CN112711598A - Data verification method and device - Google Patents

Data verification method and device Download PDF

Info

Publication number
CN112711598A
CN112711598A CN202011577245.2A CN202011577245A CN112711598A CN 112711598 A CN112711598 A CN 112711598A CN 202011577245 A CN202011577245 A CN 202011577245A CN 112711598 A CN112711598 A CN 112711598A
Authority
CN
China
Prior art keywords
verification
target data
information
data
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202011577245.2A
Other languages
Chinese (zh)
Other versions
CN112711598B (en
Inventor
陈亮
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Yiji Cloud Medical Data Research Institute Co ltd
Original Assignee
Yidu Cloud Beijing Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Yidu Cloud Beijing Technology Co Ltd filed Critical Yidu Cloud Beijing Technology Co Ltd
Priority to CN202011577245.2A priority Critical patent/CN112711598B/en
Priority claimed from CN202011577245.2A external-priority patent/CN112711598B/en
Publication of CN112711598A publication Critical patent/CN112711598A/en
Application granted granted Critical
Publication of CN112711598B publication Critical patent/CN112711598B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • G06F16/2365Ensuring data consistency and integrity
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a data verification method and a device, comprising the following steps: determining first verification information of target data in a first platform according to a preset verification rule; transmitting the target data and the check rule to a second platform so that the second platform determines second check information according to the target data and the check rule; performing data verification according to the first verification information and the second verification information to determine a verification result corresponding to the target data; and performing data verification according to the first verification information and the second verification information to determine a verification result corresponding to the target data, so that consistency verification based on partial data in the target data is realized, compression and decompression of the target data are not required, and resynchronization can be directly performed when the verification fails, thereby improving the efficiency of data verification.

Description

Data verification method and device
Technical Field
The invention relates to the technical field of computers, in particular to a data verification method and device.
Background
Public/private clouds are both currently common cloud environments. By combining the two, a cloud environment called "hybrid cloud" can also be constructed. In a hybrid cloud environment, a public cloud may synchronize data to a private cloud in a particular manner. In order to ensure the normal operation of the whole hybrid cloud environment, it is necessary to further confirm whether the public cloud and the private cloud have data consistency after data synchronization, that is, to perform data verification.
According to the existing data verification, whether the public cloud and the private cloud have data consistency or not can be judged by comprehensively comparing all data contents in the public cloud and the private cloud. However, the way of comparing the data comprehensively consumes a lot of time and calculation power, and the checking efficiency is low.
Disclosure of Invention
The invention provides a data verification method and a data verification device, which are used for at least solving the technical problems in the prior art.
In a first aspect, the present invention provides a data verification method, including:
determining first verification information of target data in a first platform according to a preset verification rule;
transmitting the target data and the check rule to a second platform so that the second platform determines second check information according to the target data and the check rule;
and performing data verification according to the first verification information and the second verification information to determine a verification result corresponding to the target data.
Preferably, the check rule includes a version rule and an encryption rule; the determining first verification information of the target data in the first platform according to the preset verification rule includes:
determining a first version number of the target data according to the version rule;
determining first configuration information of the target data according to the first version number and the data index of the target data;
performing encryption calculation on the target data according to the encryption rule to determine first encryption information of the target data;
and determining the first verification information according to the first configuration information and the first encryption information.
Preferably, when the verification result corresponding to the target data is verification success, the method further includes:
and sending the verification result to the second platform so that the second platform determines the target data as the current version data.
Preferably, when the verification result corresponding to the target data is a verification failure, the method further includes:
and transmitting the target data to a second platform so that the second platform determines third verification information according to the target data and the verification rule.
In a second aspect, the present invention provides a data verification method, including:
receiving target data and a check rule sent by a first platform, and determining second check information according to the target data and the check rule;
and sending the second check rule to the first platform so that the first platform performs data check according to the first check information and the second check information to determine a check result corresponding to the target data.
Preferably, the check rule includes a version rule and an encryption rule; the determining second check-up information according to the target data and the check-up rule includes:
determining a second version number of the target data according to the version rule;
determining second configuration information of the target data according to the second version number and the data index of the target data;
performing encryption calculation on the target data according to the encryption rule to determine second encryption information of the target data;
and determining the second check-up information according to the second configuration information and the second encryption information.
Preferably, when the verification result corresponding to the target data is a verification failure, the method further includes:
receiving target data sent by a first platform, and determining third verification information according to the target data and the verification rule;
and sending the third check rule to the first platform.
In a third aspect, the present invention provides a data verification apparatus, including:
the first verification information determining module is used for determining first verification information of the target data in the first platform according to a preset verification rule;
the transmission module is used for transmitting the target data and the check rule to a second platform so that the second platform determines second check information according to the target data and the check rule;
and the checking module is used for carrying out data checking according to the first checking information and the second checking information so as to determine a checking result corresponding to the target data.
In a fourth aspect, the present invention provides a computer-readable storage medium storing a computer program for executing the data verification method of the present invention.
In a fifth aspect, the present invention provides an electronic device, comprising:
a processor;
a memory for storing the processor-executable instructions;
the processor is used for reading the executable instruction from the memory and executing the instruction to realize the data verification method.
Compared with the prior art, the data verification method and the data verification device provided by the invention have the advantages that the data verification is carried out according to the first verification information and the second verification information to determine the verification result corresponding to the target data, the consistency verification is carried out on part of data in the target data, the target data does not need to be compressed or decompressed, and the resynchronization can be directly carried out when the verification fails, so that the data verification efficiency is improved.
Drawings
Fig. 1 is a schematic flow chart illustrating a data verification method according to an embodiment of the present invention;
fig. 2 is a schematic flow chart illustrating another data verification method according to an embodiment of the present invention;
fig. 3 is a schematic structural diagram of a data verification apparatus according to an embodiment of the present invention.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Summary of the application
In order to ensure the normal operation of the whole hybrid cloud environment, it is necessary to further confirm whether data consistency exists between the public cloud and the private cloud after data synchronization, that is, to perform data verification.
In the existing data verification, one way is to judge whether the public cloud and the private cloud have data consistency by comprehensively comparing all data contents in the public cloud and the private cloud. However, the way of comparing the data comprehensively consumes a lot of time and calculation power, and the checking efficiency is low.
Another way of data verification is to compress the complete data in the public cloud. And calculating the compressed data by the public cloud by using an encryption algorithm to obtain corresponding encryption information. After the compressed data are synchronized to the private cloud, the private cloud calculates the compressed data by using the same encryption algorithm, and corresponding encryption information is obtained again. And then, verifying according to the encrypted information obtained by the two calculations, thereby determining the data consistency. However, in the above verification method, once the verification fails, it indicates that an error may occur in the data compression process, so that data compression and data synchronization must be performed again. The above-described process of data compression also consumes a significant amount of time and computational power. Data verification may also be inefficient if recompression is repeated due to verification failure.
That is, in the prior art, a method for efficiently checking data is lacking.
Exemplary method
Therefore, embodiments of the present invention provide a data verification method to solve at least the above technical problems in the prior art.
The method in this embodiment will be applied to the first platform. The first platform is a cloud platform that performs data synchronization in the cloud environment. Usually, the first platform is a public cloud, i.e. data synchronization is performed from the public cloud to a private cloud. In other cases, it is not excluded that the first platform is a private cloud, i.e. the private cloud synchronizes data to the public cloud. In contrast, the cloud platform that accepts data synchronization is referred to as the second platform in this embodiment. As shown in fig. 1, the method in this embodiment includes the following steps:
step 101, determining first verification information of target data in a first platform according to a preset verification rule.
In this embodiment, the target data is complete data that needs to be synchronized from the first platform to the second platform. And determining verification information from the target data by using the verification rule so as to perform subsequent data verification. In this step, the first platform determines the first verification information by using the verification rule.
Specifically, the check rule may include a version rule and an encryption rule. The process of the first platform determining the first verification information specifically includes:
a first version number of the target data is determined according to the version rule. In particular, the version number may take the form of a timestamp, i.e. the creation time of the target data as its version number. For example, a version number of 20201204123000 means that the target data was created 12 o' clock 30 min 00 sec 12 month 04 year 2020.
First configuration information of the target data may be determined according to the first version number and the data index of the target data. The data index is similar in nature to a "catalog" of target data, i.e., embodying what data content is specifically included in the target data (but not the data content itself of the target data). And constructing first configuration information according to the first version number and the data index, wherein the first configuration information can embody the data content corresponding to the target data of the version. In the first configuration information, the first version number and the data index may be in a key-value data format. With the first version number as the key value and the data index as the value.
And carrying out encryption calculation on the target data according to the encryption rule to determine first encryption information of the target data. The encryption rule may be established based on an encryption algorithm commonly used in the prior art, which is not limited in this embodiment.
Preferably, the encryption rule in this embodiment may use an MD5 encryption algorithm. The first N pieces of data and the last N pieces of data in the target data can be extracted by using an MD5 encryption algorithm to carry out operation, so that first encryption information is obtained. Wherein, N is the quantity set according to the requirement.
That is to say, unlike the prior art, in the present embodiment, the encryption operation is performed on a part of the target data in a manner similar to "sampling", so that the consumption of the calculation power can be reduced, and the verification efficiency can be improved. The first configuration information and the first encryption information are determined, that is, the first configuration information and the first encryption information can be used together as the first verification information.
And 102, transmitting the target data and the check rule to the second platform so that the second platform determines second check information according to the target data and the check rule.
The target data is synchronized from the first platform to the second platform, and the specific synchronization process can be implemented by using the existing openAPI interface, which is not described herein. At the same time, the validation rules may be sent by the first platform to the second platform. After the second platform obtains the target data and the check rule, the check rule can be used for determining the check information from the target data in a similar way, namely determining the second check information. The second check information is calculated in the same manner as the first check information, and the description thereof is not repeated.
And 103, performing data verification according to the first verification information and the second verification information to determine a verification result corresponding to the target data.
In theory, the first check information and the second check information are based on the same target data and the same check rule in the operation process, so that the actual contents of the two should be the same. That is, if the data before and after synchronization has consistency, the first check information and the second check information are necessarily the same. Otherwise, if the data before and after synchronization do not have consistency, the first check information and the second check information are the same.
In this embodiment, data verification is implemented according to the rule, that is, whether the first verification information and the second verification information are consistent or not is compared, so as to determine whether target data synchronized between the first platform and the second platform have consistency or not, thereby obtaining a verification result.
When the verification result corresponding to the target data is successful, the verification result can be sent to the second platform, so that the second platform determines the target data as the current version data, namely, the data synchronization is judged to be successful. The second platform may then use the current version data normally.
When the verification result corresponding to the target data is verification failure, the first platform can transmit the target data to the second platform again, namely, synchronization is carried out again. The second platform may perform a new operation according to the target data obtained by resynchronization and the previously obtained verification rule, determine third verification information, and perform a new verification using the third verification information. In other words, the above steps 102 to 103 are repeated until the verification is passed. Of course, if the continuous verification fails for a specific number of times, the synchronization can be stopped and other processing modes can be adopted according to actual conditions.
In the embodiment, consistency verification is performed based on partial data in the target data, so that the problem that comprehensive verification consumes a large amount of time and computing power is solved. Meanwhile, target data does not need to be compressed and decompressed, resynchronization can be directly carried out when verification fails, and repeated recompression during verification failure is avoided.
According to the technical scheme, the beneficial effects of the embodiment are as follows: and performing data verification according to the first verification information and the second verification information to determine a verification result corresponding to the target data, so that consistency verification based on partial data in the target data is realized, compression and decompression of the target data are not required, resynchronization can be directly performed when the verification fails, and the efficiency of data verification is improved.
Fig. 2 shows another embodiment of the data verification method according to the present invention. The method in this embodiment is applied to a second platform, that is, a cloud platform that accepts data synchronization. That is, the method in this embodiment is equivalent to the flow on the second platform opposite to the method in the embodiment shown in fig. 1. In this embodiment, the method includes the steps of:
step 201, receiving the target data and the check rule sent by the first platform, and determining second check information according to the target data and the check rule.
Similar to the determination manner of the first check information described in step 101, in the present embodiment, the check rule includes a version rule and an encryption rule; determining the second check-up information according to the target data and the check-up rule includes: determining a second version number of the target data according to the version rule; determining second configuration information of the target data according to the second version number and the data index of the target data; carrying out encryption calculation on the target data according to the encryption rule to determine second encryption information of the target data; and determining second check-up information according to the second configuration information and the second encryption information.
Step 202, sending the second check rule to the first platform, so that the first platform performs data check according to the first check information and the second check information to determine a check result corresponding to the target data.
After determining the second check-up information, the second platform sends the second check-up information to the first platform, so that the data check-up method executed in the first platform proceeds to step 103.
In addition, if the verification result of the first platform is verification failure, the data synchronization is carried out again. The second platform receives the target data sent by the first platform again, and determines third verification information according to the target data and the verification rules; and sending the third verification rule to the first platform so as to be convenient for verifying again.
Exemplary devices
Fig. 3 shows an embodiment of the data verification apparatus according to the present invention. The apparatus of this embodiment is a physical apparatus for executing the method described in fig. 1. The technical solution is essentially the same as that in the above embodiment, and the corresponding description in the above embodiment is also applicable to this embodiment. The device in the embodiment comprises:
the first verification information determining module 301 is configured to determine first verification information of the target data in the first platform according to a preset verification rule.
A transmission module 302, configured to transmit the target data and the check rule to the second platform, so that the second platform determines the second check information according to the target data and the check rule.
The checking module 303 is configured to perform data checking according to the first checking information and the second checking information to determine a checking result corresponding to the target data.
In addition, on the basis of the embodiment shown in fig. 3, it is preferable that:
the first verification information determination module 301 includes:
a version number determining unit 311, configured to determine the first version number of the target data according to the version rule.
A configuration information determining unit 312, configured to determine first configuration information of the target data according to the first version number and the data index of the target data.
An encryption information determining unit 313, configured to perform encryption calculation on the target data according to an encryption rule to determine first encryption information of the target data.
A verification information determining unit 314, configured to determine the first verification information according to the first configuration information and the first encryption information.
Further comprising: and the feedback module 304 is configured to send the verification result to the second platform, so that the second platform determines the target data as the current version data.
Exemplary computer program product and computer-readable storage Medium
In addition to the above-described methods and apparatus, embodiments of the invention may also be a computer program product comprising computer program instructions which, when executed by a processor, cause the processor to perform the steps in the methods according to various embodiments of the invention described in the "exemplary methods" section above of this specification.
The computer program product may write program code for carrying out operations for embodiments of the present invention in any combination of one or more programming languages, including an object oriented programming language such as Java, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, as a stand-alone software package, partly on the user's computing device and partly on a remote computing device, or entirely on the remote computing device or server.
Furthermore, embodiments of the present invention may also be a computer-readable storage medium having stored thereon computer program instructions which, when executed by a processor, cause the processor to perform steps in methods according to various embodiments of the present invention described in the "exemplary methods" section above of this specification.
The computer-readable storage medium may take any combination of one or more readable media. The readable medium may be a readable signal medium or a readable storage medium. A readable storage medium may include, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples (a non-exhaustive list) of the readable storage medium include: an electrical connection having one or more wires, a portable disk, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing.
The basic principles of the present invention have been described above with reference to specific embodiments, but it should be noted that the advantages, effects, etc. mentioned in the present invention are only examples and are not limiting, and the advantages, effects, etc. must not be considered to be possessed by various embodiments of the present invention. Furthermore, the foregoing disclosure of specific details is for the purpose of illustration and description and is not intended to be limiting, since the invention is not limited to the specific details described above.
The block diagrams of devices, apparatuses, systems involved in the present invention are only given as illustrative examples and are not intended to require or imply that the connections, arrangements, configurations, etc. must be made in the manner shown in the block diagrams. These devices, apparatuses, devices, systems may be connected, arranged, configured in any manner, as will be appreciated by those skilled in the art. Words such as "including," "comprising," "having," and the like are open-ended words that mean "including, but not limited to," and are used interchangeably therewith. The words "or" and "as used herein mean, and are used interchangeably with, the word" and/or, "unless the context clearly dictates otherwise. The word "such as" is used herein to mean, and is used interchangeably with, the phrase "such as but not limited to".
It should also be noted that in the apparatus, devices and methods of the present invention, the components or steps may be broken down and/or re-combined. These decompositions and/or recombinations are to be regarded as equivalents of the present invention.
The previous description of the disclosed aspects is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these aspects will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other aspects without departing from the scope of the invention. Thus, the present invention is not intended to be limited to the aspects shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.
The foregoing description has been presented for purposes of illustration and description. Furthermore, the description is not intended to limit embodiments of the invention to the form disclosed herein. While a number of example aspects and embodiments have been discussed above, those of skill in the art will recognize certain variations, modifications, alterations, additions and sub-combinations thereof.

Claims (10)

1. A method for data verification, comprising:
determining first verification information of target data in a first platform according to a preset verification rule;
transmitting the target data and the check rule to a second platform so that the second platform determines second check information according to the target data and the check rule;
and performing data verification according to the first verification information and the second verification information to determine a verification result corresponding to the target data.
2. The method of claim 1, wherein the verification rule comprises a version rule and an encryption rule; the determining first verification information of the target data in the first platform according to the preset verification rule includes:
determining a first version number of the target data according to the version rule;
determining first configuration information of the target data according to the first version number and the data index of the target data;
performing encryption calculation on the target data according to the encryption rule to determine first encryption information of the target data;
and determining the first verification information according to the first configuration information and the first encryption information.
3. The method according to claim 1 or 2, wherein when the verification result corresponding to the target data is a verification success, the method further comprises:
and sending the verification result to the second platform so that the second platform determines the target data as the current version data.
4. The method according to claim 1 or 2, wherein when the verification result corresponding to the target data is a verification failure, the method further comprises:
and transmitting the target data to a second platform so that the second platform determines third verification information according to the target data and the verification rule.
5. A method for data verification, comprising:
receiving target data and a check rule sent by a first platform, and determining second check information according to the target data and the check rule;
and sending the second check rule to the first platform so that the first platform performs data check according to the first check information and the second check information to determine a check result corresponding to the target data.
6. The method of claim 5, wherein the verification rule includes a version rule and an encryption rule; the determining second check-up information according to the target data and the check-up rule includes:
determining a second version number of the target data according to the version rule;
determining second configuration information of the target data according to the second version number and the data index of the target data;
performing encryption calculation on the target data according to the encryption rule to determine second encryption information of the target data;
and determining the second check-up information according to the second configuration information and the second encryption information.
7. The method according to claim 5 or 6, wherein when the verification result corresponding to the target data is a verification failure, the method further comprises:
receiving target data sent by a first platform, and determining third verification information according to the target data and the verification rule;
and sending the third check rule to the first platform.
8. A data verification apparatus, comprising:
the first verification information determining module is used for determining first verification information of the target data in the first platform according to a preset verification rule;
the transmission module is used for transmitting the target data and the check rule to a second platform so that the second platform determines second check information according to the target data and the check rule;
and the checking module is used for carrying out data checking according to the first checking information and the second checking information so as to determine a checking result corresponding to the target data.
9. A computer-readable storage medium storing a computer program for executing the data verification method of any one of claims 1 to 7.
10. An electronic device, comprising:
a processor;
a memory for storing the processor-executable instructions;
the processor is configured to read the executable instructions from the memory and execute the instructions to implement the data verification method of any one of claims 1 to 7.
CN202011577245.2A 2020-12-28 Data verification method and device Active CN112711598B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011577245.2A CN112711598B (en) 2020-12-28 Data verification method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011577245.2A CN112711598B (en) 2020-12-28 Data verification method and device

Publications (2)

Publication Number Publication Date
CN112711598A true CN112711598A (en) 2021-04-27
CN112711598B CN112711598B (en) 2024-07-09

Family

ID=

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114422531A (en) * 2022-03-11 2022-04-29 深圳市金政软件技术有限公司 Data synchronization method, system, device and storage medium

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050076214A1 (en) * 2003-10-03 2005-04-07 Thomas David Andrew Method and system for file downloads to portable computing devices
US20070288696A1 (en) * 2006-05-19 2007-12-13 Rolf Repasi Distributed content verification and indexing
CN104978253A (en) * 2015-06-24 2015-10-14 合肥格易集成电路有限公司 Target file checking method and apparatus
CN106055936A (en) * 2016-05-18 2016-10-26 深圳大学 Method and device for encryption/decryption of executable program data package
CN107800675A (en) * 2016-09-07 2018-03-13 深圳市腾讯计算机系统有限公司 A kind of data transmission method, terminal and server
CN108021677A (en) * 2017-12-07 2018-05-11 成都博睿德科技有限公司 The control method of cloud computing distributed search engine
CN108111464A (en) * 2016-11-24 2018-06-01 腾讯科技(深圳)有限公司 A kind of data verification method and device
CN108920670A (en) * 2018-07-06 2018-11-30 深圳市小牛在线互联网信息咨询有限公司 Cache synchronization method, device, system and storage medium
CN109194643A (en) * 2018-08-29 2019-01-11 阿里巴巴集团控股有限公司 Data transmission, message parsing method, device and equipment
CN109492436A (en) * 2018-11-29 2019-03-19 深圳市网心科技有限公司 A kind of file verification method and relevant apparatus
CN109818748A (en) * 2018-12-28 2019-05-28 北京奇安信科技有限公司 Data transmission method, equipment, system and medium
CN110502363A (en) * 2019-08-05 2019-11-26 苏州浪潮智能科技有限公司 A kind of method of calibration of business rule, equipment and readable medium
CN111274311A (en) * 2018-12-05 2020-06-12 聚好看科技股份有限公司 Data synchronization method and device for cross-machine-room database

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050076214A1 (en) * 2003-10-03 2005-04-07 Thomas David Andrew Method and system for file downloads to portable computing devices
US20070288696A1 (en) * 2006-05-19 2007-12-13 Rolf Repasi Distributed content verification and indexing
CN104978253A (en) * 2015-06-24 2015-10-14 合肥格易集成电路有限公司 Target file checking method and apparatus
CN106055936A (en) * 2016-05-18 2016-10-26 深圳大学 Method and device for encryption/decryption of executable program data package
CN107800675A (en) * 2016-09-07 2018-03-13 深圳市腾讯计算机系统有限公司 A kind of data transmission method, terminal and server
CN108111464A (en) * 2016-11-24 2018-06-01 腾讯科技(深圳)有限公司 A kind of data verification method and device
CN108021677A (en) * 2017-12-07 2018-05-11 成都博睿德科技有限公司 The control method of cloud computing distributed search engine
CN108920670A (en) * 2018-07-06 2018-11-30 深圳市小牛在线互联网信息咨询有限公司 Cache synchronization method, device, system and storage medium
CN109194643A (en) * 2018-08-29 2019-01-11 阿里巴巴集团控股有限公司 Data transmission, message parsing method, device and equipment
CN109492436A (en) * 2018-11-29 2019-03-19 深圳市网心科技有限公司 A kind of file verification method and relevant apparatus
CN111274311A (en) * 2018-12-05 2020-06-12 聚好看科技股份有限公司 Data synchronization method and device for cross-machine-room database
CN109818748A (en) * 2018-12-28 2019-05-28 北京奇安信科技有限公司 Data transmission method, equipment, system and medium
CN110502363A (en) * 2019-08-05 2019-11-26 苏州浪潮智能科技有限公司 A kind of method of calibration of business rule, equipment and readable medium

Non-Patent Citations (3)

* Cited by examiner, † Cited by third party
Title
CHONDROS, N等: "Developing IntegrityCatalog, a software system for managing integrity-related metadata in digital repositories", 《SOFTWARE-PRACTICE & EXPERIENCE 》, vol. 48, no. 1, 25 December 2017 (2017-12-25), pages 45 - 64 *
吴靖钦: "云数据完整性校验与修复方案研究", 《中国优秀硕士学位论文全文数据库 · 信息科技辑》, no. 01, 15 January 2020 (2020-01-15), pages 1 - 66 *
张志亮等: "基于Hadoop的电网数据质量校验方法与验证系统", 《计算机研究与发展》, vol. 51, no. 2, 15 December 2014 (2014-12-15), pages 134 - 144 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN114422531A (en) * 2022-03-11 2022-04-29 深圳市金政软件技术有限公司 Data synchronization method, system, device and storage medium
CN114422531B (en) * 2022-03-11 2022-07-05 深圳市金政软件技术有限公司 Data synchronization method, system, device and storage medium

Similar Documents

Publication Publication Date Title
CN110716895A (en) Target data archiving method and device, computer equipment and medium
US11372566B2 (en) Method and device for storing data
CN111880826A (en) Cloud service application upgrading method and device, electronic equipment and storage medium
CN113342745A (en) Method and device for verifying mirror image file, electronic equipment and storage medium
US11809807B1 (en) Method and device for processing data overflow in decompression process
CN111966631A (en) Mirror image file generation method, system, equipment and medium capable of being rapidly distributed
WO2020034116A1 (en) Verification method for ai calculation results, and related products
US20170177696A1 (en) Usage of modeled validations on mobile devices in online and offline scenarios
CN103108033A (en) File uploading method and system
CN112711598A (en) Data verification method and device
US8930939B2 (en) Comparing system engram with product engram to determine compatibility of product with system
CN112711598B (en) Data verification method and device
CN113595762B (en) Network card configuration storage method and device
CN115639966A (en) Data writing method and device, terminal equipment and storage medium
CN114398678A (en) Registration verification method and device for preventing electronic file from being tampered, electronic equipment and medium
CN112860796B (en) Method, apparatus, device and storage medium for synchronizing data
CN114218166A (en) Data processing method and device, electronic equipment and readable storage medium
CN114143308A (en) File uploading information processing method and device, computer equipment and storage medium
CN113326038A (en) Method, apparatus, device, storage medium and program product for providing service
CN111949738A (en) Block chain-based data storage deduplication method, terminal device and storage medium
CN112732728A (en) Data synchronization method and system
CN113760765B (en) Code testing method and device, electronic equipment and storage medium
CN113626409B (en) Test data processing method, device, equipment and storage medium
CN112527802B (en) Soft link method and device based on key value database
CN117194343A (en) Zip file modification method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20210817

Address after: 211199 room 1502, 15 / F, building a, Yangzi science and innovation center, 211 pubin Road, Jiangbei new area, Nanjing, Jiangsu

Applicant after: NANJING YIJI CLOUD MEDICAL DATA RESEARCH INSTITUTE Co.,Ltd.

Address before: 100089 801, 8th floor, building 9, No.35 Huayuan North Road, Haidian District, Beijing

Applicant before: YIDU CLOUD Ltd.

GR01 Patent grant