CN110968888B - Data processing method and device - Google Patents

Data processing method and device Download PDF

Info

Publication number
CN110968888B
CN110968888B CN201811159854.9A CN201811159854A CN110968888B CN 110968888 B CN110968888 B CN 110968888B CN 201811159854 A CN201811159854 A CN 201811159854A CN 110968888 B CN110968888 B CN 110968888B
Authority
CN
China
Prior art keywords
data
verified
service module
verification result
service
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201811159854.9A
Other languages
Chinese (zh)
Other versions
CN110968888A (en
Inventor
王晓宇
田�健
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Gridsum Technology Co Ltd
Original Assignee
Beijing Gridsum Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Gridsum Technology Co Ltd filed Critical Beijing Gridsum Technology Co Ltd
Priority to CN201811159854.9A priority Critical patent/CN110968888B/en
Publication of CN110968888A publication Critical patent/CN110968888A/en
Application granted granted Critical
Publication of CN110968888B publication Critical patent/CN110968888B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6227Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database where protection concerns the structure of data, e.g. records, types, queries
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Abstract

The invention discloses a data processing method and a device, after acquiring data to be checked related to a service module obtained after a user operates the service module, checking the data to be checked based on a preset rule to obtain a check result of the data to be checked, if the check result of the data to be checked indicates that normal operation can still be executed based on the data to be checked, indicating the operation corresponding to the data to be checked to be completed on the service module, if the check result of the data to be checked indicates that normal operation cannot be executed based on the data to be checked, controlling the service module to forbid the execution of the operation corresponding to the data to be checked, so that when certain operation is executed on the service module, the operation is not immediately completed, but when the normal operation can still be executed based on the data to be checked is verified, indicating the service module to complete the operation corresponding to the data to be checked, thus, the corresponding operation can still be executed on the service model, thereby preventing the service module from being used normally after certain operations are performed on the service module.

Description

Data processing method and device
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a data processing method and apparatus.
Background
Currently, user behavior is controlled through rights management, such as limiting user operations on a service module with a certain service type, for example, limiting operations on service modules of service types such as interfaces, navigations, and resources, where the resources are controls, views, and the like required for forming a page indicated by navigation.
Under the authority management, a user can only operate the service model which specifies that the user has the authority, and the operation which can be performed is also limited by the authority management, such as modifying or deleting a navigation, but after the navigation is modified or deleted, the service module related to the navigation can not be normally accessed, which is a problem of the authority data of the authority management corresponding to the navigation.
Disclosure of Invention
In view of the foregoing problems, the present invention is provided to provide a data processing method and apparatus for verifying data to be verified obtained based on operations performed by rights management, so as to complete performing operations corresponding to the data to be verified on a service module when the verification passes, thereby preventing the data from being used after performing certain operations on the service module. The technical scheme is as follows:
the invention provides a data processing method, which comprises the following steps:
acquiring data to be verified, wherein the data to be verified is data which is obtained after a user operates a service module and is related to the service module;
verifying the data to be verified based on a preset rule to obtain a verification result of the data to be verified;
if the verification result of the data to be verified indicates that normal operation can still be executed based on the data to be verified, indicating that the operation corresponding to the data to be verified is completed on the service module;
and if the verification result of the data to be verified shows that normal operation cannot be executed based on the data to be verified, controlling the service module to forbid execution of the operation corresponding to the data to be verified.
Preferably, the verifying the data to be verified based on the preset rule, and obtaining a verification result of the data to be verified includes:
selecting a field check rule matched with the service module from preset check rules according to the service type corresponding to the service module;
based on the field verification rule, verifying the data to be verified to obtain a field verification result in the verification result;
and/or
Selecting a service verification rule matched with the service module from preset verification rules according to the service type corresponding to the service module;
and writing the data to be verified into a data structure corresponding to the service module, and verifying the data relationship among all the data in the data structure based on the service verification rule to obtain a service verification result in the verification result.
Preferably, the method further comprises: and if the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified, modifying original data in the data structure corresponding to the business module based on the data to be verified to obtain the modified data structure corresponding to the business module.
Preferably, the method further comprises: if the verification result of the data to be verified indicates that normal operation can still be executed based on the data to be verified, sending a synchronization request to a second server through a communication interface of a first server, wherein the first server is a server for verifying the data to be verified based on a preset rule;
and if the synchronous response sent by the second server is received through the communication interface, synchronizing the data to be verified into the second server so as to verify the data to be verified again through the second server, and storing the data to be verified by the second server when the verification result obtained by the second server shows that the data to be verified can still execute normal operation.
Preferably, if the verification result of the data to be verified indicates that normal operation can still be performed based on the data to be verified, sending the synchronization request to the second server through the communication interface of the first server includes:
and if the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified and the data to be verified still exists, sending a synchronization request to the second server through the communication interface of the first server.
Preferably, the verifying the data to be verified based on the preset rule, and obtaining a verification result of the data to be verified includes:
if the fact that the user has the operation authority on the business module is determined, verifying the data to be verified based on a preset rule to obtain a verification result of the data to be verified;
the method further comprises the following steps: and if the user does not have the operation authority to the service module, controlling the service module to forbid executing the operation corresponding to the data to be verified.
The present invention also provides a data processing apparatus, the apparatus comprising:
the system comprises an acquisition unit, a verification unit and a verification unit, wherein the acquisition unit is used for acquiring data to be verified, and the data to be verified is data which is obtained after a user operates a service module and is related to the service module;
the verification unit is used for verifying the data to be verified based on a preset rule to obtain a verification result of the data to be verified;
and the control unit is used for indicating the business module to complete the operation corresponding to the data to be verified if the verification result of the data to be verified indicates that the normal operation can still be executed based on the data to be verified, and controlling the business module to forbid the execution of the operation corresponding to the data to be verified if the verification result of the data to be verified indicates that the normal operation cannot be executed based on the data to be verified.
Preferably, the check unit is configured to select a field check rule matching the service module from preset check rules according to the service type corresponding to the service module;
based on the field verification rule, verifying the data to be verified to obtain a field verification result in the verification result;
and/or
Selecting a service verification rule matched with the service module from preset verification rules according to the service type corresponding to the service module;
and writing the data to be verified into a data structure corresponding to the service module, and verifying the data relationship among all the data in the data structure based on the service verification rule to obtain a service verification result in the verification result.
The invention also provides a storage medium having a program stored thereon, which when executed by a processor implements the data processing method described above.
The invention also provides a processor, which is used for running the program, and the program executes the data processing method when running.
By the technical scheme, the data processing method and the device provided by the invention verify the data to be verified based on the preset rule after acquiring the data to be verified related to the service module obtained after the service module is operated by a user, obtain the verification result of the data to be verified, instruct the service module to complete the operation corresponding to the data to be verified if the verification result of the data to be verified indicates that the normal operation can still be executed based on the data to be verified, control the service module to prohibit the execution of the operation corresponding to the data to be verified if the verification result of the data to be verified indicates that the normal operation can not be executed based on the data to be verified, so that the operation is not completed immediately when a certain operation is executed on the service module, but the operation corresponding to the data to be verified is instructed to be completed on the service module only if the normal operation can still be executed based on the data to be verified, therefore, the business model can still normally operate after corresponding operations are performed on the business model, and the business module is prevented from being normally used after certain operations are performed on the business module.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
fig. 1 shows a flow chart of a data processing method provided by an exemplary embodiment of the present disclosure;
FIG. 2 illustrates a flow chart of another data processing method provided by an exemplary embodiment of the present disclosure;
FIG. 3 illustrates a flow chart of yet another data processing method provided by an exemplary embodiment of the present disclosure;
fig. 4 shows a schematic structural diagram of a data processing apparatus provided by an exemplary embodiment of the present disclosure;
FIG. 5 shows a schematic block diagram of another data processing apparatus provided by an exemplary embodiment of the present disclosure;
fig. 6 shows a schematic structural diagram of still another data processing apparatus provided in an exemplary embodiment of the present disclosure.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Referring to fig. 1, which shows a flowchart of a data processing method provided by an exemplary embodiment of the present disclosure, the method may include the following steps:
101: and acquiring data to be checked, wherein the data to be checked is data which is obtained after a user operates the service module and is related to the service module.
It can be understood that: the service module may be a module with different service types, such as an interface, navigation, and resource, and for any service type, the operation performed by the user on the service module includes, but is not limited to: the modification operation on the service module, the deletion operation on the service module, the addition operation on the service module, and the like are respectively described below by taking the modification operation on the service module, the deletion operation on the service module, and the addition operation on the service module as examples, where the data to be verified obtained by any one of the operations may be different:
for example, the data to be verified acquired after the modification operation is performed on the service module may be: the rest data of the business module or the data modified by the modification operation; the data to be verified obtained after the deletion operation is performed on the service module may be: the rest data of the business module or the data deleted by the deletion operation; the data to be verified obtained after the adding operation is performed on the service module may be: and the data added in the service module or the data combined by the added data and the original data.
102: and verifying the data to be verified based on the preset rule to obtain a verification result of the data to be verified, so as to verify whether the data to be verified meets the requirement of the preset rule or not through the preset rule.
In this embodiment, one obtaining manner of the preset rule is as follows: taking a check rule input by a user as a preset rule; the other acquisition mode is as follows: and selecting a preset rule corresponding to the service type of the service module from the preset rule base, namely setting the preset rule in advance based on the service type of the service module, so that after a certain service module is operated, the corresponding preset rule can be searched from the preset rule base according to the service type of the service module.
Further, the preset rules in the preset rule base correspond to the operation types of the service modules in addition to the service types of the service modules, for example, for deletion operation and addition operation of the same service module, each operation type corresponds to at least one preset rule, so that the corresponding preset rules can be searched from the preset rule base according to the service types of the service modules and the current operation types.
In this embodiment, the preset rule of a service module may include, but is not limited to: the field check rule and/or the service check rule correspondingly checks the data to be checked based on the preset rule, and the process of obtaining the check result of the data to be checked is as follows:
selecting a field check rule matched with the service module from preset check rules according to the service type corresponding to the service module; based on the field verification rule, verifying the data to be verified to obtain a field verification result in the verification result;
and/or
And selecting a service verification rule matched with the service module from preset verification rules according to the service type corresponding to the service module, writing data to be verified into a data structure corresponding to the service module, and verifying the data relationship among all the data in the data structure based on the service verification rule to obtain a service verification result in the verification result.
That is to say, in this embodiment, the data to be checked may be checked based on at least one of a field check rule and a service check rule, where the field check rule is used to check the field content of the data to be checked, for example, for a service module whose service type is a resource type, the corresponding field check rule is used to check: whether the name of the service module is repeated, whether a character string and/or a Uniform Resource Locator (URL) meet a regular expression rule and the like, if the name meets the field verification result obtained by regulation, the fact that the data to be verified meet the requirement of the field verification rule is indicated, and if the name does not meet the requirement of the field verification rule, the fact that the obtained field verification result indicates that the data to be verified do not meet the requirement of the field verification rule is indicated.
The service check rule is to check the service logic of the service module, and the point that the check is different from the field check rule is that: before the service verification rule is carried out, data to be verified need to be written into a data structure of the service module, and then the data relationship between all pieces of data in the data structure is verified based on the service verification rule, namely the data relationship between the data to be verified and original data in the data structure is verified, so that whether all pieces of data in the data structure meet service logic requirements or not is determined. For example, for a service module whose service type is a navigation type, a corresponding service verification rule is used for verifying: whether each piece of data in the data structure can form a tree structure, the hierarchy of the tree structure does not exceed a preset hierarchy (such as three levels), and data corresponding to one sub node in the sub nodes connected with the root node in the tree structure belongs to view data, so that navigation can present an interface.
If the service module is verified through one rule of the field verification rule and the service verification rule, if the verification result corresponding to the adopted rule shows that the adopted rule meets the requirement, the verification result of the data to be verified shows that the data to be verified meets the requirement of a preset rule; if the field check rule and the service check rule are used for checking the service module, if the field check result and the service check result both indicate that the data to be checked meet the requirements, the check result of the data to be checked indicates that the data to be checked meet the requirements of the preset rule, otherwise, the check result of the data to be checked indicates that the data to be checked do not meet the requirements of the preset rule.
The points to be explained here are: the writing of the data to be verified into the data structure corresponding to the service module is simulated to be written into the data structure corresponding to the service module, but not really stored into the data structure, that is, the writing does not modify the original data in the data structure of the service module, for example, the data relationship between the data content of the original data and the original data is not changed.
103: and if the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified, indicating that the operation corresponding to the data to be verified is completed on the service module.
It can be understood that: if the verification result of the verification data indicates that the data to be verified meets the requirements of the preset rules, it indicates that the service module and the service module associated with the service module can be normally used after the service module is operated, which means that the verification result of the data to be verified indicates that normal operation can still be performed based on the data to be verified, at this time, the service module can be controlled to complete the operation corresponding to the data to be verified, that is, the operation performed on the service module when the data to be verified is obtained, so-called that normal operation can still be performed based on the data to be verified is: after the operation is performed on the service module, the service module and the service module related to the service module can be normally used.
104: and if the verification result of the data to be verified shows that the normal operation cannot be executed based on the data to be verified, the control service module prohibits the execution of the operation corresponding to the data to be verified.
It can be understood that: if the verification result of the verification data indicates that the to-be-verified data does not meet the requirement of the preset rule, the service module and/or the service module associated with the service module cannot be normally used after the service module is operated, so that the verification result of the to-be-verified data indicates that normal operation cannot be performed based on the to-be-verified data, and at the moment, the service module is prohibited from executing the operation corresponding to the to-be-verified data, so that the service module and/or the service module associated with the service module cannot be normally used after the operation is performed.
It can be known from the above technical solutions that, after data to be verified related to a service module obtained after a user operates the service module is obtained, the data to be verified is verified based on a preset rule to obtain a verification result of the data to be verified, if the verification result of the data to be verified indicates that normal operation can still be performed based on the data to be verified, the operation corresponding to the data to be verified is instructed to be completed to the service module, if the verification result of the data to be verified indicates that normal operation cannot be performed based on the data to be verified, the operation corresponding to the data to be verified is controlled to be prohibited from being performed by the service module, so that when a certain operation is performed to the service module, the operation corresponding to the data to be verified is not immediately completed, but when it is verified that normal operation can still be performed based on the data to be verified, the operation corresponding to the service module is instructed to be completed, so that normal operation can still be performed to the service module, thereby preventing the service module from being used normally after certain operations are performed on the service module.
Referring to fig. 2, which shows a flowchart of another data processing method provided by an exemplary embodiment of the present disclosure, the method may include the following steps:
201: and acquiring data to be checked, wherein the data to be checked is data which is obtained after a user operates the service module and is related to the service module.
202: and verifying the data to be verified based on the preset rule to obtain a verification result of the data to be verified, so as to verify whether the data to be verified meets the requirement of the preset rule or not through the preset rule.
203: and if the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified, indicating that the operation corresponding to the data to be verified is completed on the service module.
204: and if the verification result of the data to be verified indicates that normal operation can still be executed based on the data to be verified, modifying original data in the data structure corresponding to the business module based on the data to be verified to obtain a data structure corresponding to the modified business module, so that each piece of data in the data structure corresponding to the business module is data which is required to be possessed after the operation is executed on the business module.
In this embodiment, the method for modifying the original data in the data structure includes: at least one of modifying data content, adding data to be verified to a data structure, modifying data relationships between data, and the like, which needs to be modified depends on operations and which content the data to be verified includes, and the obtained data structure corresponding to the modified service module at least needs to meet the requirements that: the data relationship among the data is required to meet the requirements of the business check rule, and other requirements are not described in this embodiment one by one.
205: and if the verification result of the data to be verified shows that the normal operation cannot be executed based on the data to be verified, the control service module prohibits the execution of the operation corresponding to the data to be verified.
In this embodiment, the steps 201 to 203 and the step 205: similar to the above steps 101 to 104, this embodiment will not be described again.
According to the technical scheme, when the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified, original data in the data structure corresponding to the business module are modified based on the data to be verified to obtain the data structure corresponding to the modified business module, so that each piece of data in the data structure corresponding to the business module is data which is required to be possessed after the operation is executed on the business module, and the modified data structure can be called when the business module is used again.
Referring to fig. 3, which shows a flowchart of still another data processing method provided by an exemplary embodiment of the present disclosure, the method may include the following steps:
301: and acquiring data to be checked, wherein the data to be checked is data which is obtained after a user operates the service module and is related to the service module.
302: and verifying the data to be verified based on the preset rule to obtain a verification result of the data to be verified, so as to verify whether the data to be verified meets the requirement of the preset rule or not through the preset rule.
303: and if the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified, indicating that the operation corresponding to the data to be verified is completed on the service module.
304: and if the verification result of the data to be verified indicates that normal operation can still be executed based on the data to be verified, sending a synchronization request to a second server through a communication interface of a first server, wherein the first server is a server for verifying the data to be verified based on a preset rule.
If the verification result of the data to be verified indicates that normal operation can still be performed based on the data to be verified, the data of the service module stored in the other server needs to be modified, and for this purpose, a synchronization request may be sent to the other server (e.g., the second server), so that the data corresponding to the service module in the first server and the second server are consistent.
However, sometimes a user withdraws an operation after performing the operation on a certain service module, and when the operation is withdrawn, data corresponding to the service module in the first server is changed into data before performing the operation, so that it is necessary to determine whether the data to be checked exists when sending a synchronization request to the second server, where one way of determining whether the data to be checked exists is: and determining whether the data state of the data to be verified is a withdrawal state, if so, indicating that the data to be verified does not exist, and if not, indicating that the data to be verified exists.
305: and if the synchronous response sent by the second server is received through the communication interface, synchronizing the data to be verified into the second server so as to verify the data to be verified again through the second server, and storing the data to be verified by the second server when the verification result obtained by the second server shows that the data to be verified can still execute normal operation.
That is to say, when the second server receives the data to be verified, the second server does not directly store the data to be verified, but verifies the data to be verified again, so that the reliability of the data to be verified can be improved. The second server needs to modify original data in the data structure corresponding to the service module based on the data to be verified when storing the data to be verified, and for a specific process, reference is made to relevant descriptions in the above method embodiment, which is not described further in this embodiment.
306: and if the verification result of the data to be verified shows that the normal operation cannot be executed based on the data to be verified, the control service module prohibits the execution of the operation corresponding to the data to be verified.
In this embodiment, the steps 301 to 303 and the step 306: similar to the above steps 101 to 104, this embodiment will not be described again.
According to the technical scheme, the data corresponding to the same service module in the multiple servers can be kept consistent in a data synchronization mode, and any second server can check the data to be checked again after receiving the data to be checked so as to check whether the data to be checked can operate normally or not, so that the reliability of the data to be checked is improved.
In addition, for all the above method embodiments, the authority of the user needs to be determined before the data to be verified is verified, and if it is determined that the user has the operation authority for the service module, it indicates that the user can perform the operation on the service module, and at this time, the data to be verified is triggered to be verified based on the preset rule, so as to obtain the verification result of the data to be verified. If it is determined that the user does not have the operation authority for the service module, it indicates that the user cannot perform the operation on the service module, and at this time, the data processing method disclosed in this embodiment controls the service module to prohibit the execution of the operation corresponding to the data to be verified. The setting of the operation authority may be determined according to actual requirements, and this embodiment is not limited.
Corresponding to the above method embodiments, an exemplary embodiment of the present disclosure further provides a data processing apparatus, whose structure is shown in fig. 4, and may include: an acquisition unit 11, a verification unit 12 and a control unit 13.
The obtaining unit 11 is configured to obtain data to be verified, where the data to be verified is data related to a service module obtained after a user operates the service module, and for the service module, please refer to the above method embodiment for a description of an operation performed on the service module and the data to be verified.
The verifying unit 12 is configured to verify the data to be verified based on a preset rule, so as to obtain a verification result of the data to be verified. In this embodiment, one obtaining manner of the preset rule is as follows: taking a check rule input by a user as a preset rule; the other acquisition mode is as follows: and selecting a preset rule corresponding to the service type of the service module from the preset rule base, namely setting the preset rule in advance based on the service type of the service module, so that after a certain service module is operated, the corresponding preset rule can be searched from the preset rule base according to the service type of the service module.
Further, the preset rules in the preset rule base correspond to the operation types of the service modules in addition to the service types of the service modules, for example, for deletion operation and addition operation of the same service module, each operation type corresponds to at least one preset rule, so that the corresponding preset rules can be searched from the preset rule base according to the service types of the service modules and the current operation types.
In this embodiment, the preset rule of a service module may include, but is not limited to: the field check rule and/or the service check rule correspondingly checks the data to be checked based on the preset rule, and the process of obtaining the check result of the data to be checked is as follows:
selecting a field check rule matched with the service module from preset check rules according to the service type corresponding to the service module; based on the field verification rule, verifying the data to be verified to obtain a field verification result in the verification result;
and/or
And selecting a service verification rule matched with the service module from preset verification rules according to the service type corresponding to the service module, writing data to be verified into a data structure corresponding to the service module, and verifying the data relationship among all the data in the data structure based on the service verification rule to obtain a service verification result in the verification result.
For the specific description of the field check rule and the service check rule, please refer to the method embodiment, which will not be further described in this embodiment.
The control unit 13 is configured to instruct the service module to complete an operation corresponding to the data to be verified if the verification result of the data to be verified indicates that the normal operation can still be performed based on the data to be verified, and to control the service module to prohibit the operation corresponding to the data to be verified from being performed if the verification result of the data to be verified indicates that the normal operation cannot be performed based on the data to be verified.
It can be understood that: if the verification result of the verification data indicates that the data to be verified meets the requirements of the preset rules, it indicates that the service module and the service module associated with the service module can be normally used after the service module is operated, which means that the verification result of the data to be verified indicates that normal operation can still be performed based on the data to be verified, at this time, the service module can be controlled to complete the operation corresponding to the data to be verified, that is, the operation performed on the service module when the data to be verified is obtained, so-called that normal operation can still be performed based on the data to be verified is: after the operation is performed on the service module, the service module and the service module related to the service module can be normally used.
If the verification result of the verification data indicates that the to-be-verified data does not meet the requirement of the preset rule, the service module and/or the service module associated with the service module cannot be normally used after the service module is operated, so that the verification result of the to-be-verified data indicates that normal operation cannot be performed based on the to-be-verified data, and at the moment, the service module is prohibited from executing the operation corresponding to the to-be-verified data, so that the service module and/or the service module associated with the service module cannot be normally used after the operation is performed.
It can be known from the above technical solutions that, after data to be verified related to a service module obtained after a user operates the service module is obtained, the data to be verified is verified based on a preset rule to obtain a verification result of the data to be verified, if the verification result of the data to be verified indicates that normal operation can still be performed based on the data to be verified, the operation corresponding to the data to be verified is instructed to be completed to the service module, if the verification result of the data to be verified indicates that normal operation cannot be performed based on the data to be verified, the operation corresponding to the data to be verified is controlled to be prohibited from being performed by the service module, so that when a certain operation is performed to the service module, the operation corresponding to the data to be verified is not immediately completed, but when it is verified that normal operation can still be performed based on the data to be verified, the operation corresponding to the service module is instructed to be completed, so that normal operation can still be performed to the service module, thereby preventing the service module from being used normally after certain operations are performed on the service module.
Referring to fig. 5, which shows a structure of another data processing apparatus provided in an exemplary embodiment of the present disclosure, on the basis of fig. 4, the data processing apparatus may further include: and the modifying unit 14 is configured to modify, if the verification result of the data to be verified indicates that the normal operation can still be performed based on the data to be verified, original data in the data structure corresponding to the service module based on the data to be verified to obtain a data structure corresponding to the modified service module, so that each piece of data in the data structure corresponding to the service module is data that should be possessed after the operation is performed on the service module.
In this embodiment, the method for modifying the original data in the data structure includes: at least one of modifying data content, adding data to be verified to a data structure, modifying data relationships between data, and the like, which needs to be modified depends on operations and which content the data to be verified includes, and the obtained data structure corresponding to the modified service module at least needs to meet the requirements that: the data relationship among the data is required to meet the requirements of the business check rule, and other requirements are not described in this embodiment one by one.
In addition, the data processing apparatus provided in this embodiment may also be used to implement synchronization of data to be verified, as shown in fig. 6, the data processing apparatus may further include, on the basis of fig. 4: and a sending unit 15, configured to send a synchronization request to a second server through a communication interface of a first server if a verification result of the data to be verified indicates that normal operation can still be performed based on the data to be verified, where the first server is a server that verifies the data to be verified based on a preset rule.
The sending unit 15 is further configured to, if a synchronization response sent by the second server is received through the communication interface, synchronize the data to be verified into the second server, so that the data to be verified is verified again by the second server, and store the data to be verified by the second server when a verification result obtained by the second server indicates that the data to be verified can still perform normal operation.
However, sometimes a user withdraws an operation after performing the operation on a certain service module, and when the operation is withdrawn, data corresponding to the service module in the first server is changed into data before performing the operation, so that the sending unit 15 needs to determine whether the data to be verified exists when sending a synchronization request to the second server, where one way of determining whether the data to be verified exists is: and determining whether the data state of the data to be verified is a withdrawal state, if so, indicating that the data to be verified does not exist, and if not, indicating that the data to be verified exists.
For all the above embodiments of the apparatus, the verifying unit 12 is configured to, if it is determined that the user has the operation right to the service module, verify the data to be verified based on the preset rule, and obtain a verification result of the data to be verified. The control unit 13 is further configured to control the service module to prohibit execution of an operation corresponding to the data to be verified if it is determined that the user does not have the operation authority for the service module.
That is to say, the authority of the user needs to be determined before the data to be verified is verified, and if it is determined that the user has the operation authority for the service module, it indicates that the user can perform the operation on the service module, and at this time, the verification unit 12 verifies the data to be verified based on the preset rule, so as to obtain the verification result of the data to be verified. If it is determined that the user does not have the operation authority for the service module, it indicates that the user cannot perform the operation on the service module, and at this time, the control unit 13 controls the service module to prohibit the execution of the operation corresponding to the data to be verified.
The data processing device comprises a processor and a memory, the acquisition unit 11, the verification unit 12, the control unit 13 and the like are stored in the memory as program units, and the processor executes the program units stored in the memory to realize corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to be one or more, and the kernel parameters are adjusted to prevent the kernel from being used normally after certain operations are performed on the business module.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
An embodiment of the present invention provides a storage medium on which a program is stored, the program implementing the data processing method when executed by a processor.
The embodiment of the invention provides a processor, which is used for running a program, wherein the data processing method is executed when the program runs.
The embodiment of the invention provides equipment, which comprises a processor, a memory and a program which is stored on the memory and can run on the processor, wherein the processor executes the program and realizes the following steps:
acquiring data to be verified, wherein the data to be verified is data which is obtained after a user operates a service module and is related to the service module;
verifying the data to be verified based on a preset rule to obtain a verification result of the data to be verified;
if the verification result of the data to be verified indicates that normal operation can still be executed based on the data to be verified, indicating that the operation corresponding to the data to be verified is completed on the service module;
and if the verification result of the data to be verified shows that normal operation cannot be executed based on the data to be verified, controlling the service module to forbid execution of the operation corresponding to the data to be verified.
Preferably, the verifying the data to be verified based on the preset rule, and obtaining a verification result of the data to be verified includes:
selecting a field check rule matched with the service module from preset check rules according to the service type corresponding to the service module;
based on the field verification rule, verifying the data to be verified to obtain a field verification result in the verification result;
and/or
Selecting a service verification rule matched with the service module from preset verification rules according to the service type corresponding to the service module;
and writing the data to be verified into a data structure corresponding to the service module, and verifying the data relationship among all the data in the data structure based on the service verification rule to obtain a service verification result in the verification result.
Preferably, the processor executes the program to further implement the following steps: and if the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified, modifying original data in the data structure corresponding to the business module based on the data to be verified to obtain the modified data structure corresponding to the business module.
Preferably, the processor executes the program to further implement the following steps: if the verification result of the data to be verified indicates that normal operation can still be executed based on the data to be verified, sending a synchronization request to a second server through a communication interface of a first server, wherein the first server is a server for verifying the data to be verified based on a preset rule;
and if the synchronous response sent by the second server is received through the communication interface, synchronizing the data to be verified into the second server so as to verify the data to be verified again through the second server, and storing the data to be verified by the second server when the verification result obtained by the second server shows that the data to be verified can still execute normal operation.
Preferably, if the verification result of the data to be verified indicates that normal operation can still be performed based on the data to be verified, sending the synchronization request to the second server through the communication interface of the first server includes:
and if the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified and the data to be verified still exists, sending a synchronization request to the second server through the communication interface of the first server.
Preferably, the verifying the data to be verified based on the preset rule, and obtaining a verification result of the data to be verified includes:
if the fact that the user has the operation authority on the business module is determined, verifying the data to be verified based on a preset rule to obtain a verification result of the data to be verified;
the processor executes the program and further realizes the following steps: and if the user does not have the operation authority to the service module, controlling the service module to forbid executing the operation corresponding to the data to be verified.
The device herein may be a server, a PC, a PAD, a mobile phone, etc.
The present application further provides a computer program product adapted to perform a program for initializing the following method steps when executed on a data processing device:
acquiring data to be verified, wherein the data to be verified is data which is obtained after a user operates a service module and is related to the service module;
verifying the data to be verified based on a preset rule to obtain a verification result of the data to be verified;
if the verification result of the data to be verified indicates that normal operation can still be executed based on the data to be verified, indicating that the operation corresponding to the data to be verified is completed on the service module;
and if the verification result of the data to be verified shows that normal operation cannot be executed based on the data to be verified, controlling the service module to forbid execution of the operation corresponding to the data to be verified.
Preferably, the verifying the data to be verified based on the preset rule, and obtaining a verification result of the data to be verified includes:
selecting a field check rule matched with the service module from preset check rules according to the service type corresponding to the service module;
based on the field verification rule, verifying the data to be verified to obtain a field verification result in the verification result;
and/or
Selecting a service verification rule matched with the service module from preset verification rules according to the service type corresponding to the service module;
and writing the data to be verified into a data structure corresponding to the service module, and verifying the data relationship among all the data in the data structure based on the service verification rule to obtain a service verification result in the verification result.
Preferably, the program, when executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: and if the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified, modifying original data in the data structure corresponding to the business module based on the data to be verified to obtain the modified data structure corresponding to the business module.
Preferably, the program, when executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: if the verification result of the data to be verified indicates that normal operation can still be executed based on the data to be verified, sending a synchronization request to a second server through a communication interface of a first server, wherein the first server is a server for verifying the data to be verified based on a preset rule;
and if the synchronous response sent by the second server is received through the communication interface, synchronizing the data to be verified into the second server so as to verify the data to be verified again through the second server, and storing the data to be verified by the second server when the verification result obtained by the second server shows that the data to be verified can still execute normal operation.
Preferably, if the verification result of the data to be verified indicates that normal operation can still be performed based on the data to be verified, sending the synchronization request to the second server through the communication interface of the first server includes:
and if the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified and the data to be verified still exists, sending a synchronization request to the second server through the communication interface of the first server.
Preferably, the verifying the data to be verified based on the preset rule, and obtaining a verification result of the data to be verified includes:
if the fact that the user has the operation authority on the business module is determined, verifying the data to be verified based on a preset rule to obtain a verification result of the data to be verified;
when executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: and if the user does not have the operation authority to the service module, controlling the service module to forbid executing the operation corresponding to the data to be verified.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (9)

1. A method of data processing, the method comprising:
acquiring data to be verified, wherein the data to be verified is data which is obtained after a user operates a service module and is related to the service module;
verifying the data to be verified based on a preset rule to obtain a verification result of the data to be verified;
if the verification result of the data to be verified indicates that normal operation can still be executed based on the data to be verified, indicating that the operation corresponding to the data to be verified is completed on the service module;
if the verification result of the data to be verified shows that normal operation cannot be executed based on the data to be verified, controlling the service module to forbid execution of operation corresponding to the data to be verified;
and if the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified, modifying original data in the data structure corresponding to the business module based on the data to be verified to obtain the modified data structure corresponding to the business module.
2. The method according to claim 1, wherein the verifying the data to be verified based on the preset rule, and obtaining the verification result of the data to be verified comprises:
selecting a field check rule matched with the service module from preset check rules according to the service type corresponding to the service module;
based on the field verification rule, verifying the data to be verified to obtain a field verification result in the verification result;
and/or
Selecting a service verification rule matched with the service module from preset verification rules according to the service type corresponding to the service module;
and writing the data to be verified into a data structure corresponding to the service module, and verifying the data relationship among all the data in the data structure based on the service verification rule to obtain a service verification result in the verification result.
3. The method of claim 1, further comprising: if the verification result of the data to be verified indicates that normal operation can still be executed based on the data to be verified, sending a synchronization request to a second server through a communication interface of a first server, wherein the first server is a server for verifying the data to be verified based on a preset rule;
and if the synchronous response sent by the second server is received through the communication interface, synchronizing the data to be verified into the second server so as to verify the data to be verified again through the second server, and storing the data to be verified by the second server when the verification result obtained by the second server shows that the data to be verified can still execute normal operation.
4. The method of claim 3, wherein if the verification result of the data to be verified indicates that normal operation can still be performed based on the data to be verified, sending a synchronization request to the second server through the communication interface of the first server comprises:
and if the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified and the data to be verified still exists, sending a synchronization request to the second server through the communication interface of the first server.
5. The method according to claim 1, wherein the verifying the data to be verified based on the preset rule, and obtaining the verification result of the data to be verified comprises:
if the fact that the user has the operation authority on the business module is determined, verifying the data to be verified based on a preset rule to obtain a verification result of the data to be verified;
the method further comprises the following steps: and if the user does not have the operation authority to the service module, controlling the service module to forbid executing the operation corresponding to the data to be verified.
6. A data processing apparatus, characterized in that the apparatus comprises:
the system comprises an acquisition unit, a verification unit and a verification unit, wherein the acquisition unit is used for acquiring data to be verified, and the data to be verified is data which is obtained after a user operates a service module and is related to the service module;
the verification unit is used for verifying the data to be verified based on a preset rule to obtain a verification result of the data to be verified;
the control unit is used for indicating the business module to complete the operation corresponding to the data to be verified if the verification result of the data to be verified indicates that the normal operation can still be executed based on the data to be verified, and controlling the business module to forbid the execution of the operation corresponding to the data to be verified if the verification result of the data to be verified indicates that the normal operation cannot be executed based on the data to be verified; and if the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified, modifying original data in the data structure corresponding to the business module based on the data to be verified to obtain the modified data structure corresponding to the business module.
7. The apparatus according to claim 6, wherein the checking unit is configured to select, according to a service type corresponding to the service module, a field checking rule matching the service module from preset checking rules;
based on the field verification rule, verifying the data to be verified to obtain a field verification result in the verification result;
and/or
Selecting a service verification rule matched with the service module from preset verification rules according to the service type corresponding to the service module;
and writing the data to be verified into a data structure corresponding to the service module, and verifying the data relationship among all the data in the data structure based on the service verification rule to obtain a service verification result in the verification result.
8. A storage medium, characterized in that the storage medium has stored thereon a program which, when executed by a processor, implements a data processing method according to any one of claims 1 to 5.
9. A processor for running a program which when run performs the data processing method of any one of claims 1 to 5.
CN201811159854.9A 2018-09-30 2018-09-30 Data processing method and device Active CN110968888B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811159854.9A CN110968888B (en) 2018-09-30 2018-09-30 Data processing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811159854.9A CN110968888B (en) 2018-09-30 2018-09-30 Data processing method and device

Publications (2)

Publication Number Publication Date
CN110968888A CN110968888A (en) 2020-04-07
CN110968888B true CN110968888B (en) 2022-03-08

Family

ID=70028976

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811159854.9A Active CN110968888B (en) 2018-09-30 2018-09-30 Data processing method and device

Country Status (1)

Country Link
CN (1) CN110968888B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112597143A (en) * 2020-12-28 2021-04-02 中国农业银行股份有限公司 Data detection method and device and electronic equipment

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007028407A1 (en) * 2005-09-06 2007-03-15 Nero Ag Method for signing a data package and signing apparatus
EP2318961A1 (en) * 2008-08-13 2011-05-11 Inria Institut National de Recherche en Informatique et en Automatique Computer checking tool
CN106991023A (en) * 2017-03-22 2017-07-28 深圳市彬讯科技有限公司 A kind of interface parameters method of calibration and component
CN107122368A (en) * 2016-02-25 2017-09-01 阿里巴巴集团控股有限公司 A kind of data verification method, device and electronic equipment
CN108345512A (en) * 2018-03-19 2018-07-31 重庆金融资产交易所有限责任公司 Data verification method, server and storage medium
CN108479061A (en) * 2018-03-29 2018-09-04 腾讯科技(深圳)有限公司 Operation data method of calibration, device, storage medium and the server of application

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110246308A1 (en) * 2010-04-02 2011-10-06 Segall Timothy R Method and system for managing interactive communications campaigns with preference management

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2007028407A1 (en) * 2005-09-06 2007-03-15 Nero Ag Method for signing a data package and signing apparatus
EP2318961A1 (en) * 2008-08-13 2011-05-11 Inria Institut National de Recherche en Informatique et en Automatique Computer checking tool
CN107122368A (en) * 2016-02-25 2017-09-01 阿里巴巴集团控股有限公司 A kind of data verification method, device and electronic equipment
CN106991023A (en) * 2017-03-22 2017-07-28 深圳市彬讯科技有限公司 A kind of interface parameters method of calibration and component
CN108345512A (en) * 2018-03-19 2018-07-31 重庆金融资产交易所有限责任公司 Data verification method, server and storage medium
CN108479061A (en) * 2018-03-29 2018-09-04 腾讯科技(深圳)有限公司 Operation data method of calibration, device, storage medium and the server of application

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
Big Data Applications Using Workflows for Data Parallel Computing;Jiangwu Wang et al;《IEEE》;20140416;11-21 *
基于Jaya的Web应用程序中数据校验的实现;李玉红 等;《承德医学院学报》;20080228;178-179 *

Also Published As

Publication number Publication date
CN110968888A (en) 2020-04-07

Similar Documents

Publication Publication Date Title
CN110058873B (en) Application page updating method, device, equipment and storage medium
CN106990960B (en) Code deployment method and device
CN106294113B (en) creation method and device based on programmable test service
CN106897342B (en) Data verification method and equipment
CN104113576A (en) Method and device for updating client
CN107580032B (en) Data processing method, device and equipment
CN111240892A (en) Data backup method and device
CN114091099A (en) Authority hierarchical control method, equipment and storage medium for business system
CN108572888B (en) Disk snapshot creating method and disk snapshot creating device
CN109284066B (en) Data processing method, device, equipment and system
CN106990974B (en) APP updating method and device and electronic equipment
CN110968888B (en) Data processing method and device
CN110968333B (en) Configuration information replacement method and device, machine-readable storage medium and processor
CN115039082A (en) Log writing method and device, electronic equipment and storage medium
CN112559118A (en) Application data migration method and device, electronic equipment and storage medium
CN111835513B (en) Method, device and equipment for updating certificate data
CN112738181B (en) Method, device and server for cluster external IP access
US9626371B2 (en) Attribute selectable file operation
CN110928860B (en) Data migration method and device
US9936015B2 (en) Method for building up a content management system
CN110321133B (en) H5 application deployment method and device
CN112861185A (en) Data automatic deformation transmission method based on Hive data warehouse
CN110969461B (en) Method and device for processing public number information, storage medium and processor
CN112749159A (en) Form generation method and device, electronic equipment and storage medium
CN111427863A (en) Data migration method, device and equipment based on domain model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant