CN114844956A - Message checking method and device, storage medium and electronic equipment - Google Patents

Message checking method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN114844956A
CN114844956A CN202210396103.9A CN202210396103A CN114844956A CN 114844956 A CN114844956 A CN 114844956A CN 202210396103 A CN202210396103 A CN 202210396103A CN 114844956 A CN114844956 A CN 114844956A
Authority
CN
China
Prior art keywords
message
character
format
item
risk
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202210396103.9A
Other languages
Chinese (zh)
Other versions
CN114844956B (en
Inventor
宋雨新
王凯
黄振飞
陈磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202210396103.9A priority Critical patent/CN114844956B/en
Publication of CN114844956A publication Critical patent/CN114844956A/en
Application granted granted Critical
Publication of CN114844956B publication Critical patent/CN114844956B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L69/00Network arrangements, protocols or services independent of the application payload and not provided for in the other groups of this subclass
    • H04L69/08Protocols for interworking; Protocol conversion
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information

Abstract

The application discloses a message checking method, a message checking device, a storage medium and electronic equipment. The application relates to the field of financial science and technology, and the method comprises the following steps: acquiring a message to be checked, matching the content of a message item in the message to be checked with characters in a standard character set, and determining the message item failed in matching as a risk message item; determining the type of the risk message item, and determining the risk level of the risk message item according to the type of the risk message item and the message risk level relation model; correcting the content of a message item in the message to be checked according to the risk level and the illegal character mapping relation set to obtain a first corrected message; and correcting the format of the message item in the first corrected message according to the message format rule set to obtain a second corrected message. By the method and the device, the problems that message information is lost and message formats are abnormal easily caused by a message checking method in the related technology are solved.

Description

Message checking method and device, storage medium and electronic equipment
Technical Field
The application relates to the field of financial science and technology, in particular to a method and a device for message verification, a storage medium and electronic equipment.
Background
In The core bank system, The remittance message is remitted to generate a message after transaction information is extracted from each channel and product, and The remittance message is remitted through a SWIFT (The Society for world wide Inter-bank Financial Telecommunication association) network. Because transaction information sources of different channels and products are different and the message registration rules are not uniform, remittance messages of banks in different areas have poor adaptability to a universal remittance message standard (SWIFT standard) in content and format, and therefore, the remittance messages need to be checked through the SWIFT standard.
The method for checking the message in the related technology comprises the steps of firstly matching the message item with the SWIFT standard, determining the message item which fails to be matched, replacing all information contained in the message item which fails to be matched with null, and then sending the message to an opposite bank or a financial institution through the SWIFT network. However, emptying the content of the unverified and unverified message items can cause message information loss, and affect the accuracy of the remittance message received by the opposite bank or the financial institution. In addition, the existing method for checking the remittance message does not consider the influence of the splitting of the transaction information on the message format, so that the problem that the message is returned due to the abnormal message format easily occurs, and the timeliness of receiving the remittance message by an opposite bank or a financial institution is influenced.
Aiming at the problems that the message verification method in the related technology easily causes message information loss and message format abnormity, an effective solution is not provided at present.
Disclosure of Invention
The application provides a message checking method, a message checking device, a storage medium and electronic equipment, which are used for solving the problems that message information is easily lost and message formats are abnormal due to a message checking method in the related technology.
According to one aspect of the present application, a method for message verification is provided. The method comprises the following steps: acquiring a message to be checked, matching the content of a message item in the message to be checked with characters in a standard character set, and determining the message item failed in matching as a risk message item, wherein the standard character set is a set of characters contained in the standard message; determining the type of a risk message item, and determining the risk level of the risk message item according to the type of the risk message item and a message risk level relation model, wherein the message risk level relation model is used for representing the mapping relation between the type of the message item and the risk level; correcting the content of a message item in a message to be checked according to the risk level and an illegal character mapping relation set to obtain a first corrected message, wherein the illegal character mapping relation set is used for representing the mapping relation between illegal characters and standard content characters; and correcting the format of the message item in the first corrected message according to the message format rule set to obtain a second corrected message.
Optionally, before obtaining the message to be verified and matching the content of the message item in the message to be verified with the characters in the standard character set, the method further includes: obtaining message key elements from the historical messages, wherein the message key elements at least comprise one of the following components: message type, message item, risk level of the message item, illegal character, standard content character and standard format character; determining a mapping relation between the type and the risk level of the message item to obtain a first mapping relation, and establishing a message risk level relation model according to the type, the risk level and the first mapping relation of the message item; determining a mapping relation between the illegal character and the standard content character to obtain a second mapping relation, and establishing an illegal character mapping relation set according to the illegal character, the standard content character and the second mapping relation; and determining a mapping relation between the abnormal format character and the standard format character to obtain a third mapping relation, and establishing a message format rule set according to the abnormal format character, the standard format character and the third mapping relation. By establishing a message risk level relation model, an illegal character mapping relation set and a message format rule set, matching illegal characters and abnormal format characters in the checked message and replacing the illegal characters and abnormal format characters with standard content characters and standard format characters, the problems of message information loss and message format abnormity can be avoided after the message is checked.
Optionally, the risk levels include a first risk level and a second risk level, where a risk probability of the second risk level is greater than a risk probability of the first risk level, and modifying the content of the message item in the message to be verified according to the risk levels and the illegal character mapping relationship set includes: under the condition that the risk level of the risk message item is a first risk level, processing illegal characters in the risk message item through an illegal character mapping relation set; and sending alarm information under the condition that the risk level of the risk message item is a second risk level. By correcting the content of the message item in the message to be verified according to the risk level and the illegal character mapping relation set, corresponding correction measures can be taken for the content in the message to be verified according to different risk levels, and the message content can be corrected more accurately.
Optionally, when the risk level of the risk packet item is the first risk level, processing the illegal character in the risk packet item through the illegal character mapping relationship set includes: judging whether the illegal character exists in the illegal character mapping relation set or not; replacing the illegal character with a standard content character corresponding to the illegal character under the condition that the illegal character exists in the illegal character mapping relation set; under the condition that the illegal character does not exist in the illegal character mapping relation set, calculating the similarity between each standard content character in the illegal character mapping relation set and the illegal character by using a similarity matching algorithm, and determining the standard content character corresponding to the highest similarity as a first target character; and judging whether the highest similarity is greater than a first similarity threshold, replacing the illegal character with a first target character under the condition that the highest similarity is greater than the first similarity threshold, and replacing the illegal character with a null character under the condition that the highest similarity is less than or equal to the first similarity threshold. And processing the illegal characters in the risk message items through the illegal character mapping relation set, so that the key information of the message can not be lost.
Optionally, modifying the format of the packet item in the first modified packet according to the packet format rule set, and obtaining the second modified packet includes: determining the abnormal format character of the message item in the first corrected message, and judging whether the abnormal format character exists in a message format rule set; replacing the abnormal format character with a standard format character corresponding to the abnormal format character under the condition that the abnormal format character exists in the message format rule set; under the condition that the format abnormal characters do not exist in the message format rule set, calculating the similarity between each standard format character in the message format rule set and the format abnormal characters by using a similarity matching algorithm, and determining the standard format character corresponding to the highest similarity as a second target character; and judging whether the highest similarity is greater than a second similarity threshold, replacing the abnormal format character with a second target character under the condition that the highest similarity is greater than the second similarity threshold, and replacing the abnormal format character with a null character under the condition that the highest similarity is less than or equal to the second similarity threshold. The format of the message item in the first correction message is corrected according to the message format rule set to obtain a second correction message, so that the message format can be standardized, and the problem that the message is returned due to abnormal message format is avoided.
Optionally, after the format of the packet item in the first corrected packet is corrected according to the packet format rule set to obtain a second corrected packet, the method further includes: under the condition that the risk level of the risk message item is a first risk level, generating first alarm information, and triggering the rechecking operation of a second correction message according to the first alarm information, wherein the first alarm information at least comprises the message item and the alarm time of the second correction message; and under the condition that the risk level of the risk message item is a second risk level, generating second alarm information, and sending a first correction instruction according to the second alarm information, wherein the second alarm information at least comprises the message item and the alarm time of the second correction message, and the first correction instruction is used for indicating that the illegal character in the second correction message is corrected. The alarm information is sent to prompt that the message to be checked has problems in content or format and needs to be corrected, so that the problem message can be monitored in real time, and response processing can be timely carried out.
Optionally, when the risk level of the risk packet item is the first risk level, generating first warning information, and after triggering a rechecking operation of the second correction packet according to the first warning information, the method further includes: judging whether the processing operation of the content and the processing operation of the format of the message item are correct or not; under the condition that the processing operation of the content and the processing operation of the format are both correct, updating an illegal character mapping relation set according to the processing operation of the content, and updating a message format rule set according to the processing operation of the format; under the condition that the processing operation of the content or the processing operation of the format is incorrect, a second correction instruction is sent out, and whether the correction operation responding to the second correction instruction is received or not is detected, wherein the second correction instruction is used for indicating that the content or the format of the message item is corrected; and under the condition of receiving the correction operation, updating the illegal character mapping relation set or the message format rule set according to the correction operation. By updating the illegal character mapping relation set and the message format rule set, the effects of efficiently checking the message and saving manpower can be achieved.
According to another aspect of the present application, an apparatus for message verification is provided. The device includes: the system comprises an acquisition unit, a verification unit and a verification unit, wherein the acquisition unit is used for acquiring a message to be verified, matching the content of a message item in the message to be verified with characters in a standard character set, and determining the message item failed in matching as a risk message item, wherein the standard character set is a set of characters contained in the standard message; the determining unit is used for determining the type of the risk message item and determining the risk level of the risk message item according to the type of the risk message item and the message risk level relation model, wherein the message risk level relation model is used for representing the mapping relation between the type of the message item and the risk level; the first correction unit is used for correcting the content of a message item in the message to be checked according to the risk level and the illegal character mapping relation set to obtain a first corrected message, wherein the illegal character mapping relation set is used for representing the mapping relation between illegal characters and standard content characters; and the second correcting unit is used for correcting the format of the message item in the first corrected message according to the message format rule set to obtain a second corrected message.
According to another aspect of the embodiments of the present invention, a computer storage medium is further provided, where the computer storage medium is used to store a program, and the program, when running, controls a device in which the computer storage medium is located to execute a method for message verification.
According to another aspect of the embodiments of the present invention, there is also provided an electronic device, including one or more processors and a memory; the memory has stored therein computer readable instructions, and the processor is configured to execute the computer readable instructions, wherein the computer readable instructions when executed perform a method of message verification.
Through the application, the following steps are adopted: acquiring a message to be checked, matching the content of a message item in the message to be checked with characters in a standard character set, and determining the message item failed in matching as a risk message item, wherein the standard character set is a set of characters contained in the standard message; determining the type of a risk message item, and determining the risk level of the risk message item according to the type of the risk message item and a message risk level relation model, wherein the message risk level relation model is used for representing the mapping relation between the type of the message item and the risk level; correcting the content of a message item in a message to be checked according to the risk level and an illegal character mapping relation set to obtain a first corrected message, wherein the illegal character mapping relation set is used for representing the mapping relation between illegal characters and standard content characters; and correcting the format of the message item in the first corrected message according to the message format rule set to obtain a second corrected message, so that the problems of message information loss and message format abnormity easily caused by a message verification method in the related technology are solved. By checking the message content, replacing the illegal characters with standard content characters, then checking the message format, and replacing the abnormal format characters with standard format characters, the effect that the receiver can quickly and accurately receive the checked message is achieved.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this application, illustrate embodiments of the application and, together with the description, serve to explain the application and are not intended to limit the application. In the drawings:
fig. 1 is a flowchart of a method for message verification according to an embodiment of the present application;
fig. 2 is a flowchart of an optional message checking method provided in an embodiment of the present application;
fig. 3 is a schematic diagram of a device for message verification provided in an embodiment of the present application;
fig. 4 is a schematic diagram of an electronic device provided according to an embodiment of the present application.
Detailed Description
It should be noted that the embodiments and features of the embodiments in the present application may be combined with each other without conflict. The present application will be described in detail below with reference to the embodiments with reference to the attached drawings.
In order to make the technical solutions better understood by those skilled in the art, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only partial embodiments of the present application, but not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of this application and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It should be understood that the data so used may be interchanged under appropriate circumstances such that embodiments of the application described herein may be used. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be noted that, the user information (including but not limited to user device information, user personal information, etc.) and data (including but not limited to data for presentation, analyzed data, etc.) referred to in the present disclosure are information and data authorized by the user or sufficiently authorized by each party.
For convenience of description, some terms or expressions referred to in the embodiments of the present application are explained below:
a core bank system: refers to a banking core business system in the financial industry.
Cross-border remittance: it is a service of remittance to a receiver who makes an account with a bank in an overseas country or region.
SWIFT: the Society for world wide Inter-bank Financial telecommunications is a Financial cooperation organization with non-profit among international banking industries, mainly provides Financial message service, and is based on nine, seven and three years.
Remittance message: the Message refers to a Message, and service data transmitted on a network exists in a Message form. According to the requirements of SWIFT organization, the messages have certain structure and kinds, and the meaning of each kind of message is different, and the messages transmitted and received on the SWIFT network must conform to the standard of SWIFT requirements.
According to the embodiment of the application, a message checking method is provided.
Fig. 1 is a flowchart of a method for message verification according to an embodiment of the present application. As shown in fig. 1, the method comprises the steps of:
step S102, obtaining a message to be checked, matching the content of a message item in the message to be checked with characters in a standard character set, and determining the message item failed in matching as a risk message item, wherein the standard character set is a set of characters contained in the standard message.
Specifically, the message to be verified may be a remittance message that the core bank system needs to remit to other financial institutions, the standard character set is a character set formed by summarizing legal characters meeting the international universal remittance message standard, the content of the message item is matched with characters in the standard character set, if the content of the message item exists in the standard character set, the matching is successful, it is indicated that the content of the message item meets the international universal remittance message standard, no content correction is needed, otherwise, the matching is failed, it is indicated that the content of the message item does not meet the international universal remittance message standard, the message item has a risk of making other financial institutions unable to obtain accurate message information, and therefore, the message item is determined to be a risk message item and needs to be corrected in time.
And step S104, determining the type of the risk message item, and determining the risk level of the risk message item according to the type of the risk message item and the message risk level relation model, wherein the message risk level relation model is used for representing the mapping relation between the type of the message item and the risk level.
Specifically, the type of the message item includes a user name, an address, an epitopic, account information, and the like, for example, the epitopic belongs to non-important information, in the message risk level relationship model, the epitopic corresponds to a first risk level, and the address and the account information belong to important information, in the message risk level relationship model, the address and the account information correspond to a second risk level, and whether the risk message item is the first risk level or the second risk level is determined according to the type of the message item to which the risk message item belongs and the message risk level relationship model.
And S106, correcting the content of the message item in the message to be checked according to the risk level and the illegal character mapping relation set to obtain a first corrected message, wherein the illegal character mapping relation set is used for representing the mapping relation between the illegal character and the standard content character.
Specifically, the illegal character mapping relationship set is sorted and trained according to the corresponding relationship that illegal characters in the history message are replaced by standard content characters, after the illegal characters are checked, the standard content characters corresponding to the illegal characters can be determined according to the illegal character mapping relationship set, and the illegal characters in the content of the risk message item are correspondingly corrected.
And S108, correcting the format of the message item in the first corrected message according to the message format rule set to obtain a second corrected message.
Specifically, the message format rule set is sorted and trained according to the corresponding relation that the format abnormal characters in the historical messages are replaced by the standard format characters, and after the format abnormal characters are checked, the format of the message item with the abnormal format can be correspondingly corrected according to the message format rule set.
According to the message verification method provided by the embodiment of the application, the content of a message item in the message to be verified is matched with the characters in a standard character set by acquiring the message to be verified, and the message item failed in matching is determined as a risk message item, wherein the standard character set is a set of characters contained in the standard message; determining the type of a risk message item, and determining the risk level of the risk message item according to the type of the risk message item and a message risk level relation model, wherein the message risk level relation model is used for representing the mapping relation between the type of the message item and the risk level; correcting the content of a message item in a message to be checked according to the risk level and an illegal character mapping relation set to obtain a first corrected message, wherein the illegal character mapping relation set is used for representing the mapping relation between illegal characters and standard content characters; and correcting the format of the message item in the first corrected message according to the message format rule set to obtain a second corrected message, so that the problems of message information loss and message format abnormity easily caused by a message verification method in the related technology are solved. By checking the message content, replacing the illegal characters with standard content characters, then checking the message format, and replacing the abnormal format characters with standard format characters, the effect that the receiver can quickly and accurately receive the checked message is achieved.
Optionally, in the method for message verification provided in the embodiment of the present application, before obtaining a message to be verified and matching the content of a message item in the message to be verified with a character in a standard character set, the method further includes: obtaining message key elements from the historical messages, wherein the message key elements at least comprise one of the following components: message type, message item, risk level of the message item, illegal character, standard content character and standard format character; determining a mapping relation between the type and the risk level of the message item to obtain a first mapping relation, and establishing a message risk level relation model according to the type, the risk level and the first mapping relation of the message item; determining a mapping relation between the illegal character and the standard content character to obtain a second mapping relation, and establishing an illegal character mapping relation set according to the illegal character, the standard content character and the second mapping relation; and determining a mapping relation between the abnormal format character and the standard format character to obtain a third mapping relation, and establishing a message format rule set according to the abnormal format character, the standard format character and the third mapping relation.
Specifically, the message risk level relation model is established according to three elements, namely a message type, a message item and a risk level of the message item, wherein the message type is divided according to different financial institutions receiving messages, the message item is divided according to different types of the message item, the risk level corresponding to the message item containing key element information such as a username and an address is defined as H, high risk is shown, namely, an illegal character is replaced by a standard content character to cause an error of message transmitted information, the business influence corresponding to the content of the message item is large, the risk level corresponding to the message item containing non-key element information such as a postscript is defined as L, low risk is shown, namely, the illegal character is replaced by the standard content character to cause an error of message transmitted information, and the business influence corresponding to the content of the message item is small. For example, table 1 shows a message risk level relationship model, where the message 61 with the message type MT950 in the table is a low risk message item, and the message 50 with the message type MT103 is a high risk message item.
TABLE 1
Type of message Message item Risk rating
MT950 61 L
MT103 50 H
The illegal character mapping relation set is established according to four elements of a content rule number, an illegal character, a standard content character and a state, the illegal character mapping relation set comprises a plurality of mapping rules, each mapping rule corresponds to a unique content rule number, each mapping rule provides a mapping relation between a pair of illegal characters and the standard content character, each mapping rule corresponds to state information in the illegal character mapping relation set, the state information designates two dictionary values, Y represents that the rule is enabled, the message content is verified by using the current rule, N represents that the rule is not enabled, the message content is verified without using the current rule, and the message content is enabled after a service worker completes the rule. For example, table 2 is a model of an illegal character mapping relationship set, and the check rule with the content rule number 1 in table 2 indicates that the rule is enabled, and replaces the illegal character "_" with the standard content character "-"; the verification rule with the content rule number of 2 indicates that the rule is not started and the characters cannot be replaced according to the mapping relation; the check rule with the content rule number 3 indicates that the rule is enabled, and replaces the illegal character "@" with a space.
TABLE 2
Content rule numbering Illegal character Standard content characters Status of state
1 _ - Y
2 The cell of the Jing JING N
3 @ Y
The message format rule set is established according to seven elements of format rule numbers, message types, message items, lines, columns, characters, relations and standard format characters, the message format rule set comprises a plurality of format check rules, each format check rule corresponds to a unique format rule number, each format check rule corresponds to the format rule check requirements of a line and a column corresponding to one message item under one message type, if the line a and the column b of the message item meet the check requirements, the rule is skipped, the next rule check is used, if the check requirements are not met, the characters at the corresponding positions are replaced by standard format characters, for example, the table 3 is a model of the message format rule set, the check rule with the rule number of 1 in the table 3 represents the 2 nd line 1 of the MT940 message 86 item, the character is not allowed to appear, if the check finds the character, the "/" standard format character substitution is used.
TABLE 3
Figure BDA0003599010590000081
The embodiment of the method establishes a message risk level relation model, an illegal character mapping relation set and a message format rule set, matches illegal characters and abnormal format characters in the message with the verification function, and replaces the illegal characters and the abnormal format characters with standard content characters and standard format characters, so that the problems of message information loss and abnormal message format can not occur after the message is verified.
Optionally, in the method for verifying a message provided in this embodiment of the present application, the risk levels include a first risk level and a second risk level, where a risk probability of the second risk level is greater than a risk probability of the first risk level, and the modifying, according to the risk levels and the illegal character mapping relationship set, the content of the message item in the message to be verified includes: processing the illegal characters in the risk message item through the illegal character mapping relation set under the condition that the risk level of the risk message item is a first risk level; and sending alarm information under the condition that the risk level of the risk message item is a second risk level.
Specifically, under the condition that the risk level of the risk message item is the first risk level, the illegal characters in the risk message item are processed, it is not necessary to worry about that the transmitted message information is inaccurate due to errors of the illegal character mapping relation set, the message information can be directly processed through the system, under the condition that the risk level of the risk message item is the second risk level, the transmitted message information is inaccurate due to errors of the illegal character mapping relation set, the influence degree on the service is large, the message cannot be directly processed through the system, and warning information needs to be sent to inform a worker to process the message. By correcting the content of the message item in the message to be verified according to the risk level and the illegal character mapping relation set, corresponding correction measures can be taken for the content in the message to be verified according to different risk levels, and the accuracy of correcting the content of the message can be improved.
Optionally, in the method for message verification provided in this embodiment of the present application, when the risk level of the risk message item is the first risk level, processing the illegal character in the risk message item through the illegal character mapping relationship set includes: judging whether the illegal character exists in the illegal character mapping relation set or not; replacing the illegal character with a standard content character corresponding to the illegal character under the condition that the illegal character exists in the illegal character mapping relation set; under the condition that the illegal character does not exist in the illegal character mapping relation set, calculating the similarity between each standard content character in the illegal character mapping relation set and the illegal character by using a similarity matching algorithm, and determining the standard content character corresponding to the highest similarity as a first target character; and judging whether the highest similarity is greater than a first similarity threshold, replacing the illegal character with a first target character under the condition that the highest similarity is greater than the first similarity threshold, and replacing the illegal character with a null character under the condition that the highest similarity is less than or equal to the first similarity threshold.
Specifically, under the condition that the risk level is L, that is, when the risk level of the risk message item is the first risk level, sequentially querying the check rule with the state of Y in the illegal character mapping relationship set, and if the illegal character of the risk message item is matched with the check rule with the state of Y in the illegal character mapping relationship set, directly replacing the illegal character with the standard content character under the corresponding check rule; if the illegal character of the risk message item is not matched with the check rule with the state of Y in the mapping relation set of the illegal characters, a similarity matching algorithm is used for calculating the similarity between the character in the check rule with the state of Y and the current illegal character, the standard content character corresponding to the highest similarity is obtained and determined as a first target character, whether the similarity is larger than a first similarity threshold value is judged, if the similarity is larger than the first similarity threshold value, the illegal character is replaced by the first target character, otherwise, the illegal character is replaced by a null character, meanwhile, a check rule is additionally arranged in the mapping relation set of the illegal character, the rule numbering sequence is increased progressively, the illegal character field is registered as the illegal character in the current message item, the mapping character field is registered as the null character, and the state is registered as N. The illegal characters in the risk message items are processed through the illegal character mapping relation set, and compared with a correction mode of replacing the illegal characters with blank spaces, the method can ensure that key information of the message is not lost.
Optionally, in the method for verifying a message provided in the embodiment of the present application, the modifying the format of the message item in the first modified message according to the message format rule set to obtain the second modified message includes: determining the abnormal format character of the message item in the first corrected message, and judging whether the abnormal format character exists in a message format rule set; replacing the abnormal format character with a standard format character corresponding to the abnormal format character under the condition that the abnormal format character exists in the message format rule set; under the condition that the format abnormal characters do not exist in the message format rule set, calculating the similarity between each standard format character in the message format rule set and the format abnormal characters by using a similarity matching algorithm, and determining the standard format character corresponding to the highest similarity as a second target character; and judging whether the highest similarity is greater than a second similarity threshold, replacing the abnormal format character with a second target character under the condition that the highest similarity is greater than the second similarity threshold, and replacing the abnormal format character with a null character under the condition that the highest similarity is less than or equal to the second similarity threshold.
Specifically, extracting the inspection rules of the message format one by one in the message format rule set, and if the format abnormal character of the message item is matched with the inspection rules in the message format rule set, directly replacing the format abnormal character with a standard format character under the corresponding inspection rule; if the abnormal format character of the message item is not matched with the check rule in the message format rule set, calculating the similarity between the character in the check rule and the current abnormal format character by using a similarity matching algorithm, acquiring the standard format character corresponding to the highest similarity, determining the standard format character as a second target character, judging whether the standard format character is greater than a second similarity threshold value, if so, replacing the abnormal format character with the second target character, otherwise, replacing the abnormal format character with a null character. The format of the message item in the first correction message is corrected according to the message format rule set to obtain a second correction message, so that the message format can be standardized, and the problem that the message is returned due to abnormal message format is avoided.
Optionally, in the method for verifying a message provided in this embodiment of the present application, after the format of a message item in a first corrected message is corrected according to a message format rule set to obtain a second corrected message, the method further includes: under the condition that the risk level of the risk message item is a first risk level, generating first alarm information, and triggering the rechecking operation of a second correction message according to the first alarm information, wherein the first alarm information at least comprises the message item and the alarm time of the second correction message; and under the condition that the risk level of the risk message item is a second risk level, generating second alarm information, and sending a first correction instruction according to the second alarm information, wherein the second alarm information at least comprises the message item and the alarm time of a second correction message, and the first correction instruction is used for indicating correction of illegal characters in the second correction message.
Specifically, the first warning information includes a check result of the message content and/or the message format, the message check item is registered as "message content" or "message format", the rule number is registered as a content rule number corresponding to the illegal character mapping relationship set or a format rule number corresponding to the message format rule set, and the message service number and the warning time are registered according to actual conditions. The message service number is used for explaining the relevant information of the message receiver, and is convenient for inquiring the content and format of the standard message. For example, table 4 shows the warning information when the message content needs to be corrected, and table 5 shows the warning information when the message format needs to be corrected.
TABLE 4
Message inspection item Content rule numbering Message service numbering Time of alarm
Message content 2 NYCICB006101415I 2020-09-03 08:12:19
TABLE 5
Message inspection item Format rule numbering Message service numbering Time of alarm
Message format 3 TORBEA006125908I 2021-12-05 14:55:05
And the second risk level is corresponding to the risk level H, and second alarm information is sent, wherein the message inspection item is fixedly registered as 'message content', the rule number registers a default value of 0, and the message service number and the alarm time are registered according to the actual situation. Table 6 shows the warning information when the content of the message with the risk level H needs to be corrected.
TABLE 6
Message inspection item Content rule numbering Message service numbering Time of alarm
Message content 0 NYCICB006101415I 2020-09-03 08:12:19
The embodiment prompts that the message to be checked has problems in content or format and needs to be corrected by sending the alarm information, can supervise the problem message in real time, and can timely make response processing.
Optionally, in the method for verifying a message provided in this embodiment of the present application, when the risk level of the risk message item is a first risk level, generating first warning information, and after triggering a rechecking operation of a second correction message according to the first warning information, the method further includes: judging whether the processing operation of the content and the processing operation of the format of the message item are correct or not; under the condition that the processing operation of the content and the processing operation of the format are both correct, updating an illegal character mapping relation set according to the processing operation of the content, and updating a message format rule set according to the processing operation of the format; under the condition that the processing operation of the content or the processing operation of the format is incorrect, a second correction instruction is sent out, and whether the correction operation responding to the second correction instruction is received or not is detected, wherein the second correction instruction is used for indicating that the content or the format of the message item is corrected; and under the condition of receiving the correction operation, updating the illegal character mapping relation set or the message format rule set according to the correction operation.
Specifically, for the alarm information that the message check item is "message content", if the content rule number is not 0, service personnel recheck the message information according to the message service number and the content rule number, if the replacement rule is not problematic, the rule state corresponding to the content rule number in the illegal character mapping relationship set is updated to Y, otherwise, the message is manually modified and the replaced standard content character is covered to an actually correct character, if the current rule can be used as a general replacement rule, the standard content character corresponding to the content rule number in the illegal character mapping relationship set is updated to the character replaced this time, and meanwhile, the rule state is updated to Y; if the content rule number is 0, the service personnel informs the client to confirm the message information, and manually modifies and reissues the message. Aiming at the alarm information of which the message check item is a message rule, the service personnel rechecks the message information, and if the replacement rule has no problem, the message information is not modified; otherwise, updating the standard format characters in the message format rule set according to the message service number and the rule number. By updating the illegal character mapping relation set and the message format rule set, the effects of efficiently checking the message and saving manpower can be achieved.
It should be noted that the message verification system also periodically updates a message standard rule set including a standard character set, an illegal character mapping relationship set and a message format rule set according to the floor-to-floor failure message data collected by the big data processing platform. The service sensitivity of the message risk level relation model is high and is adjusted according to actual service requirements. The message checking system supports business personnel to inquire, modify and input rules in a message standard rule set.
An embodiment of the present application further provides a packet processing flow, and fig. 2 is a flowchart of a method for optional packet verification provided in the embodiment of the present application, and as shown in fig. 2, the method includes:
by means of a large data processing platform of the same-industry bank, on the basis of platform data sources such as a data lake, a data warehouse, a historical data platform and the like, key elements of the message are extracted, and a message standard rule set is established. Specifically, a message standard rule set including a standard character set, a message risk level relation model, an illegal character mapping relation set and a message format rule set can be extracted from a big data processing platform through a core bank system.
And then remitting the product group report, identifying abnormal message information according to a standard character set, a message risk level relation model, an illegal character mapping relation set and a message format rule set after the remittance product group report is finished, checking the message content and the message format, correcting message items through two modes of automatic system correction and manual service personnel correction, ensuring normal message sending and meeting the requirements on accuracy and timeliness.
Meanwhile, a monitoring alarm notification reminding mechanism is introduced, abnormal messages and key information of the verification rules are displayed, and reference is provided for business personnel to review, modify and reissue the messages.
In addition, the big data processing platform also regularly collects the historical data of the remittance messages failing to be sent to the ground, dynamically adjusts the message standard rule set, is transparent to business personnel, supports the business personnel to inquire, modify and input rules in the message standard rule set, and meets the actual needs of business.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer-executable instructions and that, although a logical order is illustrated in the flowcharts, in some cases, the steps illustrated or described may be performed in an order different than presented herein.
The embodiment of the present application further provides a device for message verification, and it should be noted that the device for message verification according to the embodiment of the present application may be used to execute the method for message verification according to the embodiment of the present application. The following describes a device for message verification provided in this embodiment.
Fig. 3 is a schematic diagram of a device for message verification according to an embodiment of the present application. As shown in fig. 3, the apparatus includes:
an obtaining unit 301, configured to obtain a message to be verified, match the content of a message item in the message to be verified with characters in a standard character set, and determine a message item that fails to be matched as a risk message item, where the standard character set is a set of characters included in the standard message.
The determining unit 302 is configured to determine a type of a risk packet item, and determine a risk level of the risk packet item according to the type of the risk packet item and a packet risk level relationship model, where the packet risk level relationship model is used to represent a mapping relationship between the type of the packet item and the risk level.
A first correcting unit 303, configured to correct the content of the message item in the message to be checked according to the risk level and the illegal character mapping relationship set, so as to obtain a first corrected message, where the illegal character mapping relationship set is used to represent a mapping relationship between an illegal character and a standard content character.
A second correcting unit 304, configured to correct the format of the packet item in the first corrected packet according to the packet format rule set, so as to obtain a second corrected packet.
The message verification device provided by the embodiment of the application acquires a message to be verified through the acquisition unit 301, matches the content of a message item in the message to be verified with characters in a standard character set, and determines a message item failed in matching as a risk message item, wherein the standard character set is a set of characters contained in the standard message; the determining unit 302 determines the type of the risk packet item, and determines the risk level of the risk packet item according to the type of the risk packet item and a packet risk level relationship model, wherein the packet risk level relationship model is used for representing the mapping relationship between the type of the packet item and the risk level; the first correction unit 303 corrects the content of the message item in the message to be checked according to the risk level and the illegal character mapping relationship set to obtain a first corrected message, wherein the illegal character mapping relationship set is used for representing the mapping relationship between the illegal character and the standard content character; the second correcting unit 304 corrects the format of the message item in the first corrected message according to the message format rule set to obtain a second corrected message, thereby solving the problems that the message information is lost and the message format is abnormal easily caused by a message checking method in the related art. By checking the message content, replacing the illegal characters with standard content characters, then checking the message format, and replacing the abnormal format characters with standard format characters, the effect that the receiver can quickly and accurately receive the checked message is achieved.
Optionally, in the device for packet verification provided in this embodiment of the present application, the device further includes: an obtaining unit, configured to obtain a message key element from a history message, where the message key element at least includes one of the following: message type, message item, risk level of the message item, illegal character, standard content character and standard format character; the first establishing unit is used for determining the mapping relation between the type and the risk level of the message item to obtain a first mapping relation, and establishing a message risk level relation model according to the type, the risk level and the first mapping relation of the message item; the second establishing unit is used for determining the mapping relation between the illegal characters and the standard content characters to obtain a second mapping relation, and establishing an illegal character mapping relation set according to the illegal characters, the standard content characters and the second mapping relation; and the third establishing unit is used for determining the mapping relation between the abnormal format character and the standard format character to obtain a third mapping relation, and establishing a message format rule set according to the abnormal format character, the standard format character and the third mapping relation.
Optionally, in the apparatus for packet verification provided in this embodiment of the present application, the first correcting unit 303 includes: the processing module is used for processing the illegal characters in the risk message item through the illegal character mapping relation set under the condition that the risk level of the risk message item is a first risk level; and the alarm module is used for sending alarm information under the condition that the risk level of the risk message item is the second risk level.
Optionally, in the device for packet verification provided in this embodiment of the present application, the processing module includes: the first judgment submodule is used for judging whether the illegal character exists in the illegal character mapping relation set or not; the replacing sub-module is used for replacing the illegal characters with standard content characters corresponding to the illegal characters under the condition that the illegal characters exist in the illegal character mapping relation set; the determining submodule is used for calculating the similarity between each standard content character in the illegal character mapping relationship set and the illegal character by using a similarity matching algorithm under the condition that the illegal character does not exist in the illegal character mapping relationship set, and determining the standard content character corresponding to the highest similarity as a first target character; and the second judgment sub-module is used for judging whether the highest similarity is greater than the first similarity threshold, replacing the illegal character with the first target character under the condition that the highest similarity is greater than the first similarity threshold, and replacing the illegal character with the null character under the condition that the highest similarity is less than or equal to the first similarity threshold.
Optionally, in the apparatus for packet verification provided in this embodiment of the present application, the second correcting unit 304 includes: the first determining module is used for determining the abnormal format characters of the message items in the first corrected message and judging whether the abnormal format characters exist in the message format rule set or not; the replacing module is used for replacing the abnormal format character with a standard format character corresponding to the abnormal format character under the condition that the abnormal format character exists in the message format rule set; the second determining module is used for calculating the similarity between each standard format character in the message format rule set and the format abnormal character by using a similarity matching algorithm under the condition that the format abnormal character does not exist in the message format rule set, and determining the standard format character corresponding to the highest similarity as a second target character; and the judging module is used for judging whether the highest similarity is greater than a second similarity threshold value or not, replacing the abnormal format character with a second target character under the condition that the highest similarity is greater than the second similarity threshold value, and replacing the abnormal format character with a null character under the condition that the highest similarity is less than or equal to the second similarity threshold value.
Optionally, in the device for packet verification provided in this embodiment of the present application, the device further includes: the first warning unit is used for generating first warning information under the condition that the risk level of the risk message item is a first risk level, and triggering the rechecking operation of a second correction message according to the first warning information, wherein the first warning information at least comprises the message item and the warning time of the second correction message; and the second warning unit is used for generating second warning information under the condition that the risk level of the risk message item is a second risk level, and sending a first correction instruction according to the second warning information, wherein the second warning information at least comprises the message item and the warning time of the second correction message, and the first correction instruction is used for indicating that the illegal character in the second correction message is corrected.
Optionally, in the device for packet verification provided in this embodiment of the present application, the device further includes: a judging unit, configured to judge whether a processing operation of the content and a processing operation of the format of the packet item are correct; the first updating unit is used for updating the illegal character mapping relation set according to the processing operation of the content and updating the message format rule set according to the processing operation of the format under the condition that the processing operation of the content and the processing operation of the format are both correct; the detection unit is used for sending a second correction instruction under the condition that the processing operation of the content or the processing operation of the format is incorrect, and detecting whether the correction operation responding to the second correction instruction is received or not, wherein the second correction instruction is used for indicating that the content or the format of the message item is corrected; and the second updating unit is used for updating the illegal character mapping relation set or the message format rule set according to the correction operation under the condition of receiving the correction operation.
The message checking device comprises a processor and a memory, the acquiring unit 301, the determining unit 302, the first correcting unit 303, the second correcting unit 304 and the like are all stored in the memory as program units, and the processor executes the program units stored in the memory to realize corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to be one or more than one, and the effect that a receiver can quickly and accurately receive the verified message is achieved by adjusting the kernel parameters.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
The embodiment of the application also provides a computer storage medium, wherein the computer storage medium is used for storing the program, and the program controls the equipment where the computer storage medium is located to execute a message verification method when running.
As shown in fig. 4, an electronic device 401 includes a processor, a memory, and a program stored in the memory and executable on the processor, where the processor executes the program to implement the following steps: and checking the message. The device herein may be a server, a PC, a PAD, a mobile phone, etc.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Disks (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.

Claims (10)

1. A method for message verification is characterized by comprising the following steps:
acquiring a message to be checked, matching the content of a message item in the message to be checked with characters in a standard character set, and determining the message item failed in matching as a risk message item, wherein the standard character set is a set of characters contained in the standard message;
determining the type of the risk message item, and determining the risk level of the risk message item according to the type of the risk message item and a message risk level relation model, wherein the message risk level relation model is used for representing the mapping relation between the type of the message item and the risk level;
correcting the content of a message item in the message to be checked according to the risk level and the illegal character mapping relation set to obtain a first corrected message, wherein the illegal character mapping relation set is used for representing the mapping relation between illegal characters and standard content characters;
and correcting the format of the message item in the first corrected message according to the message format rule set to obtain a second corrected message.
2. The method according to claim 1, wherein before obtaining the message to be verified and matching the content of the message item in the message to be verified with the characters in the standard character set, the method further comprises:
obtaining message key elements from a historical message, wherein the message key elements at least comprise one of the following components: message type, message item, risk level of the message item, illegal character, standard content character and standard format character;
determining a mapping relation between the type of the message item and the risk level to obtain a first mapping relation, and establishing a message risk level relation model according to the type of the message item, the risk level and the first mapping relation;
determining a mapping relation between the illegal character and the standard content character to obtain a second mapping relation, and establishing the illegal character mapping relation set according to the illegal character, the standard content character and the second mapping relation;
and determining a mapping relation between the abnormal format characters and the standard format characters to obtain a third mapping relation, and establishing the message format rule set according to the abnormal format characters, the standard format characters and the third mapping relation.
3. The method according to claim 1, wherein the risk levels include a first risk level and a second risk level, wherein a risk probability of the second risk level is greater than a risk probability of the first risk level, and wherein modifying the content of the message item in the message to be verified according to the risk levels and the illegal character mapping relationship set includes:
processing the illegal characters in the risk message item through the illegal character mapping relation set under the condition that the risk level of the risk message item is the first risk level;
and sending alarm information under the condition that the risk level of the risk message item is the second risk level.
4. The method of claim 3, wherein processing illegal characters in the risk packet item through the set of illegal character mapping relationships, when the risk level of the risk packet item is the first risk level, comprises:
judging whether the illegal character exists in the illegal character mapping relation set or not;
replacing the illegal character with a standard content character corresponding to the illegal character under the condition that the illegal character exists in the illegal character mapping relation set;
under the condition that the illegal character does not exist in the illegal character mapping relation set, calculating the similarity between each standard content character in the illegal character mapping relation set and the illegal character by using a similarity matching algorithm, and determining the standard content character corresponding to the highest similarity as a first target character;
judging whether the highest similarity is larger than a first similarity threshold, replacing the illegal character with the first target character under the condition that the highest similarity is larger than the first similarity threshold, and replacing the illegal character with a null character under the condition that the highest similarity is smaller than or equal to the first similarity threshold.
5. The method of claim 1, wherein modifying the format of the message item in the first modified message according to a message format rule set to obtain a second modified message comprises:
determining the abnormal format character of the message item in the first corrected message, and judging whether the abnormal format character exists in the message format rule set;
replacing the format abnormal character with a standard format character corresponding to the format abnormal character under the condition that the format abnormal character exists in the message format rule set;
under the condition that the format abnormal characters do not exist in the message format rule set, calculating the similarity between each standard format character in the message format rule set and the format abnormal characters by using a similarity matching algorithm, and determining the standard format character corresponding to the highest similarity as a second target character;
and judging whether the highest similarity is greater than a second similarity threshold, replacing the abnormal format character with the second target character under the condition that the highest similarity is greater than the second similarity threshold, and replacing the abnormal format character with a null character under the condition that the highest similarity is less than or equal to the second similarity threshold.
6. The method of claim 3, wherein after modifying the format of the message item in the first modified message according to a message format rule set to obtain a second modified message, the method further comprises:
generating first alarm information under the condition that the risk level of the risk message item is the first risk level, and triggering the rechecking operation of the second correction message according to the first alarm information, wherein the first alarm information at least comprises the message item and the alarm time of the second correction message;
and generating second warning information under the condition that the risk level of the risk message item is the second risk level, and sending a first correction instruction according to the second warning information, wherein the second warning information at least comprises the message item and warning time of the second correction message, and the first correction instruction is used for indicating correction of the illegal character in the second correction message.
7. The method according to claim 6, wherein, when the risk level of the risk packet item is the first risk level, generating first alarm information, and after triggering the rechecking operation of the second modification packet according to the first alarm information, the method further comprises:
judging whether the processing operation of the content and the processing operation of the format of the message item are correct or not;
under the condition that the processing operation of the content and the processing operation of the format are both correct, updating the illegal character mapping relation set according to the processing operation of the content, and updating the message format rule set according to the processing operation of the format;
when the processing operation of the content or the processing operation of the format is incorrect, sending a second correction instruction, and detecting whether a correction operation responding to the second correction instruction is received or not, wherein the second correction instruction is used for indicating that the content or the format of the message item is corrected;
and under the condition of receiving the correction operation, updating the illegal character mapping relation set or the message format rule set according to the correction operation.
8. An apparatus for message verification, comprising:
the system comprises an acquisition unit, a verification unit and a verification unit, wherein the acquisition unit is used for acquiring a message to be verified, matching the content of a message item in the message to be verified with characters in a standard character set, and determining the message item failed in matching as a risk message item, wherein the standard character set is a set of characters contained in the standard message;
the determining unit is used for determining the type of the risk message item and determining the risk level of the risk message item according to the type of the risk message item and a message risk level relation model, wherein the message risk level relation model is used for representing the mapping relation between the type of the message item and the risk level;
a first correcting unit, configured to correct the content of a message item in the message to be checked according to the risk level and an illegal character mapping relationship set, so as to obtain a first corrected message, where the illegal character mapping relationship set is used to represent a mapping relationship between an illegal character and a standard content character;
and the second correcting unit is used for correcting the format of the message item in the first corrected message according to the message format rule set to obtain a second corrected message.
9. A computer storage medium, characterized in that the computer storage medium is used for storing a program, wherein the program controls a device in which the computer storage medium is located to execute the method for message verification according to any one of claims 1 to 7 when the program runs.
10. An electronic device comprising one or more processors and memory storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the method of message verification of any of claims 1-7.
CN202210396103.9A 2022-04-15 2022-04-15 Message verification method and device, storage medium and electronic equipment Active CN114844956B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210396103.9A CN114844956B (en) 2022-04-15 2022-04-15 Message verification method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210396103.9A CN114844956B (en) 2022-04-15 2022-04-15 Message verification method and device, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN114844956A true CN114844956A (en) 2022-08-02
CN114844956B CN114844956B (en) 2024-03-08

Family

ID=82565725

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210396103.9A Active CN114844956B (en) 2022-04-15 2022-04-15 Message verification method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN114844956B (en)

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107231337A (en) * 2016-03-25 2017-10-03 阿里巴巴集团控股有限公司 Method of calibration and device applied to financial message
CN109889375A (en) * 2019-01-23 2019-06-14 中国银行股份有限公司 Service message method of calibration, device and computer storage medium
CN110336814A (en) * 2019-07-03 2019-10-15 中国银行股份有限公司 A kind of analytic method, equipment and the system of SWIFT message
CN113312108A (en) * 2021-06-18 2021-08-27 中国农业银行股份有限公司 SWIFT message checking method and device, electronic equipment and storage medium
CN113553555A (en) * 2021-06-28 2021-10-26 吉林亿联银行股份有限公司 Client security authentication method and device

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107231337A (en) * 2016-03-25 2017-10-03 阿里巴巴集团控股有限公司 Method of calibration and device applied to financial message
CN109889375A (en) * 2019-01-23 2019-06-14 中国银行股份有限公司 Service message method of calibration, device and computer storage medium
CN110336814A (en) * 2019-07-03 2019-10-15 中国银行股份有限公司 A kind of analytic method, equipment and the system of SWIFT message
CN113312108A (en) * 2021-06-18 2021-08-27 中国农业银行股份有限公司 SWIFT message checking method and device, electronic equipment and storage medium
CN113553555A (en) * 2021-06-28 2021-10-26 吉林亿联银行股份有限公司 Client security authentication method and device

Also Published As

Publication number Publication date
CN114844956B (en) 2024-03-08

Similar Documents

Publication Publication Date Title
CN111931731B (en) Question judging method and device, electronic equipment and storage medium
CN107633016B (en) Data processing method and device and electronic equipment
CN112181804B (en) Parameter verification method, device and storage medium
CN110909363A (en) Software third-party component vulnerability emergency response system and method based on big data
CN110705559B (en) Steel information recording method, device and equipment based on steel label image recognition
CN106547658B (en) Automatic testing method and device
CN111711540A (en) Method and device for identifying government and enterprise business alarm
CN114844956B (en) Message verification method and device, storage medium and electronic equipment
CN112799722A (en) Command recognition method, device, equipment and storage medium
CN110134579B (en) Code checking method and device
CN108572948B (en) Doorplate information processing method and device
CN115630842A (en) Method, system, device and computer readable storage medium for determining transaction risk
CN114138774A (en) Data processing method and device, storage medium and electronic equipment
CN114757201A (en) Method for identifying delivery address, storage medium and processor
CN114595765A (en) Data processing method and device, electronic equipment and storage medium
CN112085443A (en) Distribution resource detection method, distribution resource detection device, distribution resource task execution method, distribution resource detection device, distribution task execution device and electronic equipment
CN113806196B (en) Root cause analysis method and system
CN114331520B (en) Sales lead data supervision method, device, storage medium and computer equipment
CN116010217A (en) Data processing method, device, computer equipment and storage medium
CN117151053B (en) Report automation realization method, system and medium
US20230009361A1 (en) Service information management system and method
CN114169176A (en) Event failure risk determination method and device, storage medium and electronic device
CN117252606A (en) Product qualification checking method, device and equipment
CN113918593A (en) Method and device for identifying financial data abnormity, storage medium and computing equipment
CN115982264A (en) Information detection method, information detection device, storage medium and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant