CN114548952A - Transaction data verification method and device, computer equipment and storage medium - Google Patents

Transaction data verification method and device, computer equipment and storage medium Download PDF

Info

Publication number
CN114548952A
CN114548952A CN202210426213.5A CN202210426213A CN114548952A CN 114548952 A CN114548952 A CN 114548952A CN 202210426213 A CN202210426213 A CN 202210426213A CN 114548952 A CN114548952 A CN 114548952A
Authority
CN
China
Prior art keywords
transaction
verification
data
transaction data
inventory item
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210426213.5A
Other languages
Chinese (zh)
Inventor
詹聪
谭军胜
何正威
朱博
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan Zhongke Tongda High New Technology Co Ltd
Original Assignee
Wuhan Zhongke Tongda High New Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan Zhongke Tongda High New Technology Co Ltd filed Critical Wuhan Zhongke Tongda High New Technology Co Ltd
Priority to CN202210426213.5A priority Critical patent/CN114548952A/en
Publication of CN114548952A publication Critical patent/CN114548952A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation; Time management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/08Logistics, e.g. warehousing, loading or distribution; Inventory or stock management
    • G06Q10/087Inventory or stock management, e.g. order filling, procurement or balancing against orders

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Strategic Management (AREA)
  • Human Resources & Organizations (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Operations Research (AREA)
  • Quality & Reliability (AREA)
  • Tourism & Hospitality (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • General Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • Development Economics (AREA)
  • Finance (AREA)
  • Accounting & Taxation (AREA)
  • Data Mining & Analysis (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The embodiment of the application provides a transaction data checking method, a device, computer equipment and a storage medium, wherein a checking strategy is configured, when a preset checking condition is met, each transaction data of a target inventory item in a preset time period is automatically acquired according to the checking strategy meeting the preset condition, and automatic checking is carried out, so that timely checking of a target attribute value and a transaction limiting attribute value of the transaction data of the target inventory item is realized, the real-time property of abnormal discovery of the target inventory item data can be improved, the labor cost of checking the data is reduced, the condition that the data error rate is increased when error data flow is transferred to a subsequent flow is reduced, the experience of a transaction party is improved, and the labor cost of changing the data is reduced.

Description

Transaction data verification method and device, computer equipment and storage medium
Technical Field
The application relates to the technical field of computers, in particular to a transaction data verification method, a device, computer equipment and a storage medium.
Background
At present, the article transaction situation is complicated, in the transaction process, unreasonable and loophole of article transaction related data often appear, and the article transaction related data with unreasonable and loophole are difficult to find in time, and flow to the follow-up flow, not only can lead to the transaction related data error condition to be more serious, still can greatly increased the burden that personnel changed data.
Disclosure of Invention
The embodiment of the application provides a transaction data checking method and device, computer equipment and a storage medium, which can automatically check transaction data and improve the real-time performance of transaction data checking, so that the error rate of transaction related data is reduced, and the labor cost is reduced.
In one aspect, the present application provides a transaction data verification method, including: detecting whether each checking strategy of the inventory item meets a preset checking condition; if the preset verification condition is met, under the condition that the verification strategy meeting the preset verification condition is a first verification strategy, acquiring first transaction data of a first transaction according to the first verification strategy; acquiring second transaction data and third transaction data associated with the first transaction, wherein the first transaction data, the second transaction data and the third transaction data are all transaction data of a target inventory item within a preset time period, and a transaction limit attribute value exists among the first transaction data, the second transaction data and the third transaction data in a target attribute; respectively extracting transaction attribute values of the target attributes in the first transaction data, the second transaction data and the third transaction data to obtain a first transaction attribute value, a second transaction attribute value and a third transaction attribute value; summing the first transaction attribute value, the second transaction attribute value and the third transaction attribute value to obtain the transaction attribute and the value of the target inventory item within a preset time period; based on the transaction limiting attribute value, verifying the transaction attribute and the transaction limiting attribute value to obtain a transaction data verification result; and if the transaction data verification results are not matched, determining that the target inventory item data is abnormal.
In some embodiments of the present application, the preset verifying condition comprises: the checking time of the checking strategy is matched with the current time; the detecting whether each checking strategy of the inventory item meets a preset checking condition includes: acquiring each preset checking time of each checking strategy; and traversing all the verification time in the current verification period, judging whether the traversed verification time is in the current verification period, and if so, obtaining a verification strategy meeting the preset verification condition according to the verification strategy corresponding to the traversed verification time.
In some embodiments of the present application, the preset verifying condition comprises: the checking strategy is in an enabling state; the obtaining of the verification strategy meeting the preset verification condition according to the verification strategy corresponding to the currently traversed verification time includes: if the check strategy corresponding to the currently traversed check time is in an enabled state, judging that the check strategy corresponding to the currently traversed check time meets a preset check condition; and if the check strategy corresponding to the currently traversed check time is in a forbidden state, judging that the check strategy corresponding to the currently traversed check time does not meet a preset check condition.
In some embodiments of the present application, the transaction data verification method further comprises: acquiring a warning notification template of pre-configured abnormal target inventory item data; generating an alarm notice according to the abnormal target inventory item data and the alarm notice template; acquiring alarm notification equipment associated with the abnormal target inventory item data; and sending the alarm notification to the alarm notification device.
In some embodiments of the present application, after the determining that the data for the target inventory item is anomalous, the method further comprises: generating an exception handling scheme according to the exception target inventory item data; generating an alarm notification according to the abnormal target inventory item data and the alarm notification template, wherein the generating of the alarm notification comprises the following steps: inputting the abnormal processing scheme into the alarm notification template to generate an alarm notification; after the sending the alert notification to the alert notification device, the method further comprises: monitoring whether an abnormal data processing message is received; and if the abnormal data processing message is received, processing the abnormal target inventory item data according to the abnormal processing scheme.
In some embodiments of the present application, before the detecting whether each checking policy of the inventory item satisfies the preset checking condition, the method further includes: receiving a configuration request of a verification strategy; the configuration request carries session parameters for identity authentication; if the session parameters are matched with the pre-configured session parameters, providing a visual user interface for configuring the verification strategy; and acquiring configured verification strategies from the visual user interface.
In some embodiments of the present application, if the predetermined condition is satisfied, the transaction data verification method further includes: under the condition that the check strategy meeting the preset condition is a second check strategy, acquiring the stock quantity of the target inventory item according to the second check strategy, and if the stock quantity of the target inventory item is a negative number, determining that the data of the target inventory item is abnormal; under the condition that the checking strategy meeting the preset condition is a third checking strategy, acquiring the inventory quantity, the total quantity on shelves and the total quantity on shelves of the target inventory item according to the third checking strategy; and judging whether the total quantity on the shelves and the total quantity on the shelves are matched with the stock quantity of the target inventory item, and if not, determining that the data of the target inventory item is abnormal.
In another aspect, the present application provides a transaction data verification apparatus, including: the detection module is used for detecting whether each checking strategy of the inventory item meets a preset checking condition;
the verification module is used for acquiring first transaction data of a first transaction according to a first verification strategy under the condition that the verification strategy meeting the preset verification condition is the first verification strategy if the preset verification condition is met; acquiring second transaction data and third transaction data associated with the first transaction, wherein the first transaction data, the second transaction data and the third transaction data are all transaction data of a target inventory item within a preset time period, and a transaction limit attribute value exists among the first transaction data, the second transaction data and the third transaction data in a target attribute; respectively extracting transaction attribute values of the target attributes in the first transaction data, the second transaction data and the third transaction data to obtain a first transaction attribute value, a second transaction attribute value and a third transaction attribute value; summing the first transaction attribute value, the second transaction attribute value and the third transaction attribute value to obtain the transaction attribute and the value of the target inventory item within a preset time period; based on the transaction limiting attribute value, verifying the transaction attribute and the transaction limiting attribute value to obtain a transaction data verification result;
and the determining module is used for determining that the data of the target inventory item is abnormal if the transaction data verification results are not matched.
In another aspect, the present application further provides a computer device, including:
one or more processors;
a memory; and
one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the processor to implement the transaction data verification method of any of the first aspects.
In a fourth aspect, the present application further provides a computer readable storage medium having a computer program stored thereon, the computer program being loaded by a processor to perform the steps of the transaction data verification method according to any one of the first aspect.
According to the embodiment of the application, by configuring the verification strategy, when the preset verification condition is met, each transaction data of the target inventory item in the preset time period can be automatically acquired according to the verification strategy meeting the preset condition, and automatic verification is carried out, so that timely verification of the target attribute value and the transaction limiting attribute value of the transaction data of the target inventory item is realized, the real-time property of abnormal discovery of the target inventory item data can be improved, the labor cost of data verification is reduced, the condition that the data error rate is increased when error data flow is transferred to a subsequent flow is reduced, the experience of a transaction party is improved, and the labor cost of data change is reduced.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings required to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the description below are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
FIG. 1 is a schematic flow chart diagram of one embodiment of a transaction data verification method provided in an embodiment of the present application;
FIG. 2 is a schematic flow chart of generating an alert notification provided in an embodiment of the present application;
FIG. 3 is a schematic diagram of an embodiment of a transaction data verification device provided in the embodiments of the present application;
fig. 4 is a schematic structural diagram of an embodiment of a computer device provided in an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
In the description of the present application, it is to be understood that the terms "center", "longitudinal", "lateral", "length", "width", "thickness", "upper", "lower", "front", "rear", "left", "right", "vertical", "horizontal", "top", "bottom", "inner", "outer", and the like indicate orientations or positional relationships based on those shown in the drawings, and are used merely for convenience of description and for simplicity of description, and do not indicate or imply that the referenced device or element must have a particular orientation, be constructed in a particular orientation, and be operated, and thus should not be considered as limiting the present application. Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, features defined as "first", "second", may explicitly or implicitly include one or more of the described features. In the description of the present application, "a plurality" means two or more unless specifically limited otherwise.
In this application, the word "exemplary" is used to mean "serving as an example, instance, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments. The following description is presented to enable any person skilled in the art to make and use the application. In the following description, details are set forth for the purpose of explanation. It will be apparent to one of ordinary skill in the art that the present application may be practiced without these specific details. In other instances, well-known structures and processes are not set forth in detail in order to avoid obscuring the description of the present application with unnecessary detail. Thus, the present application is not intended to be limited to the embodiments shown, but is to be accorded the widest scope consistent with the principles and features disclosed herein.
It should be noted that, since the method in the embodiment of the present application is executed in the electronic device, the processing objects of each electronic device all exist in the form of data or information, for example, time, which is substantially time information, and it is understood that, if the size, the number, the position, and the like are mentioned in the following embodiments, all corresponding data exist so as to be processed by the electronic device, and details are not described herein.
Embodiments of the present application provide a transaction data verification method, an apparatus, a computer device, and a storage medium, which are described in detail below.
First, an embodiment of the present application provides a transaction data verification method, where an execution subject of the transaction data verification method is a transaction data verification device, the transaction data verification device is applied to a computer device, and the transaction data verification method includes:
detecting whether each checking strategy of the inventory item meets a preset checking condition;
if the preset verification condition is met, under the condition that the verification strategy meeting the preset verification condition is a first verification strategy, acquiring first transaction data of a first transaction according to the first verification strategy;
acquiring second transaction data and third transaction data associated with the first transaction, wherein the first transaction data, the second transaction data and the third transaction data are all transaction data of a target inventory item within a preset time period, and a transaction limit attribute value exists among the first transaction data, the second transaction data and the third transaction data in a target attribute;
respectively extracting transaction attribute values of the target attributes in the first transaction data, the second transaction data and the third transaction data to obtain a first transaction attribute value, a second transaction attribute value and a third transaction attribute value;
summing the first transaction attribute value, the second transaction attribute value and the third transaction attribute value to obtain the transaction attribute and the value of the target inventory item within a preset time period;
based on the transaction limiting attribute value, verifying the transaction attribute and the transaction limiting attribute value to obtain a transaction data verification result;
and if the transaction data verification results are not matched, determining that the target inventory item data is abnormal.
According to the embodiment of the application, by configuring the verification strategy, when the preset verification condition is met, each transaction data of the target inventory item in the preset time period can be automatically acquired according to the verification strategy meeting the preset condition, and automatic verification is carried out, so that timely verification of the target attribute value and the transaction limiting attribute value of the transaction data of the target inventory item is realized, the real-time property of abnormal discovery of the target inventory item data can be improved, the labor cost of data verification is reduced, the situation that the data error rate is increased when the error data flow is transferred to a subsequent flow is reduced, the transaction error caused by the error data is reduced, the experience of a transaction party is improved, and the labor cost for changing the data can be further reduced.
As shown in fig. 1, which is a schematic flow chart of an embodiment of a transaction data verification method in an embodiment of the present application, the transaction data verification method includes:
step 101, detecting whether each checking strategy of the inventory item meets a preset checking condition.
In some embodiments, the preset check condition may include: and the checking time of the checking strategy is matched with the current time. Namely, step 101 further comprises: acquiring each checking time of each pre-configured checking strategy; and traversing each check time in the current check period, judging whether the traversed check time is in the current check period, and if so, obtaining a check strategy meeting the preset check condition according to the check strategy corresponding to the traversed check time. The embodiment of the application realizes the timing verification of the data of the target inventory item through the periodic polling verification time, so that the configuration of the verification time is more flexible and meets the requirements of users.
For example, the check time for checking by the check strategy may be configured by a cron expression. The verification time can be set by the user according to requirements. For example, the verification time avoids the transaction time of the transaction system, and a large amount of operations cannot be performed on the inventory item data in the time period, so that the influence of verification on user transaction is avoided.
The verification period can also be configured by the user according to requirements. For example, check cycles are configured in the morning and at noon, during which time periods the trader has not yet performed trading operations, to avoid checking the software and hardware resources required to preempt trading operations.
In some embodiments, the preset verification condition may include: checking that the policy is in an enabled state, wherein step 101 specifically includes: and judging whether each checking strategy of each inventory item is in an enabled state, and if so, judging that the checking strategy meets a preset checking condition. According to the embodiment of the application, the transaction data is more flexibly checked by disabling and enabling the checking strategy.
In some embodiments, the preset checking condition includes that the checking policy is in an enabled state, and the checking time of the checking policy matches with the current time.
The verification policy is configured by the user in accordance with verification requirements for the inventory item data. Before configuration of a verification policy, the device of the embodiment of the present application may receive a configuration request of a verification rule policy; the configuration request carries session parameters for identity authentication; if the session parameters are matched with the pre-configured session parameters, providing a visual user interface for configuring the verification rule strategy; and acquiring each configured verification rule strategy from the visual user interface. According to the embodiment of the application, certain users who pass identity authentication can carry out configuration of the verification strategy through configuration of fixed session (session), and the safety of inventory item data can be ensured.
The respective inventory item data may be stored in a database. The inventory item data may include information such as an amount of inventory items on shelves, an amount off shelves, a transaction order associated with the inventory item, an amount dialed, a total amount of inventory items put in, a total amount taken out of stock, a type of inventory item, a manufacturer, a model, a color of the inventory item, and the like. The verification policy may pass Structured Query Language (SQL) for verification, i.e., verify SQL configuration. The check SQL can only be used for query, and cannot include operations such as adding, modifying and deleting. Different check SQL is different check strategies.
In some embodiments, when the check policy meeting the preset condition is a second check policy, the stock quantity of the target inventory item is obtained according to the second check policy, and if the stock quantity of the target inventory item is a negative number, it is determined that the target inventory item data is abnormal.
According to the embodiment of the application, the abnormal conditions that the inventory quantity of the target inventory item is a negative value and the like can be found in time through the second verification strategy.
In some embodiments, under the condition that the verification strategy meeting the preset condition is a third verification strategy, acquiring the inventory quantity, the total quantity on shelves and the total quantity on shelves of the target inventory item according to the third verification strategy; and judging whether the total quantity on the shelves and the total quantity on the shelves are matched with the stock quantity of the target inventory item, and if not, determining that the data of the target inventory item is abnormal.
Specifically, a match is indicated if the sum of the racking total and the drop total equals the inventory amount of the target inventory item.
According to the embodiment of the application, the inventory quantity, the rack-up quantity and the rack-down quantity of the target inventory item can be checked in time through the third checking strategy.
It should be noted that, in addition to the second verification policy and the third verification policy, when the inventory item data is stored in a plurality of data tables, due to the circulation process of the order, some attribute values of some tables should be the same, so the verification SQL may be configured to verify whether some attribute values are the same in some tables according to the verification requirement of the inventory item data, or configured to verify whether the sum of data of some fields in some tables is equal to some value according to the verification requirement of the inventory item data. That is, the check SQL may be set as required, and the embodiment of the present application is not limited thereto.
The verification process when the verification policy satisfying the preset verification condition is the second verification policy, the third verification policy, and the like is mainly described above, and the verification process of the transaction data when the verification policy satisfying the preset verification condition is the first verification policy is described below, that is, the process proceeds to step 102.
Step 102, if the preset verification condition is met, under the condition that the verification strategy meeting the preset verification condition is the first verification strategy, obtaining first transaction data of the first transaction according to the first verification strategy.
The first transaction is a transaction regarding a target inventory item in a verification policy. The first transaction data includes: the data of the transaction order of the first transaction in the target inventory item data, for example, the transaction amount of the target inventory item, the unit price of the target inventory item of the first transaction, and the like, the buyer information, the seller information, and the like.
Step 103, second transaction data and third transaction data associated with the first transaction are obtained.
The first transaction data, the second transaction data and the third transaction data are all transaction data of the target inventory item in a preset time period, and transaction limit attribute values exist among the first transaction data, the second transaction data and the third transaction data in target attributes.
The target attribute is an attribute needing to be verified in the first verification strategy.
And 104, respectively extracting the transaction attribute values of the target attributes in the first transaction data, the second transaction data and the third transaction data to obtain a first transaction attribute value, a second transaction attribute value and a third transaction attribute value.
For example, the transaction attribute value is a transaction amount, the transaction amount of the target inventory item in the first transaction data, the second transaction data and the third transaction data may be extracted to obtain transaction amount 1, transaction amount 2 and transaction amount 3, and then step 105 is performed.
And 105, summing the first transaction attribute value, the second transaction attribute value and the third transaction attribute value to obtain the transaction attribute and the value of the target inventory item within a preset time period.
For example, the transaction attribute and value is the transaction amount and value of the target inventory item over a preset time period, transaction amount and value = transaction amount 1+ transaction amount 2+ transaction amount 3.
And 106, verifying the transaction attribute and the transaction value based on the transaction limit attribute value to obtain a transaction data verification result.
For example, the transaction limit attribute value is the actual inventory margin over the first transaction, the second transaction, and the third transaction. If the theoretical inventory balance calculated according to the transaction amount and the value of the target inventory item is different from the actual inventory balance, the transaction data verification result is proved to be unmatched.
And step 107, if the transaction data verification results are not matched, determining that the target inventory item data is abnormal.
The following briefly describes a process of performing verification according to the first verification policy, taking a specific verification scenario as an example.
If the target attribute value is the weight of the target inventory item in the transaction, the target inventory item is three, and the total weight is 10 tons, the first transaction, the second transaction and the third transaction respectively trade one target inventory item in a preset time period, the weight precision of the transaction system is two decimal places, and the transaction limit attribute value is the number of the current target inventory item.
Due to weight accuracy limitation, the target attribute values in the acquired first transaction data, second transaction data and third transaction data are all 3.33 tons, the transaction attribute sum value is 9.99 tons, and the target inventory item weight allowance is 0.01 ton according to the transaction attribute sum value, however, the number of the target inventory item is 0, and the verification proves that the target inventory item weight allowance is 0 ton instead of 0.01 ton under the condition that the transaction limitation attribute value, namely the current number of the target inventory item is 0, so that the transaction data verification is not matched, and the target inventory item weight allowance in the target inventory item data is abnormal.
In some embodiments, an alarm notification may also be sent according to an existing exception, and a specific flow may refer to fig. 2:
step 201, obtaining a warning notification template of the pre-configured abnormal target inventory item data.
The alarm notification template can be of various types, such as a mail alarm notification template, a short message alarm notification template and the like.
Information required to be sent to the alarm notifier, such as abnormal target inventory item data and the like, can be set in the alarm notification template.
A visual user interface may be provided for a user to select an alert notification template.
Step 202, generating an alarm notification according to the abnormal target inventory item data and the alarm notification template.
In some embodiments, after determining that the data of the target inventory item is abnormal, an exception handling scheme may be generated from the data of the target inventory item, and the exception handling scheme may also be entered into an alert notification template to generate an alert notification.
The exception handling scheme may be an exception handling SQL statement.
For example, when the target inventory item weight balance should be 0 tons instead of 0.01 tons, the function of the exception handling SQL statement is to change the 0.01 tons of the target inventory item weight balance to 0 tons.
Step 203, obtain an alert notification device associated with the abnormal target inventory item data.
Specifically, the alarm notification device is a device held by the alarm notifier, and reflects alarm notification device information, which may be a device IP address, a mailbox address, a telephone number, or the like.
Step 204, sending the alarm notification to the alarm notification device.
And sending the alarm notice to the alarm notice equipment through the alarm information.
In some embodiments, after sending to the alert notification device, the alert notification device may further monitor whether an exception data handling message is received, and if an exception data handling message is received, handle the exception target inventory item data according to an exception handling scheme. For example, an execution exception handles SQL statements. In addition, the embodiment monitors whether the abnormal data processing message is received or not, and whether the abnormal data processing message reflects whether the user agrees to use the abnormal processing scheme for processing or not is monitored, so that the requirements of the user can be better met.
The embodiment of the application can establish an alarm table, wherein the alarm table comprises: alarm name, check time configured by cron expression, check strategy configured by check SQL, alarm notification template, alarm notification device, and enable and disable states of check strategy. The user passing the identity authentication can set the information in the alarm table through a visual user interface.
The embodiment of the application can be used for configuring some data which possibly have problems, configuring a verification strategy, carrying out identity verification through session parameters before configuring the verification strategy so as to improve data security, then verifying through the configured verification strategy so as to be convenient for knowing and positioning the data abnormality before a trading user finds the data abnormality, updating a trading system and repairing the online data according to the positioned abnormality, thereby reducing the error rate of the related trading data of inventory articles, improving the experience of the trading user, sending an alarm notification like an alarm notifier after finding the abnormality, so that the trading user can stop operating the receipt in time after knowing the data abnormality, avoiding causing more problem receipts, reducing the workload brought to online data repair, and in addition, the embodiment of the application can provide an abnormal processing scheme of abnormal target inventory data, therefore, the data is automatically repaired, and the manpower is further reduced.
An embodiment of the present application further provides a transaction data verification apparatus, which is shown in fig. 3 and includes:
the detection module 301 is configured to detect whether each verification policy of the inventory item meets a preset verification condition;
the verification module 302 is configured to, if the preset verification condition is met, obtain first transaction data of a first transaction according to a first verification policy when the verification policy meeting the preset verification condition is the first verification policy; acquiring second transaction data and third transaction data associated with the first transaction, wherein the first transaction data, the second transaction data and the third transaction data are all transaction data of a target inventory item within a preset time period, and a transaction limit attribute value exists among the first transaction data, the second transaction data and the third transaction data in a target attribute; respectively extracting transaction attribute values of the target attributes in the first transaction data, the second transaction data and the third transaction data to obtain a first transaction attribute value, a second transaction attribute value and a third transaction attribute value; summing the first transaction attribute value, the second transaction attribute value and the third transaction attribute value to obtain the transaction attribute and the value of the target inventory item within a preset time period; based on the transaction limiting attribute value, verifying the transaction attribute and the transaction limiting attribute value to obtain a transaction data verification result;
the determining module 303 is configured to determine that the data of the target inventory item is abnormal if the transaction data verification result does not match.
In some embodiments of the present application, the preset verifying condition comprises: the checking time of the checking strategy is matched with the current time; the detection module 301 is further configured to obtain check times of the check policies configured in advance; and traversing all the verification time in the current verification period, judging whether the traversed verification time is in the current verification period, and if so, obtaining a verification strategy meeting the preset verification condition according to the verification strategy corresponding to the traversed verification time.
In some embodiments of the present application, the preset verifying condition comprises: the checking strategy is in an enabling state; the detection module 301 is further configured to determine that the check policy corresponding to the currently traversed check time meets a preset check condition if the check policy corresponding to the currently traversed check time is in an enabled state; and if the check strategy corresponding to the currently traversed check time is in a forbidden state, judging that the check strategy corresponding to the currently traversed check time does not meet a preset check condition.
In some embodiments of the present application, the determination module 303 is further configured to obtain an alert notification template of pre-configured abnormal target inventory item data; generating an alarm notice according to the abnormal target inventory item data and the alarm notice template; acquiring alarm notification equipment associated with the abnormal target inventory item data; and sending the alarm notification to the alarm notification device.
In some embodiments of the present application, the determining module 303 is further configured to generate an exception handling scheme according to the data of the abnormal target inventory item after the data of the determined target inventory item is abnormal; generating an alarm notification according to the abnormal target inventory item data and the alarm notification template, wherein the generating of the alarm notification comprises the following steps: inputting the abnormal processing scheme into the alarm notification template to generate an alarm notification; after the sending the alert notification to the alert notification device, the method further comprises: monitoring whether an abnormal data processing message is received; and if the abnormal data processing message is received, processing the abnormal target inventory item data according to the abnormal processing scheme.
In some embodiments of the present application, the detecting module 301 is further configured to receive a configuration request of a checking policy before whether each checking policy of the inventory item satisfies a preset checking condition; the configuration request carries session parameters for identity authentication; if the session parameters are matched with the pre-configured session parameters, providing a visual user interface for configuring the verification strategy; and acquiring configured verification strategies from the visual user interface.
In some embodiments of the present application, the verification module 302 is further configured to, if a predetermined condition is satisfied, the transaction data verification method further includes: under the condition that the check strategy meeting the preset condition is a second check strategy, acquiring the stock quantity of the target inventory item according to the second check strategy, and if the stock quantity of the target inventory item is a negative number, determining that the data of the target inventory item is abnormal; under the condition that the checking strategy meeting the preset condition is a third checking strategy, acquiring the inventory quantity, the total quantity on shelves and the total quantity on shelves of the target inventory item according to the third checking strategy; and judging whether the total quantity on the shelves and the total quantity on the shelves are matched with the stock quantity of the target inventory item, and if not, determining that the data of the target inventory item is abnormal.
An embodiment of the present application further provides a computer device, which integrates any one of the transaction data verification apparatuses provided in the embodiments of the present application, where the computer device includes:
one or more processors;
a memory; and
one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the processor for performing the steps of the transaction data verification method described in any of the above embodiments of the transaction data verification method.
The embodiment of the application also provides computer equipment which integrates any transaction data verification device provided by the embodiment of the application. Fig. 4 is a schematic diagram showing a structure of a computer device according to an embodiment of the present application, specifically:
the computer device may include components such as a processor 401 of one or more processing cores, memory 402 of one or more computer-readable storage media, a power supply 403, and an input unit 404. Those skilled in the art will appreciate that the computer device configuration shown in fig. 4 is not intended to be limiting of computer devices and may include more or fewer components than those shown, or some components may be combined, or a different arrangement of components. Wherein:
the processor 401 is a control center of the computer device, connects various parts of the entire computer device using various interfaces and lines, and performs various functions of the computer device and processes data by running or executing software programs and/or modules stored in the memory 402 and calling data stored in the memory 402, thereby monitoring the computer device as a whole. Optionally, processor 401 may include one or more processing cores; preferably, the processor 401 may integrate an application processor, which mainly handles operating systems, user interfaces, application programs, etc., and a modem processor, which mainly handles wireless communications. It will be appreciated that the modem processor described above may not be integrated into the processor 401.
The memory 402 may be used to store software programs and modules, and the processor 401 executes various functional applications and data processing by operating the software programs and modules stored in the memory 402. The memory 402 may mainly include a program storage area and a data storage area, wherein the program storage area may store an operating system, an application program required by at least one function (such as a sound playing function, an image playing function, etc.), and the like; the storage data area may store data created according to use of the computer device, and the like. Further, the memory 402 may include high speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid state storage device. Accordingly, the memory 402 may also include a memory controller to provide the processor 401 access to the memory 402.
The computer device further comprises a power supply 403 for supplying power to the various components, and preferably, the power supply 403 is logically connected to the processor 401 via a power management system, so that functions of managing charging, discharging, and power consumption are implemented via the power management system. The power supply 403 may also include any component of one or more dc or ac power sources, recharging systems, power failure detection circuitry, power converters or inverters, power status indicators, and the like.
The computer device may also include an input unit 404, the input unit 404 being operable to receive input numeric or character information and to generate keyboard, mouse, joystick, optical or trackball signal inputs related to user settings and function control.
Although not shown, the computer device may further include a display unit and the like, which are not described in detail herein. Specifically, in this embodiment, the processor 401 in the computer device loads the executable file corresponding to the process of one or more application programs into the memory 402 according to the following instructions, and the processor 401 runs the application programs stored in the memory 402, thereby implementing various functions.
It will be understood by those skilled in the art that all or part of the steps of the methods of the above embodiments may be performed by instructions or by associated hardware controlled by the instructions, which may be stored in a computer readable storage medium and loaded and executed by a processor.
To this end, an embodiment of the present application provides a computer-readable storage medium, which may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like. Stored thereon, is a computer program, which is loaded by a processor to execute the steps of any of the transaction data verification methods provided by the embodiments of the present application.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and parts that are not described in detail in a certain embodiment may refer to the above detailed descriptions of other embodiments, and are not described herein again.
In a specific implementation, each unit or structure may be implemented as an independent entity, or may be combined arbitrarily to be implemented as one or several entities, and the specific implementation of each unit or structure may refer to the foregoing method embodiment, which is not described herein again.
The above operations can be implemented in the foregoing embodiments, and are not described in detail herein.
The transaction data verification method, the transaction data verification device, the computer device and the storage medium provided by the embodiment of the present application are introduced in detail, a specific example is applied in the present application to explain the principle and the implementation of the present application, and the description of the above embodiment is only used to help understand the method and the core idea of the present application; meanwhile, for those skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (10)

1. A transaction data verification method, characterized in that the transaction data verification method comprises:
detecting whether each checking strategy of the inventory item meets a preset checking condition;
if the preset verification condition is met, under the condition that the verification strategy meeting the preset verification condition is a first verification strategy, acquiring first transaction data of a first transaction according to the first verification strategy;
acquiring second transaction data and third transaction data associated with the first transaction, wherein the first transaction data, the second transaction data and the third transaction data are all transaction data of a target inventory item within a preset time period, and a transaction limit attribute value exists among the first transaction data, the second transaction data and the third transaction data in a target attribute;
respectively extracting transaction attribute values of the target attributes in the first transaction data, the second transaction data and the third transaction data to obtain a first transaction attribute value, a second transaction attribute value and a third transaction attribute value;
summing the first transaction attribute value, the second transaction attribute value and the third transaction attribute value to obtain the transaction attribute and the value of the target inventory item within a preset time period;
based on the transaction limiting attribute value, verifying the transaction attribute and the transaction limiting attribute value to obtain a transaction data verification result;
and if the transaction data verification results are not matched, determining that the target inventory item data is abnormal.
2. The transaction data verification method of claim 1, wherein the preset verification condition comprises: the checking time of the checking strategy is matched with the current time;
the detecting whether each checking strategy of the inventory item meets a preset checking condition includes:
acquiring each preset checking time of each checking strategy;
and traversing all the verification time in the current verification period, judging whether the traversed verification time is in the current verification period, and if so, obtaining a verification strategy meeting the preset verification condition according to the verification strategy corresponding to the traversed verification time.
3. The transaction data verification method of claim 2, wherein the preset verification condition comprises: the checking strategy is in an enabling state;
the obtaining of the verification strategy meeting the preset verification condition according to the verification strategy corresponding to the currently traversed verification time includes:
if the check strategy corresponding to the currently traversed check time is in an enabled state, judging that the check strategy corresponding to the currently traversed check time meets the preset check condition;
and if the check strategy corresponding to the currently traversed check time is in a forbidden state, judging that the check strategy corresponding to the currently traversed check time does not meet the preset check condition.
4. The transaction data verification method of claim 1, further comprising:
acquiring a warning notification template of pre-configured abnormal target inventory item data;
generating an alarm notice according to the abnormal target inventory item data and the alarm notice template;
acquiring alarm notification equipment associated with the abnormal target inventory item data;
and sending the alarm notification to the alarm notification device.
5. The transaction data verification method of claim 4, wherein after determining that there is an anomaly in the data for the target inventory item, the method further comprises:
generating an exception handling scheme according to the exception target inventory item data;
generating an alarm notification according to the abnormal target inventory item data and the alarm notification template, wherein the generating of the alarm notification comprises the following steps:
inputting the abnormal processing scheme into the alarm notification template to generate an alarm notification;
after the sending the alert notification to the alert notification device, the method further comprises:
monitoring whether an abnormal data processing message is received;
and if the abnormal data processing message is received, processing the abnormal target inventory item data according to the abnormal processing scheme.
6. The transaction data verification method of claim 1, wherein prior to the detecting whether each verification policy for the inventory item satisfies a preset verification condition, the method further comprises:
receiving a configuration request of a verification strategy; the configuration request carries session parameters for identity authentication;
if the session parameters are matched with the pre-configured session parameters, providing a visual user interface for configuring the verification strategy;
and acquiring configured verification strategies from the visual user interface.
7. The transaction data verification method according to any one of claims 1 to 6, wherein if a preset condition is satisfied, the transaction data verification method further comprises:
under the condition that the check strategy meeting the preset condition is a second check strategy, acquiring the stock quantity of the target inventory item according to the second check strategy, and if the stock quantity of the target inventory item is a negative number, determining that the data of the target inventory item is abnormal;
under the condition that the checking strategy meeting the preset condition is a third checking strategy, acquiring the inventory quantity, the total quantity on shelves and the total quantity on shelves of the target inventory item according to the third checking strategy;
and judging whether the total quantity on the shelves and the total quantity on the shelves are matched with the stock quantity of the target inventory item, and if not, determining that the data of the target inventory item is abnormal.
8. A transaction data verification device, comprising:
the detection module is used for detecting whether each checking strategy of the inventory item meets a preset checking condition;
the verification module is used for acquiring first transaction data of a first transaction according to a first verification strategy under the condition that the verification strategy meeting the preset verification condition is the first verification strategy if the preset verification condition is met; acquiring second transaction data and third transaction data associated with the first transaction, wherein the first transaction data, the second transaction data and the third transaction data are all transaction data of a target inventory item within a preset time period, and a transaction limit attribute value exists among the first transaction data, the second transaction data and the third transaction data in a target attribute; respectively extracting transaction attribute values of the target attributes in the first transaction data, the second transaction data and the third transaction data to obtain a first transaction attribute value, a second transaction attribute value and a third transaction attribute value; summing the first transaction attribute value, the second transaction attribute value and the third transaction attribute value to obtain the transaction attribute and the value of the target inventory item within a preset time period; based on the transaction limiting attribute value, verifying the transaction attribute and the transaction limiting attribute value to obtain a transaction data verification result;
and the determining module is used for determining that the data of the target inventory item is abnormal if the transaction data verification results are not matched.
9. A computer device, characterized in that the computer device comprises:
one or more processors;
a memory; and
one or more application programs, wherein the one or more application programs are stored in the memory and configured to be executed by the processor to implement the transaction data verification method of any of claims 1 to 7.
10. A computer-readable storage medium having stored thereon a computer program which is loaded by a processor to perform the steps of the transaction data verification method of any one of claims 1 to 7.
CN202210426213.5A 2022-04-22 2022-04-22 Transaction data verification method and device, computer equipment and storage medium Pending CN114548952A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210426213.5A CN114548952A (en) 2022-04-22 2022-04-22 Transaction data verification method and device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210426213.5A CN114548952A (en) 2022-04-22 2022-04-22 Transaction data verification method and device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114548952A true CN114548952A (en) 2022-05-27

Family

ID=81667683

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210426213.5A Pending CN114548952A (en) 2022-04-22 2022-04-22 Transaction data verification method and device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114548952A (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06208576A (en) * 1993-01-11 1994-07-26 Toshiba Corp Stock controller
CN106055432A (en) * 2016-05-31 2016-10-26 乐视控股(北京)有限公司 Inventory backup method and system of target item, and inventory backup execution module of target item
CN106156987A (en) * 2016-08-31 2016-11-23 成都聚美优品科技有限公司 The equalization methods of inventory variance and device
CN106845881A (en) * 2015-12-04 2017-06-13 阿里巴巴集团控股有限公司 A kind of detection method of stock abnormal data, device and electronic equipment
CN109685428A (en) * 2018-12-27 2019-04-26 拉扎斯网络科技(上海)有限公司 A kind of data processing method, device, storage medium and electronic equipment
CN111383088A (en) * 2020-03-04 2020-07-07 海南金盘智能科技股份有限公司 Checking method and related device for warehousing accounts
CN111680068A (en) * 2020-06-02 2020-09-18 深圳乐信软件技术有限公司 Verification method, device, equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JPH06208576A (en) * 1993-01-11 1994-07-26 Toshiba Corp Stock controller
CN106845881A (en) * 2015-12-04 2017-06-13 阿里巴巴集团控股有限公司 A kind of detection method of stock abnormal data, device and electronic equipment
CN106055432A (en) * 2016-05-31 2016-10-26 乐视控股(北京)有限公司 Inventory backup method and system of target item, and inventory backup execution module of target item
CN106156987A (en) * 2016-08-31 2016-11-23 成都聚美优品科技有限公司 The equalization methods of inventory variance and device
CN109685428A (en) * 2018-12-27 2019-04-26 拉扎斯网络科技(上海)有限公司 A kind of data processing method, device, storage medium and electronic equipment
CN111383088A (en) * 2020-03-04 2020-07-07 海南金盘智能科技股份有限公司 Checking method and related device for warehousing accounts
CN111680068A (en) * 2020-06-02 2020-09-18 深圳乐信软件技术有限公司 Verification method, device, equipment and storage medium

Similar Documents

Publication Publication Date Title
US9601000B1 (en) Data-driven alert prioritization
WO2021003970A1 (en) Production line monitoring method and apparatus, and electronic device and readable storage medium
CN111983412B (en) Monitoring system, monitoring method, monitoring terminal and storage medium
CN115344888A (en) Data access method and device, electronic equipment and storage medium
CN112465446A (en) Work order data processing method and device, electronic equipment and storage medium
CN111710403B (en) Medical equipment supervision method, equipment and readable storage medium
CN114548952A (en) Transaction data verification method and device, computer equipment and storage medium
CN109039714A (en) The management method and device of resource in cloud computing system
CN108259248A (en) The configuration method and device of queue management device
CN115190044A (en) Equipment connection state checking method, device, equipment and storage medium
US10248110B2 (en) Graph theory and network analytics and diagnostics for process optimization in manufacturing
CN103870325B (en) Flow engine processing method
CN115496567A (en) Delivery filing method, device, equipment and storage medium
CN113554328A (en) Point inspection task supervision system, method and device based on strong association with device startup
CN115098505A (en) Method and device for changing table structure of database and electronic equipment
CN112667512A (en) Data drive test method, device, equipment and computer readable storage medium
CN110348984B (en) Automatic credit card data input method and related equipment under different transaction channels
WO2024046470A1 (en) Weighing abnormality detection method and apparatus, and related apparatus
CN115829287B (en) Goods distribution method and device
CN114265390B (en) Equipment data acquisition diagnosis method, device, server and storage medium
CN113849362B (en) Business service platform management method, device and computer readable storage medium
CN114625640B (en) Software test project management method and device, storage medium and electronic equipment
CN110502404B (en) Early warning processing method based on data management platform and related equipment
CN115809850A (en) Project establishment method, device, equipment and storage medium
CN116109112B (en) Service data processing method, device, medium and equipment based on aggregation interface

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20220527