CN110263071A - Business datum checking method, device, equipment and system architecture - Google Patents
Business datum checking method, device, equipment and system architecture Download PDFInfo
- Publication number
- CN110263071A CN110263071A CN201910468796.6A CN201910468796A CN110263071A CN 110263071 A CN110263071 A CN 110263071A CN 201910468796 A CN201910468796 A CN 201910468796A CN 110263071 A CN110263071 A CN 110263071A
- Authority
- CN
- China
- Prior art keywords
- verification
- rule
- data
- change data
- filtering
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/24—Querying
- G06F16/245—Query processing
- G06F16/2458—Special types of queries, e.g. statistical queries, fuzzy queries or distributed queries
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/20—Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
- G06F16/27—Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/50—Network services
- H04L67/56—Provisioning of proxy services
- H04L67/562—Brokering proxy services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Data Mining & Analysis (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Signal Processing (AREA)
- Computer Networks & Wireless Communication (AREA)
- Fuzzy Systems (AREA)
- Mathematical Physics (AREA)
- Probability & Statistics with Applications (AREA)
- Software Systems (AREA)
- Computational Linguistics (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
Abstract
After this specification embodiment provides a kind of verification request triggered when the altering event for receiving the business datum in upstream business system, determines the filtering rule and verification rule of change data correlation, judge whether the change data meet the filtering rule;If met, the associated data is inquired in the downstream traffic system based on the verification rule invocation remote service, and checks the consistency of the change data and the associated data.Due in configuration rule, filtering rule is separated from verification rule, only primary screening need to be carried out using associated filtering rule, when the regular quantity of the corresponding verification of change data is more, goes to judge to change whether data meet filtering rule without repetition, the consumption of memory can be saved and improve the efficiency checked, furthermore, developer is in configuration rule, without the repeatedly configurating filtered rule in verification rule, it is possible to reduce artificial number of operations.
Description
Technical field
This specification be related to technical field of data processing more particularly to a kind of business datum checking method, device, equipment and
System architecture.
Background technique
In O2O (Online To Offline, under line on line) industry, influence of the money damage failure to client and company
Be it is very serious, in order to reduce money damage failure influence degree, it is necessary to failure is found as early as possible, to quickly meet an urgent need.Due to
The common system architecture of O2O industry is usually distributed, in a distributed system, the business system to be passed through of a business operation
Route of uniting is very long, thus most of money damage failures be all because the business datum of upstream and downstream operation system it is inconsistent caused by, be
The inconsistent problem of discovery data as early as possible, using middleware to upstream and downstream business system usually in upstream and downstream operation system
The business datum of system is checked, this middleware is generally referred to as verification platform.When certain business number in upstream business system
After changing, this data altering event can trigger a verification request, and verification platform can basis after receiving verification request
Preconfigured some rules and passes through remote service and inquire incidence number with the data altering event in downstream traffic system
According to whether the business datum then compared in upstream and downstream operation system is consistent.In configuration rule, needs to configure triggering verification and ask
The business datum of the upstream business system asked, the screening conditions of business datum, business datum downstream traffic system incidence number
Accordingly and the rule that follows of business datum and associated data needs to sieve using a kind of after changing if you need to the data of business A
Conditional filtering is selected to come out, then it needs to be determined that the associated data of the data changed, and the rule followed according to the two is to change
More data and associated data are checked.Using different configuration modes, the process of verification is also different, existing rule configuration
Process and verification process CIMS are cumbersome inefficient, thus need to improve the checking method of business datum, to improve verification
Regular allocative efficiency and verification efficiency.
Summary of the invention
Based on this, present description provides a kind of business datum checking method, device, equipment and system architectures.
According to this specification embodiment in a first aspect, provide a kind of checking method of business datum in distributed system,
The distributed system includes upstream business system and downstream traffic system, which comprises
After the verification request that the altering event for receiving the business datum in upstream business system triggers, change number is determined
According to associated triggering filtering rule and verification rule, wherein the triggering filtering rule and the regular separate storage of the verification,
The verification rule is for determining associated data and verification institute of the data altering event in the downstream traffic system
State the consistency of change data and the associated data;
Judge whether the change data meet the triggering filtering rule;
If met, the pass is inquired in the downstream traffic system based on the verification rule invocation remote service
Join data, and checks the consistency of the change data and the associated data.
In one embodiment, by inquire preset routing table determine the change data correlation filtering rule and
Verification rule, the routing table record have business datum and trigger the binding relationship of filtering rule, verification rule.
In one embodiment, filtering rule and the verification of the change data correlation are determined based on preset routing table
Rule includes:
The filtering rule of the change data correlation and the mark of the verification rule are inquired from the routing table
Information;
The verification rule is obtained from preset verification rule list according to the identification information of the verification rule.
In one embodiment, the verification rule include: database table where the associated data identify, the pass
Join the major key mark of data and the incidence relation of the change data and the associated data.
In one embodiment, if the change data do not meet the filtering rule, give up the verification request.
In one embodiment, after judging the change data fit filtering rule, further includes:
It is requested to generate a verification task according to the verification, the verification task is for checking the change data and institute
State the consistency of associated data;
Store the verification task;
After the delay of the verification task, which executes the time, reaches preset duration, then the verification task is executed.
According to the second aspect of this specification embodiment, a kind of checking device of business datum in distributed system is provided,
Described device includes:
Regular determining module, when the verification request that the altering event for receiving the business datum in upstream business system triggers
Afterwards, the triggering filtering rule and verification rule of change data correlation are determined, wherein the triggering filtering rule and the verification
Regular separate storage, the verification rule is for determining incidence number of the data altering event in the downstream traffic system
According to and verification it is described change data and the associated data consistency;
Judgment module, judges whether the change data meet the triggering filtering rule;
Module is checked, if met, based on the verification rule invocation remote service in the downstream traffic system
The associated data is inquired, and checks the consistency of the change data and the associated data.
According to the third aspect of this specification embodiment, a kind of computer equipment is provided, including memory, processor and deposit
The computer program that can be run on a memory and on a processor is stored up, the processor realizes any reality when executing described program
Apply method described in example.
According to the fourth aspect of this specification embodiment, a kind of system architecture is provided, the system architecture includes upstream industry
Business system, middleware, downstream traffic system,
The middleware is used to ask when the verification for the altering event triggering for receiving the business datum in upstream business system
After asking, the triggering filtering rule and verification rule of change data correlation are determined, wherein the triggering filtering rule and the core
To regular separate storage in different storage units, the verification rule is for determining the data altering event in the downstream
The consistency of associated data and verification the change data and the associated data in operation system;Judge the change
Whether data meet the triggering filtering rule;If met, based on the verification rule invocation remote service under described
The associated data is inquired in trip operation system, and checks the consistency of the change data and the associated data.
In one embodiment, the system architecture further includes routing memory module and the regular memory module of verification,
The routing memory module is stored with routing table, and the regular memory module of the verification is stored with verification rule list, when
After the middleware receives the verification request of the altering event triggering of the business datum in upstream business system, from the routing
The routing table is inquired in memory module, and the filtering rule and verification rule of change data correlation are determined according to the routing table
Identification information, and judge whether the change data meet the filtering rule;If met, deposited from the verification rule
Inquiry verification rule list in module is stored up, the verification rule is determined according to the identification information and verification rule list, and be based on
The verification rule invocation remote service inquires the associated data in the downstream traffic system, and checks the change number
According to the consistency with the associated data.
It will in the rule of business datum verification for configuring upstream and downstream operation system using this specification example scheme
Filtering rule is separated from verification rule, separate storage, is touched when receiving the data altering event in upstream business system
After the verification request of hair, determines the triggering filtering rule and verification rule of change data correlation, judge that the change data are
It is no to meet the triggering filtering rule;If met, based on the verification rule invocation remote service in the downstream traffic
The associated data is inquired in system, and checks the consistency of the change data and the associated data.Due to being advised in configuration
When then, filtering rule is separated from verification rule, it, only need to be using pass after the data of upstream business system change
The filtering rule of connection carries out primary screening, is then checked again using associated verification rule, when the corresponding core of change data
When more to regular quantity, go to judge to change whether data meet filtering rule without repetition, the consumption of memory can be saved
With the efficiency for improving verification, in addition, developer is in configuration rule, without the repeatedly configurating filtered rule in verification rule
Then, it is possible to reduce artificial number of operations.
It should be understood that above general description and following detailed description be only it is exemplary and explanatory, not
This specification can be limited.
Detailed description of the invention
The drawings herein are incorporated into the specification and forms part of this specification, and shows the reality for meeting this specification
Example is applied, and is used to explain the principle of this specification together with specification.
Fig. 1 is a kind of verification rule database table of this specification one embodiment;
Fig. 2 is the checking method flow chart of business datum in a kind of distributed system of this specification one embodiment;
Fig. 3 a is a kind of routing table of this specification one embodiment;
Fig. 3 b is a kind of verification rule list of this specification one embodiment;
Fig. 4 a is a kind of schematic diagram of the structure composed of verification rule of this specification one embodiment;
Fig. 4 b is a kind of structure composed schematic diagram of verification rule of this specification one embodiment;
Fig. 5 a is a kind of structural schematic diagram of distributed system of this specification one embodiment;
Fig. 5 b is a kind of structural schematic diagram of distributed system of this specification one embodiment;
Fig. 6 is a kind of logical construction schematic diagram of business datum checking device of this specification one embodiment;
Fig. 7 is the structural representation of the computer equipment for implementing this specification method of this specification one embodiment
Figure.
Specific embodiment
Example embodiments are described in detail here, and the example is illustrated in the accompanying drawings.Following description is related to
When attached drawing, unless otherwise indicated, the same numbers in different drawings indicate the same or similar elements.Following exemplary embodiment
Described in embodiment do not represent all embodiments consistent with this specification.On the contrary, they are only and such as institute
The example of the consistent device and method of some aspects be described in detail in attached claims, this specification.
It is only to be not intended to be limiting this explanation merely for for the purpose of describing particular embodiments in the term that this specification uses
Book.The "an" of used singular, " described " and "the" are also intended to packet in this specification and in the appended claims
Most forms are included, unless the context clearly indicates other meaning.It is also understood that term "and/or" used herein is
Refer to and includes that one or more associated any or all of project listed may combine.
It will be appreciated that though various information may be described using term first, second, third, etc. in this specification, but
These information should not necessarily be limited by these terms.These terms are only used to for same type of information being distinguished from each other out.For example, not taking off
In the case where this specification range, the first information can also be referred to as the second information, and similarly, the second information can also be claimed
For the first information.Depending on context, word as used in this " if " can be construed to " ... when " or
" when ... " or " in response to determination ".
In O2O (Online To Offline, under line on line) industry, influence of the money damage failure to client and company
Be it is very serious, in order to reduce money damage failure influence degree, it is necessary to failure is found as early as possible, to quickly meet an urgent need.Due to
The common system architecture of O2O industry is usually distributed, in a distributed system, the business system to be passed through of a business operation
Route of uniting is very long, thus most of money damage failures be all because the business datum of upstream and downstream operation system it is inconsistent caused by, be
The inconsistent problem of discovery data as early as possible, using middleware to upstream and downstream business system usually in upstream and downstream operation system
The business datum of system is checked, this middleware is generally referred to as verification platform.When certain business number in upstream business system
After changing, this data altering event can trigger a verification request, and verification platform can basis after receiving verification request
Preconfigured some rules and passes through remote service and inquire incidence number with the data altering event in downstream traffic system
According to whether the business datum then compared in upstream and downstream operation system is consistent.
A kind of business datum (such as data of business A) in usual upstream business system can correspond to a kind of filtering rule,
Filtering rule for filtering out such business datum (data of business A), then obtain again with this kind of business datum (business A's
Data) associated downstream traffic system business datum, and according to certain verification logic to the number of upstream and downstream operation system
According to carrying out consistency verification, for example, up-stream system business datum is equal with the value of downstream traffic data or downstream traffic system
The data that the data of system are equal to downstream traffic system subtract 100 etc..Therefore, in the consistency of the data to upstream and downstream operation system
Before verification, need to check upstream business of these rules of rule including triggering verification request for configuring and checking in platform now
The business datum of system, the filtering rule of the business datum of the upstream business system of triggering verification request and triggering verification request
Upstream business system the associated downstream traffic system of business datum business datum and upstream business system business number
The certain law followed according to the business datum with associated downstream traffic system.The prior art usually configures in verification platform
One verification rule list, as shown in Figure 1, verification rule list record has the corresponding verification of business datum of certain class upstream business system
Rule, and check rule the inside include filtering rule, upstream business system the associated downstream traffic data of business datum with
And the incidence relation of the business datum of upstream business system and the business datum of associated downstream traffic system.When upstream business system
After change triggering verification request occurs for the business datum of system, verification platform can be according to preconfigured after receiving verification request
Verification rule list finds change data corresponding verification rule, then using the filtering rule in verification rule to change data into
Row filtering passes through long-range if the change corresponding filtering rule of data fit according to the associated data information in verification rule
The associated data of the inquiry change data in downstream traffic system is serviced, and according to the incidence relation in verification rule to change number
Consistency verification is carried out according to associated data.Since a kind of business datum may correspond to a plurality of verification rule, and every verification is advised
Filtering rule in then may be it is identical, therefore, when check regular quantity it is more when, it is necessary to repeatedly gone with filtering rule
Change data are screened, this necessarily will cause the waste of memory and extends the time of verification.In addition, in configuration verification rule
When then, all it is artificially to go configuration, if configured number is more, causes the probability of human error also bigger.Using existing
Configuration mode, due to will the repeatedly configurating filtered rule in verification rule, it is more to will also result in configured number, manual operation
Number is frequent.
Based on this, this specification embodiment provides a kind of checking method of business datum in distributed system, the distribution
Formula system includes upstream business system and downstream traffic system, and the method can be used for can be with upstream business system and downstream industry
The middleware for system communication of being engaged in, the middleware can be independently developed one for checking upstream and downstream operation system business number
According to verification platform, as shown in Fig. 2, the method can include:
S202, when receive the business datum in upstream business system altering event trigger verification request after, determine
Change the triggering filtering rule and verification rule of data correlation, wherein the triggering filtering rule and verification rule are solely
Vertical storage, the verification rule for determine associated data of the data altering event in the downstream traffic system, with
And the consistency of the verification change data and the associated data;
S204, judge whether the change data meet the filtering rule;
If S206, met, inquired in the downstream traffic system based on the verification rule invocation remote service
The associated data, and check the consistency of the change data and the associated data.
After the business datum in upstream business system changes, which can trigger a verification request
And it is sent to verification platform, after verification platform receives verification request, it can determine whether the filtering rule and core of change data correlation
To rule, wherein filtering rule is for filtering out the business datum for meeting a kind of condition, and checks rule for determining that data become
Associated data in more event downstream traffic system and consistent with the associated data for checking the change data
Property.For example, the database table in upstream business system includes the data of business A, business B and business C, in database table
Data can all trigger verification and request after changing, but the business in the associated downstream of data of business A, business B and business C
Data are different, and the rule that the data of different business are followed in upstream and downstream operation system is also different, therefore, upper
After business datum in trip operation system changes, need to filter out the number of business A, business B and business C by filtering rule
According to then, then being checked using verification rule corresponding with type of service, verification rule is used to indicate change data under
Which the trip associated data of operation system have, and the rule that change data and associated data are followed.
It in certain embodiments, can be according to being pre-configured with after the business datum in upstream business system changes
Routing table come determine change data correlation filtering rule and verification rule, wherein routing table by verification personnel in configuration
It is configured when the rule of the business datum verification of downstream traffic system, have altered data, filtering rule and verification is recorded in routing table
The binding relationship of rule, as shown in Figure 3a.For example, routing table can recorde the mark, corresponding with business datum of business datum
The mark of the mark of filtering rule and verification rule corresponding with business datum, record has business datum in routing table in other words
Mark and the corresponding filtering rule of business datum store path and verification rule corresponding with business datum storage
Path, in short, the associated filtering rule of certain business datum and verification rule can be determined according to routing table, it is specific in routing table
The content of storage can go to determine according to actual needs.Verification platform, can be with table of query and routing, really after receiving verification request
Surely the filtering rule and verification rule of data correlation are changed.Certainly, in certain embodiments, routing table can also be stored directly
Filter rule, for example, routing table can recorde the mark of business datum, filtering rule corresponding with business datum and with business number
According to the mark of corresponding verification rule, to sum up, filtering rule can store in the routing table, can also be stored separately on another
In outer database table, this specification is with no restriction.
It in certain embodiments, may include the database table mark changed where the associated data of data in verification rule
Know, the incidence relation of the major key of associated data mark and change data and associated data.The data of associated data can be passed through
Library table mark determine with change data associated datas be especially stored in downstream traffic system which database table and according to
Major key, which identifies, determines associated data is which specific data in database table, passes through remote service to downstream to check platform
These associated datas are inquired in operation system and are checked with the change data in upstream business system.Certainly, due to not
The business of same type in the rule that the corresponding data of upstream and downstream operation system are followed be it is different, have plenty of upstream and downstream business
Data are equal, and some upstream business data subtract certain value equal to downstream traffic data, therefore, should also record in verification rule
The incidence relation of the data of downstream traffic system is associated with change data with it to check platform based on the incidence relation of record
Data are checked.
In this specification embodiment, filtering rule and verification rule are to separate separate storage.In verification platform configuration
When the rule of downstream traffic system data verification, the prior art is will to check rule and filtering rule merging to be stored in a data
In the table of library, verification rule list as shown in Figure 1, i.e. filtering rule belong to a part of verification rule.In each verification rule
It all include one or more filtering rule, business datum is associated with verification rule, thus, each data change triggering verification is asked
After asking, verification platform can find the corresponding verification rule of change data according to preconfigured verification rule list, and then judgement becomes
Whether more data meet the filtering rule in verification rule, meet then according to verification Rule change data in down-stream system
Associated data is simultaneously checked.It goes to judge whether change data it is necessary to repetition when there are many corresponding verification rule of a change data
Meet the filtering rule in verification rule.In this specification embodiment configuration data verification rule when, by filtering rule from
It is detached in verification rule, after the data of upstream business system change, first determines the filtering rule of change data correlation
Then and verification is regular, then judges to change whether data meet filtering rule, if met, further according to associated verification rule
Determine associated data of the data altering event in the downstream traffic system, and by remote call service in downstream industry
Bid associated data in business system, and the consistency of the verification change data and the associated data.In this way,
After the data of upstream business system change, only primary screening need to be carried out using associated filtering rule, then used again
Associated verification rule is checked, and when the regular quantity of the corresponding verification of change data is more, goes judgement to become without repetition
Whether more data meet filtering rule, can save the consumption of memory and improve the efficiency of verification.
In some embodiments it is possible to which a routing table and a verification rule list is respectively configured, filtering rule is stored
In routing table, verification rule be stored in verification rule list in, wherein routing table is as shown in Figure 3a, for record traffic data,
The binding relationship and stored filter rule of filtering rule and verification rule, for example, routing table record has business datum mark letter
Breath, the mark letter of the corresponding filtering rule of business datum identification information and the corresponding verification rule of business datum identification information
Breath, and it is as shown in Figure 3b to check rule list, for recording specific verification rule, such as the incidence number of the operation system in downstream
According to information and the incidence relation of upstream and downstream business datum etc..After upstream business data change, it can inquire default
Routing table, and according to routing table determine change data associated filtering rule and it is associated verification rule mark believe
Then breath judges to change whether data meet the filtering rule, be found according to identification information from verification rule list if meeting
Change data correlation verification rule, according to the verification rule to change data and downstream traffic system associated data into
Row verification.Certainly, in certain embodiments, if change data do not meet associated filtering rule, directly ignore the verification
Request.
In addition, developer when checking the rule of platform configuration verification, divides from verification rule using by filtering rule
Separating out the mode come also can reduce the number configured to filtering rule, reduce operation of the developer in regular configuration process
The frequency can also avoid the number of human error to a certain extent in this way.For example, it is assumed that have one in upstream business system
The business datum of a database table, the database table will be in a database table in downstream traffic system and business datum
Verification needs to configure verification rule, and verification requires as follows:
1, need to dispose 10 verification rules;
2, this 10 filtering rules cross rate rule phase using a trigger data source (the change data of triggering verification request)
Together;
3, this 10 filtering rules use 10 verification data sources respectively (in the associated data of downstream traffic system).
Filtering rule is a part for belonging to verification rule in the prior art, as shown in fig. 4 a, the business number of a change
According to corresponding one or more verification rule, include in verification rule filtering rule, business datum downstream traffic system association
When the incidence relation of data and upstream and downstream business datum, so every one verification rule of configuration, require to advise in verification
Then the inside configures a filtering rule, needs to configure 10 filtering rules altogether in this way.And use the side of this specification embodiment
Case separates filtering rule from verification rule, as shown in Figure 4 b, corresponding one or more mistake of the business datum of a change
Filter rule and one or more verification rule, filtering rule from verification rule be detached from, verification rule only include associated data and
Incidence relation just only needs to configure a filtering rule when configuration in this way, without configuring 10 times.And when verification rule
When then number is more, for example, verification rule up to up to a hundred when, then diminishbb manual operation number is more.
Since the verification request that the data altering event of upstream business system triggers is relatively more, so verification platform cannot be stood
These verification requests are handled, but need to postpone to be handled again for a period of time, therefore, in certain embodiments, verification is flat
Platform can first judge to change whether data meet corresponding filtering rule, if met, just according to core after receiving verification request
One verification task is generated to request, and the verification task of generation is stored.If not meeting associated filtering rule, ignore
Verification request, and corresponding verification task will not be generated.In some embodiments, timer-triggered scheduler mechanism can be passed through by checking platform
The verification task of storage is handled, after generate verification task, when can use timer, the delay disposal of task to be checked
After time reaches preset duration, just the verification task is handled.Due to this specification embodiment by filtering rule from core
To detaching in rule, verification platform can first judge to change whether data meet filtering rule after receiving verification request,
If met, verification task can be just generated, by change data screening and then generating verification task, and in the prior art
Verification task is directly generated after receiving verification request, is then gone when executing verification task using the filtering rule in verification rule
Change data are filtered and are compared, without storing the verification task of some not real values, this may save verifications
The memory space of task and the expense of timer-triggered scheduler.
In addition, this specification embodiment additionally provides a kind of system architecture, as shown in Figure 5 a, the system architecture includes upper
Operation system 51, middleware 52, downstream traffic system 53 are swum, the middleware is used to work as the number received in upstream business system
After the verification request of altering event triggering, the triggering filtering rule and verification rule of change data correlation are determined, wherein institute
Triggering filtering rule and the regular separate storage of the verification are stated, the verification rule is for determining the data altering event in institute
State the consistency of the associated data and the verification change data and the associated data in downstream traffic system;Judge institute
State whether change data meet the triggering filtering rule;If met, existed based on the verification rule invocation remote service
The associated data is inquired in the downstream traffic system, and checks the consistency of the change data and the associated data.
In one embodiment, as shown in Figure 5 b, the system architecture further includes routing memory module 54 and verification rule
Memory module 55, the routing memory module 54 are stored with routing table, and the regular memory module 55 of the verification is stored with verification rule
Then table, after the middleware receives the verification request of the altering event triggering of the business datum in upstream business system, from
Inquire the routing table in the routing memory module, according to the routing table determine change data correlation filtering rule and
The identification information of rule is checked, and judges whether the change data meet the filtering rule;It, will be from described if met
It checks in regular memory module and inquires the verification rule list, the core is determined according to the identification information and verification rule list
The associated data is inquired in the downstream traffic system to rule, and based on the verification rule invocation remote service, and
Check the consistency of the change data and the associated data.
In order to which the business datum checking method and system architecture of this specification embodiment is explained further, below again with one
Specific embodiment is described in detail.
Distributed system as shown in Figure 5 a, including upstream business system 51, downstream traffic system 53 and middleware 52,
In, middleware 52 is independently developed verification platform, and verification platform is used for the service data consistence to upstream and downstream operation system
It is checked.After the business datum in upstream business system changes, which can trigger a verification and ask
Verification platform is sought and is sent to, verification platform can be according to preconfigured rule and calling remote service in downstream traffic system
The middle associated data for inquiring the data altering event.Wherein, routing table and verification rule list are that developer is pre-configured.Road
There are business datum identification information, filtering rule corresponding with business datum identification information and verification rule by record in recording in table
Identification information.It can be corresponding by routing table lookup to an associated filtering rule of business datum, and verification rule
Identification information.Then record has incidence number of the business datum in downstream traffic system in upstream business system in verification rule list
Accordingly and the certain law that is followed of the associated data of the data of upstream business system and downstream traffic system, including associated data
The mark of the database table at place, the major key mark of associated data and the data of upstream business system and being associated with for associated data
Relationship.After the data of upstream business system change, which can trigger a verification request and be sent to core
To platform, verification meeting table of query and routing determines that the filtering rule of the change data correlation is advised with associated verification according to routing table
Then identification information then judges to change whether data meet associated filtering rule, if met, please be sought survival according to verification
It is stored at a verification task, and by verification task, the duration that verification task delay executes when then passing through timer.Such as
Fruit does not meet, then gives up verification request.After the delay duration of some verification task reaches preset duration, platform meeting is checked
The verification task is obtained by timer-triggered scheduler mechanism, and according to the mark for the verification rule for changing data correlation in the verification task
Information inquires verification rule corresponding with the identification information from verification rule list, based on the association recorded in verification rule
The database table mark and major key of data, which identify, determines associated data, and being inquired from downstream traffic system by remote service should
Associated data is then based on the incidence relation of upstream business data and associated data to determine the specified number evidence of upstream and downstream operation system
Whether coherence request is met.
This specification embodiment is when configuring the rule of verification of data of upstream and downstream operation system by filtering rule from verification
It is separated in rule, when receiving the verification request of data change triggering, first passes through whether routing table determines change data
The filtering rule of satisfaction is checked using associated verification rule again if met.It, can be in this way when verification rule is more
Reduce using same filtering rule go to change data screen, and only it is necessary to when just generation verification task,
Saved verification task stored memory and timer-triggered scheduler expense, in addition, developer configuration verification rule when, also without
Duplicate configurating filtered rule is needed, manual operation number is can reduce, reduces the probability of human error.
Various technical characteristics in above embodiments can be arbitrarily combined, as long as there is no punchings for the combination between feature
Prominent or contradiction, but as space is limited, is not described one by one, thus the various technical characteristics in above embodiment it is any into
Row combination also belongs to the range of this disclosure.
As shown in fig. 6, be checking device corresponding with business datum checking method in this specification embodiment, it is described
Device can 60 include:
Regular determining module 61, when the verification that the altering event for receiving the business datum in upstream business system triggers is asked
After asking, the filtering rule and verification rule of change data correlation are determined, wherein the triggering filtering rule and verification rule
Then separate storage, the verification rule is for determining incidence number of the data altering event in the downstream traffic system
According to and verification it is described change data and the associated data consistency;
Judgment module 62, judges whether the change data meet the triggering filtering rule;
Module 63 is checked, if met, based on the verification rule invocation remote service in the downstream traffic system
The middle inquiry associated data, and check the consistency of the change data and the associated data.
In one embodiment, by inquire preset routing table determine the change data correlation filtering rule and
Verification rule, the routing table record have business datum and trigger the binding relationship of filtering rule, verification rule.
In one embodiment, filtering rule and the verification of the change data correlation are determined based on preset routing table
Rule includes:
The filtering rule of the change data correlation and the mark of the verification rule are inquired from the routing table
Information;
The verification rule is obtained from preset verification rule list according to the identification information of the verification rule.
In one embodiment, the verification rule include: database table where the associated data identify, the pass
Join the major key mark of data and the incidence relation of the change data and the associated data.
In one embodiment, if the change data do not meet the filtering rule, give up the verification request.
In one embodiment, after judging the change data fit filtering rule, further includes:
It is requested to generate a verification task according to the verification, the verification task is for checking the change data and institute
State the consistency of associated data;
Store the verification task;
After the delay of the verification task, which executes the time, reaches preset duration, then the verification task is executed.
The specific details of the realization process of the function of modules and effect, which are shown in, in above-mentioned apparatus corresponds to step in the above method
Realization process, details are not described herein.
For device embodiment, since it corresponds essentially to embodiment of the method, so related place is referring to method reality
Apply the part explanation of example.The apparatus embodiments described above are merely exemplary, wherein described be used as separation unit
The module of explanation may or may not be physically separated, and the component shown as module can be or can also be with
It is not physical module, it can it is in one place, or may be distributed on multiple network modules.It can be according to actual
The purpose for needing to select some or all of the modules therein to realize this specification scheme.Those of ordinary skill in the art are not
In the case where making the creative labor, it can understand and implement.
The embodiment of this specification device can be applied on a computing device, such as server or intelligent terminal.Device
Embodiment can also be realized by software realization by way of hardware or software and hardware combining.Taking software implementation as an example,
As the device on a logical meaning, being will be corresponding in nonvolatile memory by the processor of file process where it
Computer program instructions are read into memory what operation was formed.For hardware view, as shown in fig. 7, being this specification device
A kind of hardware structure diagram of place computer equipment, in addition to processor 702 shown in Fig. 7, memory 704, network interface 706, with
And except nonvolatile memory 708, server or electronic equipment in embodiment where device are set generally according to the computer
Standby actual functional capability can also include other hardware, repeat no more to this.
Correspondingly, this specification embodiment also provides a kind of computer storage medium, is stored with journey in the storage medium
Sequence realizes the method in any of the above-described embodiment when described program is executed by processor.
Correspondingly, this specification embodiment also provides a kind of computer equipment, including memory, processor and is stored in
On reservoir and the computer program that can run on a processor, the processor realize any of the above-described implementation when executing described program
Method in example.
It wherein includes storage medium (the including but not limited to disk of program code that the application, which can be used in one or more,
Memory, CD-ROM, optical memory etc.) on the form of computer program product implemented.Computer-usable storage medium packet
Permanent and non-permanent, removable and non-removable media is included, can be accomplished by any method or technique information storage.Letter
Breath can be computer readable instructions, data structure, the module of program or other data.The example packet of the storage medium of computer
Include but be not limited to: phase change memory (PRAM), static random access memory (SRAM), dynamic random access memory (DRAM),
Other kinds of random access memory (RAM), read-only memory (ROM), electrically erasable programmable read-only memory
(EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), digital versatile disc
(DVD) or other optical storage, magnetic cassettes, tape magnetic disk storage or other magnetic storage devices or any other non-biography
Defeated medium, can be used for storage can be accessed by a computing device information.
Those skilled in the art will readily occur to the disclosure after considering specification and practicing specification disclosed herein
Other embodiments.The disclosure is intended to cover any variations, uses, or adaptations of the disclosure, these modifications, purposes
Or adaptive change follow the general principles of this disclosure and including the disclosure it is undocumented in the art known in often
Knowledge or conventional techniques.The description and examples are only to be considered as illustrative, and the true scope and spirit of the disclosure are by following
Claim point out.
It should be understood that the present disclosure is not limited to the precise structures that have been described above and shown in the drawings, and
And various modifications and changes may be made without departing from the scope thereof.The scope of the present disclosure is only limited by the accompanying claims.
The foregoing is merely the preferred embodiments of the disclosure, not to limit the disclosure, all essences in the disclosure
Within mind and principle, any modification, equivalent substitution, improvement and etc. done be should be included within the scope of disclosure protection.
Claims (10)
1. the checking method of business datum in a kind of distributed system, the distributed system include upstream business system and under
Swim operation system, which comprises
After the verification request that the altering event for receiving the business datum in upstream business system triggers, determine that change data are closed
The filtering rule and verification rule of connection, wherein the filtering rule and the regular separate storage of the verification, the verification rule
For determine associated data of the data altering event in the downstream traffic system and the verification change data and
The consistency of the associated data;
Judge whether the change data meet the filtering rule;
If met, the incidence number is inquired in the downstream traffic system based on the verification rule invocation remote service
According to, and check the consistency of the change data and the associated data.
2. checking method according to claim 1 determines the change data correlation by inquiring preset routing table
Filtering rule and verification rule, the routing table record have business datum and the binding of triggering filtering rule, verification rule to close
System.
3. checking method according to claim 2 determines the filtering of the change data correlation based on preset routing table
Rule and verification rule include:
The filtering rule of the change data correlation and the mark letter of the verification rule are inquired from the routing table
Breath;
The verification rule is obtained from preset verification rule list according to the identification information of the verification rule.
4. checking method according to claim 1, the verification rule includes: the database table where the associated data
The incidence relation of mark, the major key mark of the associated data and the change data and the associated data.
5. checking method according to claim 1 gives up institute if the change data do not meet the filtering rule
State verification request.
6. checking method according to claim 1, after judging the change data fit filtering rule, further includes:
It is requested to generate a verification task according to the verification, the verification task is for checking the change data and the pass
Join the consistency of data;
Store the verification task;
After the delay of the verification task, which executes the time, reaches preset duration, then the verification task is executed.
7. the checking device of business datum, described device include: in a kind of distributed system
Regular determining module, after the verification request that the altering event for receiving the business datum in upstream business system triggers,
Determine the filtering rule and verification rule of change data correlation, wherein the filtering rule and verification rule are independently deposited
Storage, it is described to check associated data, the Yi Jihe that rule is used to determine the data altering event in the downstream traffic system
To the consistency of the change data and the associated data;
Judgment module, judges whether the change data meet the filtering rule;
Module is checked, if met, is inquired in the downstream traffic system based on the verification rule invocation remote service
The associated data, and check the consistency of the change data and the associated data.
8. a kind of equipment including memory, processor and stores the computer journey that can be run on a memory and on a processor
Sequence, the processor realize method described in claim 1 to 6 any one when executing described program.
9. a kind of system architecture, the system architecture includes upstream business system, middleware, downstream traffic system,
The middleware is used for after the verification request that the altering event for receiving the business datum in upstream business system triggers,
Determine the filtering rule and verification rule of change data correlation, wherein the filtering rule and verification rule are independently deposited
It is stored in different storage units, the verification rule is for determining the data altering event in the downstream traffic system
The consistency of associated data and the verification change data and the associated data;Judge whether the change data meet
The filtering rule;If met, inquired in the downstream traffic system based on the verification rule invocation remote service
The associated data, and check the consistency of the change data and the associated data.
10. system architecture according to claim 9, the system architecture further includes that routing memory module and verification rule are deposited
Module is stored up,
The routing memory module is stored with routing table, and the regular memory module of the verification is stored with verification rule list, when described
After middleware receives the verification request of the altering event triggering of the business datum in upstream business system, stored from the routing
The routing table is inquired in module, and the filtering rule of change data correlation and the mark of verification rule are determined according to the routing table
Know information, and judges whether the change data meet the filtering rule;If met, from the verification rule storage mould
Inquiry verification rule list in block determines the verification rule according to the identification information and verification rule list, and based on described
Verification rule invocation remote service inquire the associated data in the downstream traffic system, and check the change data and
The consistency of the associated data.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910468796.6A CN110263071B (en) | 2019-05-31 | 2019-05-31 | Business data checking method, device, equipment and system architecture |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910468796.6A CN110263071B (en) | 2019-05-31 | 2019-05-31 | Business data checking method, device, equipment and system architecture |
Publications (2)
Publication Number | Publication Date |
---|---|
CN110263071A true CN110263071A (en) | 2019-09-20 |
CN110263071B CN110263071B (en) | 2020-06-26 |
Family
ID=67916252
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910468796.6A Active CN110263071B (en) | 2019-05-31 | 2019-05-31 | Business data checking method, device, equipment and system architecture |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN110263071B (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111309331A (en) * | 2020-02-11 | 2020-06-19 | 支付宝(杭州)信息技术有限公司 | Service processing method and device, electronic equipment and storage medium |
CN112817991A (en) * | 2021-01-29 | 2021-05-18 | 上海微盟企业发展有限公司 | Data checking method and system |
CN112949278A (en) * | 2021-02-24 | 2021-06-11 | 深圳壹账通智能科技有限公司 | Data checking method and device, electronic equipment and readable storage medium |
CN113282623A (en) * | 2021-05-20 | 2021-08-20 | 浙江网商银行股份有限公司 | Data processing method and device |
CN113421109A (en) * | 2021-05-14 | 2021-09-21 | 北京沃东天骏信息技术有限公司 | Service checking method, device, electronic equipment and storage medium |
CN118012720A (en) * | 2024-04-09 | 2024-05-10 | 浙江口碑网络技术有限公司 | Complex event processing method, device, medium and equipment |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106503217A (en) * | 2016-11-03 | 2017-03-15 | 用友网络科技股份有限公司 | Data interaction device and method based on business-driven |
CN107451136A (en) * | 2016-05-30 | 2017-12-08 | 阿里巴巴集团控股有限公司 | Verification of data method and device |
CN107644077A (en) * | 2017-09-19 | 2018-01-30 | 杭州贝购科技有限公司 | Data consistency monitoring method, computer equipment and storage medium |
US20180032575A1 (en) * | 2016-08-01 | 2018-02-01 | Palantir Technologies Inc. | Techniques for data extraction |
WO2018170504A1 (en) * | 2017-03-17 | 2018-09-20 | Labyrinth Research Llc | Unified control of privacy-impacting devices |
CN109597828A (en) * | 2018-09-29 | 2019-04-09 | 阿里巴巴集团控股有限公司 | A kind of off-line data checking method, device and server |
-
2019
- 2019-05-31 CN CN201910468796.6A patent/CN110263071B/en active Active
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107451136A (en) * | 2016-05-30 | 2017-12-08 | 阿里巴巴集团控股有限公司 | Verification of data method and device |
US20180032575A1 (en) * | 2016-08-01 | 2018-02-01 | Palantir Technologies Inc. | Techniques for data extraction |
CN106503217A (en) * | 2016-11-03 | 2017-03-15 | 用友网络科技股份有限公司 | Data interaction device and method based on business-driven |
WO2018170504A1 (en) * | 2017-03-17 | 2018-09-20 | Labyrinth Research Llc | Unified control of privacy-impacting devices |
CN107644077A (en) * | 2017-09-19 | 2018-01-30 | 杭州贝购科技有限公司 | Data consistency monitoring method, computer equipment and storage medium |
CN109597828A (en) * | 2018-09-29 | 2019-04-09 | 阿里巴巴集团控股有限公司 | A kind of off-line data checking method, device and server |
Cited By (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111309331A (en) * | 2020-02-11 | 2020-06-19 | 支付宝(杭州)信息技术有限公司 | Service processing method and device, electronic equipment and storage medium |
CN111309331B (en) * | 2020-02-11 | 2022-11-18 | 支付宝(杭州)信息技术有限公司 | Business processing method and device, electronic equipment and storage medium |
CN112817991A (en) * | 2021-01-29 | 2021-05-18 | 上海微盟企业发展有限公司 | Data checking method and system |
CN112949278A (en) * | 2021-02-24 | 2021-06-11 | 深圳壹账通智能科技有限公司 | Data checking method and device, electronic equipment and readable storage medium |
WO2022179119A1 (en) * | 2021-02-24 | 2022-09-01 | 深圳壹账通智能科技有限公司 | Data verification method and apparatus, electronic device, and readable storage medium |
CN113421109A (en) * | 2021-05-14 | 2021-09-21 | 北京沃东天骏信息技术有限公司 | Service checking method, device, electronic equipment and storage medium |
CN113282623A (en) * | 2021-05-20 | 2021-08-20 | 浙江网商银行股份有限公司 | Data processing method and device |
CN118012720A (en) * | 2024-04-09 | 2024-05-10 | 浙江口碑网络技术有限公司 | Complex event processing method, device, medium and equipment |
Also Published As
Publication number | Publication date |
---|---|
CN110263071B (en) | 2020-06-26 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110263071A (en) | Business datum checking method, device, equipment and system architecture | |
CN109471796A (en) | Interface test method, device, computer equipment and storage medium | |
WO2017048924A1 (en) | Distributed data processing method and system | |
CN110222042B (en) | Method, device, equipment and system architecture for determining checked business data | |
CN106648859A (en) | Task scheduling method and device | |
CA2984833A1 (en) | Device, method and program for securely reducing an amount of records in a database | |
CN110019255A (en) | Data query method, apparatus, server and storage medium | |
CN109286511B (en) | Data processing method and device | |
CN106682096A (en) | Method and device for log data management | |
US11698938B2 (en) | System and method for data event management system | |
US10891129B1 (en) | Decentralized development operations blockchain system | |
CN109460841A (en) | User's account-opening method, system and storage medium | |
CN107783880A (en) | A kind of log analysis method of server system, device and server system | |
CN110399309A (en) | A kind of test data generating method and device | |
CN116415206A (en) | Operator multiple data fusion method, system, electronic equipment and computer storage medium | |
CN109766370A (en) | Data processing method, data service system and equipment | |
WO2021151520A1 (en) | Classifying traffic data | |
CN108234566B (en) | Cluster data processing method and device | |
CN106570005A (en) | Database cleaning method and device | |
EP3816782B1 (en) | Data reconstruction method, apparatus and storage medium | |
CN110290210A (en) | Distinct interface flow proportional automatic governing method and device in interface calling system | |
CN110046172A (en) | In line computation data processing method and system | |
WO2019232958A1 (en) | Method, apparatus, device and storage medium for sharing business rules in multiple channels | |
CN109902937A (en) | Quality detecting method, device, computer equipment and the storage medium of task data | |
US20050120357A1 (en) | Discovering and monitoring process executions |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |