CN112416916A - Data verification method and device, electronic equipment and readable storage medium - Google Patents

Data verification method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN112416916A
CN112416916A CN202011276936.9A CN202011276936A CN112416916A CN 112416916 A CN112416916 A CN 112416916A CN 202011276936 A CN202011276936 A CN 202011276936A CN 112416916 A CN112416916 A CN 112416916A
Authority
CN
China
Prior art keywords
data
checking
verification
layer
target data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011276936.9A
Other languages
Chinese (zh)
Inventor
霍卫强
郭利锋
武竞
陈捷
沙威宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
China Citic Bank Corp Ltd
Original Assignee
China Citic Bank Corp Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by China Citic Bank Corp Ltd filed Critical China Citic Bank Corp Ltd
Priority to CN202011276936.9A priority Critical patent/CN112416916A/en
Publication of CN112416916A publication Critical patent/CN112416916A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/215Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24568Data stream processing; Continuous queries

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computational Linguistics (AREA)
  • Quality & Reliability (AREA)
  • Storage Device Security (AREA)

Abstract

The invention relates to the technical field of computer information security, in particular to a parameter checking method, a parameter checking device, electronic equipment and a computer readable storage medium. The method comprises the following steps: extracting target data in the data stream based on a tangent plane technology; and checking whether the target data meet preset conditions or not according to pre-stored reference data. The technical scheme provided by the application is that a centralized checking mechanism aiming at the key threshold value based on JSR-303 checking specification is established based on a Spring MVC framework development system and according to a tangent plane mechanism, a data checking layer is newly added in the system, and any data interaction interface needing data checking (configuration is carried out so as to achieve effective checking, checking codes are non-intrusive, program source codes do not need to be modified, the possibility of abnormal data generation is avoided from the technical aspect, and the normal operation of the system is guaranteed.

Description

Data verification method and device, electronic equipment and readable storage medium
Technical Field
The invention relates to the technical field of computer information security, in particular to a data verification method and device, electronic equipment and a readable storage medium
Background
At present, a system based on a Spring MVC framework has no mechanism for uniformly controlling the threshold range of a key domain, the control of threshold verification is dispersed in various places such as interface logic, database operation, business processing and the like, and the centralized management cannot be effectively carried out. When the related work flow of the system is complex, the operation combination is various, and the requirement for reporting data changes frequently, the data generates obvious fluctuation (multiple magnification or reduction and the like) in the circulation process to influence the accuracy of the data in the system and a downstream system, and the system executes abnormal services.
Disclosure of Invention
The present application aims to solve at least one of the above technical drawbacks. The technical scheme adopted by the application is as follows:
in a first aspect, an embodiment of the present application discloses a data verification method, which is applied to an intelligent terminal, and the method includes:
extracting target data in the data stream based on a tangent plane technology;
and checking whether the target data meet preset conditions or not according to pre-stored reference data.
Optionally, the extracting target data in the data stream based on the tangent plane technology includes:
identifying a key domain of a system in which the data stream is located;
and extracting target data at the data interface of the key domain.
Optionally, the pre-stored reference data comprises:
pre-storing the key domain datum data based on JSR-303 specifications; wherein the baseline data can receive custom configuration and detection.
Optionally, the verifying whether the target data meets a preset condition includes:
a data check layer is additionally arranged in a Spring MVC system;
executing a data verification thread on the data verification layer; the data verification thread is used for verifying whether the target data meet preset conditions.
Optionally, the adding a data check layer in the Spring MVC system includes:
a data check layer is additionally arranged between the control layer and the service logic layer; or the like, or, alternatively,
and a data checking layer is additionally arranged on the service logic layer and the data persistence layer.
Optionally, the method further comprises:
storing the verification data, and determining a verification result according to the verification data;
and feeding back the checking result to the front end of the system.
Optionally, the method further comprises:
and if the target data are verified not to meet the preset conditions, adjusting the target data into data meeting the preset conditions according to the pre-stored reference data.
On the other hand, an embodiment of the present application provides a data verification apparatus, where the apparatus may include: the device comprises an extraction module, a storage module and a verification module; wherein the content of the first and second substances,
the extraction module is used for extracting target data in the data stream based on a tangent plane technology;
the storage module is used for prestoring reference data;
and the checking module is used for checking whether the target data meet preset conditions according to pre-stored reference data.
In a third aspect, an embodiment of the present application provides an electronic device, including a processor and a memory;
the memory is used for storing operation instructions;
the processor is configured to execute the method in any of the embodiments by calling the operation instruction.
In a fourth aspect, the present application provides a computer-readable storage medium, on which a computer program is stored, and when the computer program is executed by a processor, the computer program implements the method of any one of the above embodiments.
The data verification scheme provided by the embodiment of the application is used for extracting target data in a data stream based on a tangent plane technology; and checking whether the target data meet preset conditions or not according to pre-stored reference data. The technical scheme provided by the embodiment of the application has the beneficial effects that a centralized checking mechanism aiming at the key threshold based on the JSR-303 checking specification is established based on the system developed by the Spring MVC framework and according to the tangent plane mechanism, a data checking layer is newly added in the system, and any data interaction interface (which needs to be checked for data) can be checked (configured to realize effective checking, the checking code is non-intrusive, the program source code does not need to be modified, the possibility of generating abnormal data is avoided from the technical aspect, and the normal operation of the system is ensured.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings used in the description of the embodiments of the present application will be briefly described below.
Fig. 1 is a schematic flowchart of a data verification method according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a data verification apparatus according to an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings, wherein like or similar reference numerals refer to the same or similar elements or elements having the same or similar function throughout. The embodiments described below with reference to the drawings are exemplary only for the purpose of explaining the present application and are not to be construed as limiting the present invention.
As used herein, the singular forms "a", "an", "the" and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms "comprises" and/or "comprising," when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. As used herein, the term "and/or" includes all or any element and all combinations of one or more of the associated listed items.
In addition, it is to be understood that "at least one" in the embodiments of the present application means one or more, "a plurality" means two or more. "and/or" describes the association relationship of the associated objects, meaning that there may be three relationships, e.g., a and/or B, which may mean: a alone, both A and B, and B alone, where A, B may be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of the singular or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, a and b, a and c, b and c, or a, b and c, wherein a, b and c can be single or multiple.
To make the objects, technical solutions and advantages of the present application more clear, embodiments of the present application will be described in further detail below with reference to the accompanying drawings.
The following describes some concepts, terms or devices that may be referred to in the following embodiments:
spring MVC belongs to a subsequent product of Spring FrameWork and is fused in Spring Web Flow. The Spring framework provides a fully functional MVC module that builds Web applications. The Spring pluggable MVC framework is used, so that when the Spring is used for WEB development, the Spring MVC framework using the Spring or other integrated MVC development frameworks can be selected. Through policy interfaces, the Spring framework is highly configurable and contains a variety of view technologies, such as JavaServer Pages (JSP) technology, Velocity, Tiles, iText, and POI. The Spring MVC framework does not know the views used, so it does not force the developer to use JSP technology only. Spring MVC separates the roles of controllers, model objects, filters, and handler objects, making them easier to customize.
The AOP is an abbreviation of Aspect programmed technology, is a technology facing to a tangent plane, and is a technology capable of realizing dynamic and unified addition of functions to a program under the condition of not modifying a source code through a pre-compiling mode and a running-period dynamic agent; the AOP is a continuation of the OOP, is a hot spot in software development, is also an important content in a Spring framework, and is a derivative paradigm of functional programming. By utilizing the AOP, all parts of the business logic can be isolated, so that the coupling degree between all parts of the business logic is reduced, the reusability of a program is improved, and the development efficiency is improved. The AOP can extract and independently package general functions related to multiple business processes to form independent sections, and the sections are transversely cut into positions designated by the business processes at proper time.
The JSR 303 is a sub-specification in JAVA EE 6, called Bean validity, which is a standardized JavaBean verification API defined by JCP (Java Community Process), is based on annotation, and has good usability and expansibility; it should be noted that Bean Validation is only a specification and standard and does not provide an implementation.
DAO (data Access object) is an Application Programming Interface (API), found in microsoft's Visual Basic, that allows a programmer to request Access to microsoft's Access database. DAO is the first object-oriented database interface by microsoft. The DAO object encloses the Jet function of Access. It can also access other Structured Query Language (SQL) databases through Jet functions.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific embodiments. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 1 shows a schematic flow chart of data verification provided in an embodiment of the present application, and as shown in fig. 1, the method mainly includes:
s101, extracting target data in a data stream based on a tangent plane technology;
in an optional embodiment of the present application, the extracting target data in the data stream based on the tangent plane technology includes: identifying a key domain of a system in which the data stream is located; and extracting target data at the data interface of the key domain, and formulating uniform data types, lengths and maximum and minimum values in the system.
S102, checking whether the target data meet preset conditions or not according to pre-stored reference data.
In an optional embodiment of the application, the key domain datum data are prestored based on JSR-303 specifications; wherein the baseline data can receive custom configuration and detection.
In an optional embodiment of the present application, the step of verifying whether the target data meets a preset condition is implemented as follows:
step 1, adding a data check layer in a Spring MVC system; wherein the content of the first and second substances,
the data checking layer can be additionally arranged between the control layer and the service logic layer; or the like, or, alternatively,
the data checking layer is additionally arranged between the service logic layer and the data persistence layer;
step 2, executing a data verification thread on the data verification layer; the data verification thread is used for verifying whether the target data meet preset conditions or not;
step 3, storing the verification data, and determining a verification result according to the verification data;
and 4-1, feeding back the verification result to the front end of the system. In the specific implementation process, a data verification failure table can be added, data verification failure records are recorded, and the data in the table can be monitored and failure results can be fed back to a user.
In an alternative embodiment of the present application, the method further comprises:
and 4-2, if the target data are not verified to meet the preset conditions, adjusting the target data to be the data meeting the preset conditions according to the pre-stored reference data.
Based on the data verification method shown in fig. 1, on the other hand, an embodiment of the present application provides a data verification apparatus, which is applied to an intelligent terminal, and as shown in fig. 2, the apparatus may include a 201 extraction module, a 202 storage module, and a 203 verification module; wherein the content of the first and second substances,
the 201 extraction module is configured to extract target data in a data stream based on a tangent plane technology;
the 202 storage module is used for prestoring reference data;
and the 203 checking module is used for checking whether the target data meet preset conditions according to pre-stored reference data.
Optionally, the extraction module further comprises an identification unit and an extraction unit, wherein,
the identification unit is used for identifying a key domain of a system where the data stream is located;
the extraction unit is used for extracting target data at a data interface of the key domain.
The storage module is specifically used for pre-storing the key domain datum data based on JSR-303 specifications; wherein the baseline data can receive custom configuration and detection.
The method further comprises the device further comprises a setting module, wherein the setting module is used for
A data check layer is additionally arranged in a Spring MVC system; a data check layer is additionally arranged between the control layer and the service logic layer; or, a data checking layer is added between the business logic layer and the data persistence layer.
Executing a data verification thread on the data verification layer; the data verification thread is used for verifying whether the target data meet preset conditions.
The storage module is also used for storing the check data and determining a check result according to the check data; and feeding back the checking result to the front end of the system.
The device further comprises an adjusting module, wherein the adjusting module is used for adjusting the target data into data meeting preset conditions according to the pre-stored reference data if the target data are not verified to meet the preset conditions.
It is to be understood that the above-described respective component devices of the data verification in the present embodiment have functions of implementing the corresponding steps of the method in the embodiment shown in fig. 1. The function can be realized by hardware, and can also be realized by executing corresponding software by hardware. The hardware or software includes one or more modules or means corresponding to the functions described above. The modules and devices can be software and/or hardware, and the modules and devices can be realized independently or integrated by a plurality of modules and devices. For the functional description of each module and apparatus, reference may be specifically made to the corresponding description of the method in the embodiment shown in fig. 1, and therefore, the beneficial effects that can be achieved by the method may refer to the beneficial effects in the corresponding method provided above, which are not described again here.
It is to be understood that the illustrated structure of the embodiment of the present invention does not constitute a specific limitation to the specific structure of the data verification apparatus. In other embodiments of the present application, the data verification device may include more or fewer components than illustrated, or some components may be combined, some components may be split, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware.
The embodiment of the application provides an electronic device, which comprises a processor and a memory;
a memory for storing operating instructions;
and the processor is used for executing the data verification method provided by any embodiment of the application by calling the operation instruction.
As an example, fig. 3 shows a schematic structural diagram of an electronic device to which an embodiment of the present application is applicable, and as shown in fig. 3, the electronic device 2000 includes: a processor 2001 and a memory 2003. Wherein the processor 2001 is coupled to a memory 2003, such as via a bus 2002. Optionally, the electronic device 2000 may also include a transceiver 2004. It should be noted that the number of the transceivers 2004 is not limited to one. It is to be understood that the illustrated structure of the embodiment of the invention does not constitute a specific limitation to the specific structure of the electronic device 2000. In other embodiments of the present application, the electronic device 2000 may include more or fewer components than shown, or some components may be combined, some components may be split, or a different arrangement of components. The illustrated components may be implemented in hardware, software, or a combination of software and hardware. Optionally, the electronic device may further include a display screen 2005 for displaying images or receiving an operation instruction of a user when necessary.
The processor 2001 is applied to the embodiment of the present application to implement the method shown in the above method embodiment. The transceiver 2004 may include a receiver and a transmitter, and the transceiver 2004 is applied to the embodiments of the present application to implement the functions of the electronic device of the embodiments of the present application to communicate with other devices when executed.
The Processor 2001 may be a CPU (Central Processing Unit), general Processor, DSP (Digital Signal Processor), ASIC (Application Specific Integrated Circuit), FPGA (Field Programmable Gate Array) or other Programmable logic device, transistor logic device, hardware component, or any combination thereof. Which may implement or perform the various illustrative logical blocks, modules, and circuits described in connection with the disclosure. The processor 2001 may also be a combination of computing functions, e.g., comprising one or more microprocessors, DSPs and microprocessors, and the like.
The processor 2001 may also include one or more processing units, such as: the processor 2001 may include an Application Processor (AP), a modem processor, a Graphics Processing Unit (GPU), an Image Signal Processor (ISP), a controller, a memory, a video codec, a Digital Signal Processor (DSP), a baseband processor, and/or a Neural-Network Processing Unit (NPU), among others. The different processing units may be separate devices or may be integrated into one or more processors. The controller may be, among other things, a neural center and a command center of the electronic device 2000. The controller can generate an operation control signal according to the instruction operation code and the timing signal to complete the control of instruction fetching and instruction execution. A memory may also be provided in the processor 2001 for storing instructions and data. In some embodiments, the memory in the processor 2001 is a cache memory. The memory may hold instructions or data that have just been used or recycled by the processor 2001. If the processor 2001 needs to use the instruction or data again, it can be called directly from the memory. Avoiding repeated accesses reduces the latency of the processor 2001, thereby increasing the efficiency of the system.
The processor 2001 may operate the data verification method provided in the embodiment of the present application, so as to reduce the operation complexity of the user, improve the intelligent degree of the terminal device, and improve the user experience. The processor 2001 may include different devices, for example, when the CPU and the GPU are integrated, the CPU and the GPU may cooperate to execute the data verification method provided in the embodiment of the present application, for example, part of the algorithm in the data verification method is executed by the CPU, and another part of the algorithm is executed by the GPU, so as to obtain faster processing efficiency.
Bus 2002 may include a path that conveys information between the aforementioned components. The bus 2002 may be a PCI (Peripheral Component Interconnect) bus, an EISA (Extended Industry Standard Architecture) bus, or the like. The bus 2002 may be divided into an address bus, a data bus, a control bus, and the like. For ease of illustration, only one thick line is shown in FIG. 3, but this does not mean only one bus or one type of bus.
The Memory 2003 may be a ROM (Read Only Memory) or other type of static storage device that can store static information and instructions, a RAM (Random Access Memory) or other type of dynamic storage device that can store information and instructions, an EEPROM (Electrically Erasable Programmable Read Only Memory), a CD-ROM (Compact disk Read Only Memory), a high-speed Random Access Memory, a non-volatile Memory such as at least one magnetic disk storage device, a flash Memory device, a universal flash Memory (UFS), or other optical disk storage, optical disk storage (including Compact disk, laser disk, optical disk, digital versatile disk, blu-ray disk, etc.), a magnetic disk storage medium or other magnetic storage device, a magnetic disk storage medium, or other magnetic storage device, Or any other medium which can be used to carry or store desired program code in the form of instructions or data structures and which can be accessed by a computer, but is not limited to such.
Optionally, the memory 2003 is used for storing application program code for performing the disclosed aspects, and is controlled in execution by the processor 2001. The processor 2001 is configured to execute the application program code stored in the memory 2003 to implement the data verification method provided in any of the embodiments of the present application.
Memory 2003 may be used to store computer-executable program code, including instructions. The processor 2001 executes various functional applications and data processing of the electronic device 2000 by executing instructions stored in the memory 2003. The memory 2003 may include a program storage area and a data storage area. Wherein, the storage program area can store the codes of the operating system and the application program, etc. The stored data area may store data created during use of the electronic device 2000 (e.g., images, video, etc. captured by a camera application), and the like.
The memory 2003 may further store one or more computer programs corresponding to the data verification method provided in the embodiments of the present application. The one or more computer programs stored in the memory 2003 and configured to be executed by the one or more processors 2001 include instructions that may be used to perform the various steps in the respective embodiments described above.
Of course, the code of the data verification method provided in the embodiment of the present application may also be stored in the external memory. In this case, the processor 2001 may execute the code of the data verification method stored in the external memory through the external memory interface, and the processor 2001 may control the execution of the data verification flow.
The display screen 2005 includes a display panel. The display panel may be a Liquid Crystal Display (LCD), an organic light-emitting diode (OLED), an active-matrix organic light-emitting diode (active-matrix organic light-emitting diode, AMOLED), a flexible light-emitting diode (FLED), a miniature, a Micro-oeld, a quantum dot light-emitting diode (QLED), or the like. In some embodiments, electronic device 2000 may include 1 or N display screens 2005, N being a positive integer greater than 1. The display screen 2005 can be used to display information input by or provided to a user and various Graphical User Interfaces (GUIs). For example, the display screen 2005 may display a photograph, a video, a web page, or a file, etc.
The electronic device provided by the embodiment of the present application is applicable to any embodiment of the above method, and therefore, the beneficial effects that can be achieved by the electronic device can refer to the beneficial effects in the corresponding method provided above, and are not described again here.
The embodiment of the present application provides a computer-readable storage medium, where a computer program is stored on the computer-readable storage medium, and when the computer program is executed by a processor, the computer program implements the data verification method shown in the foregoing method embodiment.
The computer-readable storage medium provided in the embodiments of the present application is applicable to any embodiment of the foregoing method, and therefore, the beneficial effects that can be achieved by the computer-readable storage medium can refer to the beneficial effects in the corresponding method provided above, and are not described herein again.
The embodiment of the present application further provides a computer program product, which when running on a computer, causes the computer to execute the above related steps to implement the method in the above embodiment. The computer program product provided in the embodiments of the present application is applicable to any of the embodiments of the method described above, and therefore, the beneficial effects that can be achieved by the computer program product can refer to the beneficial effects in the corresponding method provided above, and are not described herein again.
According to the data verification scheme provided by the embodiment of the application, target data in the data stream are extracted based on a tangent plane technology through the data verification scheme provided by the embodiment of the application; and checking whether the target data meet preset conditions or not according to pre-stored reference data. The technical scheme provided by the embodiment of the application is that a centralized checking mechanism aiming at the key threshold value based on a JSR-303 checking specification is established based on a Spring MVC framework development system and according to a tangent plane mechanism, a data checking layer is newly added in the system, and any data interaction interface (which needs to be checked for data) can be checked (configured so as to achieve effective checking, and the checking code is non-intrusive, a program source code does not need to be modified, so that the possibility of abnormal data generation is avoided from the technical aspect, and the normal operation of the system is ensured.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, a division of a module or a unit is merely one type of logical division, and an actual implementation may have another division, for example, a plurality of units or components may be combined or integrated into another apparatus, or some features may be discarded or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
Units described as separate parts may or may not be physically separate, and parts displayed as units may be one physical unit or a plurality of physical units, may be located in one place, or may be distributed to a plurality of different places. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a readable storage medium. Based on such understanding, the technical solutions of the embodiments of the present application may be essentially or partially contributed to by the prior art, or all or part of the technical solutions may be embodied in the form of a software product, where the software product is stored in a storage medium and includes several instructions to enable a device (which may be a single chip, a chip, or the like) or a processor (processor) to execute all or part of the steps of the methods of the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing program codes, such as a usb disk, a removable hard disk, a Read Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
It should be understood that, although the steps in the flowcharts of the figures are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless explicitly stated herein. Moreover, at least a portion of the steps in the flow chart of the figure may include multiple sub-steps or multiple stages, which are not necessarily performed at the same time, but may be performed at different times, which are not necessarily performed in sequence, but may be performed alternately or alternately with other steps or at least a portion of the sub-steps or stages of other steps.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of changes or substitutions within the technical scope of the present application, and can make several modifications and decorations, and these changes, substitutions, improvements and decorations should also be considered to be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (10)

1. A data verification method is applied to an intelligent terminal and is characterized by comprising the following steps:
extracting target data in the data stream based on a tangent plane technology;
and checking whether the target data meet preset conditions or not according to pre-stored reference data.
2. The data verification method of claim 1, wherein the extracting target data in the data stream based on the tangent plane technique comprises:
identifying a key domain of a system in which the data stream is located;
and extracting target data at the data interface of the key domain.
3. The data verification method of claim 2, wherein pre-storing the reference data comprises:
pre-storing the key domain datum data based on JSR-303 specifications; wherein the baseline data can receive custom configuration and detection.
4. The data verification method of claim 3, wherein the verifying whether the target data meets a preset condition comprises:
a data check layer is additionally arranged in a Spring MVC system;
executing a data verification thread on the data verification layer; the data verification thread is used for verifying whether the target data meet preset conditions.
5. The data verification method of claim 1 or 4, wherein the adding of the data verification layer in the Spring MVC system comprises:
a data check layer is additionally arranged between the control layer and the service logic layer; or the like, or, alternatively,
and a data checking layer is additionally arranged on the service logic layer and the data persistence layer.
6. The data verification method of claim 5, further comprising:
storing the verification data, and determining a verification result according to the verification data;
and feeding back the checking result to the front end of the system.
7. The data verification method of claim 6, further comprising:
and if the target data are verified not to meet the preset conditions, adjusting the target data into data meeting the preset conditions according to the pre-stored reference data.
8. The utility model provides a data verification device, is applied to intelligent terminal, its characterized in that, the device includes: the device comprises an extraction module, a storage module and a verification module; wherein the content of the first and second substances,
the extraction module is used for extracting target data in the data stream based on a tangent plane technology;
the storage module is used for prestoring reference data;
and the checking module is used for checking whether the target data meet preset conditions according to pre-stored reference data.
9. An electronic device comprising a processor and a memory;
the memory is used for storing operation instructions;
the processor is used for executing the method of any one of claims 1-6 by calling the operation instruction.
10. A computer-readable storage medium, characterized in that the storage medium has stored thereon a computer program which, when being executed by a processor, carries out the method of any one of claims 1-6.
CN202011276936.9A 2020-11-16 2020-11-16 Data verification method and device, electronic equipment and readable storage medium Pending CN112416916A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011276936.9A CN112416916A (en) 2020-11-16 2020-11-16 Data verification method and device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011276936.9A CN112416916A (en) 2020-11-16 2020-11-16 Data verification method and device, electronic equipment and readable storage medium

Publications (1)

Publication Number Publication Date
CN112416916A true CN112416916A (en) 2021-02-26

Family

ID=74831249

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011276936.9A Pending CN112416916A (en) 2020-11-16 2020-11-16 Data verification method and device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN112416916A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114547033A (en) * 2022-02-22 2022-05-27 苏州浪潮智能科技有限公司 Method, system, equipment and storage medium for managing key product data

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114547033A (en) * 2022-02-22 2022-05-27 苏州浪潮智能科技有限公司 Method, system, equipment and storage medium for managing key product data
CN114547033B (en) * 2022-02-22 2024-01-16 苏州浪潮智能科技有限公司 Method, system, equipment and storage medium for managing key product data

Similar Documents

Publication Publication Date Title
US11687645B2 (en) Security control method and computer system
US11093601B2 (en) Dynamic switching between pointer authentication regimes
CN112288439A (en) Risk assessment method and device, electronic equipment and readable storage medium
US20220365862A1 (en) Systems and methods of formal verification
US11201870B2 (en) Using commit tokens to coordinate permissions submissions to address transaction conflict in blockchain systems
US10540524B2 (en) Memory access protection using processor transactional memory support
US8296738B1 (en) Methods and systems for in-place shader debugging and performance tuning
US20210263912A1 (en) Method for data processing based on smart contract and device
CN112416916A (en) Data verification method and device, electronic equipment and readable storage medium
US10698667B2 (en) Compiler with type inference and target code generation
CN111899018B (en) Order data processing method, device, server and storage medium
CN111369354A (en) Data monitoring method and device for block chain application and storage medium
CN110688320B (en) Global variable detection method and device and terminal equipment
CN115380278A (en) Object attribute dynamic verification
CN111736817A (en) Method and device for determining function execution time consumption, terminal equipment and storage medium
US20230078138A1 (en) Computing systems employing measurement of boot components, such as prior to trusted platform module (tpm) availability, for enhanced boot security, and related methods
US11689630B2 (en) Request processing method and apparatus, electronic device, and computer storage medium
CN112906045A (en) Mobile phone shield access record storage certificate and alarm method and computer system
CN112882994A (en) Log extraction method and device
US9424420B2 (en) Restricting application binary interfaces
CN112686759A (en) Account checking monitoring method, device, equipment and medium
US20070156775A1 (en) Metadata transformation in copy and paste scenarios between heterogeneous applications
CN113961366A (en) Kernel function calling method of operating system and computer equipment
CN112416772A (en) Test case completion method and device, electronic equipment and readable storage medium
CN109561146A (en) Document down loading method, device, terminal device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination