CN110377454A - Data verification method, device, computer equipment and storage medium - Google Patents

Data verification method, device, computer equipment and storage medium Download PDF

Info

Publication number
CN110377454A
CN110377454A CN201910521896.0A CN201910521896A CN110377454A CN 110377454 A CN110377454 A CN 110377454A CN 201910521896 A CN201910521896 A CN 201910521896A CN 110377454 A CN110377454 A CN 110377454A
Authority
CN
China
Prior art keywords
data
verified
field
subfield
cryptographic hash
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910521896.0A
Other languages
Chinese (zh)
Other versions
CN110377454B (en
Inventor
林荣吉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Life Insurance Company of China Ltd
Original Assignee
Ping An Life Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Life Insurance Company of China Ltd filed Critical Ping An Life Insurance Company of China Ltd
Priority to CN201910521896.0A priority Critical patent/CN110377454B/en
Publication of CN110377454A publication Critical patent/CN110377454A/en
Application granted granted Critical
Publication of CN110377454B publication Critical patent/CN110377454B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/08Error detection or correction by redundancy in data representation, e.g. by using checking codes
    • G06F11/10Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
    • G06F11/1004Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's to protect a block of data words, e.g. CRC or checksum
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • G06F16/2255Hash tables

Abstract

This application involves a kind of data verification method, device, computer equipment and storage mediums.The method is related to data coherence tester technology, comprising: obtains data to be verified and the corresponding initial data of data to be verified;According to preset data check rule, the original field in the field and initial data to be verified in data to be verified is determined;The field cryptographic Hash of field more to be verified and the field cryptographic Hash of original field determine that the corresponding data of data to be verified split number according to the data length of data to be verified when field comparison result is inconsistent;Number is split according to data, splits to obtain subfield to be verified respectively by field to be verified, original field is split to obtain original sub word section;The subfield cryptographic Hash of subfield more to be verified and the subfield cryptographic Hash of original sub word section, obtain data check result according to subfield comparison result.Data check efficiency can be improved using this method.

Description

Data verification method, device, computer equipment and storage medium
Technical field
This application involves field of computer technology, more particularly to a kind of data verification method, device, computer equipment and Storage medium.
Background technique
With the development of computer technology, the arrival of cloud era, each operation system storage, the data volume handled are in several What series increases, and big data has attracted more and more concerns.In treatment processes such as data transmission, Data Migration or system upgrades In, it is required to verify data before and after the processing, has ensured that the integrality and consistency of data.
However, with the sharp increase of data volume, the data verification method compared one by one by data at present, data check Low efficiency.
Summary of the invention
Based on this, it is necessary in view of the above technical problems, provide a kind of data check that can be improved data check efficiency Method, apparatus, computer equipment and storage medium.
A kind of data verification method, which comprises
Obtain data to be verified and the corresponding initial data of data to be verified;
According to preset data check rule, determine original in the field and initial data to be verified in data to be verified Field;
The field cryptographic Hash of field more to be verified and the field cryptographic Hash of original field, when field comparison result is inconsistent When, determine that the corresponding data of data to be verified split number according to the data length of data to be verified;
Number is split according to data, splits to obtain subfield to be verified respectively by field to be verified, original field is split Obtain original sub word section;
The subfield cryptographic Hash of subfield more to be verified and the subfield cryptographic Hash of original sub word section, according to subfield ratio Relatively result obtains data check result.
Data to be verified are obtained in one of the embodiments, and the corresponding initial data of data to be verified includes:
Determine type of service belonging to data to be verified;
Inquiry business type corresponds to preset data check priority;
According to data check priority, data to be verified and the corresponding initial data of data to be verified are obtained.
In one of the embodiments, according to preset data check rule, the word to be verified in data to be verified is determined Section and initial data in original field include:
Preset data check rule is inquired, and data check section is determined according to data check rule;
According to data check section, field to be verified is extracted from data to be verified respectively, is extracted from initial data original Field.
The field cryptographic Hash packet of the field cryptographic Hash of field more to be verified and original field in one of the embodiments, It includes:
Obtain preset field hash function;
According to field hash function, the field cryptographic Hash of field to be verified and the field Hash of original field are calculated separately Value;
The field cryptographic Hash of the field cryptographic Hash of field to be verified and original field is compared, field is obtained and compares knot Fruit.
In one of the embodiments, when field comparison result is inconsistent, the data length according to data to be verified is true Determining the corresponding data fractionation number of data to be verified includes:
When field comparison result is inconsistent, the data length of data to be verified is determined;
Obtain preset verification data division rule;
According to data length and verification data division rule, determine that the data of data to be verified split number.
The subfield of the subfield cryptographic Hash of subfield more to be verified and original sub word section in one of the embodiments, Cryptographic Hash, obtaining data check result according to subfield comparison result includes:
Obtain preset subfield hash function;
According to subfield hash function, the subfield cryptographic Hash of subfield to be verified and the son of original sub word section are calculated separately Field cryptographic Hash;
The subfield cryptographic Hash of the subfield cryptographic Hash of subfield to be verified and original sub word section is compared, son is obtained Field comparison result;
According to subfield to be verified less consistent in subfield comparison result, error data section, data check are obtained It as a result include error data section.
In one of the embodiments, according to subfield to be verified less consistent in subfield comparison result, obtain To after error data section, further includes:
Obtain the corresponding initial data section of error data section;
Error data section and initial data section are subjected to bit bit check, obtain bit check results.
A kind of data calibration device, described device include:
Data acquisition module, for obtaining data to be verified and the corresponding initial data of data to be verified;
Check field determining module, for determining to be verified in data to be verified according to preset data check rule Original field in field and initial data;
Field comparison module, for the field cryptographic Hash of field more to be verified and the field cryptographic Hash of original field, when When field comparison result is inconsistent, determine that the corresponding data of data to be verified split number according to the data length of data to be verified Mesh;
Field splits module, for splitting number according to data, splits field to be verified to obtain sub- word to be verified respectively Section, original field is split to obtain original sub word section;
Check results obtain module, for the subfield cryptographic Hash of subfield more to be verified and the sub- word of original sub word section Section cryptographic Hash, obtains data check result according to subfield comparison result.
A kind of computer equipment, including memory and processor, the memory are stored with computer program, the processing Device performs the steps of when executing the computer program
Obtain data to be verified and the corresponding initial data of data to be verified;
According to preset data check rule, determine original in the field and initial data to be verified in data to be verified Field;
The field cryptographic Hash of field more to be verified and the field cryptographic Hash of original field, when field comparison result is inconsistent When, determine that the corresponding data of data to be verified split number according to the data length of data to be verified;
Number is split according to data, splits to obtain subfield to be verified respectively by field to be verified, original field is split Obtain original sub word section;
The subfield cryptographic Hash of subfield more to be verified and the subfield cryptographic Hash of original sub word section, according to subfield ratio Relatively result obtains data check result.
A kind of computer readable storage medium, is stored thereon with computer program, and the computer program is held by processor It is performed the steps of when row
Obtain data to be verified and the corresponding initial data of data to be verified;
According to preset data check rule, determine original in the field and initial data to be verified in data to be verified Field;
The field cryptographic Hash of field more to be verified and the field cryptographic Hash of original field, when field comparison result is inconsistent When, determine that the corresponding data of data to be verified split number according to the data length of data to be verified;
Number is split according to data, splits to obtain subfield to be verified respectively by field to be verified, original field is split Obtain original sub word section;
The subfield cryptographic Hash of subfield more to be verified and the subfield cryptographic Hash of original sub word section, according to subfield ratio Relatively result obtains data check result.
Above-mentioned data verification method, device, computer equipment and storage medium, by comparing to be verified in data to be verified The field cryptographic Hash of original field, the data compared when reducing data check in the field cryptographic Hash and initial data of field Amount, and when field comparison result is inconsistent, according to the data length of data to be verified by field to be verified and original field into Row is split, and by comparing the subfield cryptographic Hash of subfield to be verified and the subfield cryptographic Hash of original sub word section, can be right Error data is quickly positioned, and data check efficiency is improved.
Detailed description of the invention
Fig. 1 is the application scenario diagram of data verification method in one embodiment;
Fig. 2 is the flow diagram of data verification method in one embodiment;
Fig. 3 is the flow diagram of field verification in one embodiment;
Fig. 4 is the flow diagram of data verification method in another embodiment;
Fig. 5 is the structural block diagram of data calibration device in one embodiment;
Fig. 6 is the internal structure chart of computer equipment in one embodiment.
Specific embodiment
It is with reference to the accompanying drawings and embodiments, right in order to which the objects, technical solutions and advantages of the application are more clearly understood The application is further elaborated.It should be appreciated that specific embodiment described herein is only used to explain the application, not For limiting the application.
Data verification method provided by the present application can be applied in application environment as shown in Figure 1.Wherein, server 102 connect with calibration database server 104 and original database server 106 respectively.Server 102 is from calibration database service Data to be verified are obtained in device 104, and the corresponding initial data of data to be verified is obtained from original database server 106, is passed through In data more to be verified in the field cryptographic Hash and initial data of field to be verified original field field cryptographic Hash, and in word When section comparison result is inconsistent, field to be verified and original field are split according to the data length of data to be verified, and By comparing the subfield cryptographic Hash of subfield to be verified and the subfield cryptographic Hash of original sub word section, can to error data into Row quickly positioning, obtains data check result.Wherein, server 102, calibration database server 104 and original database service Device 106 can be realized with the server cluster of the either multiple server compositions of independent server.
In one embodiment, as shown in Fig. 2, providing a kind of data verification method, it is applied in Fig. 1 in this way It is illustrated for server 102, comprising the following steps:
Step S201: data to be verified and the corresponding initial data of data to be verified are obtained.
Wherein, data to be verified are the data for needing to carry out checking treatment, for example, can for after Data Migration data, be The data after upgrading of uniting or the data that recipient receives after transmitting.Initial data is the corresponding source data of data to be verified, It can be used as the reference data treated when verification data carry out data check processing, i.e., in Data Migration, system upgrade or data In transmission process, therefore, to assure that the integrality and consistency of obtained data.Specific Data Migration application in, can respectively from Data to be verified are obtained in database after Data Migration, are obtained from the database before Data Migration corresponding with data to be verified Initial data.
Step S203: according to preset data check rule, the field and original number to be verified in data to be verified are determined Original field in.
Wherein, data check rule is for determining the data field verified, according to data to be verified and original Beginning data respectively belonging to systematical difference preset.For example, for data and original number to be verified in Data Migration According to operation system platform affiliated respectively is different before and after Data Migration, and data format might have corresponding conversion process;This Outside, for certain fields in data, it is also possible to not need to be verified.Then when carrying out data check, need to exclude business System platform difference bring data difference, and filter the data field for not needing to be verified, i.e., according to data check rule Determine the data field for needing to carry out checking treatment.Specifically, preset data check rule can be inquired, and according to the data Verification rule determines field to be verified from data to be verified respectively, and original field is determined from initial data, wherein to school Test that field and original field are corresponding, original field can be used as the benchmark field of field to be verified when checking treatment.
Step S205: the field cryptographic Hash of field more to be verified and the field cryptographic Hash of original field, when field compares As a result when inconsistent, determine that the corresponding data of data to be verified split number according to the data length of data to be verified.
Wherein, the field cryptographic Hash of the field cryptographic Hash of field to be verified and original field can pass through preset word respectively Section hash algorithm, as MD5 Message Digest 5 (MD5Message-Digest Algorithm) is calculated.Data split number Mesh is that the quantity of subfield to be verified is obtained after being split field to be verified, and data split number can be according to word to be verified The length of section is correspondingly arranged, and fixed data also can be set and split number, and fixed data can also be arranged and split length, root Length is split according to the data and data to be verified determine that corresponding data split number.Specifically, it obtains in data to be verified After original field in field and initial data to be verified, calculate separately to obtain field to be verified by preset hash algorithm The field cryptographic Hash of field cryptographic Hash and original field, the two is compared, according to the available field of field comparison result Check results, data check result include the field check results.Be compared by field cryptographic Hash, can be effectively reduced into The data volume that row compares improves data check efficiency.
Further, when field comparison result be than it is more consistent when, show that field to be verified is identical with original field, i.e., to It is consistent to verify the corresponding initial data of data, obtained field check results are that verification passes through, and data check result includes field Check results, to complete data check.And when field comparison result is inconsistent, show field to be verified and original field not Together, i.e., the corresponding initial data of data to be verified is different, and field check results are that verification does not pass through.At this point it is possible to not to verification By error data carry out out mispointing, can specifically determine that data to be verified are corresponding according to the data length of data to be verified Data split number, split number according to the data and split field to be verified and original field, and according to fractionation after Subfield and original sub word section to be verified be compared, so as to which error data is accurately positioned.
Step S207: splitting number according to data, split field to be verified to obtain subfield to be verified respectively, will be original Field splits to obtain original sub word section.
When field comparison result is inconsistent, show that data to be verified and initial data are different, it can be by will be to be verified Field splits into subfield to be verified and carries out error data positioning.Specifically, it after obtaining data fractionation number, is torn open according to the data Score mesh respectively splits field to be verified and original field, and correspondence obtains subfield and original sub word section to be verified.Its In, each subfield to be verified and each original sub word section respectively correspond, and original sub word section can be used as at subfield verification to be verified Reference data when reason, it can treat verification subfield by the way that subfield to be verified and original sub word section are compared realization Verification.
Step S209: the subfield cryptographic Hash of subfield more to be verified and the subfield cryptographic Hash of original sub word section, root Data check result is obtained according to subfield comparison result.
After obtaining subfield and original sub word section to be verified, calculate subfield to be verified subfield cryptographic Hash and original son The subfield cryptographic Hash of field can specifically be calculated according to preset subfield hash algorithm.Subfield more to be verified Subfield cryptographic Hash and original sub word section subfield cryptographic Hash, obtain subfield comparison result, and according to the subfield ratio Relatively result obtains data check as a result, treating the rapid verification for verifying data to realize, and it is fixed to carry out accurately error data Position.By comparing the subfield cryptographic Hash of each subfield to be verified and the subfield cryptographic Hash of original sub word section, son can be determined Field comparison result is the subfield to be verified in inconsistent data to be verified, treats error number in verification data to realize According to positioning, further obtain data check as a result, data check result may include that data check does not pass through, and it is corresponding go out Wrong data.
In above-mentioned data verification method, by comparing the field cryptographic Hash and original number of field to be verified in data to be verified The field cryptographic Hash of original field in, the data volume compared when reducing data check, and it is inconsistent in field comparison result When, field to be verified and original field are split according to the data length of data to be verified, and by comparing son to be verified The subfield cryptographic Hash of field and the subfield cryptographic Hash of original sub word section can quickly position error data, improve Data check efficiency.
In one embodiment, data to be verified are obtained and the corresponding initial data of data to be verified includes: being determined to school Test type of service belonging to data;Inquiry business type corresponds to preset data check priority;According to data check priority, Obtain data to be verified and the corresponding initial data of data to be verified.
Initial data be the corresponding source data of data to be verified, as treat verification data carry out data check processing when Data to be verified are compared by reference data with corresponding initial data, to realize the data check for treating verification data Processing.For the operation system with different business rule, the relationship between the various data in operation system database is different, With different data levels, be corresponding with different data check demands, for example, certain data be in other data basis by The data splitting further obtained according to certain business rule.In addition, different data has different access frequencys in database, Different data check demands can be corresponded to.So can be needed in conjunction with the data check of various data in data check processing It asks, sequentially data is verified, to ensure that the normal operation of data uses.
Specifically, when obtaining data to be verified and the corresponding initial data of data to be verified, data institute to be verified is determined The type of service of category, type of service can be determined according to the corresponding affiliated operation system of data to be verified.Inquire the type of service Corresponding preset data check priority, data check priority reflect the data check of the data to be verified of the type of service Priority requirements, the data to be verified under different service types correspond to different data check priority.Wherein, data check Priority can access data according to the business rule and history of operation system, carry out priority to various data and divide determination. According to determining data check priority, data to be verified and the corresponding initial data of data to be verified are obtained, it specifically can be from It extracts and obtains in calibration database server and original database server.By corresponding to preset data school according to data to be verified Priority is tested, data to be verified is sequentially obtained and carries out checking treatment, it can be ensured that the data that data-level is high or access frequency is high Available preferential verification, to ensure that the normal access of data uses.
In one embodiment, according to preset data check rule, determine field to be verified in data to be verified and Original field in initial data includes: the preset data check rule of inquiry, and determines data school according to data check rule Test section;According to data check section, field to be verified is extracted from data to be verified respectively, original word is extracted from initial data Section.
Data check rule is for determining the data field verified, according to data to be verified and initial data Systematical difference belonging to respectively is preset.In the present embodiment, determined in data to be verified according to data check rule Field and initial data to be verified in original field when, inquire preset data check rule, and according to the data check Rule determines data check section, and data check section is the data segment for needing to carry out data check processing.According to the data check section, From field to be verified is extracted from data to be verified respectively, original field is extracted from initial data.Field to be verified and original Field is corresponding, and original field can be used as the benchmark field of field to be verified when checking treatment.
In one embodiment, as shown in figure 3, the step of field verifies, i.e., the field cryptographic Hash of field more to be verified Field cryptographic Hash with original field includes:
Step S301: preset field hash function is obtained.
Durings Data Migration, system upgrade and data transmission etc., with the data mode of the 0 of bit and 1 coding It being handled, the length of each data corresponding bit code is very long, if directly being compared one by one according to bit code in data check, Data check efficiency is extremely low, and is easy error.It is verified, be can effectively improve again by the way that data mapping is compressed into short parameter Data compression such as can be mapped to the shorter eap-message digest of length based on hash algorithm by data check treatment effeciency.
Specifically, the field to be verified of input and original field compression can be mapped to corresponding fixation by field hash function The eap-message digest of length, i.e., corresponding field cryptographic Hash.Wherein, the length of field cryptographic Hash can be far smaller than field to be verified Length, then field verification is carried out based on field cryptographic Hash, the data volume being compared can be effectively reduced, to improve data school Test treatment effeciency.In the present embodiment, when treating check field progress field verification, preset field hash function is obtained, such as The field hash function constructed based on MD4, MD5 and SHA1.
Step S303: according to field hash function, the field cryptographic Hash and original field of field to be verified are calculated separately Field cryptographic Hash.
After obtaining field hash function, according to the field hash function calculate separately field to be verified field cryptographic Hash and The field cryptographic Hash of original field.It can specifically be obtained respectively by field to be verified and original field input field hash function To the field cryptographic Hash of field to be verified and the field cryptographic Hash of original field.
Step S305: the field cryptographic Hash of the field cryptographic Hash of field to be verified and original field is compared, is obtained Field comparison result.
After obtaining the field cryptographic Hash of field to be verified and the field cryptographic Hash of original field, field cryptographic Hash is compared Compared with obtaining field comparison result.Specifically, identical with the field cryptographic Hash of original field when the field cryptographic Hash of field to be verified When, show that field to be verified is identical with original field, i.e., the corresponding initial data of data to be verified is consistent, obtained field verification As a result pass through for verification, data check result includes the field check results, to complete data check.And when field compares knot When fruit is inconsistent, show that field to be verified and original field are different, i.e., the corresponding initial data of data to be verified is different, field school Result is tested not pass through for verification.At this point, can also further position to error data, error data section, data school are obtained Testing result may include the error data section.
In one embodiment, when field comparison result is inconsistent, according to the data length of data to be verified determine to It includes: to determine the data of data to be verified when field comparison result is inconsistent that the corresponding data of verification data, which split number, Length;Obtain preset verification data division rule;According to data length and verification data division rule, data to be verified are determined Data split number.
In the field cryptographic Hash of field more to be verified and the field cryptographic Hash of original field, field comparison result is obtained Afterwards, if field comparison result is inconsistent, show that field to be verified is different with original field, i.e., data to be verified are corresponding original Data are different, and field check results do not pass through for verification, at this point, by splitting field to be verified and original field, it can Error data to be accurately positioned.
Specifically, when the data for determining field to be verified and original field split number, the number of data to be verified is determined According to length.Verification data can be treated to be analyzed, the data length of data to be verified is determined, can such as be based on data to be verified Size, calculate the length of data to be verified.Obtain preset verification data division rule again, verification data division rule can be with Number is split including the corresponding data of various data lengths, i.e., different data lengths corresponds to different data and splits number. Verification data division rule can be preset according to actual treatment resource, data to be verified be divided to obtain suitable data long The data segment of degree.For example, it may be determined that data obtain the subdata length of subdata after splitting, that is, determine sub- word to be verified The Subfield Length of section, and the available data of the data length of field to be verified is combined to split number;Fractionation can also be preset Ratio, such as 20%, 10%, field to be verified is split according to the primary contract, corresponding data is obtained and splits number.
Determine the data length of data to be verified, and after obtaining verification data division rule, according to the data length, according to Verification data division rule determines that the data of data to be verified split number.Splitting number according to the data can be by word to be verified Section and original field are split, and correspondence obtains subfield and original sub word section to be verified, and according to subfield to be verified and original Beginning subfield carries out error data positioning.
In one embodiment, the subfield Hash of the subfield cryptographic Hash of subfield more to be verified and original sub word section Value, obtaining data check result according to subfield comparison result includes: to obtain preset subfield hash function;According to subfield Hash function calculates separately the subfield cryptographic Hash of subfield to be verified and the subfield cryptographic Hash of original sub word section;It will be to school The subfield cryptographic Hash of the subfield cryptographic Hash and original sub word section of testing subfield is compared, and obtains subfield comparison result; According to subfield to be verified less consistent in subfield comparison result, error data section is obtained, data check result includes Error data section.
When carrying out error data positioning, can subfield more to be verified subfield cryptographic Hash and original sub word section Subfield cryptographic Hash, and data check result is obtained according to subfield comparison result.Specifically, preset subfield Hash is obtained Function, subfield hash function is corresponding with field hash function, can respectively obtain son to be verified by subfield hash function The subfield cryptographic Hash of field and original sub word section.In a particular application, subfield hash function and field hash function can be with It is identical, it can also be different.According to obtained subfield hash function, calculate separately subfield to be verified subfield cryptographic Hash and The subfield cryptographic Hash of original sub word section, and carry out subfield comparison, i.e., by the subfield cryptographic Hash and original of subfield to be verified The subfield cryptographic Hash of beginning subfield is compared, and obtains subfield comparison result.
In view of field comparison result is inconsistent, then at least one in subfield comparison result is less consistent, sub- word The section inconsistent corresponding subfield to be verified of comparison result is error data section, is determined so as to realize error data Position.Specifically, it is determined that the corresponding subfield to be verified of subfield comparison result less consistent, as error data Section, obtains data check as a result, data check result may include the error data section.By comparing the son of subfield to be verified The subfield cryptographic Hash of field cryptographic Hash and original sub word section, according to son to be verified less consistent in subfield comparison result The accurate positionin to error data may be implemented in field, improves data check efficiency.
In one embodiment, according to subfield to be verified less consistent in subfield comparison result, gone out After wrong data segment, further includes: obtain the corresponding initial data section of error data section;By error data section and initial data section into Row bit bit check, obtains bit check results.
It is positioned to error data, after obtaining error data section, bit further can be carried out to error data Verification, to determine the bit specifically to malfunction.Specifically, after obtaining error data section, it is corresponding to obtain error data section Initial data section, initial data section can be determined from original sub word section.Error data section and initial data section are subjected to bit Error data section and initial data section specifically can be carried out bit and compared one by one, obtain bit check results by bit check, By bit check results, the faulty bit position in error data segment can be accurately determined.Compared to data to be verified and to The data length of check field, error data section and initial data section is shorter, and error data section and initial data section are compared Special position compares one by one may insure checking treatment efficiency, and realize the accurate positioning to faulty bit position.
In one embodiment, as shown in figure 4, providing a kind of data verification method, comprising:
Step S401: type of service belonging to data to be verified is determined;
Step S402: inquiry business type corresponds to preset data check priority;
Step S403: according to data check priority, data to be verified and the corresponding initial data of data to be verified are obtained.
Initial data is the corresponding source data of data to be verified, and data to be verified are compared with corresponding initial data Compared with to realize the data check processing for treating verification data.In the present embodiment, according to determining data check priority, obtain Data to be verified and the corresponding initial data of data to be verified, specifically from calibration database server and original database server Extraction obtains.
Step S404: preset data check rule is inquired, and data check section is determined according to data check rule;
Step S405: according to data check section, field to be verified is extracted from data to be verified respectively, from initial data Extract original field.
Data check rule is for determining the data field verified, according to data to be verified and initial data Systematical difference belonging to respectively is preset.According to the data check section of data check regular drive, from respectively to school It tests in data and extracts field to be verified, original field is extracted from initial data.Field to be verified and original field are corresponding, original Field can be used as the benchmark field of field to be verified when checking treatment.
Step S406: the field cryptographic Hash of field more to be verified and the field cryptographic Hash of original field;
Step S407: when field comparison result is inconsistent, the data length of data to be verified is determined;
Step S408: preset verification data division rule is obtained;
Step S409: according to data length and verification data division rule, determine that the data of data to be verified split number;
Step S410: splitting number according to data, split field to be verified to obtain subfield to be verified respectively, will be original Field splits to obtain original sub word section.
In the present embodiment, comparing field cryptographic Hash includes: to obtain preset field hash function;According to field Hash letter Number, calculates separately the field cryptographic Hash of field to be verified and the field cryptographic Hash of original field;The field of field to be verified is breathed out The field cryptographic Hash of uncommon value and original field is compared, and obtains field comparison result.Wherein, field hash function is MD5.
When field comparison result is inconsistent, show that field to be verified is different with original field, i.e., data to be verified are corresponding Initial data it is different, field check results are that verification does not pass through.At this point it is possible to go out to unacceptable error data is verified Mispointing can specifically determine that data split number, split number according to the data and carry out field to be verified and original field It splits, and is compared according to subfield and the original sub word section to be verified after fractionation, it is quasi- so as to be carried out to error data Determine position.
Step S411: preset subfield hash function is obtained;
Step S412: according to subfield hash function, the subfield cryptographic Hash of subfield to be verified and original is calculated separately The subfield cryptographic Hash of subfield;
Step S413: the subfield cryptographic Hash of the subfield cryptographic Hash of subfield to be verified and original sub word section is compared Compared with obtaining subfield comparison result;
Step S414: according to subfield to be verified less consistent in subfield comparison result, obtaining error data section, Data check result includes error data section.
After obtaining subfield and original sub word section to be verified, calculate and the subfield cryptographic Hash of subfield more to be verified and The subfield cryptographic Hash of original sub word section obtains data check according to subfield comparison result as a result, to realize to be verified The rapid verification of data, and carry out accurately error data and position.
Step S415: bit bit check is carried out to error data section, obtains bit check results, data check result packet Include bit check results.
It is positioned to error data, after obtaining error data section, bit further can be carried out to error data Verification, to determine the bit specifically to malfunction.Specifically, carrying out bit bit check to error data section includes: acquisition error number According to the corresponding initial data section of section;Error data section and initial data section are subjected to bit bit check, obtain bit bit check knot Fruit.
It should be understood that although each step in the flow chart of Fig. 2-4 is successively shown according to the instruction of arrow, These steps are not that the inevitable sequence according to arrow instruction successively executes.Unless expressly stating otherwise herein, these steps Execution there is no stringent sequences to limit, these steps can execute in other order.Moreover, at least one in Fig. 2-4 Part steps may include that perhaps these sub-steps of multiple stages or stage are not necessarily in synchronization to multiple sub-steps Completion is executed, but can be executed at different times, the execution sequence in these sub-steps or stage is also not necessarily successively It carries out, but can be at least part of the sub-step or stage of other steps or other steps in turn or alternately It executes.
In one embodiment, as shown in figure 5, providing a kind of data calibration device, comprising: data acquisition module 501, Check field determining module 503, field comparison module 505, field comparison module 507 and check results obtain module 509, In:
Data acquisition module 501, for obtaining data to be verified and the corresponding initial data of data to be verified;
Check field determining module 503, for according to preset data check rule, determine in data to be verified to school Test the original field in field and initial data;
Field comparison module 505, for the field cryptographic Hash of field more to be verified and the field cryptographic Hash of original field, When field comparison result is inconsistent, determine that the corresponding data of data to be verified split number according to the data length of data to be verified Mesh;
Field comparison module 507 splits field to be verified to obtain son to be verified respectively for splitting number according to data Field splits original field to obtain original sub word section;
Check results obtain module 509, the subfield cryptographic Hash and original sub word section for subfield more to be verified Subfield cryptographic Hash obtains data check result according to subfield comparison result.
In one embodiment, data acquisition module 501 includes type of service determination unit, priority determining unit sum number According to acquiring unit, in which: type of service determination unit, for determining type of service belonging to data to be verified;Priority determines Unit corresponds to preset data check priority for inquiry business type;Data capture unit, for excellent according to data check First grade obtains data to be verified and the corresponding initial data of data to be verified.
In one embodiment, check field determining module 503 includes that verification section determination unit and check field extract list Member, in which: verification section determination unit for inquiring preset data check rule, and determines data according to data check rule Verify section;Check field extraction unit, for field to be verified to be extracted from data to be verified respectively according to data check section, Original field is extracted from initial data.
In one embodiment, field comparison module 505 include field hash function unit, field Hash processing unit and Field comparing unit, in which: field hash function unit, for obtaining preset field hash function;The processing of field Hash is single Member, for calculating separately the field cryptographic Hash of field to be verified and the field cryptographic Hash of original field according to field hash function; Field comparing unit is obtained for the field cryptographic Hash of the field cryptographic Hash of field to be verified and original field to be compared Field comparison result.
In one embodiment, field comparison module 505 include data length determination unit, division rule acquiring unit and Data split cells, in which: data length determination unit, for determining number to be verified when field comparison result is inconsistent According to data length;Division rule acquiring unit, for obtaining preset verification data division rule;Data split cells is used According to data length and verification data division rule, determine that the data of data to be verified split number.
In one embodiment, it includes subfield hash function unit, at subfield Hash that check results, which obtain module 509, Manage unit, subfield comparing unit and error data positioning unit, in which: subfield hash function unit, it is default for obtaining Subfield hash function;Subfield Hash processing unit, for calculating separately sub- word to be verified according to subfield hash function The subfield cryptographic Hash of section and the subfield cryptographic Hash of original sub word section;Subfield comparing unit is used for subfield to be verified Subfield cryptographic Hash and the subfield cryptographic Hash of original sub word section be compared, obtain subfield comparison result;Error data Positioning unit, for obtaining error data section, data according to subfield to be verified less consistent in subfield comparison result Check results include error data section.
It in one embodiment, further include that initial data section obtains module and bit correction verification module, in which: initial data Section obtains module, for obtaining the corresponding initial data section of error data section;Bit correction verification module is used for error data section Bit bit check is carried out with initial data section, obtains bit check results.
Specific about data calibration device limits the restriction that may refer to above for data verification method, herein not It repeats again.Modules in above-mentioned data calibration device can be realized fully or partially through software, hardware and combinations thereof.On Stating each module can be embedded in the form of hardware or independently of in the processor in computer equipment, can also store in a software form In memory in computer equipment, the corresponding operation of the above modules is executed in order to which processor calls.
In one embodiment, a kind of computer equipment is provided, which can be server, internal junction Composition can be as shown in Figure 6.The computer equipment includes processor, memory and the network interface connected by system bus. Wherein, the processor of the computer equipment is for providing calculating and control ability.The memory of the computer equipment includes non-easy The property lost storage medium, built-in storage.The non-volatile memory medium is stored with operating system and computer program.The built-in storage Operation for operating system and computer program in non-volatile memory medium provides environment.The network of the computer equipment connects Mouth with external terminal by network connection for being communicated.To realize a kind of data school when the computer program is executed by processor Proved recipe method.
It will be understood by those skilled in the art that structure shown in Fig. 6, only part relevant to application scheme is tied The block diagram of structure does not constitute the restriction for the computer equipment being applied thereon to application scheme, specific computer equipment It may include perhaps combining certain components or with different component layouts than more or fewer components as shown in the figure.
In one embodiment, a kind of computer equipment, including memory and processor are provided, which is stored with Computer program, the processor perform the steps of when executing computer program
Obtain data to be verified and the corresponding initial data of data to be verified;
According to preset data check rule, determine original in the field and initial data to be verified in data to be verified Field;
The field cryptographic Hash of field more to be verified and the field cryptographic Hash of original field, when field comparison result is inconsistent When, determine that the corresponding data of data to be verified split number according to the data length of data to be verified;
Number is split according to data, splits to obtain subfield to be verified respectively by field to be verified, original field is split Obtain original sub word section;
The subfield cryptographic Hash of subfield more to be verified and the subfield cryptographic Hash of original sub word section, according to subfield ratio Relatively result obtains data check result.
In one embodiment, it is also performed the steps of when processor executes computer program and determines data institute to be verified The type of service of category;Inquiry business type corresponds to preset data check priority;According to data check priority, obtain to school Test data and the corresponding initial data of data to be verified.
In one embodiment, inquiry preset data school is also performed the steps of when processor executes computer program Rule is tested, and data check section is determined according to data check rule;According to data check section, extracted from data to be verified respectively Field to be verified extracts original field from initial data.
In one embodiment, it is also performed the steps of when processor executes computer program and obtains preset field Kazakhstan Uncommon function;According to field hash function, the field cryptographic Hash of field to be verified and the field cryptographic Hash of original field are calculated separately; The field cryptographic Hash of the field cryptographic Hash of field to be verified and original field is compared, field comparison result is obtained.
In one embodiment, it also performs the steps of when processor executes computer program when field comparison result is When inconsistent, the data length of data to be verified is determined;Obtain preset verification data division rule;According to data length and school Data division rule is tested, determines that the data of data to be verified split number.
In one embodiment, it is also performed the steps of when processor executes computer program and obtains preset subfield Hash function;According to subfield hash function, the subfield cryptographic Hash and original sub word section of subfield to be verified are calculated separately Subfield cryptographic Hash;The subfield cryptographic Hash of the subfield cryptographic Hash of subfield to be verified and original sub word section is compared, Obtain subfield comparison result;According to subfield to be verified less consistent in subfield comparison result, error data is obtained Section, data check result includes error data section.
In one embodiment, it is right that acquisition error data section is also performed the steps of when processor executes computer program The initial data section answered;Error data section and initial data section are subjected to bit bit check, obtain bit check results.
In one embodiment, a kind of computer readable storage medium is provided, computer program is stored thereon with, is calculated Machine program performs the steps of when being executed by processor
Obtain data to be verified and the corresponding initial data of data to be verified;
According to preset data check rule, determine original in the field and initial data to be verified in data to be verified Field;
The field cryptographic Hash of field more to be verified and the field cryptographic Hash of original field, when field comparison result is inconsistent When, determine that the corresponding data of data to be verified split number according to the data length of data to be verified;
Number is split according to data, splits to obtain subfield to be verified respectively by field to be verified, original field is split Obtain original sub word section;
The subfield cryptographic Hash of subfield more to be verified and the subfield cryptographic Hash of original sub word section, according to subfield ratio Relatively result obtains data check result.
In one embodiment, it is also performed the steps of when computer program is executed by processor and determines data to be verified Affiliated type of service;Inquiry business type corresponds to preset data check priority;According to data check priority, obtain to Verify data and the corresponding initial data of data to be verified.
In one embodiment, inquiry preset data are also performed the steps of when computer program is executed by processor Verification rule, and data check section is determined according to data check rule;According to data check section, mentioned from data to be verified respectively Field to be verified is taken, original field is extracted from initial data.
In one embodiment, it is also performed the steps of when computer program is executed by processor and obtains preset field Hash function;According to field hash function, the field cryptographic Hash of field to be verified and the field Hash of original field are calculated separately Value;The field cryptographic Hash of the field cryptographic Hash of field to be verified and original field is compared, field comparison result is obtained.
In one embodiment, it also performs the steps of when computer program is executed by processor when field comparison result When being inconsistent, the data length of data to be verified is determined;Obtain preset verification data division rule;According to data length and Data division rule is verified, determines that the data of data to be verified split number.
In one embodiment, it is also performed the steps of when computer program is executed by processor and obtains preset sub- word Section hash function;According to subfield hash function, the subfield cryptographic Hash and original sub word section of subfield to be verified are calculated separately Subfield cryptographic Hash;The subfield cryptographic Hash of the subfield cryptographic Hash of subfield to be verified and original sub word section is compared Compared with obtaining subfield comparison result;According to subfield to be verified less consistent in subfield comparison result, error number is obtained According to section, data check result includes error data section.
In one embodiment, it is also performed the steps of when computer program is executed by processor and obtains error data section Corresponding initial data section;Error data section and initial data section are subjected to bit bit check, obtain bit check results.
Those of ordinary skill in the art will appreciate that realizing all or part of the process in above-described embodiment method, being can be with Relevant hardware is instructed to complete by computer program, the computer program can be stored in a non-volatile computer In read/write memory medium, the computer program is when being executed, it may include such as the process of the embodiment of above-mentioned each method.Wherein, To any reference of memory, storage, database or other media used in each embodiment provided herein, Including non-volatile and/or volatile memory.Nonvolatile memory may include read-only memory (ROM), programming ROM (PROM), electrically programmable ROM (EPROM), electrically erasable ROM (EEPROM) or flash memory.Volatile memory may include Random access memory (RAM) or external cache.By way of illustration and not limitation, RAM is available in many forms, Such as static state RAM (SRAM), dynamic ram (DRAM), synchronous dram (SDRAM), double data rate sdram (DDRSDRAM), enhancing Type SDRAM (ESDRAM), synchronization link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic ram (DRDRAM) and memory bus dynamic ram (RDRAM) etc..
Each technical characteristic of above embodiments can be combined arbitrarily, for simplicity of description, not to above-described embodiment In each technical characteristic it is all possible combination be all described, as long as however, the combination of these technical characteristics be not present lance Shield all should be considered as described in this specification.
The several embodiments of the application above described embodiment only expresses, the description thereof is more specific and detailed, but simultaneously It cannot therefore be construed as limiting the scope of the patent.It should be pointed out that coming for those of ordinary skill in the art It says, without departing from the concept of this application, various modifications and improvements can be made, these belong to the protection of the application Range.Therefore, the scope of protection shall be subject to the appended claims for the application patent.

Claims (10)

1. a kind of data verification method, which comprises
Obtain data to be verified and the corresponding initial data of the data to be verified;
According to preset data check rule, determine in the field to be verified and the initial data in the data to be verified Original field;
Compare the field cryptographic Hash of the field to be verified and the field cryptographic Hash of the original field, when field comparison result not When consistent, determine that the corresponding data of the data to be verified split number according to the data length of the data to be verified;
Number is split according to the data, splits the field to be verified to obtain subfield to be verified respectively, it will be described original Field splits to obtain original sub word section;
Compare the subfield cryptographic Hash of the subfield to be verified and the subfield cryptographic Hash of the original sub word section, according to sub- word Section comparison result obtains data check result.
2. the method according to claim 1, wherein acquisition data to be verified and the data pair to be verified The initial data answered includes:
Determine type of service belonging to data to be verified;
It inquires the type of service and corresponds to preset data check priority;
According to the data check priority, the data to be verified and the corresponding initial data of the data to be verified are obtained.
3. the method according to claim 1, wherein described according to preset data check rule, determine described in The original field in field to be verified and the initial data in data to be verified includes:
Preset data check rule is inquired, and data check section is determined according to the data check rule;
According to the data check section, field to be verified is extracted from the data to be verified respectively, from the initial data Extract original field.
4. the method according to claim 1, wherein the field cryptographic Hash of the field to be verified and The field cryptographic Hash of the original field includes:
Obtain preset field hash function;
According to the field hash function, the field cryptographic Hash of the field to be verified and the word of the original field are calculated separately Section cryptographic Hash;
The field cryptographic Hash of the field cryptographic Hash of the field to be verified and the original field is compared, field ratio is obtained Relatively result.
5. according to the method described in claim 4, it is characterized in that, described when field comparison result is inconsistent, according to described The data length of data to be verified determines that the corresponding data of the data to be verified split number and include:
When the field comparison result is inconsistent, the data length of the data to be verified is determined;
Obtain preset verification data division rule;
According to the data length and the verification data division rule, determine that the data of the data to be verified split number.
6. according to claim 1 to method described in 5 any one, which is characterized in that the subfield to be verified Subfield cryptographic Hash and the original sub word section subfield cryptographic Hash, data check knot is obtained according to subfield comparison result Fruit includes:
Obtain preset subfield hash function;
According to the subfield hash function, calculate separately the subfield to be verified subfield cryptographic Hash and the original son The subfield cryptographic Hash of field;
The subfield cryptographic Hash of the subfield cryptographic Hash of the subfield to be verified and the original sub word section is compared, is obtained To subfield comparison result;
According to subfield to be verified less consistent in the subfield comparison result, error data section, data check are obtained It as a result include the error data section.
7. according to the method described in claim 6, it is characterized in that, it is described according to ratio in the subfield comparison result less Consistent subfield to be verified, after obtaining error data section, further includes:
Obtain the corresponding initial data section of the error data section;
The error data section and the initial data section are subjected to bit bit check, obtain bit check results.
8. a kind of data calibration device, which is characterized in that described device includes:
Data acquisition module, for obtaining data to be verified and the corresponding initial data of the data to be verified;
Check field determining module, for determining to be verified in the data to be verified according to preset data check rule Original field in field and the initial data;
Field comparison module, for the field cryptographic Hash of the field to be verified and the field Hash of the original field Value determines that the data to be verified are corresponding according to the data length of the data to be verified when field comparison result is inconsistent Data split number;
Field splits module, for splitting number according to the data, splits to obtain by the field to be verified respectively to be verified Subfield splits the original field to obtain original sub word section;
Check results obtain module, the subfield cryptographic Hash and the original sub word section for the subfield to be verified Subfield cryptographic Hash obtains data check result according to subfield comparison result.
9. a kind of computer equipment, including memory and processor, the memory are stored with computer program, feature exists In the step of processor realizes any one of claims 1 to 7 the method when executing the computer program.
10. a kind of computer readable storage medium, is stored thereon with computer program, which is characterized in that the computer program The step of method described in any one of claims 1 to 7 is realized when being executed by processor.
CN201910521896.0A 2019-06-17 2019-06-17 Data verification method and device, computer equipment and storage medium Active CN110377454B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910521896.0A CN110377454B (en) 2019-06-17 2019-06-17 Data verification method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910521896.0A CN110377454B (en) 2019-06-17 2019-06-17 Data verification method and device, computer equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110377454A true CN110377454A (en) 2019-10-25
CN110377454B CN110377454B (en) 2023-02-07

Family

ID=68248985

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910521896.0A Active CN110377454B (en) 2019-06-17 2019-06-17 Data verification method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110377454B (en)

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110781134A (en) * 2019-10-30 2020-02-11 泰康保险集团股份有限公司 Data processing method and device, computer storage medium and electronic equipment
CN111046043A (en) * 2019-12-11 2020-04-21 北京西骏数据科技股份有限公司 Method for quickly and accurately checking database table
CN111339508A (en) * 2020-02-28 2020-06-26 北京达佳互联信息技术有限公司 Shared password analysis method and device, electronic equipment and storage medium
CN112559547A (en) * 2020-12-24 2021-03-26 北京百度网讯科技有限公司 Method and device for determining consistency among multiple storage object copies
CN113672634A (en) * 2021-08-30 2021-11-19 中国平安人寿保险股份有限公司 Policy data verification method, device, equipment and storage medium
CN114567485A (en) * 2022-03-01 2022-05-31 北京全路通信信号研究设计院集团有限公司 Data processing method, device, equipment and storage medium
CN115221245A (en) * 2022-07-14 2022-10-21 广州纳指数据智能科技有限公司 Intelligent data acquisition synchronization method, system and equipment
CN115760006A (en) * 2022-11-29 2023-03-07 联仁健康医疗大数据科技股份有限公司 Data correction method, device, electronic equipment and storage medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702639A (en) * 2009-11-23 2010-05-05 成都市华为赛门铁克科技有限公司 Check value calculation method and device of cyclic redundancy check
CN102325167A (en) * 2011-07-21 2012-01-18 杭州微元科技有限公司 Verifying method for network file transmission
WO2016082277A1 (en) * 2014-11-28 2016-06-02 安科智慧城市技术(中国)有限公司 Video authentication method and apparatus
US20190163606A1 (en) * 2016-11-15 2019-05-30 Jrd Communication (Shenzhen) Ltd Checking system, checking method and compiling method of system start-up file

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101702639A (en) * 2009-11-23 2010-05-05 成都市华为赛门铁克科技有限公司 Check value calculation method and device of cyclic redundancy check
CN102325167A (en) * 2011-07-21 2012-01-18 杭州微元科技有限公司 Verifying method for network file transmission
WO2016082277A1 (en) * 2014-11-28 2016-06-02 安科智慧城市技术(中国)有限公司 Video authentication method and apparatus
US20190163606A1 (en) * 2016-11-15 2019-05-30 Jrd Communication (Shenzhen) Ltd Checking system, checking method and compiling method of system start-up file

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110781134A (en) * 2019-10-30 2020-02-11 泰康保险集团股份有限公司 Data processing method and device, computer storage medium and electronic equipment
CN111046043A (en) * 2019-12-11 2020-04-21 北京西骏数据科技股份有限公司 Method for quickly and accurately checking database table
CN111339508A (en) * 2020-02-28 2020-06-26 北京达佳互联信息技术有限公司 Shared password analysis method and device, electronic equipment and storage medium
CN112559547A (en) * 2020-12-24 2021-03-26 北京百度网讯科技有限公司 Method and device for determining consistency among multiple storage object copies
CN112559547B (en) * 2020-12-24 2023-09-19 北京百度网讯科技有限公司 Method and device for determining consistency among multiple storage object copies
CN113672634A (en) * 2021-08-30 2021-11-19 中国平安人寿保险股份有限公司 Policy data verification method, device, equipment and storage medium
CN114567485A (en) * 2022-03-01 2022-05-31 北京全路通信信号研究设计院集团有限公司 Data processing method, device, equipment and storage medium
CN115221245A (en) * 2022-07-14 2022-10-21 广州纳指数据智能科技有限公司 Intelligent data acquisition synchronization method, system and equipment
CN115760006A (en) * 2022-11-29 2023-03-07 联仁健康医疗大数据科技股份有限公司 Data correction method, device, electronic equipment and storage medium
CN115760006B (en) * 2022-11-29 2023-07-18 联仁健康医疗大数据科技股份有限公司 Data correction method, device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN110377454B (en) 2023-02-07

Similar Documents

Publication Publication Date Title
CN110377454A (en) Data verification method, device, computer equipment and storage medium
CN110730107B (en) Test data generation method and device, computer equipment and storage medium
CN109446068A (en) Interface test method, device, computer equipment and storage medium
CN108874661B (en) Test mapping relation library generation method and device, computer equipment and storage medium
CN108874678B (en) Automatic testing method and device for intelligent program
CN110704312B (en) Method, device, computer equipment and storage medium for pressure test
CN109144519A (en) Generation method, device, computer equipment and the storage medium of upgrade package
CN104866293A (en) Method and device for extending Android application program function
CN110502224A (en) Interface analogy method, device and computer equipment based on HTTP request
CN108776642B (en) Test report generation method and device, computer equipment and storage medium
CN114385485A (en) Interface test method, device, equipment and storage medium
CN111949553B (en) Rule engine-based scene case testing method and device
CN111159025A (en) Application program interface testing method and device, computer equipment and storage medium
US20100251024A1 (en) System and Method for Generating Test Job Control Language Files
CN110633213B (en) Unit test method, unit test device, computer equipment and storage medium
CN116069635A (en) SOC system testing method and device, computer equipment and storage medium
CN111061610B (en) Generation method and device of cluster system performance test report and computer equipment
CN110737426B (en) Program block creating method, program block creating device, computer equipment and storage medium
CN110347609B (en) Method and device for testing blockchain software
CN112416781A (en) Cross-system interface determination method and device, computer equipment and storage medium
CN109240906B (en) Database configuration information adaptation method and device, computer equipment and storage medium
CN116911406B (en) Wind control model deployment method and device, computer equipment and storage medium
CN106598857A (en) Method and device for testing electronic equipment based on automatic testing tool
CN111367816B (en) Mobile test method and device, computer equipment and storage medium
CN116662210B (en) Interface regression testing method, device and application

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant