN 201811204234A CN 109543942 A CN109543942 A CN 109543942A
Authority
CN
China
Prior art keywords
rule
data
verified
current
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201811204234.2A
Other languages
Chinese (zh)
Inventor
林永成
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Puhui Enterprise Management Co Ltd
Original Assignee
Ping An Puhui Enterprise Management Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Puhui Enterprise Management Co Ltd filed Critical Ping An Puhui Enterprise Management Co Ltd
Priority to CN201811204234.2A priority Critical patent/CN109543942A/en
Publication of CN109543942A publication Critical patent/CN109543942A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management; Enterprise or organisation planning; Enterprise or organisation modelling
    • G06Q10/063Operations research, analysis or management
    • G06Q10/0635Risk analysis of enterprise or organisation activities
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance

Abstract

This application involves a kind of data verification method, device, computer equipment and storage mediums.Method includes: to receive data check request;Data check request carries Data Identification and current process node identification;Obtain data to be verified corresponding with Data Identification;Obtain current rule set corresponding with current process node identification;Verification data are treated based on current rule set to be verified, and node check results are obtained;Detection current process node identifies whether that there are downstream node identifications, when it is present, returns and obtains current rule set corresponding with current process node identification, treats verification data based on current rule set and is verified, obtains node check results;When it be not present, summarize each flow nodes and identify corresponding node check results, obtain overall calibration result.Data checking procedure is optimized using this method, quickly data can be verified.

Description

Data verification method, device, computer equipment and storage medium
Technical field
This application involves field of computer technology, more particularly to a kind of data verification method, device, computer equipment and Storage medium.
Background technique
The reinforcing realized with enterprise's air control, it will usually school be carried out to data according to air control rule in multiple flow nodes It tests.Such as enterprise into part system other than special air control system is set and carries out regular verification to data, there are also into part system System included interior careful link rule verification, the rule verification of signing flow nodes and the rule verification in the case of other.Tradition side It is identical when needing to increase newly in multiple flow nodes since the regular checking procedure of each flow nodes is independent of each other in formula Rule when, needing to expend the time repeats to create identical rule for different flow nodes, leads to not quickly update rule Then carry out data check.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of data school that can be quickly verified to data Test method, apparatus, computer equipment and storage medium.
A kind of data verification method, which comprises receive data check request;The data check request carries number According to mark and current process node identification;Obtain data to be verified corresponding with the Data Identification;It obtains and current process section The corresponding current rule set of point identification;The data to be verified are verified based on the current rule set, obtain node school Test result;That detects the current process node identifies whether that there are downstream node identifications, when it is present, obtains described in return Current rule set corresponding with current process node identification is taken, school is carried out to the data to be verified based on the current rule set It tests, obtains node check results;When it be not present, summarize each flow nodes and identify corresponding node check results, obtain comprehensive Close check results.
It in one of the embodiments, include multiple rules to be verified in the current rule set;It is described to be worked as based on described Preceding rule set verifies the data to be verified, obtains node check results, comprising: from the current rule set successively Search rule to be verified;Detect the status indicator that the rule to be verified found carries;When the status indicator is to open mark When knowledge, the data to be verified are verified according to the rule to be verified searched, obtain regular check results;According to rule Check results obtain node check results.
The data check request carries service identification to be matched in one of the embodiments,;The acquisition with it is current Flow nodes identify corresponding current rule set, comprising: when current process node identification corresponds to multiple current rule sets, detection The target service mark that each current rule set carries;By multiple target services mark with the service identification to be matched into Row matching;Obtain current rule set corresponding with the matched target service mark of service identification to be matched.
In one of the embodiments, the method also includes: identify corresponding original rule set from each flow nodes It is middle to obtain multiple initial rules;Similarity calculation is carried out to every two initial rules, is obtained between corresponding two initial rules Similarity;The rule to be verified in multiple initial rules is extracted according to multiple similarities, generates synthesis rule collection;The synthesis The similarity between any two rule to be verified in rule set is less than default similarity threshold;According to the synthesis rule collection In include rule to be verified, the current rule set of combination producing each flow nodes mark.
It is described in one of the embodiments, that similarity calculation is carried out to every two initial rules, it obtains at the beginning of corresponding two Similarity between the rule that begins, comprising: the first initial rules and the second initial rules are chosen from multiple initial rules;Obtain institute State the Second Rule vector of the corresponding first regular vector of the first initial rules and second initial rules;According to default Similarity formula similarity calculation is carried out to the described first regular vector sum majority Second Rule vector, obtain selected two Similarity between a initial rules.
In one of the embodiments, the method also includes: receive the newly-increased request of rule that terminal is sent;The rule Newly-increased request carries regular set identifier and goal rule describes text;Rule description document is obtained, the rule is described into document Text is described with the goal rule to be matched;Text is described comprising multiple historical rules in the rule description document;When When describing text in the presence of the historical rule for describing text matches with the goal rule, then the matched historical rule is described The corresponding historical rule of text is added in the corresponding current rule set of the regular set identifier;When there is no advise with the target When then describing the historical rules of text matches and describing text, then the goal rule is described into the corresponding goal rule of text and added Into the corresponding current rule set of the rule set identifier.
It is described in one of the embodiments, to summarize the corresponding node check results of each flow nodes mark, it obtains comprehensive Close check results, comprising: obtain each flow nodes and identify corresponding default impact factor;Obtain each flow nodes mark pair The node check results answered;The node check results include node value-at-risk;According to by multiple node value-at-risks and phase The impact factor for answering flow nodes to identify is calculated, and the risk class of data to be verified is obtained.
A kind of data calibration device, described device include: receiving module, for receiving data verification request;The data Verification request carries Data Identification and current process node identification;Module is obtained, it is corresponding with the Data Identification for obtaining Data to be verified;Obtain current rule set corresponding with current process node identification;Correction verification module, for working as front lay based on described Then collection verifies the data to be verified, obtains node check results;Detection module is used for
That detects the current process node identifies whether that there are downstream node identifications, when it is present, described in return Current rule set corresponding with current process node identification is obtained, the data to be verified are carried out based on the current rule set Verification, obtains node check results;Summarizing module identifies corresponding node for when it be not present, summarizing each flow nodes Check results obtain overall calibration result.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing The step of device realizes above-mentioned each data verification method as described in the examples when executing the computer program.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor The step of above-mentioned each data verification method as described in the examples is realized when row.
Above-mentioned data verification method, device, computer equipment and storage medium, server receive data check request, number It requests to carry Data Identification and current process node identification according to verification.Server is obtaining number to be verified corresponding with data expression It is verified according to verification data later, can be treated based on the corresponding current rule set of current process node identification, obtains node school Test result.By constantly searching the downstream node identification of current process node identification, multiple flow nodes are successively obtained Node check results.Server can summarize each flow nodes and identify corresponding node school when next node identification is not present It tests as a result, obtaining overall calibration result.It is preset in the server to have multiple flow nodes, and stored for each flow nodes Rule set, be managed collectively by the rule set to multiple flow nodes, can be by same rule configuration to be verified to difference Rule set in, so as to quickly update rule carry out data check.
Detailed description of the invention
Fig. 1 is the application scenario diagram of data verification method in one embodiment;
Fig. 2 is the flow diagram of data verification method in one embodiment;
Fig. 3 is the correspondence diagram of flow nodes and rule set in one embodiment;
Fig. 4 is the flow diagram of data verification method in another embodiment;
Fig. 5 is the structural block diagram of data calibration device in one embodiment;
Fig. 6 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
It is appreciated that term " first " used in the present invention, " second " etc. can be used to describe various elements herein, But these elements are not limited by these terms.These terms are only used to distinguish the first element from the other element.Citing For, without departing from the scope of the invention, the first initial rules can be known as the second initial rules, and similar Second initial rules can be known as the first initial rules by ground.First initial rules and the second initial rules are both initially advised Then, but it is not same initial rules.
Data verification method provided by the present application can be applied in application environment as shown in Figure 1.Wherein, terminal 102 It is communicated with server 104 by network.Wherein, terminal 102 can be, but not limited to be various personal computers, notebook electricity Brain, smart phone, tablet computer and portable wearable device, server 104 can be either multiple with independent server The server cluster of server composition is realized.Server 104 can receive the data check request of the transmission of terminal 102, data school It tests request and carries Data Identification and current process node identification.Multiple flow nodes are preset in server 104, and for each Flow nodes are stored with corresponding rule set.Server 104, can base after obtaining data to be verified corresponding with data expression Verification data are treated in the corresponding current rule set of current process node identification to be verified, and node check results are obtained.Service The detection current process node of device 104 identifies whether that there are downstream node identifications, when it is present, returns to obtain and flow with current The corresponding current rule set of journey node identification is treated verification data based on current rule set and is verified, and node verification knot is obtained Fruit.After obtaining each flow nodes and identifying corresponding node check results, server 104 can summarize each flow nodes mark Know corresponding node check results, obtains overall calibration result.
In one embodiment, as shown in Fig. 2, providing a kind of data verification method, it is applied in Fig. 1 in this way It is illustrated for server 104, comprising the following steps:
Step 202, data check request is received;Data check request carries Data Identification and current process node identification.
Data check request refers to the request for being used to carry out data check that terminal is sent.Data Identification refers to for obtaining The mark of data to be verified.Data Identification can be the address for obtaining data to be verified.Such as Data Identification can be it is to be verified The URL (Uniform Resource Locator, uniform resource locator) of data.Data Identification can also be for by letter, number The character string that at least one of word, punctuation mark are constituted.For example Data Identification can be the number of data to be verified, server can It goes in preset database to obtain corresponding data to be verified by the number of data to be verified.What data check request carried works as Preceding flow nodes mark refers to the mark for carrying out the starting flow nodes of data check.
In one embodiment, multiple flow nodes are preset in server.It is verified as with carrying out air control rule to data Example, flow nodes include but is not limited to special air control system to data carry out regular verification flow nodes, into part system from The flow nodes etc. of rule verification when the flow nodes of the interior careful link rule verification of band, signing.It is settable between flow nodes There is fixed process sequence, it can also be for according to the process of data self to be verified sequence.Data check request carries current Flow nodes mark can be the mark of one of flow nodes.
Step 204, data to be verified corresponding with Data Identification are obtained.
Data to be verified refer to the data verified.Verification data can be treated and carry out risk verification, integrality The data checks such as verification, legitimacy verifies.Data to be verified can store in preset database, can be the data of terminal In library, it is also possible in the database of server.
In one embodiment, terminal can provide data upload interface, may include in data upload interface text box, by The input controls such as button, combobox, user can input data to be verified to terminal by input control.It is acted on when terminal detects When confirming the clicking operation of control, the data summarization to be verified that can input user is packaged, and the data to be verified of packing are sent out It send into server, is verified so that server treats verification data.
Step 206, current rule set corresponding with current process node identification is obtained.
Current process node identification refers to current logarithmic according to the mark of the flow nodes verified.Current rule set refers to The corresponding rule set of current process node identification.Rule set refers to the set for storing multiple rules.It can be stored in current rule set There are multiple rules to be verified, and can be preset with for multiple rules to be verified and execute sequence.
In one embodiment, data check request carries service identification to be matched;It obtains and current process node identification Corresponding current rule set, comprising: when current process node identification corresponds to multiple current rule sets, detect each current rule The target service mark that collection carries;Multiple target services are identified and are matched with service identification to be matched;Obtain with it is to be matched The matched target service of service identification identifies corresponding current rule set.
Multiple current rule sets can be preset for each flow nodes, and each rule set can be determined from different attribute dimension Justice, and different rule sets is distinguished with target service mark.Such as target service mark can be channel mark, field Scape mark, product identification can be directed to the corresponding different business channel of data, business scenario or service product, take different work as Preceding rule set carries out data check.It can be in the rule set of all or part of the process node setting various dimensions.
Fig. 3 is the correspondence diagram of flow nodes and rule set.Flow nodes 1 and flow nodes 3 have respectively corresponded Multiple rule sets, and it is only corresponding with a rule set respectively in flow nodes 2 and flow nodes 4.It is asked when receiving data check After asking, need to identify data check request carry service identification to be matched, make it possible to each flow nodes determine with The corresponding rule set of service identification to be matched.It can be different to distinguish for the corresponding regular set identifier of each rule set label Rule set.Such as service identification product A to be matched, current rule set that data check process obtains can for rule set 1.1, Rule set 2.1, rule set 3.1, rule set 4.1;And it is directed to service identification product B to be matched, what data check process obtained works as Preceding rule set can be rule set 1.2, rule set 2.1, rule set 3.2, rule set 4.1.It is being flowed by different target service identification Cheng Jiedian distinguishing rule collection makes it possible to configure personalized rule set more flexiblely for different attribute dimension.
Step 208, verification data are treated based on current rule set to be verified, obtains node check results.
Regular execution sequence, which can be, successively to be executed, and is also possible to execute side by side, be can also be selective execution.Such as It says, includes three rules to be verified in current rule set, respectively rule 1, rule 2 and rule 3, it can be suitable by preset execution Sequence successively executes three rules, can also execute three rules side by side, can also be after executing rule 1, according to holding for rule 1 Row result selectivity executing rule 2 or rule 3.Risk verification, completeness check, legitimacy verifies can be carried out by treating verification data Equal data checks.Correspondingly, node check results are venture entrepreneur, integrality degree, legitimacy result etc..
It in one embodiment, include multiple rules to be verified in current rule set;Based on current rule set to be verified Data are verified, and node check results are obtained, comprising: rule to be verified is successively searched from current rule set;Detection is looked into The status indicator that the rule to be verified found carries;When status indicator is to open mark, according to the rule to be verified searched It treats verification data to be verified, obtains regular check results;According to regular check results, node check results are obtained.
Each corresponding status indicator of rule setting to be verified can be directed to.Such as when status indicator be open mark, than When for example Y, the rule to be verified can be performed;When status indicator is to close mark, for example when for N, can skip the rule to be verified. Such as the data check of authentication process, different rule sets, and rule can be set for different business channels Concentration may include identical rule to be verified, but the corresponding status indicator of rule to be verified that Different Rule is concentrated can not phase Together.For the business channel of webpage, need to verify name, identification card number, cell-phone number, IP address;And it is directed to the industry of application program The rule setting to be verified for verifying cell-phone number and IP address can be to close mark, then only need to verify name and body by business channel Part card number.The switch state of rule to be verified is set by status indicator, can more easily be controlled in increase and decrease rule set Rule to be verified, so that carrying out independent configuration to distinctive rule to be verified.
Step 210, that detects current process node identifies whether that there are downstream node identifications, when it is present, returns Current rule set corresponding with current process node identification is obtained, verification data are treated based on current rule set and are verified, are obtained To node check results.
Multiple flow nodes, and the process sequence of settable flow nodes can be preset in server.It can be directed to different Data to be verified execute wherein all or part of the process node.As shown in figure 3, whole process sections can be executed according to process sequence Point 1, flow nodes 2, flow nodes 3 and flow nodes 4.Part flow nodes therein can also be executed, for example only execute stream Cheng Jiedian 1 and flow nodes 3.When downstream node identification is not present in current process node identification, illustrate current process section Point identification is the mark of the last one flow nodes, then without returning again to execution circulation step.
After executing as the corresponding current rule set of current process node identification, current process node identification can be searched Downstream node identification, and using the downstream node identification found as current process node identification.Such as it is holding It has gone the rule to be verified in the rule set 1.1 of flow nodes 1 and after obtaining node check results, flow nodes 1 can be searched Downstream node identification flow nodes 2, and again obtain flow nodes 2 current rule set 2.1 data are verified.
In one embodiment, after receiving data check request, each flow nodes and process sequence are first determined.It can Process sequence different between different flow nodes and flow nodes is set for every kind of different business.Some business need The data check of whole flow nodes is carried out, and some business only need to carry out the data check of part flow nodes.Therefore, Can sequence be executed for what different business was arranged corresponding flow nodes and flow nodes in advance.It can be taken in data check request With service identification to be matched, first choice is to obtain flow nodes mark sequence corresponding with service identification to be matched, according to process section Point identification sequence, which determines, works as future node identification, and determines that each flow nodes identify corresponding downstream node identification.
Step 212, when it be not present, summarize each flow nodes and identify corresponding node check results, obtain comprehensive school Test result.
According to each flow nodes mark searched and executed, corresponding node check results can be respectively obtained, are passed through Summarizing multiple node check results can be obtained overall calibration result.For risk verification, each process section can be passed through The rule set of point obtains data to be verified in the venture entrepreneur of each flow nodes, and multiple venture entrepreneurs can be weighted Obtain comprehensive venture entrepreneur;For completeness check, it can be obtained by the rule set of each flow nodes to school Data are tested in the integrality degree of each flow nodes, multiple integrality degree can be carried out score value be calculated it is comprehensive complete Property degree;For another example for for legitimacy verifies, data to be verified can be obtained by the rule set of each flow nodes every As a result, when data to be verified are when each flow nodes are all legal, overall calibration result is just the legitimacy of a flow nodes Legitimacy verifies pass through.
In above-mentioned data verification method, server receive data check request, data check request carry Data Identification and Current process node identification.Server can be based on current process section after obtaining data to be verified corresponding with data expression The corresponding current rule set of point identification is treated verification data and is verified, and node check results are obtained.It is current by constantly searching The downstream node identification of flow nodes mark, successively obtains the node check results of multiple flow nodes.Server can be There is no when downstream node identification, summarizing each flow nodes to identify corresponding node check results, overall calibration is obtained As a result.It is preset in the server to have multiple flow nodes, and for the rule set of each flow nodes storage, by multiple The rule set of flow nodes is managed collectively, and can configure same rule to be verified into different rule sets, so as to It quickly updates rule and carries out data check.
In one embodiment, this method further include: identify in corresponding original rule set and obtain from each flow nodes Multiple initial rules;Similarity calculation is carried out to every two initial rules, obtains the similarity between corresponding two initial rules; The rule to be verified in multiple initial rules is extracted according to multiple similarities, generates synthesis rule collection;What synthesis rule was concentrated Similarity between any two rule to be verified is less than default similarity threshold;According to synthesis rule concentrate include it is to be verified Rule, the current rule set of each flow nodes mark of combination producing.
Before being managed collectively to the rule of multiple flow nodes, needs to carry out initial rules regular cleaning, reject Duplicate rule.Original rule set is obtained from the corresponding database of multiple original flow nodes, includes in original rule set Multiple initial rules.After calculating the similarity between any two initial rules, when similarity is greater than default similarity threshold When, then illustrate that corresponding two initial rules are recurring rule, therefore duplicate initial rules can be rejected according to similarity, so that Obtained synthesis rule is concentrated comprising a plurality of mutually independent rule to be verified.
In one embodiment, server can receive the rule set configuring request that configurating terminal is sent, and rule set configuration is asked Seek the rule mark that can carry flow nodes mark and multiple rules to be verified;Server can by it is multiple rule mark it is corresponding to Verification rule set is configured to a rule set;And the flow nodes for carrying the configured rule set and rule set configuring request Mark is associated.
In one embodiment, to every two initial rules carry out similarity calculation, obtain corresponding two initial rules it Between similarity, comprising: the first initial rules and the second initial rules are chosen from multiple initial rules;First is obtained initially to advise Then the corresponding first regular vector and the Second Rule vector of the second initial rules;According to preset similarity formula to One regular vector sum majority Second Rule vector carries out similarity calculation, obtains similar between two selected initial rules Degree.
First initial rules and the second initial rules are in the corresponding multiple initial rules of multiple original flow nodes Any two initial rules.First regular vector be using multiple characteristic values of the first initial rules as divide vector it is regular to Amount, Second Rule vector is using multiple characteristic values of the second initial rules as the regular vector for dividing vector.Pass through similarity public affairs Formula can accurately determine the similarity between two initial rules, so as to be convenient for filtering out duplicate rule.By picking Except the initial rules of redundancy, synthesis rule collection can be simplified, so as to efficiently be managed to rule to be verified.
In one embodiment, the corresponding first regular vector of the first initial rules and the second initial rules are obtained Second Rule vector, comprising: obtain the corresponding keyword of the first initial rules and the corresponding keyword of the second initial rules;It obtains Predetermined keyword weight corresponding with each keyword;Based on corresponding pre- with each keyword corresponding in the first initial rules If keyword weight, the corresponding first regular vector of the first initial rules is generated according to the corresponding keyword of the first initial rules; It is corresponding according to the second initial rules based on predetermined keyword weight corresponding with each keyword corresponding in the second initial rules Keyword generate the corresponding Second Rule vector of the second initial rules.
Each initial rules can be segmented according to preset segmentation methods, generate corresponding multiple initial words.It will In each initial rules with the matched initial word of predetermined keyword in predetermined keyword library, as keyword.Preset point Word algorithm includes but is not limited to the segmenting method based on string matching, the segmenting method based on understanding and the participle based on statistics The combinational algorithm of the one or more of them such as method.It can be after removing the stop words in initial word, according to preliminary screening The corresponding frequency of initial word out determines keyword.Can be according to formula: frequency=N/m be calculated, and obtains each residue The frequency of initial word.Wherein, N is the frequency that initial word occurs, and m is word in the corresponding term database of synthesis rule collection Sum, using frequency be greater than preset threshold initial word as keyword.
It can be according to formula W=log (D/DW) calculated, obtain the predetermined keyword weight of each keyword, wherein W For predetermined keyword weight, D is the rule sum for including, D in all initial rulesWFor the initial rules comprising the keyword Quantity.If rule R includes n keyword, regular RxBeing represented by with the corresponding predetermined keyword weight of each keyword is point The n-dimensional vector R of vectorx(W1, W2, W3……Wn), wherein W1To WnFor the corresponding predetermined keyword weight of each keyword.It can According to preset similarity formulaTo the first regular vectorIt is advised with majority second Then vectorSimilarity calculation is carried out, the similarity between two selected initial rules is obtainedWherein, W0k For the first regular vectorN corresponding predetermined keyword weight, WAkFor Second Rule vectorCorresponding n are default Keyword weight.
In one embodiment, method further include: receive the newly-increased request of rule that terminal is sent;The newly-increased request of rule carries Regular set identifier and goal rule describe text;Rule description document is obtained, rule description document and goal rule are described into text This is matched;Text is described comprising multiple historical rules in rule description document;Text is described with goal rule when existing When the historical rule matched describes text, then matched historical rule is described into the corresponding historical rule of text and be added to rule set mark Know in corresponding current rule set;When describing text there is no the historical rule for describing text matches with goal rule, then will Goal rule describes the corresponding goal rule of text and is added in the corresponding current rule set of regular set identifier.
After creating synthesis rule collection, all historical rules building rule description that can include based on synthesis rule collection is literary Shelves have corresponding description text for each historical rule.By the way that goal rule is described text and rule description document progress Matching, can determine rule description document in whether include and the matched historical rule of goal rule.When presence and goal rule When the historical rule of description text matches describes text, illustrate without adding the goal rule, and only need to be new by the historical rule It increases in the corresponding current rule set of regular set identifier.When there is no the historical rules for describing text matches with goal rule to describe When text, explanation can add goal rule into the corresponding current rule set of regular set identifier, and goal rule is added to comprehensive Normally concentrate.It is matched by the way that goal rule is described text with rule description document, can avoid increasing duplicate rule, The utilization rate of each historical rule is improved, to efficiently update the rule in rule set.
In one embodiment, summarize each flow nodes and identify corresponding node check results, obtain overall calibration knot Fruit, comprising: obtain each flow nodes and identify corresponding default impact factor;It obtains each flow nodes and identifies corresponding node Check results;Node check results include node value-at-risk;According to by multiple node value-at-risks and corresponding process node identification Impact factor is calculated, and the risk class of data to be verified is obtained.
When data check is to verify to the risk of data, air control rule set can be set in each flow nodes, pass through wind The air control rule that regulatory control is then concentrated is treated verification data and is verified.Impact factor can be set for each flow nodes, influence The factor representation significance level of flow nodes can refer to degree.By the air control rule set of each flow nodes can obtain to Data are verified in the node value-at-risk of each flow nodes.Multiple node value-at-risks can be weighted with corresponding impact factor It calculates, obtains integrated risk value, determine value-at-risk section locating for integrated risk value to determine the risk class of data to be verified.
In one embodiment, as shown in figure 4, providing another data verification method, it is applied in Fig. 1 in this way Server 104 for be illustrated, comprising the following steps:
Step 402, data check request is received;Data check request carry Data Identification, current process node identification and Service identification to be matched.
Step 404, data to be verified corresponding with Data Identification are obtained.
Step 406, it when current process node identification corresponds to multiple current rule sets, detects each current rule set and carries Target service mark.
Step 408, multiple target services are identified and is matched with service identification to be matched.
Step 410, current rule set corresponding with the matched target service mark of service identification to be matched is obtained.
Step 412, rule to be verified is successively searched from current rule set.
Step 414, the status indicator that the rule to be verified that detection is found carries.
Step 416, when status indicator is to open mark, verification data is treated according to the rule to be verified searched and are carried out Verification, obtains regular check results.
Step 418, according to regular check results, node check results are obtained.
Step 420, that detects current process node identifies whether that there are downstream node identifications, when it is present, returns Current rule set corresponding with the matched target service mark of service identification to be matched is obtained, based on current rule set to be verified Data are verified, and node check results are obtained.
Step 422, when it be not present, summarize each flow nodes and identify corresponding node check results, obtain comprehensive school Test result.
In above-mentioned data verification method, server receive data check request, data check request carry Data Identification and Current process node identification.Server can be based on current process section after obtaining data to be verified corresponding with data expression Point identification and the corresponding current rule set of service identification to be matched are treated verification data and are verified, and node check results are obtained. Different rule sets, and the status indicator carried by rule to be verified, energy are configured with for different service identifications to be matched Enough verification data of easily and flexibly treating carry out personalized verification.By the lower one stream for constantly searching current process node identification Journey node identification successively obtains the node check results of multiple flow nodes.Downstream node mark can be not present in server When knowledge, summarizes each flow nodes and identify corresponding node check results, obtain overall calibration result.It is preset in the server There are multiple flow nodes, and for the rule set of each flow nodes storage, is carried out by the rule set to multiple flow nodes Unified management can carry out data by same rule configuration to be verified into different rule sets so as to quickly update rule Verification.
It should be understood that although each step in the flow chart of Fig. 2 and 4 is successively shown according to the instruction of arrow, It is these steps is not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps There is no stringent sequences to limit for rapid execution, these steps can execute in other order.Moreover, in Fig. 2 and 4 at least A part of step may include that perhaps these sub-steps of multiple stages or stage are not necessarily in same a period of time to multiple sub-steps Quarter executes completion, but can execute at different times, the execution in these sub-steps or stage be sequentially also not necessarily according to Secondary progress, but in turn or can replace at least part of the sub-step or stage of other steps or other steps Ground executes.
In one embodiment, as shown in figure 5, providing a kind of data calibration device 500, comprising: receiving module 502, Verification request for receiving data;Data check request carries Data Identification and current process node identification;Module 504 is obtained, For obtaining data to be verified corresponding with Data Identification;Obtain current rule set corresponding with current process node identification;School Module 506 is tested, is verified for treating verification data based on current rule set, obtains node check results;Detection module 508, it identifies whether that there are downstream node identifications for detect current process node, when it is present, returns and obtain and work as Preceding flow nodes identify corresponding current rule set, treat verification data based on current rule set and are verified, obtain node school Test result;Summarizing module 510 identifies corresponding node check results for when it be not present, summarizing each flow nodes, obtains Overall calibration result.
It in one embodiment, include multiple rules to be verified in current rule set;Correction verification module 506 is also used to from current Rule to be verified is successively searched in rule set;Detect the status indicator that the rule to be verified found carries;Work as status indicator When to open mark, verification data being treated according to the rule to be verified searched and are verified, regular check results are obtained;According to Regular check results obtain node check results.
In one embodiment, data check request carries service identification to be matched;Module 504 is obtained to be also used to when current When flow nodes identify corresponding multiple current rule sets, the target service mark that each current rule set carries is detected;It will be multiple Target service mark is matched with service identification to be matched;It obtains and the matched target service mark pair of service identification to be matched The current rule set answered.
In one embodiment, which further includes configuration module, corresponding original for identifying from each flow nodes Multiple initial rules are obtained in rule set;Similarity calculation is carried out to every two initial rules, obtains corresponding two initial rules Between similarity;The rule to be verified in multiple initial rules is extracted according to multiple similarities, generates synthesis rule collection;It is comprehensive Similarity between any two normally concentrated rule to be verified is less than default similarity threshold;It is concentrated according to synthesis rule The rule to be verified for including, the current rule set of each flow nodes mark of combination producing.
In one embodiment, at the beginning of configuration module is also used to choose the first initial rules and second from multiple initial rules Begin rule;Obtain the Second Rule vector of the corresponding first regular vector of the first initial rules and the second initial rules;According to Preset similarity formula carries out similarity calculation to the first regular vector sum majority Second Rule vector, obtains selected two Similarity between a initial rules.
In one embodiment, which further includes newly-increased module, the newly-increased request of the rule for receiving terminal transmission;Rule It then increases the regular set identifier of request carrying newly and goal rule describes text;Obtain rule description document, by rule description document with Goal rule describes text and is matched;Text is described comprising multiple historical rules in rule description document;When presence and target When the historical rule of rule description text matches describes text, then the corresponding historical rule of text is described into matched historical rule It is added in the corresponding current rule set of regular set identifier;When there is no the historical rules for describing text matches with goal rule to retouch When stating text, then goal rule is described into the corresponding goal rule of text and be added to the corresponding current rule set of regular set identifier In.
In one embodiment, summarizing module 510 be also used to obtain each flow nodes identify corresponding default influence because Son;It obtains each flow nodes and identifies corresponding node check results;Node check results include node value-at-risk;According to will be more A node value-at-risk and the impact factor of corresponding process node identification are calculated, and the risk class of data to be verified is obtained.
Specific about data calibration device limits the restriction that may refer to above for data verification method, herein not It repeats again.Modules in above-mentioned data calibration device can be realized fully or partially through software, hardware and combinations thereof.On Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 6.The computer equipment include by system bus connect processor, memory, network interface and Database.Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory packet of the computer equipment Include non-volatile memory medium, built-in storage.The non-volatile memory medium is stored with operating system, computer program and data Library.The built-in storage provides environment for the operation of operating system and computer program in non-volatile memory medium.The calculating The database of machine equipment is for data such as Stored Procedure node identification, rule sets.The network interface of the computer equipment be used for External terminal passes through network connection communication.To realize a kind of data verification method when the computer program is executed by processor.
It will be understood by those skilled in the art that structure shown in Fig. 6, only part relevant to application scheme is tied The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with The step of computer program, which realizes the data verification method in above-mentioned each embodiment when executing computer program.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program realizes the step of data verification method in above-mentioned each embodiment when being executed by processor.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of data verification method, which comprises
Receive data check request;The data check request carries Data Identification and current process node identification;
Obtain data to be verified corresponding with the Data Identification;
Obtain current rule set corresponding with current process node identification;
The data to be verified are verified based on the current rule set, obtain node check results;
That detects the current process node identifies whether that there are downstream node identifications, when it is present, returns to the acquisition Current rule set corresponding with current process node identification carries out school to the data to be verified based on the current rule set It tests, obtains node check results;
When it be not present, summarize each flow nodes and identify corresponding node check results, obtain overall calibration result.
2. the method according to claim 1, wherein including multiple rules to be verified in the current rule set; It is described that the data to be verified are verified based on the current rule set, obtain node check results, comprising:
Rule to be verified is successively searched from the current rule set;
Detect the status indicator that the rule to be verified found carries;
When the status indicator is to open mark, school is carried out to the data to be verified according to the rule to be verified searched It tests, obtains regular check results;
According to regular check results, node check results are obtained.
3. the method according to claim 1, wherein data check request carries service identification to be matched; It is described to obtain current rule set corresponding with current process node identification, comprising:
When current process node identification corresponds to multiple current rule sets, the target industry that each current rule set carries is detected Business mark;
Multiple target services are identified and are matched with the service identification to be matched;
Obtain current rule set corresponding with the matched target service mark of service identification to be matched.
4. the method according to claim 1, wherein the method also includes:
It is identified in corresponding original rule set from each flow nodes and obtains multiple initial rules;
Similarity calculation is carried out to every two initial rules, obtains the similarity between corresponding two initial rules;
The rule to be verified in multiple initial rules is extracted according to multiple similarities, generates synthesis rule collection;The comprehensive rule Similarity between any two then concentrated rule to be verified is less than default similarity threshold;
The rule to be verified for including, the current rule of each flow nodes mark of combination producing are concentrated according to the synthesis rule Collection.
5. according to the method described in claim 4, it is characterized in that, it is described to every two initial rules carry out similarity calculation, Obtain the similarity between corresponding two initial rules, comprising:
The first initial rules and the second initial rules are chosen from multiple initial rules;
Obtain the Second Rules of the corresponding first regular vector of first initial rules and second initial rules to Amount;
Similarity calculation is carried out to the described first regular vector sum majority Second Rule vector according to preset similarity formula, is obtained Similarity between two selected initial rules.
6. the method according to claim 1, wherein the method also includes:
Receive the newly-increased request of rule that terminal is sent;The newly-increased request of rule carries regular set identifier and goal rule description text This;
Rule description document is obtained, the rule description document is described into text with the goal rule and is matched;The rule It then describes to describe text comprising multiple historical rules in document;
When describing text in the presence of the historical rule for describing text matches with the goal rule, then the matched history is advised The corresponding historical rule of text is then described to be added in the corresponding current rule set of the regular set identifier;
When describing text there is no the historical rule for describing text matches with the goal rule, then the goal rule is retouched The corresponding goal rule of text is stated to be added in the corresponding current rule set of the regular set identifier.
7. the method according to claim 1, wherein described summarize the corresponding node school of each flow nodes mark It tests as a result, obtaining overall calibration result, comprising:
It obtains each flow nodes and identifies corresponding default impact factor;
It obtains each flow nodes and identifies corresponding node check results;The node check results include node value-at-risk;
It is calculated according to by multiple node value-at-risks and the impact factor of corresponding process node identification, obtains number to be verified According to risk class.
8. a kind of data calibration device, which is characterized in that described device includes:
Receiving module, for receiving data verification request;The data check request carries Data Identification and current process node Mark;
Module is obtained, for obtaining data to be verified corresponding with the Data Identification;It obtains and current process node identification pair The current rule set answered;
Correction verification module obtains node check results for verifying based on the current rule set to the data to be verified;
Detection module identifies whether that there are downstream node identifications for detect the current process node, when it is present, Acquisition current rule set corresponding with current process node identification is returned to, based on the current rule set to described to be verified Data are verified, and node check results are obtained;
Summarizing module identifies corresponding node check results for when it be not present, summarizing each flow nodes, obtains comprehensive school Test result.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
CN201811204234.2A 2018-10-16 2018-10-16 Data verification method, device, computer equipment and storage medium Pending CN109543942A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811204234.2A CN109543942A (en) 2018-10-16 2018-10-16 Data verification method, device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811204234.2A CN109543942A (en) 2018-10-16 2018-10-16 Data verification method, device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN109543942A true CN109543942A (en) 2019-03-29

Family

ID=65843895

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811204234.2A Pending CN109543942A (en) 2018-10-16 2018-10-16 Data verification method, device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN109543942A (en)

Cited By (25)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110134929A (en) * 2019-04-17 2019-08-16 深圳壹账通智能科技有限公司 Document verification method, apparatus, computer equipment and storage medium
CN110245049A (en) * 2019-06-06 2019-09-17 深圳前海微众银行股份有限公司 Monitoring method, device, equipment and the storage medium of product configuration data
CN110442756A (en) * 2019-06-27 2019-11-12 平安科技(深圳)有限公司 Data verification method, device, computer equipment and storage medium
CN110728501A (en) * 2019-09-30 2020-01-24 口碑(上海)信息技术有限公司 Incoming part processing method and incoming part system
CN110766160A (en) * 2019-10-21 2020-02-07 北京明略软件系统有限公司 Data verification method and device, storage medium and electronic equipment
CN111291054A (en) * 2020-02-21 2020-06-16 苏宁云计算有限公司 Data processing method and device, computer equipment and storage medium
CN111427571A (en) * 2020-03-16 2020-07-17 北京明略软件系统有限公司 Data verification method and device
CN111444224A (en) * 2020-03-24 2020-07-24 政采云有限公司 Service data verification method and device
CN111666340A (en) * 2020-05-27 2020-09-15 中国平安财产保险股份有限公司 Synchronous data proofreading method and device based on big data and computer equipment
CN111680305A (en) * 2020-07-31 2020-09-18 支付宝(杭州)信息技术有限公司 Data processing method, device and equipment based on block chain
CN111709035A (en) * 2020-06-12 2020-09-25 北京思特奇信息技术股份有限公司 Business process security verification method and system
CN111798245A (en) * 2020-06-29 2020-10-20 平安国际智慧城市科技股份有限公司 Data monitoring method and device, computer equipment and storage medium
CN112364381A (en) * 2020-11-25 2021-02-12 广州三叠纪元智能科技有限公司 Authority management method, electronic box, server and storage medium
CN112416648A (en) * 2020-06-03 2021-02-26 上海哔哩哔哩科技有限公司 Data verification method and device
CN112581134A (en) * 2020-12-25 2021-03-30 中国农业银行股份有限公司 Data verification method, device and system
CN113011989A (en) * 2021-03-23 2021-06-22 腾讯科技(深圳)有限公司 Object verification method, device, equipment and storage medium
CN113240351A (en) * 2021-06-28 2021-08-10 平安信托有限责任公司 Business data consistency checking method and device, electronic equipment and medium
CN113240266A (en) * 2021-05-11 2021-08-10 北京沃东天骏信息技术有限公司 Risk management method and device
CN113378549A (en) * 2021-06-29 2021-09-10 平安普惠企业管理有限公司 Document verification method and device, computer equipment and storage medium
CN113938388A (en) * 2021-10-14 2022-01-14 工银科技有限公司 Parameter verification method and device for service interface
CN114338102A (en) * 2021-12-14 2022-04-12 北京安天网络安全技术有限公司 Security detection method and device, electronic equipment and storage medium
CN114364017A (en) * 2021-12-21 2022-04-15 威海北洋电气集团股份有限公司 Method, device, medium and equipment for automatically calibrating and calibrating physical position of cascade node
CN114780595A (en) * 2022-05-09 2022-07-22 马上消费金融股份有限公司 Verification method, device and system
CN115242349A (en) * 2022-06-21 2022-10-25 苏州盈数智能科技有限公司 Enterprise-level data verification method and device, computer equipment and storage medium
CN113011989B (en) * 2021-03-23 2024-04-23 腾讯科技(深圳)有限公司 Object verification method, device, equipment and storage medium

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103544074A (en) * 2012-07-09 2014-01-29 阿里巴巴集团控股有限公司 Method and device for verifying service
CN108346191A (en) * 2018-02-06 2018-07-31 中国平安人寿保险股份有限公司 Work attendance method, device, computer equipment and storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103544074A (en) * 2012-07-09 2014-01-29 阿里巴巴集团控股有限公司 Method and device for verifying service
CN108346191A (en) * 2018-02-06 2018-07-31 中国平安人寿保险股份有限公司 Work attendance method, device, computer equipment and storage medium

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110134929A (en) * 2019-04-17 2019-08-16 深圳壹账通智能科技有限公司 Document verification method, apparatus, computer equipment and storage medium
CN110245049A (en) * 2019-06-06 2019-09-17 深圳前海微众银行股份有限公司 Monitoring method, device, equipment and the storage medium of product configuration data
CN110442756A (en) * 2019-06-27 2019-11-12 平安科技(深圳)有限公司 Data verification method, device, computer equipment and storage medium
WO2020258655A1 (en) * 2019-06-27 2020-12-30 平安科技(深圳)有限公司 Data verification method and apparatus, and computer device and storage medium
CN110728501A (en) * 2019-09-30 2020-01-24 口碑(上海)信息技术有限公司 Incoming part processing method and incoming part system
CN110766160A (en) * 2019-10-21 2020-02-07 北京明略软件系统有限公司 Data verification method and device, storage medium and electronic equipment
CN111291054A (en) * 2020-02-21 2020-06-16 苏宁云计算有限公司 Data processing method and device, computer equipment and storage medium
CN111291054B (en) * 2020-02-21 2023-05-16 苏宁云计算有限公司 Data processing method, device, computer equipment and storage medium
CN111427571A (en) * 2020-03-16 2020-07-17 北京明略软件系统有限公司 Data verification method and device
CN111444224A (en) * 2020-03-24 2020-07-24 政采云有限公司 Service data verification method and device
CN111444224B (en) * 2020-03-24 2023-08-15 政采云有限公司 Service data verification method and device
CN111666340A (en) * 2020-05-27 2020-09-15 中国平安财产保险股份有限公司 Synchronous data proofreading method and device based on big data and computer equipment
CN111666340B (en) * 2020-05-27 2023-10-27 中国平安财产保险股份有限公司 Synchronous data proofreading method and device based on big data and computer equipment
CN112416648A (en) * 2020-06-03 2021-02-26 上海哔哩哔哩科技有限公司 Data verification method and device
CN111709035A (en) * 2020-06-12 2020-09-25 北京思特奇信息技术股份有限公司 Business process security verification method and system
CN111709035B (en) * 2020-06-12 2022-03-29 北京思特奇信息技术股份有限公司 Business process security verification method and system
CN111798245A (en) * 2020-06-29 2020-10-20 平安国际智慧城市科技股份有限公司 Data monitoring method and device, computer equipment and storage medium
CN111798245B (en) * 2020-06-29 2023-09-26 深圳赛安特技术服务有限公司 Data monitoring method, device, computer equipment and storage medium
CN111680305A (en) * 2020-07-31 2020-09-18 支付宝(杭州)信息技术有限公司 Data processing method, device and equipment based on block chain
CN112364381A (en) * 2020-11-25 2021-02-12 广州三叠纪元智能科技有限公司 Authority management method, electronic box, server and storage medium
CN112581134A (en) * 2020-12-25 2021-03-30 中国农业银行股份有限公司 Data verification method, device and system
CN113011989A (en) * 2021-03-23 2021-06-22 腾讯科技(深圳)有限公司 Object verification method, device, equipment and storage medium
CN113011989B (en) * 2021-03-23 2024-04-23 腾讯科技(深圳)有限公司 Object verification method, device, equipment and storage medium
CN113240266A (en) * 2021-05-11 2021-08-10 北京沃东天骏信息技术有限公司 Risk management method and device
CN113240351A (en) * 2021-06-28 2021-08-10 平安信托有限责任公司 Business data consistency checking method and device, electronic equipment and medium
CN113378549B (en) * 2021-06-29 2023-02-14 平安普惠企业管理有限公司 Document verification method and device, computer equipment and storage medium
CN113378549A (en) * 2021-06-29 2021-09-10 平安普惠企业管理有限公司 Document verification method and device, computer equipment and storage medium
CN113938388A (en) * 2021-10-14 2022-01-14 工银科技有限公司 Parameter verification method and device for service interface
CN114338102A (en) * 2021-12-14 2022-04-12 北京安天网络安全技术有限公司 Security detection method and device, electronic equipment and storage medium
CN114338102B (en) * 2021-12-14 2024-03-19 北京安天网络安全技术有限公司 Security detection method, security detection device, electronic equipment and storage medium
CN114364017A (en) * 2021-12-21 2022-04-15 威海北洋电气集团股份有限公司 Method, device, medium and equipment for automatically calibrating and calibrating physical position of cascade node
CN114364017B (en) * 2021-12-21 2024-03-01 威海北洋电气集团股份有限公司 Cascade node physical position automatic calibration method, device, medium and equipment
CN114780595B (en) * 2022-05-09 2023-08-15 马上消费金融股份有限公司 Verification method, verification device and verification system
CN114780595A (en) * 2022-05-09 2022-07-22 马上消费金融股份有限公司 Verification method, device and system
CN115242349A (en) * 2022-06-21 2022-10-25 苏州盈数智能科技有限公司 Enterprise-level data verification method and device, computer equipment and storage medium
CN115242349B (en) * 2022-06-21 2023-11-14 苏州盈数智能科技有限公司 Enterprise-level data verification method, enterprise-level data verification device, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109543942A (en) Data verification method, device, computer equipment and storage medium
CN110069449B (en) File processing method, device, computer equipment and storage medium
US10305776B2 (en) Network verification
CN109800258B (en) Data file deployment method, device, computer equipment and storage medium
CN108985934B (en) Block chain modification method and device
CN110442756A (en) Data verification method, device, computer equipment and storage medium
CN112100071B (en) Test case generation method and device, computer equipment and storage medium
CN112181804A (en) Parameter checking method, equipment and storage medium
CN105187230B (en) The switching method and device of server
US20190180057A1 (en) Fingerprint-based configuration typing and classification
CN110648180B (en) Method and device for adjusting delivery channel and electronic equipment
CN113946546B (en) Abnormality detection method, computer storage medium, and program product
CN109815231A (en) Data fragmentation method, device, computer equipment and storage medium
CN105989457A (en) Information query method and apparatus thereof
CN105630667A (en) Test method and terminal equipment
EP2784692A1 (en) Filter regular expression
CN112579472B (en) Automatic generation method and device for test cases
CN115756598A (en) Component detection method, system and device applied to low-code platform
CN110020040A (en) Inquire the methods, devices and systems of data
CN115098362A (en) Page testing method and device, electronic equipment and storage medium
CN115130043A (en) Database-based data processing method, device, equipment and storage medium
CN105512020A (en) Method and device for test
US11113268B2 (en) Method and device for restoring missing operational data
CN113342647A (en) Test data generation method and device
CN111971931B (en) Method for verifying transactions in a blockchain network and nodes constituting the network

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination