CN112085611A - Asynchronous data verification method and device, electronic equipment and storage medium - Google Patents

Asynchronous data verification method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN112085611A
CN112085611A CN202010927404.0A CN202010927404A CN112085611A CN 112085611 A CN112085611 A CN 112085611A CN 202010927404 A CN202010927404 A CN 202010927404A CN 112085611 A CN112085611 A CN 112085611A
Authority
CN
China
Prior art keywords
data
verification
verified
checked
asynchronous
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202010927404.0A
Other languages
Chinese (zh)
Inventor
裴学云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Property and Casualty Insurance Company of China Ltd
Original Assignee
Ping An Property and Casualty Insurance Company of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Property and Casualty Insurance Company of China Ltd filed Critical Ping An Property and Casualty Insurance Company of China Ltd
Priority to CN202010927404.0A priority Critical patent/CN112085611A/en
Publication of CN112085611A publication Critical patent/CN112085611A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/08Insurance
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/215Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/54Interprogram communication
    • G06F9/546Message passing systems or structures, e.g. queues

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Software Systems (AREA)
  • Accounting & Taxation (AREA)
  • Finance (AREA)
  • Data Mining & Analysis (AREA)
  • Economics (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Quality & Reliability (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Computing Systems (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

The invention relates to the technical field of data processing, and discloses a data asynchronous verification method, which comprises the following steps: receiving data to be checked, and transmitting the data to be checked to a preset checking flow; performing modular splitting on the data to be checked in the checking process to generate corresponding sub data to be checked; transmitting the sub-to-be-verified data in the verification process to a preset message middleware to obtain asynchronous sub-to-be-verified data; and responding to the data verification rule in the verification process, executing the data verification of the asynchronous sub data to be verified, and obtaining a verification result. The invention also provides a data asynchronous verification device, electronic equipment and a storage medium. In addition, the invention also relates to a block chain technology, and the sub-to-be-verified data can be stored in the block chain. The invention can improve the verification efficiency of the data to be verified.

Description

Asynchronous data verification method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of data processing technologies, and in particular, to a data asynchronous verification method and apparatus, an electronic device, and a computer-readable storage medium.
Background
The data verification refers to a process of verifying and verifying the authenticity and/or legal compliance of data to be verified, and is widely applied to different industry fields, such as insurance industry verification and claim settlement, financial industry loan approval, and the like.
At present, data verification needs to verify the authenticity and legal compliance of data before the data verification is passed, and then the data and related data are subjected to rule verification, various data including a final state and an intermediate state need to be stored in the data verification process, which easily causes overlong process time and affects the verification efficiency of the data verification.
Disclosure of Invention
The invention provides a data asynchronous verification method, a data asynchronous verification device, electronic equipment and a computer readable storage medium, and mainly aims to realize data asynchronous verification so as to improve the verification efficiency of data verification.
In order to achieve the above object, the asynchronous data verification method provided by the present invention comprises:
receiving data to be checked, and transmitting the data to be checked to a preset checking flow;
performing modular splitting on the data to be checked in the checking process to generate corresponding sub data to be checked;
transmitting the sub-to-be-verified data in the verification process to a preset message middleware to obtain asynchronous sub-to-be-verified data;
and responding to the data verification rule in the verification process, executing the data verification of the asynchronous data to be verified, and obtaining a data verification result.
Optionally, the transmitting the data to be verified to a preset verification process includes:
acquiring a program running file packet of the data to be checked;
identifying interface parameters of the program operation file packet;
acquiring a port parameter of the verification process;
configuring a data transmission channel of the program operation file packet and the verification process according to the interface parameter and the port parameter;
and transmitting the data to be verified to the verification process based on the data transmission channel.
Optionally, the identifying interface parameters of the program running file package includes:
and inquiring the configuration file of the program operation file packet, identifying the interface address of the configuration file, reading the attribute parameter of the interface address, and obtaining the interface parameter of the program operation file packet.
Optionally, the performing modular splitting on the data to be verified in the verification process to generate corresponding sub data to be verified includes:
acquiring a data type contained in the data to be checked in the checking process;
clustering the data to be checked of the same data type to generate one or more clustered data sets to be checked;
and selecting legal clustering data to be checked from the clustering data set to be checked to generate corresponding sub data to be checked.
Optionally, the selecting legal clustering to-be-checked data from the clustering to-be-checked data set to generate corresponding sub-to-be-checked data includes:
and identifying whether the clustering data set to be checked contains illegal clustering data to be checked by using a preset sensitive word dictionary, if so, deleting the corresponding clustering data to be checked to generate the corresponding sub-data to be checked, and if not, directly generating the corresponding sub-data to be checked.
Optionally, the transmitting the sub data to be checked in the checking process to a preset message middleware to obtain the asynchronous sub data to be checked includes:
configuring a channel between the verification process and the message middleware, and creating an exchanger according to the channel;
creating a message queue between the verification process and message middleware;
binding the exchanger and the message queue to obtain a message transmission channel of the verification process and the message middleware;
and transmitting the sub data to be checked in the checking process to the message middleware according to the message transmission channel to obtain the asynchronous sub data to be checked.
Optionally, the performing, in response to the data verification rule in the verification process, data verification of the asynchronous data to be verified to obtain a verification result includes:
and configuring the data verification rules contained in the verification flow into a preset verification rule engine, and performing data verification on the asynchronous data to be verified based on the verification rule engine to obtain a verification result.
In order to solve the above problem, the present invention further provides an asynchronous data verification apparatus, including:
the transmission module is used for receiving data to be verified and transmitting the data to be verified to a preset verification process;
the splitting module is used for modularly splitting the data to be verified in the verification process to generate corresponding sub data to be verified;
the transmission module is further configured to transmit the sub data to be verified in the verification process to a preset message middleware to obtain asynchronous sub data to be verified;
and the verification module is used for responding to the data verification rule in the verification process, executing the data verification of the asynchronous sub data to be verified and obtaining a data verification result.
In order to solve the above problem, the present invention also provides an electronic device, including:
a memory storing at least one instruction; and
and the processor executes the instructions stored in the memory to realize the data asynchronous verification method.
In order to solve the above problem, the present invention further provides a computer-readable storage medium, which stores at least one instruction, where the at least one instruction is executed by a processor in an electronic device to implement the data asynchronous verification method described above.
In summary, in the embodiments of the present invention, first, data to be verified is transmitted to a preset verification process, so that a streamlined data verification can be implemented, the verification reliability of the data to be verified is ensured, and the data to be verified in the verification process is split in a modular manner to generate corresponding sub data to be verified, so that an asynchronous verification of the sub data to be verified can be implemented, and a problem that a data verification result has a long process due to the fact that the whole verification process needs to be completed is solved, thereby reducing the verification process time of the data to be verified; secondly, the sub data to be verified in the verification process is transmitted to the preset message middleware to obtain asynchronous sub data to be verified, so that the asynchronous processing of the data to be verified can be realized, the problem that the operation pressure is brought to a verification system due to the fact that different threads are required to be developed for verification is solved, and the verification efficiency of the data to be verified is improved; further, in the embodiment of the present invention, in response to the data verification rule in the verification process, the data verification of the asynchronous sub-to-be-verified data is executed to obtain a verification result, so that the problem of low data verification efficiency caused by different data verification rules in the verification process can be avoided. Therefore, the asynchronous data verification method provided by the invention can improve the verification efficiency of data verification.
Drawings
Fig. 1 is a schematic flow chart of a data asynchronous verification method according to an embodiment of the present invention;
FIG. 2 is a detailed flowchart of step S1 of the asynchronous data verification method provided in FIG. 1 according to an embodiment of the present invention;
FIG. 3 is a detailed flowchart of step S2 of the asynchronous data verification method provided in FIG. 1 according to an embodiment of the present invention;
FIG. 4 is a detailed flowchart illustrating the step S3 of the asynchronous data verification method provided in FIG. 1 according to an embodiment of the present invention;
FIG. 5 is a block diagram of an asynchronous data verification apparatus according to an embodiment of the present invention;
fig. 6 is a schematic internal structural diagram of an electronic device implementing a data asynchronous verification method according to an embodiment of the present invention;
the implementation, functional features and advantages of the objects of the present invention will be further explained with reference to the accompanying drawings.
Detailed Description
It should be understood that the specific embodiments described herein are merely illustrative of the invention and are not intended to limit the invention.
The execution subject of the data asynchronous verification method provided by the embodiment of the present application includes, but is not limited to, at least one of electronic devices, such as a server and a terminal, which can be configured to execute the method provided by the embodiment of the present application. In other words, the asynchronous data verification method may be performed by software or hardware installed in the terminal device or the server device, and the software may be a blockchain platform. The server includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like.
Referring to fig. 1, a flow diagram of a data asynchronous verification method according to an embodiment of the present invention is shown. In the embodiment of the present invention, the data asynchronous verification method includes:
and S1, receiving the data to be verified, and transmitting the data to be verified to a preset verification process.
In a preferred embodiment of the present invention, the data to be verified refers to data that needs to be verified, for example, the data to be verified is certified data, which includes: user profile data and underwriting data, wherein the user profile data includes, but is not limited to: name, age, occupation, contact details, and the like, the underwriting data including, but not limited to: the type of the verification, the amount of the verification, the period of the verification, the range of the verification and the like. Further, the preset verification process is a process for judging whether the data to be verified conform to the verification rule. Preferably, in the embodiment of the present invention, the verification process is compiled by using Java language.
In one embodiment of the present invention, the verification process is an underwriting process, which includes: pre-underwriting process, mid-underwriting process and post-underwriting process.
The pre-underwriting process comprises risk identification and risk estimation, and the risk estimation is carried out on the possible loss occurrence probability, the loss amount, the loss range, the loss degree and the like of the to-be-underwriting target by using probability statistical theory through risk identification means such as field investigation, questionnaire survey, financial analysis, historical data analysis, past year verification experience analysis and the like so as to determine whether to underwritten.
The in-process underwriting process comprises risk evaluation and selection risk management, the risk condition of the insurance target determining underwriting is subjected to risk evaluation through the pre-underwriting process, and the risk bearing capacity of the enterprise to be underwrited is combined, the risk degree of the insurance target is measured, so that what underwriting condition is adopted is determined, and what risk management is selected, for example, underwriting risk management.
The posterior verification process is used for comprehensively evaluating the prior verification and the posterior verification, and taking corresponding remedial measures according to laws for problems in the prior verification process and the posterior verification process, such as classification management according to the risk size and risk characteristics of the user or modification of verification policies, verification rules and the like according to claim settlement experience.
The prior underwriting process, the in-process underwriting process and the after-event underwriting process are equivalent to three underwriting systems, and the underwriting systems perform interaction of underwriting data through system windows.
Further, referring to fig. 2, the transmitting the data to be verified to a preset verification process includes:
s10, acquiring a program running file package of the data to be checked;
s11, identifying the interface parameters of the program operation file package;
s12, acquiring the port parameters of the verification process;
s13, configuring the program operation file packet and the data transmission channel of the verification process according to the interface parameters and the port parameters;
and S14, transmitting the data to be verified to the verification process based on the data transmission channel.
In an optional embodiment, the program running file package is a jar package, and is used for running the data to be verified in a corresponding verification system.
In an optional embodiment, the identifying interface parameters of the program execution file package includes: querying a configuration file of the program operation file package by using a preset query statement, identifying an interface address of the configuration file by using a preset identification instruction, reading an attribute parameter of the interface address by using a preset reading instruction, and obtaining the interface parameter of the program operation file package, wherein preferably, the preset query statement is an sql statement, the preset identification instruction is a post () instruction, the preset reading instruction is a get () instruction, and the attribute parameter includes: fields, ids, and key values, etc.
In an optional embodiment, the port parameters include: port number and url address and api interface.
In an optional embodiment, the data transmission channel of the program running file package and the verification process is compiled by using Java language.
In an optional embodiment, the data to be verified is transmitted to the verification process by using a data transmission tool.
Based on the preset verification process, the process data verification can be realized, and the verification reliability of the data to be verified is ensured.
And S2, performing modular splitting on the data to be checked in the checking process to generate corresponding sub data to be checked.
In a preferred embodiment of the present invention, the modular splitting refers to a process of splitting the data to be verified according to the data type to generate one or more sub data to be verified.
In detail, referring to fig. 3, the S2 includes:
s20, acquiring the data type contained in the data to be checked in the checking process;
s21, clustering the data to be checked corresponding to the same data type to generate one or more clustered data sets to be checked;
and S22, selecting legal clustering data to be checked from the clustering data set to be checked, and generating corresponding sub data to be checked.
Further, the data type is determined based on different data to be verified, for example, the data type of the above-mentioned underwriting data includes: a user basic information data type and an application information data type.
In a preferred embodiment, the clustering of the data to be verified corresponding to the same data type is performed by using a currently known k-means algorithm.
Further, the selecting legal clustering to-be-checked data from the clustering to-be-checked data set to generate one or more clustering to-be-checked data sets includes:
and identifying whether the clustering data set to be checked contains illegal clustering data to be checked by using a preset sensitive word dictionary, if so, deleting the corresponding clustering data to be checked to generate the corresponding sub-data to be checked, and if not, directly generating the corresponding sub-data to be checked.
In a preferred embodiment, the preset sensitive word dictionary is downloaded from a professional website, and contains a large number of illegal words, which refer to non-civilized words and words with inverse politeness, pornography, inverse action and inappropriate speech, for example, in the insurance industry, the illegal words include: earning thousands of days to return the book, and paying commission to fill money, etc.
In the embodiment of the invention, the data to be verified is split to generate the corresponding sub data to be verified, so that asynchronous verification of the sub data to be verified can be realized, mutual interference of the sub data to be verified is ensured during verification, and the verification efficiency of the data to be verified can be improved.
It should be emphasized that, in order to further ensure the privacy and security of the sub data to be verified, the sub data to be verified may also be stored in a node of a block chain.
And S3, transmitting the sub data to be checked in the checking process to a preset message middleware to obtain the asynchronous sub data to be checked.
In at least one embodiment of the present invention, the preset message middleware may be a rocktmq message middleware, and based on an interactive manner in which the message middleware is used as data to be verified, asynchronous processing of the data to be verified can be implemented, thereby relieving verification pressure brought to a subsequent verification process by the presence of a large amount of data to be verified, so as to improve verification efficiency of the data to be verified, that is, a direct communication connection does not need to be established between a producer producing the data to be verified and a consumer verifying the data to be verified through a Transmission Control Protocol (TCP), in the verification process, the producer issues sub data to be verified to enter a message queue of the rocktmq message middleware, the consumer verifies one or more sub data to be verified in the message queue, and then only receives the verified sub data to be verified, that is, the producer only manages the issuing of the sub data to be verified, the consumer only manages to obtain the sub-to-be-verified data required by the consumer.
In detail, referring to fig. 4, the S3 includes:
s30, configuring a Channel (Channel) between the verification process and the message middleware, and creating an exchanger according to the Channel;
s31, creating a message queue between the verification process and the message middleware;
s32, binding the exchanger and the message queue to obtain the verification process and the message transmission channel of the message middleware;
and S33, transmitting the sub-to-be-checked data in the checking process to the message middleware according to the message transmission channel to obtain the asynchronous sub-to-be-checked data.
The channel is used for identifying the data type of the subsequent sub data to be checked transmitted in the message transmission channel, the exchanger is used for supporting the increasing, deleting, modifying and checking of the sub data to be checked, and the message queue is used for storing the transmitted sub data to be checked.
In a preferred embodiment, the channel is configured using a conform function in the Java language, and the switch and the message queue are created by a void function in the Java language.
Based on the implementation means, the asynchronous processing of the data to be verified can be realized, and the verification efficiency of the data to be verified is improved. S4, responding to the data verification rule in the verification process, executing the data verification of the asynchronous sub data to be verified, and obtaining a verification result.
In at least one embodiment of the present invention, the data verification rule is generated based on different user requirements, for example, the criteria set by different users may be different for the underwriting rule, for example, the underwriting rule set by user a may not pass the policy whose insurance amount is less than 1 thousand, and the underwriting rule set by user B may not pass the policy whose insurance type is life accident insurance.
Further, since different data verification rules exist in the verification process, for example, the verification process includes a pre-verification rule, an in-flight verification rule and a post-verification rule, if the pre-verification rule, the in-flight verification rule and the post-verification rule are used to sequentially verify the generated asynchronous sub-verification data, the pre-verification rule passes, the in-flight verification rule does not pass, or the pre-verification rule and the in-flight verification rule pass, and the post-verification rule does not pass, which may cause the verification efficiency to be very low, in the embodiment of the present invention, the data verification rules included in the verification process are unified, that is, the data verification rules included in the verification process are configured in a preset verification rule engine, and the data to be verified of the asynchronous sub-verification data is verified based on the verification rule engine, and obtaining a verification result.
In an alternative embodiment, the verification rules engine is a currently known Drools rules engine.
Based on the verification of the asynchronous sub-verification in the verification rule engine, the problem of low data verification efficiency caused by different data verification rules in the verification process can be solved.
In summary, in the embodiments of the present invention, first, data to be verified is transmitted to a preset verification process, so that a streamlined data verification can be implemented, the verification reliability of the data to be verified is ensured, and the data to be verified in the verification process is split in a modular manner to generate corresponding sub data to be verified, so that an asynchronous verification of the sub data to be verified can be implemented, and a problem that a data verification result has a long process due to the fact that the whole verification process needs to be completed is solved, thereby reducing the verification process time of the data to be verified; secondly, the sub data to be verified in the verification process is transmitted to the preset message middleware to obtain asynchronous sub data to be verified, so that the asynchronous processing of the data to be verified can be realized, the problem that the operation pressure is brought to a verification system due to the fact that different threads are required to be developed for verification is solved, and the verification efficiency of the data to be verified is improved; further, in the embodiment of the present invention, in response to the data verification rule in the verification process, the data verification of the asynchronous sub-to-be-verified data is executed to obtain a verification result, so that the problem of low data verification efficiency caused by different data verification rules in the verification process can be avoided. Therefore, the asynchronous data verification method provided by the invention can improve the verification efficiency of data verification.
Fig. 5 is a functional block diagram of the asynchronous data verification apparatus according to the present invention.
The asynchronous data verification device 100 of the present invention can be installed in an electronic device. According to the implemented functions, the data asynchronous verification device may include a transmission module 101, a splitting module 102, and a verification module 103. A module according to the present invention, which may also be referred to as a unit, refers to a series of computer program segments that can be executed by a processor of an electronic device and that can perform a fixed function, and that are stored in a memory of the electronic device.
In the present embodiment, the functions regarding the respective modules/units are as follows:
the transmission module 101 is configured to receive data to be verified, and transmit the data to be verified to a preset verification process.
In a preferred embodiment of the present invention, the data to be verified refers to data that needs to be verified, for example, the data to be verified is certified data, which includes: user profile data and underwriting data, wherein the user profile data includes, but is not limited to: name, age, occupation, contact details, and the like, the underwriting data including, but not limited to: the type of the verification, the amount of the verification, the period of the verification, the range of the verification and the like. Further, the preset verification process is a process for judging whether the data to be verified conform to the verification rule. Preferably, in the embodiment of the present invention, the verification process is compiled by using Java language.
In one embodiment of the present invention, the verification process is an underwriting process, which includes: pre-underwriting process, mid-underwriting process and post-underwriting process.
The pre-underwriting process comprises risk identification and risk estimation, and the risk estimation is carried out on the possible loss occurrence probability, the loss amount, the loss range, the loss degree and the like of the to-be-underwriting target by using probability statistical theory through risk identification means such as field investigation, questionnaire survey, financial analysis, historical data analysis, past year verification experience analysis and the like so as to determine whether to underwritten.
The in-process underwriting process comprises risk evaluation and selection risk management, the risk condition of the insurance target determining underwriting is subjected to risk evaluation through the pre-underwriting process, and the risk bearing capacity of the enterprise to be underwrited is combined, the risk degree of the insurance target is measured, so that what underwriting condition is adopted is determined, and what risk management is selected, for example, underwriting risk management.
The posterior verification process is used for comprehensively evaluating the prior verification and the posterior verification, and taking corresponding remedial measures according to laws for problems in the prior verification process and the posterior verification process, such as classification management according to the risk size and risk characteristics of the user or modification of verification policies, verification rules and the like according to claim settlement experience.
The prior underwriting process, the in-process underwriting process and the after-event underwriting process are equivalent to three underwriting systems, and the underwriting systems perform interaction of underwriting data through system windows.
Further, the transmission module 101 transmits the data to be verified to a preset verification process by the following method:
step A, acquiring a program running file package of the data to be checked;
b, identifying interface parameters of the program operation file packet;
step C, acquiring a port parameter of the verification process;
d, configuring the program operation file packet and a data transmission channel of the verification process according to the interface parameters and the port parameters;
and E, transmitting the data to be verified to the verification process based on the data transmission channel.
In an optional embodiment, the program running file package is a jar package, and is used for running the data to be verified in a corresponding verification system.
In an optional embodiment, the identifying interface parameters of the program execution file package includes: querying a configuration file of the program operation file package by using a preset query statement, identifying an interface address of the configuration file by using a preset identification instruction, reading an attribute parameter of the interface address by using a preset reading instruction, and obtaining the interface parameter of the program operation file package, wherein preferably, the preset query statement is an sql statement, the preset identification instruction is a post () instruction, the preset reading instruction is a get () instruction, and the attribute parameter includes: fields, ids, and key values, etc.
In an optional embodiment, the port parameters include: port number and url address and api interface.
In an optional embodiment, the data transmission channel of the program running file package and the pre-verification process is compiled by using Java language.
In an optional embodiment, the data to be verified is transmitted to the verification process by using a data transmission tool.
Based on the preset verification process, the process data verification can be realized, and the verification reliability of the data to be verified is ensured.
The splitting module 102 is configured to perform modular splitting on the data to be verified in the verification process to generate corresponding sub data to be verified.
In a preferred embodiment of the present invention, the modular splitting refers to a process of splitting the data to be verified according to the data type to generate one or more sub data to be verified.
In detail, the splitting module 102 modularly splits the data to be verified in the verification process by the following method to generate corresponding sub data to be verified:
step a, acquiring a data type contained in data to be checked in the checking process;
b, clustering the data to be checked corresponding to the same data type to generate one or more clustered data sets to be checked;
and c, selecting legal clustering data to be checked from the clustering data set to be checked to generate corresponding sub data to be checked.
Further, the data type is determined based on different data to be verified, for example, the data type of the above-mentioned underwriting data includes: a user basic information data type and an application information data type.
In a preferred embodiment, the clustering of the data to be verified corresponding to the same data type is performed by using a currently known k-means algorithm.
Further, the selecting legal clustering to-be-checked data from the clustering to-be-checked data set to generate one or more clustering to-be-checked data sets includes:
and identifying whether the clustering data set to be checked contains illegal clustering data to be checked by using a preset sensitive word dictionary, if so, deleting the corresponding clustering data to be checked to generate the corresponding sub-data to be checked, and if not, directly generating the corresponding sub-data to be checked.
In a preferred embodiment, the preset sensitive word dictionary is downloaded from a professional website, and contains a large number of illegal words, which refer to non-civilized words and words with inverse politeness, pornography, inverse action and inappropriate speech, for example, in the insurance industry, the illegal words include: earning thousands of days to return the book, and paying commission to fill money, etc.
In the embodiment of the invention, the data to be verified is split to generate the corresponding sub data to be verified, so that asynchronous verification of the sub data to be verified can be realized, mutual interference of the sub data to be verified is ensured during verification, and the verification efficiency of the data to be verified can be improved.
It should be emphasized that, in order to further ensure the privacy and security of the sub data to be verified, the sub data to be verified may also be stored in a node of a block chain.
The transmission module 103 is further configured to transmit the sub data to be checked in the checking process to a preset message middleware, so as to obtain the asynchronous sub data to be checked.
In at least one embodiment of the present invention, the preset message middleware may be a rocktmq message middleware, and based on an interactive manner in which the message middleware is used as data to be verified, asynchronous processing of the data to be verified can be implemented, thereby relieving verification pressure brought to a subsequent verification process by the presence of a large amount of data to be verified, so as to improve verification efficiency of the data to be verified, that is, a direct communication connection does not need to be established between a producer producing the data to be verified and a consumer verifying the data to be verified through a Transmission Control Protocol (TCP), in the verification process, the producer issues sub data to be verified to enter a message queue of the rocktmq message middleware, the consumer verifies one or more sub data to be verified in the message queue, and then only receives the verified sub data to be verified, that is, the producer only manages the issuing of the sub data to be verified, the consumer only manages to obtain the sub-to-be-verified data required by the consumer.
In detail, the transmission module 103 transmits the sub data to be checked in the checking process to a preset message middleware by the following method to obtain the asynchronous sub data to be checked:
step I, configuring a Channel (Channel) between the verification process and the message middleware, and creating an exchanger according to the Channel;
step II, establishing a message queue between the verification process and the message middleware;
step III, binding the exchanger and the message queue to obtain a message transmission channel of the verification process and the message middleware;
and IV, transmitting the sub data to be checked in the checking process to the message middleware according to the message transmission channel to obtain the asynchronous sub data to be checked.
The channel is used for identifying the data type of the subsequent sub data to be checked transmitted in the message transmission channel, the exchanger is used for supporting the increasing, deleting, modifying and checking of the sub data to be checked, and the message queue is used for storing the transmitted sub data to be checked.
In a preferred embodiment, the channel is configured using a conform function in the Java language, and the switch and the message queue are created by a void function in the Java language.
Based on the implementation means, the asynchronous processing of the data to be verified can be realized, and the verification efficiency of the data to be verified is improved.
The verification module 104 is configured to respond to the data verification rule in the verification process, and execute data verification of the asynchronous sub-to-be-verified data to obtain a verification result.
In at least one embodiment of the present invention, the data verification rule is generated based on different user requirements, for example, the criteria set by different users may be different for the underwriting rule, for example, the underwriting rule set by user a may not pass the policy whose insurance amount is less than 1 thousand, and the underwriting rule set by user B may not pass the policy whose insurance type is life accident insurance.
Further, since different data verification rules exist in the verification process, for example, the verification process includes a pre-verification rule, an in-flight verification rule and a post-verification rule, if the pre-verification rule, the in-flight verification rule and the post-verification rule are used to sequentially verify the generated asynchronous sub-verification data, the pre-verification rule passes, the in-flight verification rule does not pass, or the pre-verification rule and the in-flight verification rule pass, and the post-verification rule does not pass, which may cause the verification efficiency to be very low, in the embodiment of the present invention, the data verification rules included in the verification process are unified, that is, the data verification rules included in the verification process are configured in a preset verification rule engine, and the data to be verified of the asynchronous sub-verification data is verified based on the verification rule engine, and obtaining a verification result.
In an alternative embodiment, the verification rules engine is a currently known Drools rules engine.
Based on the verification of the asynchronous sub-verification in the verification rule engine, the problem of low data verification efficiency caused by different data verification rules in the verification process can be solved.
In summary, in the embodiments of the present invention, first, data to be verified is transmitted to a preset verification process, so that a streamlined data verification can be implemented, the verification reliability of the data to be verified is ensured, and the data to be verified in the verification process is split in a modular manner to generate corresponding sub data to be verified, so that an asynchronous verification of the sub data to be verified can be implemented, and a problem that a data verification result has a long process due to the fact that the whole verification process needs to be completed is solved, thereby reducing the verification process time of the data to be verified; secondly, the sub data to be verified in the verification process is transmitted to the preset message middleware to obtain asynchronous sub data to be verified, so that the asynchronous processing of the data to be verified can be realized, the problem that the operation pressure is brought to a verification system due to the fact that different threads are required to be developed for verification is solved, and the verification efficiency of the data to be verified is improved; further, in the embodiment of the present invention, in response to the data verification rule in the verification process, the data verification of the asynchronous sub-to-be-verified data is executed to obtain a verification result, so that the problem of low data verification efficiency caused by different data verification rules in the verification process can be avoided. Therefore, the data asynchronous verification device provided by the invention can improve the verification efficiency of data verification.
Fig. 6 is a schematic structural diagram of an electronic device implementing the data asynchronous verification method according to the present invention.
The electronic device 1 may comprise a processor 10, a memory 11 and a bus, and may further comprise a computer program, such as a data asynchronous verification program 12, stored in the memory 11 and operable on the processor 10.
The memory 11 includes at least one type of readable storage medium, which includes flash memory, removable hard disk, multimedia card, card-type memory (e.g., SD or DX memory, etc.), magnetic memory, magnetic disk, optical disk, etc. The memory 11 may in some embodiments be an internal storage unit of the electronic device 1, such as a removable hard disk of the electronic device 1. The memory 11 may also be an external storage device of the electronic device 1 in other embodiments, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like, which are provided on the electronic device 1. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic device 1. The memory 11 may be used not only to store application software installed in the electronic device 1 and various types of data, such as codes for asynchronous verification of data, but also to temporarily store data that has been output or is to be output.
The processor 10 may be composed of an integrated circuit in some embodiments, for example, a single packaged integrated circuit, or may be composed of a plurality of integrated circuits packaged with the same or different functions, including one or more Central Processing Units (CPUs), microprocessors, digital Processing chips, graphics processors, and combinations of various control chips. The processor 10 is a Control Unit (Control Unit) of the electronic device, connects various components of the whole electronic device by using various interfaces and lines, and executes various functions and processes data of the electronic device 1 by running or executing programs or modules (for example, performing data asynchronous check, etc.) stored in the memory 11 and calling data stored in the memory 11.
The bus may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The bus may be divided into an address bus, a data bus, a control bus, etc. The bus is arranged to enable connection communication between the memory 11 and at least one processor 10 or the like.
Fig. 6 only shows an electronic device with components, and it will be understood by a person skilled in the art that the structure shown in fig. 6 does not constitute a limitation of the electronic device 1, and may comprise fewer or more components than shown, or a combination of certain components, or a different arrangement of components.
For example, although not shown, the electronic device 1 may further include a power supply (such as a battery) for supplying power to each component, and preferably, the power supply may be logically connected to the at least one processor 10 through a power management device, so as to implement functions of charge management, discharge management, power consumption management, and the like through the power management device. The power supply may also include any component of one or more dc or ac power sources, recharging devices, power failure detection circuitry, power converters or inverters, power status indicators, and the like. The electronic device 1 may further include various sensors, a bluetooth module, a Wi-Fi module, and the like, which are not described herein again.
Further, the electronic device 1 may further include a network interface, and optionally, the network interface may include a wired interface and/or a wireless interface (such as a WI-FI interface, a bluetooth interface, etc.), which are generally used for establishing a communication connection between the electronic device 1 and other electronic devices.
Optionally, the electronic device 1 may further comprise a user interface, which may be a Display (Display), an input unit (such as a Keyboard), and optionally a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch device, or the like. The display, which may also be referred to as a display screen or display unit, is suitable for displaying data processed in the electronic device 1 and for displaying a visualized user interface, among other things.
It is to be understood that the described embodiments are for purposes of illustration only and that the scope of the appended claims is not limited to such structures.
The asynchronous verification 12 of data stored by the memory 11 in the electronic device 1 is a combination of instructions that, when executed in the processor 10, enable:
receiving data to be checked, and transmitting the data to be checked to a preset checking flow;
performing modular splitting on the data to be checked in the checking process to generate corresponding sub data to be checked;
transmitting the sub-to-be-verified data in the verification process to a preset message middleware to obtain asynchronous sub-to-be-verified data;
and responding to the data verification rule in the verification process, executing the data verification of the asynchronous sub data to be verified, and obtaining a verification result.
Specifically, the specific implementation method of the processor 10 for the instruction may refer to the description of the relevant steps in the embodiment corresponding to fig. 1, which is not described herein again.
Further, the integrated modules/units of the electronic device 1, if implemented in the form of software functional units and sold or used as separate products, may be stored in a non-volatile computer-readable storage medium. The computer-readable medium may include: any entity or device capable of carrying said computer program code, recording medium, U-disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM).
In the embodiments provided in the present invention, it should be understood that the disclosed apparatus, device and method can be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is only one logical functional division, and other divisions may be realized in practice.
The modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
In addition, functional modules in the embodiments of the present invention may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, or in a form of hardware plus a software functional module.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential attributes thereof.
The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
The block chain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, a consensus mechanism, an encryption algorithm and the like. A block chain (Blockchain), which is essentially a decentralized database, is a series of data blocks associated by using a cryptographic method, and each data block contains data of a batch of network transactions, so as to verify the validity (anti-counterfeiting) of the data and generate a next block. The blockchain may include a blockchain underlying platform, a platform product service layer, an application service layer, and the like.
Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the system claims may also be implemented by one unit or means in software or hardware. The terms second, etc. are used to denote names, but not any particular order.
Finally, it should be noted that the above embodiments are only for illustrating the technical solutions of the present invention and not for limiting, and although the present invention is described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions of the present invention.

Claims (10)

1. A method for asynchronous verification of data, the method comprising:
receiving data to be checked, and transmitting the data to be checked to a preset checking flow;
performing modular splitting on the data to be checked in the checking process to generate corresponding sub data to be checked;
transmitting the sub-to-be-verified data in the verification process to a preset message middleware to obtain asynchronous sub-to-be-verified data;
and responding to the data verification rule in the verification process, executing the data verification of the asynchronous data to be verified, and obtaining a data verification result.
2. The asynchronous data verification method as claimed in claim 1, wherein the step of transmitting the data to be verified to a predetermined verification process comprises:
acquiring a program running file packet of the data to be checked;
identifying interface parameters of the program operation file packet;
acquiring a port parameter of the verification process;
configuring a data transmission channel of the program operation file packet and the verification process according to the interface parameter and the port parameter;
and transmitting the data to be verified to the verification process based on the data transmission channel.
3. The asynchronous data verification method of claim 2, wherein identifying the interface parameters of the package of program execution files comprises:
and inquiring the configuration file of the program operation file packet, identifying the interface address of the configuration file, reading the attribute parameter of the interface address, and obtaining the interface parameter of the program operation file packet.
4. The asynchronous data verification method of claim 1, wherein the modular splitting of the data to be verified in the verification process to generate corresponding sub-data to be verified comprises:
acquiring a data type contained in the data to be checked in the checking process;
clustering the data to be checked of the same data type to generate one or more clustered data sets to be checked;
and selecting legal clustering data to be checked from the clustering data set to be checked to generate corresponding sub data to be checked.
5. The asynchronous data verification method as claimed in claim 4, wherein said selecting legal clustered data to be verified from said clustered data set to be verified to generate corresponding sub-data to be verified comprises:
and identifying whether the clustering data set to be checked contains illegal clustering data to be checked by using a preset sensitive word dictionary, if so, deleting the corresponding clustering data to be checked to generate the corresponding sub-data to be checked, and if not, directly generating the corresponding sub-data to be checked.
6. The asynchronous data verification method of claim 1, wherein the step of transmitting the sub data to be verified in the verification process to a preset message middleware to obtain asynchronous sub data to be verified comprises:
configuring a channel between the verification process and the message middleware, and creating an exchanger according to the channel;
creating a message queue between the verification process and message middleware;
binding the exchanger and the message queue to obtain a message transmission channel of the verification process and the message middleware;
and transmitting the sub data to be checked in the checking process to the message middleware according to the message transmission channel to obtain the asynchronous sub data to be checked.
7. The asynchronous data verification method according to any one of claims 1 to 6, wherein the performing data verification of the asynchronous data to be verified to obtain a verification result in response to the data verification rule in the verification process comprises:
and configuring the data verification rules contained in the verification flow into a preset verification rule engine, and performing data verification on the asynchronous data to be verified based on the verification rule engine to obtain a verification result.
8. An apparatus for asynchronous verification of data, the apparatus comprising:
the transmission module is used for receiving data to be verified and transmitting the data to be verified to a preset verification process;
the splitting module is used for modularly splitting the data to be verified in the verification process to generate corresponding sub data to be verified;
the transmission module is further configured to transmit the sub data to be verified in the verification process to a preset message middleware to obtain asynchronous sub data to be verified;
and the verification module is used for responding to the data verification rule in the verification process, executing the data verification of the asynchronous sub data to be verified and obtaining a data verification result.
9. An electronic device, characterized in that the electronic device comprises:
at least one processor; and the number of the first and second groups,
a memory communicatively coupled to the at least one processor; wherein the content of the first and second substances,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform a method of asynchronous verification of data according to any of claims 1 to 7.
10. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out a method for asynchronous verification of data according to any one of claims 1 to 7.
CN202010927404.0A 2020-09-07 2020-09-07 Asynchronous data verification method and device, electronic equipment and storage medium Pending CN112085611A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010927404.0A CN112085611A (en) 2020-09-07 2020-09-07 Asynchronous data verification method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010927404.0A CN112085611A (en) 2020-09-07 2020-09-07 Asynchronous data verification method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN112085611A true CN112085611A (en) 2020-12-15

Family

ID=73732051

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010927404.0A Pending CN112085611A (en) 2020-09-07 2020-09-07 Asynchronous data verification method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112085611A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112579632A (en) * 2020-12-28 2021-03-30 中国建设银行股份有限公司 Data verification method, device, equipment and medium
CN113179333A (en) * 2021-06-30 2021-07-27 北京航空航天大学 File transmission and real-time computing system and method for block chain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106502992A (en) * 2016-11-10 2017-03-15 四川享宇金信金融服务外包有限公司 A kind of information intersects checking method and device
CN109669936A (en) * 2018-12-25 2019-04-23 福建南威软件有限公司 A kind of mass data quality report generation method based on polymerization model
CN109685669A (en) * 2018-12-11 2019-04-26 北京量子保科技有限公司 A kind of policy information data processing method and system
CN110069353A (en) * 2019-03-18 2019-07-30 中科恒运股份有限公司 Business asynchronous processing method and device
CN110457294A (en) * 2019-06-28 2019-11-15 阿里巴巴集团控股有限公司 A kind of data processing method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106502992A (en) * 2016-11-10 2017-03-15 四川享宇金信金融服务外包有限公司 A kind of information intersects checking method and device
CN109685669A (en) * 2018-12-11 2019-04-26 北京量子保科技有限公司 A kind of policy information data processing method and system
CN109669936A (en) * 2018-12-25 2019-04-23 福建南威软件有限公司 A kind of mass data quality report generation method based on polymerization model
CN110069353A (en) * 2019-03-18 2019-07-30 中科恒运股份有限公司 Business asynchronous processing method and device
CN110457294A (en) * 2019-06-28 2019-11-15 阿里巴巴集团控股有限公司 A kind of data processing method and device

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112579632A (en) * 2020-12-28 2021-03-30 中国建设银行股份有限公司 Data verification method, device, equipment and medium
CN113179333A (en) * 2021-06-30 2021-07-27 北京航空航天大学 File transmission and real-time computing system and method for block chain

Similar Documents

Publication Publication Date Title
CN112507936B (en) Image information auditing method and device, electronic equipment and readable storage medium
CN112541745A (en) User behavior data analysis method and device, electronic equipment and readable storage medium
CN112418798A (en) Information auditing method and device, electronic equipment and storage medium
CN113688923A (en) Intelligent order abnormity detection method and device, electronic equipment and storage medium
CN112417503A (en) Method and device for authorizing post authority, electronic equipment and storage medium
CN112115145A (en) Data acquisition method and device, electronic equipment and storage medium
CN114881616A (en) Business process execution method and device, electronic equipment and storage medium
CN112580079A (en) Authority configuration method and device, electronic equipment and readable storage medium
CN112085611A (en) Asynchronous data verification method and device, electronic equipment and storage medium
CN115081016A (en) Log desensitization method and device, electronic equipment and storage medium
CN114547696A (en) File desensitization method and device, electronic equipment and storage medium
CN112541640A (en) Resource authority management method and device, electronic equipment and computer storage medium
CN112182562A (en) Data auditing method and system in sandbox environment, electronic equipment and medium
CN114911479A (en) Interface generation method, device, equipment and storage medium based on configuration
CN114826725A (en) Data interaction method, device, equipment and storage medium
CN114722789A (en) Data report integration method and device, electronic equipment and storage medium
CN114036068A (en) Update detection method, device, equipment and storage medium based on privacy security
CN112686759A (en) Account checking monitoring method, device, equipment and medium
CN112667244A (en) Data verification method and device, electronic equipment and computer readable storage medium
CN113360375B (en) Transaction testing method, device, electronic equipment and storage medium
CN116991364B (en) Software development system management method based on big data
CN113438221B (en) Local end file loading method and device, electronic equipment and medium
CN115964307B (en) Automatic test method, device, equipment and medium for transaction data
CN114416661A (en) Data reporting method, device, equipment and storage medium
CN117635210A (en) Client information integration method, device, equipment and medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination