CN114880049A - Data processing method and device, electronic equipment and storage medium - Google Patents

Data processing method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN114880049A
CN114880049A CN202210224006.1A CN202210224006A CN114880049A CN 114880049 A CN114880049 A CN 114880049A CN 202210224006 A CN202210224006 A CN 202210224006A CN 114880049 A CN114880049 A CN 114880049A
Authority
CN
China
Prior art keywords
target
verification logic
verification
field
logic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210224006.1A
Other languages
Chinese (zh)
Inventor
林建明
邹明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Samoye Digital Technology Co ltd
Original Assignee
Shenzhen Samoye Digital Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Samoye Digital Technology Co ltd filed Critical Shenzhen Samoye Digital Technology Co ltd
Priority to CN202210224006.1A priority Critical patent/CN114880049A/en
Publication of CN114880049A publication Critical patent/CN114880049A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/448Execution paradigms, e.g. implementations of programming paradigms
    • G06F9/4482Procedural
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/30Creation or generation of source code
    • G06F8/36Software reuse
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/41Compilation
    • G06F8/42Syntactic analysis
    • G06F8/427Parsing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/41Compilation
    • G06F8/43Checking; Contextual analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/40Transformation of program code
    • G06F8/41Compilation
    • G06F8/43Checking; Contextual analysis
    • G06F8/433Dependency analysis; Data or control flow analysis

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a data processing method, a data processing device, electronic equipment and a storage medium, and belongs to the technical field of computers. When a calling request sent by a target calling party is received, analyzing the calling request to obtain at least one corresponding target field and target data corresponding to each target field; in a preset verification logic set, determining a target verification logic combination based on the target caller and at least one target field; and verifying the target data by using the target verification logic combination. The corresponding verification logic is matched according to different calling parties and different fields in the preset verification logic set, codes do not need to be written according to different calling party requirements each time, and labor cost is reduced.

Description

Data processing method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a data processing method and apparatus, an electronic device, and a storage medium.
Background
When a service provider provides a service interface to the outside, there are cases where multiple service invokers call the service interface, and when each invoker calls the service interface, the parameter verification requirements for parameters are often different, for example: for the three fields A, B, and C, caller X requires A, B is not null, caller Y requires B, C is not null, and caller Z requires B, C is not null and B is greater than C, and so on. In such a scenario, it is usually necessary to write a set of verification codes for the caller X, Y, Z to achieve three different verification requirements, that is, each time a different caller's requirement is met, a set of codes needs to be written for the caller, which is high in labor cost and low in efficiency.
Disclosure of Invention
An object of the embodiments of the present application is to provide a data processing method, an apparatus, an electronic device, and a storage medium, so as to solve the problems that at present, a set of codes needs to be written for different callers each time when the different callers meet a demand, which is high in labor cost and low in efficiency. The specific technical scheme is as follows:
in a first aspect, a data processing method is provided, the method including:
when a calling request sent by a target calling party is received, analyzing the calling request to obtain at least one corresponding target field and target data corresponding to each target field;
in a preset verification logic set, determining a target verification logic combination based on the target caller and at least one target field;
and verifying the target data by using the target verification logic combination.
In a possible embodiment, the determining, in the preset verification logic set, a target verification logic combination based on the target caller and at least one of the target fields includes:
in the verification logic set, determining a first verification logic subset corresponding to the target calling party according to a preset first corresponding relation;
for any target field in at least one target field, determining a second verification logic subset corresponding to the target field in the first verification logic subset according to a preset second corresponding relation;
and combining at least one second verification logic in the second verification logic subset to obtain the target verification logic combination.
In a possible embodiment, the combining at least one second verification logic in the second verification logic subset to obtain the target verification logic combination includes:
for any target field in at least one target field, determining a field priority corresponding to the target field, and taking the field priority as the priority of a second verification logic corresponding to the target field;
and combining at least one second verification logic according to the sequence from high priority to low priority to obtain the target verification logic combination.
In one possible embodiment, the method further comprises:
receiving configuration information through a visualization tool, wherein the configuration information comprises a calling party, a field and verification logic;
creating the first correspondence based on the caller and the validation logic, and creating the second correspondence based on the field and the validation logic.
In one possible implementation, the configuration information further includes: the verification logic is corresponding to reference value information, and the method further comprises the following steps:
and adjusting the corresponding reference parameters in the verification logic by using the reference value information to obtain the adjusted adjustment verification logic, and adding the adjustment verification logic to the verification logic set.
In one possible embodiment, the method further comprises:
obtaining a verification result of verifying the target data by using the target verification logic combination;
and sending the verification result to a preset device so that the preset device displays the verification result.
In a second aspect, there is provided a data processing apparatus, the apparatus comprising:
the analysis module is used for analyzing the call request to obtain at least one corresponding target field and target data corresponding to each target field when receiving the call request sent by a target calling party;
the determining module is used for determining a target verification logic combination based on the target caller and at least one target field in a preset verification logic set;
a verification module to verify the target data using the target verification logic combination.
In a possible implementation manner, the determining module is specifically configured to:
in the verification logic set, determining a first verification logic subset corresponding to the target calling party according to a preset first corresponding relation;
for any target field in at least one target field, determining a second verification logic subset corresponding to the target field in the first verification logic subset according to a preset second corresponding relation;
and combining at least one second verification logic in the second verification logic subset to obtain the target verification logic combination.
In a possible implementation, the determining module is further configured to:
for any target field in at least one target field, determining a field priority corresponding to the target field, and taking the field priority as the priority of a second verification logic corresponding to the target field;
and combining at least one second verification logic according to the sequence from high priority to low priority to obtain the target verification logic combination.
In one possible embodiment, the apparatus further comprises a creating module, configured to:
receiving configuration information through a visualization tool, wherein the configuration information comprises a calling party, a field and verification logic;
creating the first correspondence based on the caller and the validation logic, and creating the second correspondence based on the field and the validation logic.
In one possible implementation, the configuration information further includes: the device further includes an updating module, configured to:
and adjusting the corresponding reference parameters in the verification logic by using the reference value information to obtain the adjusted adjustment verification logic, and adding the adjustment verification logic to the verification logic set.
In one possible embodiment, the apparatus further comprises a display module for:
obtaining a verification result of verifying the target data by using the target verification logic combination;
and sending the verification result to a preset device so that the preset device displays the verification result.
In a third aspect, an electronic device is provided, which includes a processor, a communication interface, a memory and a communication bus, wherein the processor, the communication interface and the memory complete communication with each other through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any of the first aspect when executing a program stored in the memory.
In a fourth aspect, a computer-readable storage medium is provided, wherein a computer program is stored in the computer-readable storage medium, and when executed by a processor, the computer program implements the method steps of any of the first aspects.
In a fifth aspect, there is provided a computer program product containing instructions which, when run on a computer, cause the computer to perform any of the data processing methods described above.
The embodiment of the application has the following beneficial effects:
the embodiment of the application provides a data processing method, a data processing device, electronic equipment and a storage medium, and the data processing method and the electronic equipment comprise the steps of firstly, when a calling request sent by a target calling party is received, analyzing the calling request to obtain at least one corresponding target field and target data corresponding to each target field; then, in a preset verification logic set, determining a target verification logic combination based on the target caller and at least one target field; and finally, verifying the target data by utilizing the target verification logic combination. Namely, according to the method and the device, the corresponding verification logic can be matched according to the calling party and the field in the preset verification logic set, and then the data corresponding to the field is verified by using the verification logic, so that codes do not need to be written according to different calling party requirements every time, and the labor cost is reduced.
Of course, not all advantages described above need to be achieved at the same time in the practice of any one product or method of the present application.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious for those skilled in the art to obtain other drawings without inventive exercise.
Fig. 1 is a flowchart of a data processing method according to an embodiment of the present application;
fig. 2 is a flowchart of another data processing method provided in an embodiment of the present application;
fig. 3 is a schematic structural diagram of a data processing apparatus according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
A data processing method provided in the embodiments of the present application will be described in detail below with reference to specific embodiments, as shown in fig. 1, the specific steps are as follows:
s101, when receiving a call request sent by a target caller, analyzing the call request to obtain at least one corresponding target field and target data corresponding to each target field.
The data processing method provided by the embodiment of the application can be applied to a built-in processing program in a server or a service provider and is used for verifying the calling request of a calling party. The call request carries at least one target field and target data corresponding to each target field, for example, the target data corresponding to the "age" of the target field may be "30 years old".
In this embodiment of the application, when a target caller sends a call request to a service provider, a server or a processing program may intercept the call request through an interceptor, and analyze at least one target field carried in the call request and target data corresponding to each target field.
S102, in a preset verification logic set, determining a target verification logic combination based on the target caller and at least one target field.
In the embodiment of the application, the verification logic can be written in advance according to the common requirements of most calling parties, and a verification logic set is formed for standby. Thus, different callers may select the appropriate validation logic from the set of validation logic for subsequent use based on their different requirements (i.e., validation requirements for each field).
In the embodiment of the application, after the target field is analyzed, the verification logic corresponding to the target field can be determined according to the selection condition of the target caller on the verification logic in advance, and the verification logic is used as the target verification logic combination.
S103, verifying the target data by using the target verification logic combination.
In the embodiment of the application, after the target verification logic combination is determined, the target data can be verified by using the target verification logic combination to obtain a verification result. The verification result may include verification success and verification failure, different operations may be performed according to different verification results, for example, when the verification is successful, it means that the call request meets the call condition, the corresponding service may be called in the service provider, and when the verification is failed, it means that the call request does not meet the call condition, the corresponding service may not be called.
In the embodiment of the application, firstly, when a calling request sent by a target calling party is received, the calling request is analyzed to obtain at least one corresponding target field and target data corresponding to each target field; then, in a preset verification logic set, determining a target verification logic combination based on the target caller and at least one target field; and finally, verifying the target data by utilizing the target verification logic combination. Namely, according to the method and the device, the corresponding verification logic can be matched according to the calling party and the field in the preset verification logic set, and then the data corresponding to the field is verified by using the verification logic, so that codes do not need to be written according to different calling party requirements every time, and the labor cost is reduced.
In another embodiment of the present application, the S102 may include the following steps:
s201, in the verification logic set, determining a first verification logic subset corresponding to the target caller according to a preset first corresponding relation.
In the embodiment of the application, the first corresponding relation between the target calling party and the verification logic and the second corresponding relation between each field and the verification logic can be obtained according to the pre-selected condition of the target calling party. For example, caller X requires field A to be verified with verification logic a, and field B to be verified with verification logic B and field C to be verified with verification logic C. Taking the corresponding relation between the calling party X and the verification logic a and the verification logic b as a first corresponding relation; and taking the corresponding relation between the verification logic a and the field A, the corresponding relation between the verification logic B and the field B and the corresponding relation between the verification logic C and the field C as a second corresponding relation.
Therefore, a first verification logic subset corresponding to the target caller can be determined according to a preset first corresponding relation in the verification logic set, wherein the first verification logic subset comprises a plurality of first verification logics.
S202, aiming at any target field in at least one target field, determining a second verification logic subset corresponding to the target field in the first verification logic subset according to a preset second corresponding relation.
S203, at least one second verification logic in the second verification logic subset is combined to obtain the target verification logic combination.
In this embodiment of the present application, after determining the first verification logic subset according to the target caller, a second verification logic subset corresponding to the target field may be determined in the first verification logic subset according to a preset second correspondence. And finally, combining at least one second verification logic in the second verification logic subset to obtain the target verification logic combination.
As an embodiment, the at least one second verification logic may be combined by:
step one, aiming at any target field in at least one target field, determining the field priority corresponding to the target field, and taking the field priority as the priority of a second verification logic corresponding to the target field.
And step two, combining at least one second verification logic according to the sequence from high priority to low priority to obtain the target verification logic combination.
In this embodiment, the field priority corresponding to each field may be set in advance according to the requirement of the caller, and the higher the field priority is, the higher the verification order of the field is.
Specifically, after determining the field priority corresponding to each target field according to a preset setting condition, the priority corresponding to the target field is used as the priority of the second verification logic corresponding to the target field, and at least one second verification logic is combined according to the sequence of the priorities from high to low to obtain the target verification logic combination.
As an example, assuming that the target caller is caller X in the above example and the target fields are field a and field B, the first subset of validation logic includes: a verification logic a, a verification logic b and a verification logic c, wherein the second subset of verification logics comprises: verification logic a and verification logic b, wherein the verification logic a has a lower priority than the verification logic b, and therefore, the combination results in { verification logic b, verification logic a } as the target verification logic combination.
In the embodiment of the application, the verification logics corresponding to the calling party and the field can be matched in the preset verification logic set according to the preset corresponding relation, and then the data corresponding to the field is verified by using the verification logics, so that codes do not need to be written according to different calling party requirements every time, and the labor cost is reduced.
In another embodiment of the present application, the S103 may include the following steps:
in at least one second verification logic included in the target verification logic combination, sequentially controlling each second verification logic to perform verification operation on the corresponding target data according to the sequence from high priority to low priority; when the verification fails, stopping the verification process and determining that the calling request does not conform to the calling condition; and when all the second verification logics verify successfully, determining that the calling request meets the calling condition.
In the embodiment of the application, when the target verification logic combination is used for verification, according to the sequence of the priority levels from high to low, the second verification logic with the highest priority level is firstly used for verifying the target data corresponding to the second verification logic, after the verification is successful, the second verification logic with the second priority level is extracted for verifying the target data corresponding to the second verification logic, and so on, if the verification fails in any second verification logic, the verification process is stopped, namely, the subsequent verification is not needed, and the calling request is determined not to meet the calling condition; and when all the second verification logics verify successfully, determining that the calling request meets the calling condition.
As an embodiment, there is a dependency relationship in the verification between two fields, specifically: according to the value range of the first field, the second field has a plurality of verification logics, each verification logic corresponds to a data range or an enumeration value, and for any first field, after the verification is successful (or not verified), in the plurality of verification logics corresponding to the second field, the verification logic for verifying the second field is determined according to the data range or the enumeration value where the target data corresponding to the first field is located.
For example, according to the priority ranking, the field a "user age" is ranked at the 1 st position, the field B "loan amount" is ranked at the second position, after the verification field a is older than 20 years, the target data corresponding to the field a is determined to be 22 years old, the verification logic corresponding to the field B is 2, and the verification logic one is: the user is 20-38 years old, and the loan amount is less than 3 ten thousand; the verification logic two is: the users are 39-60 years old, and whether the loan amount is less than 5 ten thousand or not; i.e., the target data for field a is "22 years old" and falls within the data range "20-38 years old" corresponding to the validation logical one, and thus, the target data corresponding to field B is determined to be validated using the validation logical one.
Another example is: field a "customer type", field B "unique number". The field B has two verification logics, wherein the first verification logic is as follows: if the client type is personal, verifying according to the ID card format; the verification logic two is: and if the client type is enterprise, verifying according to the uniform social credit code format. When the field a target data is an enterprise, the target data corresponding to field B should be verified using verification logic two.
Another example is: field a "mobile phone number", field B "mailbox number". The field B has two kinds of verification logics, wherein the first verification logic is as follows: when the mobile phone number is empty, the mailbox number must be filled. The verification logic two is: the mailbox number is allowed to be empty when the mobile phone number exists. When the target data of A does not exist, the target data of field B should be verified using a verify logic one.
According to the scheme, the verification operation can be sequentially performed according to the sequence of the priority from high to low, and the verification can be stopped when any link fails, so that unnecessary verification operation is reduced, and the computing resource is saved.
In yet another embodiment of the present application, the method may further comprise the steps of:
the method comprises the steps that firstly, configuration information is received through a visualization tool, and the configuration information comprises a calling party, a field and verification logic.
And step two, creating the first corresponding relation based on the caller and the verification logic, and creating the second corresponding relation based on the field and the verification logic.
In the embodiment of the application, a visualization tool can be provided for a user, and the user can view the verification logic in the verification logic set through the visualization tool and perform verification-related configuration. The configuration information is specific information configured by the user, such as a caller and a field added by the user, and a corresponding relationship between the set caller and field and the verification logic.
Therefore, the configuration information input by the user can be received through the visualization tool, and the first corresponding relation and the second corresponding relation are created according to the configuration information. Therefore, the technical barrier is broken, the corresponding relation is convenient for non-technical personnel to configure, and the use is convenient.
In yet another embodiment of the present application, the method may further comprise the steps of: and adjusting the corresponding reference parameters in the verification logic by using the reference value information to obtain the adjusted adjustment verification logic, and adding the adjustment verification logic to the verification logic set.
In this embodiment of the present application, the configuration information further includes: and the reference value information is used for adjusting corresponding reference parameters in the verification logic, wherein the reference parameters are parameters used for reference in the verification logic, such as a numerical threshold or a text used for comparison. For example, the verification logic a is used to verify whether the user is older than 20 years, where "20" is the reference parameter in the verification logic, and the user can view the reference parameter in each verification logic through the visualization tool and modify the reference parameter.
Specifically, after a user inputs reference value information for a certain reference parameter in a certain verification logic through a visualization tool, the reference value information can be used to adjust the corresponding reference parameter in the verification logic, so as to obtain an adjusted verification logic, and further add the adjusted verification logic to the verification logic set. As another embodiment, the corresponding validation logic in the set of validation logics may also be updated with the adjusted validation logic. According to the scheme, the reference parameters in the verification logic can be adjusted according to the reference value information input by the user, and a technician is not required to modify codes, so that the technical barrier is broken, and the use of non-technicians is facilitated.
In yet another embodiment of the present application, the method may further comprise the steps of: obtaining a verification result of verifying the target data by using the target verification logic combination; and sending the verification result to a preset device so that the preset device displays the verification result.
In the embodiment of the application, after the target data is verified by using the target verification logic combination, the verification result obtained by verification can be obtained, and the verification result is sent to the preset device (such as a mobile phone or a computer), so that the preset device displays the verification result, and a worker can conveniently check the verification condition.
As an embodiment, the verification result may be transmitted to the preset device only when the verification result is that the verification fails, so as to reduce the transmission amount.
Based on the same technical concept, an embodiment of the present application further provides a data processing apparatus, as shown in fig. 3, the apparatus includes:
the analysis module 301 is configured to, when receiving a call request sent by a target caller, analyze the call request to obtain at least one corresponding target field and target data corresponding to each target field;
a determining module 302, configured to determine, in a preset verification logic set, a target verification logic combination based on the target caller and at least one of the target fields;
a verification module 303, configured to verify the target data by using the target verification logic combination.
In a possible implementation manner, the determining module is specifically configured to:
in the verification logic set, determining a first verification logic subset corresponding to the target calling party according to a preset first corresponding relation;
for any target field in at least one target field, determining a second verification logic subset corresponding to the target field in the first verification logic subset according to a preset second corresponding relation;
and combining at least one second verification logic in the second verification logic subset to obtain the target verification logic combination.
In a possible implementation, the determining module is further configured to:
for any target field in at least one target field, determining a field priority corresponding to the target field, and taking the field priority as the priority of a second verification logic corresponding to the target field;
and combining at least one second verification logic according to the sequence from high priority to low priority to obtain the target verification logic combination.
In one possible embodiment, the apparatus further comprises a creating module, configured to:
receiving configuration information through a visualization tool, wherein the configuration information comprises a calling party, a field and verification logic;
creating the first correspondence based on the caller and the validation logic, and creating the second correspondence based on the field and the validation logic.
In one possible implementation, the configuration information further includes: the device further includes an updating module, configured to:
and adjusting the corresponding reference parameters in the verification logic by using the reference value information to obtain the adjusted adjustment verification logic, and adding the adjustment verification logic to the verification logic set.
In one possible embodiment, the apparatus further comprises a display module for:
obtaining a verification result of verifying the target data by using the target verification logic combination;
and sending the verification result to a preset device so that the preset device displays the verification result.
In the embodiment of the application, firstly, when a calling request sent by a target calling party is received, the calling request is analyzed to obtain at least one corresponding target field and target data corresponding to each target field; then, in a preset verification logic set, determining a target verification logic combination based on the target caller and at least one target field; and finally, verifying the target data by utilizing the target verification logic combination. Namely, according to the method and the device, the corresponding verification logic can be matched according to the calling party and the field in the preset verification logic set, and then the data corresponding to the field is verified by using the verification logic, so that codes do not need to be written according to different calling party requirements every time, and the labor cost is reduced.
Based on the same technical concept, the embodiment of the present application further provides an electronic device, as shown in fig. 4, including a processor 111, a communication interface 112, a memory 113, and a communication bus 114, where the processor 111, the communication interface 112, and the memory 113 complete mutual communication through the communication bus 114,
a memory 113 for storing a computer program;
the processor 111, when executing the program stored in the memory 113, implements the following steps:
when a calling request sent by a target calling party is received, analyzing the calling request to obtain at least one corresponding target field and target data corresponding to each target field;
in a preset verification logic set, determining a target verification logic combination based on the target caller and at least one target field;
and verifying the target data by using the target verification logic combination.
The communication bus mentioned in the electronic device may be a Peripheral Component Interconnect (PCI) bus, an Extended Industry Standard Architecture (EISA) bus, or the like. The communication bus may be divided into an address bus, a data bus, a control bus, etc. For ease of illustration, only one thick line is shown, but this does not mean that there is only one bus or one type of bus.
The communication interface is used for communication between the electronic equipment and other equipment.
The Memory may include a Random Access Memory (RAM) or a Non-Volatile Memory (NVM), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the processor.
The Processor may be a general-purpose Processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
In yet another embodiment provided by the present application, a computer-readable storage medium is further provided, in which a computer program is stored, and the computer program, when executed by a processor, implements the steps of any of the data processing methods described above.
In yet another embodiment provided by the present application, there is also provided a computer program product containing instructions which, when run on a computer, cause the computer to perform any of the data processing methods of the above embodiments.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, cause the processes or functions described in accordance with the embodiments of the application to occur, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored in a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website site, computer, server, or data center to another website site, computer, server, or data center via wired (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, hard Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., Solid State Disk (SSD)), among others.
It is noted that, in this document, relational terms such as "first" and "second," and the like, may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
The above description is merely exemplary of the present application and is presented to enable those skilled in the art to understand and practice the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method of data processing, the method comprising:
when a calling request sent by a target calling party is received, analyzing the calling request to obtain at least one corresponding target field and target data corresponding to each target field;
in a preset verification logic set, determining a target verification logic combination based on the target caller and at least one target field;
and verifying the target data by using the target verification logic combination.
2. The method of claim 1, wherein determining a target validation logic combination based on the target caller and at least one of the target fields in a predetermined set of validation logic comprises:
in the verification logic set, determining a first verification logic subset corresponding to the target calling party according to a preset first corresponding relation;
for any target field in at least one target field, determining a second verification logic subset corresponding to the target field in the first verification logic subset according to a preset second corresponding relation;
and combining at least one second verification logic in the second verification logic subset to obtain the target verification logic combination.
3. The method of claim 2, wherein said combining at least one second verification logic of said second subset of verification logics to obtain said target combination of verification logics comprises:
for any target field in at least one target field, determining a field priority corresponding to the target field, and taking the field priority as the priority of a second verification logic corresponding to the target field;
and combining at least one second verification logic according to the sequence from high priority to low priority to obtain the target verification logic combination.
4. The method of claim 2, further comprising:
receiving configuration information through a visualization tool, wherein the configuration information comprises a calling party, a field and verification logic;
creating the first correspondence based on the caller and the validation logic, and creating the second correspondence based on the field and the validation logic.
5. The method of claim 4, wherein the configuration information further comprises: the verification logic corresponds to the reference value information, and the method further comprises:
and adjusting the corresponding reference parameters in the verification logic by using the reference value information to obtain the adjusted adjustment verification logic, and adding the adjustment verification logic to the verification logic set.
6. The method of claim 1, further comprising:
obtaining a verification result of verifying the target data by using the target verification logic combination;
and sending the verification result to a preset device so that the preset device displays the verification result.
7. A data processing apparatus, characterized in that the apparatus comprises:
the analysis module is used for analyzing the call request to obtain at least one corresponding target field and target data corresponding to each target field when receiving the call request sent by a target calling party;
the determining module is used for determining a target verification logic combination based on the target caller and at least one target field in a preset verification logic set;
and the verification module is used for verifying the target data by utilizing the target verification logic combination.
8. The apparatus of claim 7, wherein the determining module is specifically configured to:
in the verification logic set, determining a first verification logic subset corresponding to the target calling party according to a preset first corresponding relation;
for any target field in at least one target field, determining a second verification logic subset corresponding to the target field in the first verification logic subset according to a preset second corresponding relation;
and combining at least one second verification logic in the second verification logic subset to obtain the target verification logic combination.
9. An electronic device is characterized by comprising a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface are used for realizing mutual communication by the memory through the communication bus;
a memory for storing a computer program;
a processor for implementing the method steps of any of claims 1-6 when executing a program stored in the memory.
10. A computer-readable storage medium, characterized in that a computer program is stored in the computer-readable storage medium, which computer program, when being executed by a processor, carries out the method steps of any one of claims 1 to 6.
CN202210224006.1A 2022-03-09 2022-03-09 Data processing method and device, electronic equipment and storage medium Pending CN114880049A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210224006.1A CN114880049A (en) 2022-03-09 2022-03-09 Data processing method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210224006.1A CN114880049A (en) 2022-03-09 2022-03-09 Data processing method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN114880049A true CN114880049A (en) 2022-08-09

Family

ID=82668011

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210224006.1A Pending CN114880049A (en) 2022-03-09 2022-03-09 Data processing method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN114880049A (en)

Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753605A (en) * 2008-12-02 2010-06-23 北大方正集团有限公司 Data validation method and server
CN107316134A (en) * 2017-06-16 2017-11-03 深圳乐信软件技术有限公司 A kind of risk control method, device, server and storage medium
CN108694670A (en) * 2018-07-25 2018-10-23 珠海宏桥高科技有限公司 Transaction data authentication method, apparatus and system
CN110389900A (en) * 2019-07-10 2019-10-29 深圳市腾讯计算机系统有限公司 A kind of distributed experiment & measurement system test method, device and storage medium
CN111581216A (en) * 2020-05-09 2020-08-25 北京百度网讯科技有限公司 Data processing method, device, equipment and storage medium
US10769220B1 (en) * 2019-04-09 2020-09-08 Coupang Corp. Systems, apparatuses, and methods of processing and managing web traffic data
CN111639360A (en) * 2020-04-29 2020-09-08 深圳壹账通智能科技有限公司 Intelligent data desensitization method and device, computer equipment and storage medium
CN111773728A (en) * 2020-07-09 2020-10-16 网易(杭州)网络有限公司 Data table testing method, device, equipment and storage medium
US20200364075A1 (en) * 2018-05-17 2020-11-19 Baidu Online Network Technology (Beijing) Co., Ltd. Blockchain network transaction processing method, apparatus, device, and storage medium
CN112860562A (en) * 2021-02-23 2021-05-28 中国工商银行股份有限公司 Automatic testing method and device

Patent Citations (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101753605A (en) * 2008-12-02 2010-06-23 北大方正集团有限公司 Data validation method and server
CN107316134A (en) * 2017-06-16 2017-11-03 深圳乐信软件技术有限公司 A kind of risk control method, device, server and storage medium
US20200364075A1 (en) * 2018-05-17 2020-11-19 Baidu Online Network Technology (Beijing) Co., Ltd. Blockchain network transaction processing method, apparatus, device, and storage medium
CN108694670A (en) * 2018-07-25 2018-10-23 珠海宏桥高科技有限公司 Transaction data authentication method, apparatus and system
US10769220B1 (en) * 2019-04-09 2020-09-08 Coupang Corp. Systems, apparatuses, and methods of processing and managing web traffic data
CN110389900A (en) * 2019-07-10 2019-10-29 深圳市腾讯计算机系统有限公司 A kind of distributed experiment & measurement system test method, device and storage medium
CN111639360A (en) * 2020-04-29 2020-09-08 深圳壹账通智能科技有限公司 Intelligent data desensitization method and device, computer equipment and storage medium
CN111581216A (en) * 2020-05-09 2020-08-25 北京百度网讯科技有限公司 Data processing method, device, equipment and storage medium
CN111773728A (en) * 2020-07-09 2020-10-16 网易(杭州)网络有限公司 Data table testing method, device, equipment and storage medium
CN112860562A (en) * 2021-02-23 2021-05-28 中国工商银行股份有限公司 Automatic testing method and device

Similar Documents

Publication Publication Date Title
WO2020042290A1 (en) Risk management method, and apparatus and computer-readable storage medium
CN111290742A (en) Parameter verification method and device, electronic equipment and readable storage medium
US9165207B2 (en) Screenshot orientation detection
CN113034274A (en) Supply chain financial service system and method based on block chain and terminal equipment
CN111124917A (en) Public test case management and control method, device, equipment and storage medium
CN113052676A (en) Intelligent wind control decision method, device, equipment and readable storage medium
US20160284013A1 (en) Order processing system and order processing method
US20150012921A1 (en) Systems, methods, and computer program products for processing sets of instructions for mobile devices
CN112711640A (en) Method and device for configuring business handling process
CN108632348B (en) Service checking method and device
CN114928603B (en) Upgrading method and device of client software, electronic equipment and medium
CN114880049A (en) Data processing method and device, electronic equipment and storage medium
CN115965474A (en) Service processing method, device, equipment and storage medium
CN110471966B (en) Information data verification method, device, computer equipment and storage medium
CN112181817B (en) Test method and test device for SOA architecture platform
CN113935295A (en) Valuation table summarizing method, valuation table summarizing device, valuation table summarizing equipment and valuation table summarizing medium
CN114693358A (en) Data processing method and device, electronic equipment and storage medium
CN113312900A (en) Data verification method and device
CN112988812A (en) Inventory data processing method, device, equipment and storage medium
CN109447806B (en) Front-end control method and device, storage medium and electronic equipment
CN113592645A (en) Data verification method and device
CN113077316A (en) Data display method and device
CN111210109A (en) Method and device for predicting user risk based on associated user and electronic equipment
CN112261072A (en) Service calling method, device, equipment and storage medium
CN110661792B (en) Service ordered calling method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination