CN112817953A - Data verification method and device, computer equipment and computer-readable storage medium - Google Patents

Data verification method and device, computer equipment and computer-readable storage medium Download PDF

Info

Publication number
CN112817953A
CN112817953A CN202110089029.1A CN202110089029A CN112817953A CN 112817953 A CN112817953 A CN 112817953A CN 202110089029 A CN202110089029 A CN 202110089029A CN 112817953 A CN112817953 A CN 112817953A
Authority
CN
China
Prior art keywords
data
rule
data verification
verification
user
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110089029.1A
Other languages
Chinese (zh)
Inventor
王永辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Yishi Huolala Technology Co Ltd
Original Assignee
Shenzhen Yishi Huolala Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Yishi Huolala Technology Co Ltd filed Critical Shenzhen Yishi Huolala Technology Co Ltd
Priority to CN202110089029.1A priority Critical patent/CN112817953A/en
Publication of CN112817953A publication Critical patent/CN112817953A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/21Design, administration or maintenance of databases
    • G06F16/215Improving data quality; Data cleansing, e.g. de-duplication, removing invalid entries or correcting typographical errors
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/23Updating
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • G06F16/2455Query execution
    • G06F16/24552Database cache management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/25Integrating or interfacing systems involving database management systems
    • G06F16/258Data format conversion from or to a database
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/27Replication, distribution or synchronisation of data between databases or within a distributed database system; Distributed database system architectures therefor

Abstract

The embodiment of the application discloses a data verification method, a system, computer equipment and a computer readable storage medium, wherein the commonalities of data rules are extracted from a historical data verification set to serve as pre-prepared data verification rules; updating the data verification rule in real time; managing the data verification rule, dynamically rendering the data verification rule and verifying the data; and acquiring the user using behavior according to the data verification, and reporting in a unified format. The invention designs a set of data verification rule configuration system and a data dynamic verification method, can move rule verification to the location of data, and provides a white list to meet the customized requirement, so that the data verification can be realized more simply and rapidly.

Description

Data verification method and device, computer equipment and computer-readable storage medium
Technical Field
The embodiment of the application relates to the field of data processing, and in particular relates to a data verification method, a data verification device, computer equipment and a computer-readable storage medium.
Background
Generally, if an application system needs to perform data verification, a centralized system or a third-party interface is required to be relied on to realize the data verification. However, such an approach needs to strongly depend on the third party interface support capability, and as the number of applications accessed is larger, the probability of causing instability of the third party is higher, thereby affecting the capability of providing highly available services. As can be seen from the above description, in the prior art, data verification is centralized.
With the development of internet technology, various micro-service systems appear, and most of the systems need to perform core data verification. In the prior art, each application may have its own data verification system, and developers need to consider development and maintenance of the data verification system when developing application software, and different systems have different calibers for data verification, thereby possibly bringing risks such as data leakage. As can be seen from the above description, in the prior art, the implementation manner of data verification is complex.
In internet products, fast iteration is particularly important, when verification rules are changed, developers also need to modify logic codes of data verification in one or more systems, the systems which need customized verification content can only be hard coded, maintenance is complex along with the system iteration, if a certain system is modified wrongly, the risk of service rejection of the whole business can be brought, the static mode can slow down product iteration, and the data verification is not flexible in the prior art.
The data verification system in the prior art disperses the collection scheme of the use behaviors of each user, but the collected fields and the data format are not uniform, so that the subsequent data analysis and data mining are not facilitated.
Disclosure of Invention
The embodiments of the present application provide a data verification method, system, computer device, and computer readable storage medium, and provide a semi-centralized SDK and its resources to be loaded to an application, configure a verification rule at a remote end, collect a user usage behavior according to data verification and report the user usage behavior to a big data ecology, so that a third-party interface or system does not need to be strongly relied on, and local data can be directly dynamically verified, thereby improving the service capability of availability of local data without affecting its own services.
One aspect of the embodiments of the present application provides a method for data verification, where the method includes:
extracting the commonality of the data rule from the historical data verification set as a pre-prepared data verification rule;
updating the data verification rule in real time;
managing the data verification rule, dynamically rendering the data verification rule and verifying the data;
and acquiring the user using behavior according to the data verification, and reporting in a unified format.
An aspect of the embodiments of the present application further provides an apparatus for data verification, where the apparatus includes:
the extraction module is used for extracting the commonality of the data rule from the historical data verification set as a pre-prepared data verification rule;
the updating module is used for updating the data verification rule in real time;
the rendering module is used for managing the data verification rule, dynamically rendering the data verification rule and verifying the data;
and the acquisition module is used for acquiring the user using behaviors according to the data verification and reporting the user using behaviors in a unified format.
An aspect of the embodiments of the present application further provides a computer device, including a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method as described above when executing the computer program.
An aspect of the embodiments of the present application further provides a computer-readable storage medium, including a memory, a processor, and a computer program stored on the memory and executable on the processor, the processor implementing the steps of the method as described above when executing the computer program.
According to the data verification method, the system, the computer equipment and the computer readable storage medium, the commonalities of data rules are extracted from a historical data verification set to serve as pre-prepared data verification rules; updating the data verification rule in real time; managing the data verification rule, dynamically rendering the data verification rule and verifying the data; and acquiring the user using behavior according to the data verification, and reporting in a unified format. The application designs a set of data verification rule configuration system and a data dynamic verification method, rule verification can be moved to the location of data, and meanwhile, a white list is provided so as to meet the customized requirement, so that data verification can be realized more simply and rapidly.
Drawings
FIG. 1 schematically illustrates an application environment diagram of a method of data verification according to an embodiment of the present application;
FIG. 2 is a flow chart schematically illustrating a method of data verification according to a first embodiment of the present application;
FIG. 3 is a block diagram schematically illustrating an apparatus for data verification according to a second embodiment of the present application;
fig. 4 schematically shows a hardware architecture diagram of a computer device suitable for implementing the method for data verification according to the third embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the descriptions relating to "first", "second", etc. in the embodiments of the present application are only for descriptive purposes and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In addition, technical solutions between various embodiments may be combined with each other, but must be realized by a person skilled in the art, and when the technical solutions are contradictory or cannot be realized, such a combination should not be considered to exist, and is not within the protection scope of the present application.
Fig. 1 schematically shows an environment application diagram of a method for data verification according to an embodiment of the present application.
The data verification rule configuration platform comprises: the system comprises a rule management module, a rule distribution module and a data recovery module. The data check rule communication includes: codis and Kafka. The data verification SDK includes: dynamic loading of rule plug-ins, dynamic data verification, reporting of user behaviors and white list fragmentation. The SDK distribution system includes: version management and code release.
The data check rule communication includes:
a) rules required by application software are configured on the data rule configuration platform, and online operation is performed after the rules are stored;
b) and synchronizing the check rule to the Codis, and simultaneously monitoring the change of the rule by the daemon process to synchronously modify the changed content.
The data verification SDK includes:
a) analyzing the white list for fragmentation processing, and meanwhile, caching the white list in an application local and monitoring the expiration time of the white list in real time;
b) reading the verification rule from the Codis, caching the verification rule in an application local, and loading a corresponding plug-in according to the verification rule;
in addition, still include:
a) directly reporting the data filtered according to the rule to Kafka;
b) and the Flink consumes Hive of the Kafka written data, and the accurate data is provided for data analysis or mining.
Example one
Fig. 2 schematically shows a flowchart of a method for data verification according to a first embodiment of the present application. It is understood that the method embodiments may be implemented in a mobile terminal, and the flowchart of the method embodiments is not intended to limit the order in which the steps are performed.
As shown in fig. 2, the data verification method may include steps S200 to S206, wherein:
step S200, extracting the commonality of the data rule from the historical data verification set as a pre-prepared data verification rule;
optionally, the extracting, from the historical data verification set, the commonality of the data rule as a pre-prepared data verification rule includes:
recording the pre-prepared data verification rule into a data rule configuration system;
and receiving data parameters of the data verification rule configured by the user in the data rule configuration system.
Optionally, the configuring, by the receiving user, data parameters of the data verification rule in the data rule configuration system includes:
and receiving manual or automatic on-line and off-line operations of a user, and performing dynamic data verification by matching with the pre-prepared data verification rule.
Step S202, updating the data verification rule in real time;
optionally, the updating the data verification rule in real time includes:
and writing the data verification rule into a distributed cache, starting a background process to monitor the change of the data verification rule, and updating the distributed cache in a quasi-real time manner.
Step S204, managing the data verification rule, dynamically rendering the data verification rule and verifying the data;
optionally, the managing the data verification rule, dynamically rendering the data verification rule, and performing data verification, includes:
and communicating with the data rule configuration system, analyzing a white list, carrying out fragment processing to accelerate the loading speed of resources, and dynamically rendering the data rule to complete related data verification.
Optionally, the communicating with the data rule configuration system includes:
configuring a check rule required by application software on a data rule configuration platform, and performing online operation after storing the check rule;
and synchronizing the check rule to the distributed cache, monitoring the change of the rule by a daemon process, and synchronously modifying the changed content.
Optionally, the parsing the white list and performing fragment processing to accelerate the loading speed of the resource, and dynamically rendering the data rule to complete related data verification, includes:
analyzing the white list for fragmentation processing, caching the white list in an application local area, and monitoring the expiration time of the white list in real time;
and reading the check rule from the distributed cache, caching the application local, and loading the corresponding plug-in according to the check rule.
And step S206, acquiring the user using behavior according to the data verification, and reporting the user using behavior in a unified format.
Specifically, from the historical data verification set, the data rule commonality is extracted as a pre-prepared data verification rule.
A set of data rule configuration system is developed, and prepared data rules are recorded into the system to be provided for a user, and the user can also configure required data verification rules in the system.
The rules in the system can be manually and automatically operated on and off the line, and the dynamic verification of the data is realized by matching with the self-defined rules.
And writing the online rule into a distributed cache (Codis), and simultaneously starting a background process to monitor the change of the rule to update the cache in a quasi-real-time manner.
The SDK realizes management of plug-in data verification rules, simultaneously communicates with a rule configuration system, analyzes a white list and processes the white list in a fragmentation mode to accelerate loading speed of resources, and dynamically renders the data rules to complete related data verification.
And according to the verification of the data rule, collecting the use behaviors of the user and reporting the use behaviors to Kafka in a unified format.
According to the data verification method provided by the embodiment of the application, the commonalities of data rules are extracted from a historical data verification set to serve as pre-prepared data verification rules; updating the data verification rule in real time; managing the data verification rule, dynamically rendering the data verification rule and verifying the data; and acquiring the user using behavior according to the data verification, and reporting in a unified format. The application designs a set of data verification rule configuration system and a data dynamic verification method, rule verification can be moved to the location of data, and meanwhile, a white list is provided so as to meet the customized requirement, so that data verification can be realized more simply and rapidly.
Example two
Fig. 3 schematically shows a block diagram of an apparatus for data verification according to the second embodiment of the present application, which may be divided into one or more program modules, and the one or more program modules are stored in a storage medium and executed by one or more processors to implement the embodiments of the present application. The program modules referred to in the embodiments of the present application refer to a series of computer program instruction segments that can perform specific functions, and the following description will specifically describe the functions of the program modules in the embodiments.
As shown in fig. 3, the apparatus 300 for data verification may include an extracting module 310, an updating module 320, a rendering module 330, and an obtaining module 340, wherein:
an extracting module 310, configured to extract a commonality of the data rule from the historical data verification set as a pre-prepared data verification rule;
an update module 320, configured to update the data verification rule in real time;
the rendering module 330 is configured to manage the data verification rule, dynamically render the data verification rule, and perform data verification;
and the obtaining module 340 is configured to obtain the user usage behavior according to the data verification, and report the user usage behavior in a unified format.
Specifically, from the historical data verification set, the data rule commonality is extracted as a pre-prepared data verification rule.
A set of data rule configuration system is developed, and prepared data rules are recorded into the system to be provided for a user, and the user can also configure required data verification rules in the system.
The rules in the system can be manually and automatically operated on and off the line, and the dynamic verification of the data is realized by matching with the self-defined rules.
And writing the online rule into a distributed cache (Codis), and simultaneously starting a background process to monitor the change of the rule to update the cache in a quasi-real-time manner.
The SDK realizes management of plug-in data verification rules, simultaneously communicates with a rule configuration system, analyzes a white list and processes the white list in a fragmentation mode to accelerate loading speed of resources, and dynamically renders the data rules to complete related data verification.
And according to the verification of the data rule, collecting the use behaviors of the user and reporting the use behaviors to Kafka in a unified format.
According to the data verification device provided by the embodiment of the application, the commonalities of data rules are extracted from a historical data verification set to serve as pre-prepared data verification rules; updating the data verification rule in real time; managing the data verification rule, dynamically rendering the data verification rule and verifying the data; and acquiring the user using behavior according to the data verification, and reporting in a unified format. The application designs a set of data verification rule configuration system and a data dynamic verification method, rule verification can be moved to the location of data, and meanwhile, a white list is provided so as to meet the customized requirement, so that data verification can be realized more simply and rapidly.
EXAMPLE III
Fig. 4 schematically shows a hardware architecture diagram of a computer device suitable for implementing the method for data verification according to the third embodiment of the present application.
In this embodiment, the computer device 400 may be used as a provider network or a component part of a provider network, and the computer device 400 may be, for example, a virtual machine host process and one or more virtual machine instances, or a rack server, a blade server, a tower server, or a rack server (including an independent server or a server cluster composed of multiple servers), and the like.
In this embodiment, the computer device 400 may also be used as a mobile terminal or as a component part of a mobile terminal. When the computer device 400 is a mobile terminal or forms part of a mobile terminal, the computer device 400 may be, for example, a smartphone, a computer, a projector, a set-top box, or the like.
In this embodiment, the computer device 400 is a device capable of automatically performing numerical calculation and/or information processing in accordance with a command set in advance or stored. As shown in fig. 4, computer device 400 includes at least, but is not limited to: memory 410, processor 420, and network interface 430 may be communicatively linked to each other via a system bus.
Wherein:
the memory 410 includes at least one type of computer-readable storage medium including a flash memory, a hard disk, a multimedia card, a card-type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a read-only memory (ROM), an electrically erasable programmable read-only memory (EEPROM), a programmable read-only memory (PROM), a magnetic memory, a magnetic disk, an optical disk, etc. In some embodiments, the storage 410 may be an internal storage module of the computer device 400, such as a hard disk or a memory of the computer device 400. In other embodiments, the memory 410 may also be an external storage device of the computer device 400, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), or the like, provided on the computer device 4. Of course, memory 410 may also include both internal and external memory modules of computer device 4. In this embodiment, the memory 410 is generally used for storing an operating system installed in the computer device 4 and various application software, such as program codes of a method for data verification. In addition, the memory 410 may also be used to temporarily store various types of data that have been output or are to be output.
Processor 420 may be a Central Processing Unit (CPU), controller, microcontroller, microprocessor, or other data Processing chip in some embodiments. The processor 420 is generally configured to control overall operations of the computer device 400, such as performing control and processing related to data interaction or communication with the computer device 400. In this embodiment, the processor 420 is used to execute program codes stored in the memory 410 or process data.
Network interface 430 may include a wireless network interface or a wired network interface, and network interface 430 is typically used to establish communication links between computer device 400 and other computer devices. For example, the network interface 430 is used to connect the computer device 400 with an external terminal through a network, establish a data transmission channel and a communication link between the computer device 400 and the external terminal, and the like. The network may be a wireless or wired network such as an Intranet (Intranet), the Internet (Internet), a Global System of Mobile communication (GSM), Wideband Code Division Multiple Access (WCDMA), a 4G network, a 5G network, Bluetooth (Bluetooth), or Wi-Fi.
It should be noted that fig. 4 only shows a computer device having components 410 and 430, but it should be understood that not all of the shown components are required to be implemented, and that more or fewer components may be implemented instead.
In this embodiment, the method for verifying the data stored in the memory 410 may be further divided into one or more program modules and executed by one or more processors (in this embodiment, the processor 420) to complete the present application.
Example four
The present embodiment also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the steps of the method of data verification in embodiments.
In this embodiment, the computer-readable storage medium includes a flash memory, a hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a Random Access Memory (RAM), a Static Random Access Memory (SRAM), a Read Only Memory (ROM), an Electrically Erasable Programmable Read Only Memory (EEPROM), a Programmable Read Only Memory (PROM), a magnetic memory, a magnetic disk, an optical disk, and the like. In some embodiments, the computer readable storage medium may be an internal storage unit of the computer device, such as a hard disk or a memory of the computer device. In other embodiments, the computer readable storage medium may be an external storage device of the computer device, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card), and the like provided on the computer device. Of course, the computer-readable storage medium may also include both internal and external storage devices of the computer device. In this embodiment, the computer-readable storage medium is generally used for storing an operating system and various types of application software installed in the computer device, for example, the program codes of the data verification method in the embodiment, and the like. Further, the computer-readable storage medium may also be used to temporarily store various types of data that have been output or are to be output.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all modifications of equivalent structures and equivalent processes, which are made by the contents of the specification and the drawings of the present application, or which are directly or indirectly applied to other related technical fields, are included in the scope of the present application.

Claims (10)

1. A method of data verification, the method comprising:
extracting the commonality of the data rule from the historical data verification set as a pre-prepared data verification rule; updating the data verification rule in real time;
managing the data verification rule, dynamically rendering the data verification rule and verifying the data;
and acquiring the user using behavior according to the data verification, and reporting in a unified format.
2. The method of claim 1, wherein extracting the commonality of the data rule as a pre-prepared data verification rule from the historical data verification set comprises:
recording the pre-prepared data verification rule into a data rule configuration system;
and receiving data parameters of the data verification rule configured by the user in the data rule configuration system.
3. The method of claim 2, wherein the receiving user configures data parameters of a data verification rule in the data rule configuration system, including:
and receiving manual or automatic on-line and off-line operations of a user, and performing dynamic data verification by matching with the pre-prepared data verification rule.
4. The method of claim 1, wherein updating the data validation rules in real-time comprises:
and writing the data verification rule into a distributed cache, starting a background process to monitor the change of the data verification rule, and updating the distributed cache in a quasi-real time manner.
5. The method of claim 1, wherein managing the data validation rules, dynamically rendering the data validation rules, and performing data validation comprises:
and communicating with the data rule configuration system, analyzing a white list, carrying out fragment processing to accelerate the loading speed of resources, and dynamically rendering the data rule to complete related data verification.
6. The method of claim 5, wherein the communicating with the data rule configuration system comprises:
configuring a check rule required by application software on a data rule configuration platform, and performing online operation after storing the check rule;
and synchronizing the check rule to the distributed cache, monitoring the change of the rule by a daemon process, and synchronously modifying the changed content.
7. The method of claim 5, wherein the parsing the white list and slicing process accelerates a loading speed of resources, and dynamically rendering the data rule to complete related data verification, comprises:
analyzing the white list for fragmentation processing, caching the white list in an application local area, and monitoring the expiration time of the white list in real time;
and reading the check rule from the distributed cache, caching the application local, and loading the corresponding plug-in according to the check rule.
8. An apparatus for data verification, the apparatus comprising:
the extraction module is used for extracting the commonality of the data rule from the historical data verification set as a pre-prepared data verification rule;
the updating module is used for updating the data verification rule in real time;
the rendering module is used for managing the data verification rule, dynamically rendering the data verification rule and verifying the data;
and the acquisition module is used for acquiring the user using behaviors according to the data verification and reporting the user using behaviors in a unified format.
9. A computer device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, characterized in that the steps of the method of any of claims 1 to 7 are implemented by the processor when executing the computer program.
10. A computer-readable storage medium, having stored thereon a computer program, the computer program being executable by at least one processor to cause the at least one processor to perform the steps of the method according to any one of claims 1 to 7.
CN202110089029.1A 2021-01-22 2021-01-22 Data verification method and device, computer equipment and computer-readable storage medium Pending CN112817953A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110089029.1A CN112817953A (en) 2021-01-22 2021-01-22 Data verification method and device, computer equipment and computer-readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110089029.1A CN112817953A (en) 2021-01-22 2021-01-22 Data verification method and device, computer equipment and computer-readable storage medium

Publications (1)

Publication Number Publication Date
CN112817953A true CN112817953A (en) 2021-05-18

Family

ID=75858824

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110089029.1A Pending CN112817953A (en) 2021-01-22 2021-01-22 Data verification method and device, computer equipment and computer-readable storage medium

Country Status (1)

Country Link
CN (1) CN112817953A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113342852A (en) * 2021-06-09 2021-09-03 上海万物新生环保科技集团有限公司 Method and equipment for realizing distributed configuration

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180067983A1 (en) * 2016-09-06 2018-03-08 Kabushiki Kaisha Toshiba System, client device, server device, and program
US20180241809A1 (en) * 2017-02-21 2018-08-23 Microsoft Technology Licensing, Llc Load balancing in distributed computing systems
CN109359277A (en) * 2018-10-22 2019-02-19 众安在线财产保险股份有限公司 Data monitoring method, equipment and computer storage medium
CN109614262A (en) * 2018-09-25 2019-04-12 阿里巴巴集团控股有限公司 Business method of calibration, device and computer readable storage medium
CN110263024A (en) * 2019-05-20 2019-09-20 平安普惠企业管理有限公司 Data processing method, terminal device and computer storage medium
CN110515937A (en) * 2019-09-02 2019-11-29 中国农业银行股份有限公司 A kind of data verification method and device
CN111581191A (en) * 2020-04-10 2020-08-25 岭东核电有限公司 Nuclear safety data verification method and device, computer equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180067983A1 (en) * 2016-09-06 2018-03-08 Kabushiki Kaisha Toshiba System, client device, server device, and program
US20180241809A1 (en) * 2017-02-21 2018-08-23 Microsoft Technology Licensing, Llc Load balancing in distributed computing systems
CN109614262A (en) * 2018-09-25 2019-04-12 阿里巴巴集团控股有限公司 Business method of calibration, device and computer readable storage medium
CN109359277A (en) * 2018-10-22 2019-02-19 众安在线财产保险股份有限公司 Data monitoring method, equipment and computer storage medium
CN110263024A (en) * 2019-05-20 2019-09-20 平安普惠企业管理有限公司 Data processing method, terminal device and computer storage medium
CN110515937A (en) * 2019-09-02 2019-11-29 中国农业银行股份有限公司 A kind of data verification method and device
CN111581191A (en) * 2020-04-10 2020-08-25 岭东核电有限公司 Nuclear safety data verification method and device, computer equipment and storage medium

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
杨青;黄树帮;张海东;倪益民;窦仁晖;: "智能变电站信息模型工程应用标准化校验技术", 电力系统自动化, no. 10 *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113342852A (en) * 2021-06-09 2021-09-03 上海万物新生环保科技集团有限公司 Method and equipment for realizing distributed configuration
CN113342852B (en) * 2021-06-09 2023-06-30 上海万物新生环保科技集团有限公司 Method and equipment for realizing distributed configuration

Similar Documents

Publication Publication Date Title
CN107844634B (en) Modeling method of multivariate general model platform, electronic equipment and computer readable storage medium
CN106156186B (en) Data model management device, server and data processing method
CN110928802A (en) Test method, device, equipment and storage medium based on automatic generation of case
CN112559354A (en) Front-end code specification detection method and device, computer equipment and storage medium
CN111737227B (en) Data modification method and system
WO2019095667A1 (en) Database data collection method, application server, and computer readable storage medium
CN104881454A (en) Updating method and system of parameter
CN112017007A (en) User behavior data processing method and device, computer equipment and storage medium
CN113157315A (en) Method, device, equipment and medium for identifying difference information of different versions of software
CN108255735B (en) Associated environment testing method, electronic device and computer readable storage medium
CN112416957A (en) Data increment updating method and device based on data model layer and computer equipment
CN110716804A (en) Method and device for automatically deleting useless resources, storage medium and electronic equipment
CN112817953A (en) Data verification method and device, computer equipment and computer-readable storage medium
CN114489762A (en) Method and system for realizing multi-version application and electronic equipment
CN112729868A (en) Vehicle diagnosis method, device, equipment and medium
CN111552712A (en) Report data extraction method and device and computer equipment
CN113595762B (en) Network card configuration storage method and device
CN106708541A (en) Version upgrading processing method and apparatus
CN114721681A (en) Configuration file updating method, device, equipment and storage medium
CN114466387A (en) Method and device for updating configuration file of base station, storage medium and electronic device
CN114416420A (en) Equipment problem feedback method and system
CN107015831A (en) A kind of client updating management method upgraded based on server end and system
KR101968501B1 (en) Data processing apparatus and data check method stored in a memory of the data processing apparatus
CN113656378A (en) Server management method, device and medium
CN112988583A (en) Method and device for testing syntax compatibility of database

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination