CN115357762A - Data verification method and device, storage medium and electronic equipment - Google Patents

Data verification method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN115357762A
CN115357762A CN202211282363.XA CN202211282363A CN115357762A CN 115357762 A CN115357762 A CN 115357762A CN 202211282363 A CN202211282363 A CN 202211282363A CN 115357762 A CN115357762 A CN 115357762A
Authority
CN
China
Prior art keywords
data
program
tangent plane
verified
data verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211282363.XA
Other languages
Chinese (zh)
Inventor
刘焱
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Alipay Hangzhou Information Technology Co Ltd
Original Assignee
Alipay Hangzhou Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Alipay Hangzhou Information Technology Co Ltd filed Critical Alipay Hangzhou Information Technology Co Ltd
Priority to CN202211282363.XA priority Critical patent/CN115357762A/en
Publication of CN115357762A publication Critical patent/CN115357762A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/901Indexing; Data structures therefor; Storage structures
    • G06F16/9014Indexing; Data structures therefor; Storage structures hash tables
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/903Querying
    • G06F16/90335Query processing
    • G06F16/90344Query processing by using string matching techniques
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Computer Security & Cryptography (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Computational Linguistics (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the specification relates to a safety section, firstly, data to be verified are obtained, and then a data verification function to be called and a data verification rule for verifying the data to be verified are determined from a business application program. And determining a tangent plane program matched with the data verification function from the tangent plane program library and injecting the tangent plane program into a tangent point in the service application program through a tangent plane base corresponding to the service application program. And injecting the section program into the service application program through the section base. And performing data verification on the input data to be verified through the tangent plane program according to the data verification rule input into the tangent plane program. In the method, the service application program and the section program of the data verification are mutually decoupled, so that the maintenance cost of the section program of the data verification can be reduced, and the maintenance efficiency can be improved.

Description

Data verification method and device, storage medium and electronic equipment
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a data verification method and apparatus, a storage medium, and an electronic device.
Background
Currently, each service platform may perform data verification on data set by a user through a matching program of a regular expression written in a service application program, so as to protect privacy of the user.
Taking the setting of the password as an example, the password is verified through the regular expression aiming at the password input by the user, so as to judge whether the input password meets the complex intensity corresponding to the regular expression. The greater the complexity, the less easily the password is broken, and the more the privacy data of the user can be prevented from being revealed.
However, the business application and the regular expression matching program are coupled with each other, thereby increasing the maintenance cost of the regular expression matching program and reducing the maintenance efficiency.
Disclosure of Invention
Embodiments of the present specification provide a data verification method, apparatus, storage medium, and electronic device, so as to partially solve the problems in the prior art.
The embodiment of the specification adopts the following technical scheme:
the data verification method provided by the specification comprises the following steps:
acquiring data to be checked;
determining a data verification rule for performing data verification on the data to be verified and a data verification function to be called in a service application program according to the data to be verified;
determining a tangent plane program matched with the data verification function from a preset tangent plane program library and determining a tangent point corresponding to the tangent plane program injected into the service application program through a tangent plane base corresponding to the service application program, wherein the tangent plane base comprises a program code for acquiring the tangent plane program and injecting the tangent plane program into the tangent point;
injecting, by the tangent plane base, the tangent plane program into the tangent point in the business application;
and inputting the data to be verified and the data verification rule as input parameters into the tangent plane program, so that the data to be verified is verified according to the data verification rule through the tangent plane program.
Optionally, performing data verification on the data to be verified according to the data verification rule, which specifically includes:
processing the data to be verified according to a preset hash algorithm to obtain a hash value corresponding to the data to be verified;
judging whether the hash value exists in a stored hash list or not;
and if the hash value does not exist in the hash list, performing data verification on the data to be verified according to the data verification rule to obtain a verification result.
Optionally, after obtaining the verification result, the method further includes:
and adding the hash value into the hash list, and correspondingly storing the verification result and the hash value.
Optionally, the method further comprises:
and if the hash value exists in the hash list, searching a check result corresponding to the hash value.
Optionally, the data verification rule includes: and carrying out a regular expression required by data verification on the data to be verified.
This specification provides a data verification apparatus, includes:
the acquisition module is used for acquiring data to be checked;
the first determining module is used for determining a data checking rule for checking the data to be checked and a data checking function to be called in a business application program according to the data to be checked;
the second determination module is used for determining a tangent plane program matched with the data verification function from a preset tangent plane program library through a tangent plane base corresponding to the service application program and determining a tangent point corresponding to the tangent plane program injected into the service application program, and the tangent plane base comprises a program code for acquiring the tangent plane program and injecting the tangent plane program into the tangent point;
the injection module is used for injecting the tangent plane program into the tangent point in the business application program through the tangent plane base;
and the verification module is used for inputting the data to be verified and the data verification rule into the tangent plane program as input parameters so as to perform data verification on the data to be verified according to the data verification rule through the tangent plane program.
Optionally, the verification module is specifically configured to process the data to be verified according to a preset hash algorithm, so as to obtain a hash value corresponding to the data to be verified; judging whether the hash value exists in a stored hash list or not; and if the hash value does not exist in the hash list, performing data verification on the data to be verified according to the data verification rule to obtain a verification result.
Optionally, the verification module is further configured to add the hash value to the hash list, and store the verification result corresponding to the hash value.
The present specification provides a computer-readable storage medium storing a computer program, which when executed by a processor implements the above-described data verification method.
The present specification provides an electronic device, which includes a memory, a processor, and a computer program stored in the memory and executable on the processor, and when the processor executes the computer program, the processor implements the data verification method described above.
The embodiment of the specification adopts at least one technical scheme which can achieve the following beneficial effects:
in the embodiment of the present specification, data to be verified is obtained first, and then a data verification function to be called and a data verification rule for verifying the data to be verified are determined from a business application. And determining a section program matched with the data verification function from the section program library and injecting the section program into a tangent point in the service application program through a section base corresponding to the service application program, wherein the section base comprises a program code for acquiring the section program and injecting the section program into the tangent point. Injecting the tangent program into the tangent point in the business application program through the tangent base. And performing data verification on the input data to be verified through the section program according to the data verification rule in the input section program. In the method, the service application program and the section program of the data verification are mutually decoupled, so that the maintenance cost of the section program of the data verification can be reduced, and the maintenance efficiency can be improved.
Drawings
The accompanying drawings, which are included to provide a further understanding of the specification and are incorporated in and constitute a part of this specification, illustrate embodiments of the specification and together with the description serve to explain the specification and not to limit the specification in a non-limiting sense. In the drawings:
fig. 1 is a schematic flow chart of a data verification method provided in an embodiment of the present disclosure;
fig. 2 is a schematic structural diagram of a data verification apparatus provided in an embodiment of the present disclosure;
fig. 3 is a schematic structural diagram of an electronic device provided in an embodiment of the present specification.
Detailed Description
In order to make the objects, technical solutions and advantages of the present disclosure more clear, the technical solutions of the present disclosure will be clearly and completely described below with reference to the specific embodiments of the present disclosure and the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present disclosure, and not all embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present specification without making any creative effort belong to the protection scope of the present specification.
The technical solutions provided by the embodiments of the present description are described in detail below with reference to the accompanying drawings.
In this specification, a secure section is used to decouple the service application program from the program for data verification, so as to improve the efficiency of the program for maintaining data verification.
The above-mentioned security profile refers to a method for dynamically adding or modifying a profile program for implementing a security profile service in the running logic of a service application program by using an Aspect-oriented Programming (AOP) mode without modifying the service application program. The method and the system enable the program for realizing the safe tangent plane service to be decoupled with the service application program while realizing the safe tangent plane service, thereby avoiding the development iteration problem caused by high coupling.
The section program mentioned here is an enhanced program for implementing the security section service based on the service operation logic. The method can inject the tangent plane program into the corresponding tangent point of the service application program by adopting a tangent plane-oriented programming mode, and the tangent plane program is triggered and executed in the process of executing the service application program, so that the required safe tangent plane service function is realized.
When a service application executes a service, the service application generally performs service execution through a call between functions. Therefore, any function in the business application program can be used as the cut-in point of the cut-plane program, namely the cut-in point, and the cut-plane program is injected into the corresponding cut-in point. When the service application program is executed to the tangent point, namely the function of the service application program corresponding to the tangent point is called, the tangent plane program injected at the tangent point is executed.
Generally, there is high reusability of the code responsible for the process of injecting the tangent program into the tangent point, and therefore, the program implementing this process is generally abstracted into one service module, i.e., the tangent base. The tangent plane base can obtain tangent plane programs needing to be deployed and tangent points in the service application programs from a third party providing safe tangent plane services, and the corresponding tangent plane programs are injected into the tangent points of the service application programs by the environment after the application containers are started.
The business application may be a business application that provides business services in a server of the business platform. The service may be a service provided by a server of the service platform to a user, such as an inquiry service, a payment service, and the like. The business service may also be a business service provided by a certain server of the business platform to other servers, such as a settlement service.
Of course, as can be seen from the above description, in order to decouple the program of the security cut plane service from the service application program, the present specification uses a cut plane-oriented programming mode to make the program of the security cut plane service and the service application program be interleaved during service execution, but parallel to each other and can be maintained independently. Therefore, unlike the service provider of the service application program, a third party providing the security tangent plane service may manage the content related to the security tangent plane service through the management and control platform, for example, configuration of a security tangent plane service management and control policy, version iteration of the tangent plane program, configuration of a deployment rule of the tangent plane program, and the like. Of course, the service providing the security profile may be a third party or a service provider.
When managing the content related to the security tangent plane service, the management and control platform may record various configuration information, such as configuration of various policies, configuration of deployment rules of tangent plane programs, and the like, through the configuration file. The section base can complete the deployment of the section program according to the configuration file, or the management and control platform can realize the safe section service according to the configuration file.
In practical applications, a service provider usually has a machine room including several physical machines or physical servers, and provides physical resources required by service applications through the physical machines. Of course, a business application may not need all the physical resources of the entire physical machine, and thus, multiple virtual hosts (virtual hosting) are generally run on one physical machine through virtualization technology. The virtual hosts are independent of each other and share part of physical resources of the physical machine. An application container can then be deployed in the virtual host and the business application can be run through the application container. An application container typically contains physical resources, such as CPU, memory, etc., allocated to the application container, and a runtime environment, such as an Operating System (OS) or other runtime environment data, provided to the application container, such as Serial Number (SN) Number of the container, allocated IP (infinitial Property), application name, tenant, environment variable, etc. Business applications can be deployed in application containers to execute business.
In a scene of executing a service based on a safe tangent plane, a service provider or a server of a third party providing the safe tangent plane service can provide a control platform, manage the content related to the safe tangent plane service through the control platform, deploy a tangent plane base in an application container, and inject a tangent plane program into a service application program in the service application container through the tangent plane base to provide support of the safe tangent plane service for the application container of the service provider.
The tangent plane base can then be deployed beforehand in the application container of the service provider. Generally, when the application container is started, an operating system provided for the application container can be invoked, a pre-deployed section base is operated, a section program and a tangent point of a service application program are obtained from the management and control platform through the section base, and the section program is injected into the tangent point of the service application program in the application container. In addition, the tangent plane base can also obtain tangent points of the tangent plane program and the service application program from the management and control platform in the execution process of the service application program, and inject the tangent plane program into the tangent points of the service application program in the application container.
Of course, how the tangent plane base obtains the information required by the tangent plane program deployment from the control platform can be set according to the needs. For example, the required information may be actively pulled from the management and control platform according to the configuration file, or the management and control platform may actively issue the information required for the tangent plane base to receive.
After the tangent plane program is injected into the tangent point of the service application program, the service application program can trigger the tangent plane program in the execution process so as to realize the corresponding safe tangent plane service function.
In this specification, the secure tangent plane service function implemented by the tangent plane program refers to: and performing data verification on the data to be verified based on the data verification rule.
Fig. 1 is a schematic flow chart of a data verification method provided in this specification, where the data verification method is applied to a server, and the server is used to execute a service, and the data verification method includes:
s100: and acquiring data to be verified.
In the embodiment of the specification, the server responds to the input operation of the user at the client to acquire the data to be verified. The data type of the data to be verified may include: any data type such as mobile phone number, mailbox, password and the like.
Specifically, the server may use data input by the user at the client as data to be verified. Or taking data input by a user at the client as an input parameter of the business application program, inputting the data input by the user into the business application program, determining data needing data verification based on the data input by the user in the running process of the business application program, taking the data as data to be verified, and finally obtaining the data to be verified.
S102: and determining a data verification rule for performing data verification on the data to be verified and a data verification function to be called in a service application program according to the data to be verified.
In this embodiment of the present description, in an operation process of a service application, a server may determine, according to acquired data to be verified, a data verification rule for performing data verification on the data to be verified and a data verification function to be invoked in the service application.
When the data verification rule is determined, the server may determine, according to the data type of the data to be verified, the data verification rule corresponding to the data type, as the data verification rule for performing data verification on the data to be verified. The data check rule may include: and carrying out a regular expression required by data verification on the data to be verified. Regular expressions are a logical formula for operating on character strings (including common characters (e.g., letters between a and z) and special characters (called meta characters)), and a "regular character string" is formed by using specific characters and combinations of the specific characters defined in advance, and is used for expressing a filtering logic for the character string. A regular expression is a text pattern that describes one or more strings of characters to be matched when searching for text.
Such as: when the data to be verified is the mobile phone number, the data verification rule is as follows: the input numeric string is 11 bits. At this time, the data check rule is used for judging whether the mobile phone number is legal or not. When the data to be verified is a password, the data verification rule is as follows: the input character strings are numbers, and the secrecy strength of the password is simple; the input character string contains a plurality of numbers and a letter, and the security strength of the password is moderate.
After the data verification rule is determined, a data verification function to be called in the service application program can be determined according to the data to be verified and the data verification rule, and the data verification function is called by the service application program. The data check functions written by different code languages have different function identifications. The function identification may refer to the function name. The code language includes at least: java, java Script, python, hypertext Preprocessor (PHP), etc.
S104: and determining a tangent plane program matched with the data verification function from a preset tangent plane program library and determining a tangent point corresponding to the tangent plane program injected into the service application program through a tangent plane base corresponding to the service application program, wherein the tangent plane base comprises a program code for acquiring the tangent plane program and injecting the tangent plane program into the tangent point.
S106: injecting, by the tangent plane base, the tangent plane program into the business application at the tangent point.
In this embodiment of the present specification, when the service application calls the data check function, a tangent plane program injection operation is triggered. For the tangent plane program injection operation, the server may determine (or obtain), from a preset tangent plane program library, a tangent plane program matched with the data check function through a tangent plane base corresponding to the service application program, and determine, from the preset tangent plane program library, a tangent point corresponding to the tangent plane program injected into the service application program when the data check function is called. The section base comprises a program code for acquiring a section program and injecting the section program to a tangent point. In addition, the tangent plane base may be pre-deployed in an application container running the business application.
For the data check function called by the service application program, the execution logics of the data check programs written in different code languages are different, so that the data check functions written in different code languages correspond to the tangent plane programs written in different code languages. Therefore, when the tangent plane program matched with the data verification function is determined, the server can determine the tangent plane program matched with the function identifier from a preset tangent plane program library through the tangent plane base corresponding to the service application program according to the function identifier of the data verification function.
When the tangent point injected into the service application program by the tangent plane program is determined, the position corresponding to the data check function can be used as the tangent point.
After the tangent plane program and the tangent point are determined, the tangent plane program may be injected into the business application program according to the determined tangent point. Specifically, the tangent plane program may be injected into the tangent point determined in the service application program through the tangent plane base, that is, the tangent plane program may be injected into the position corresponding to the data check function in the service application program through the tangent plane base.
Aiming at the tangent plane programs written by different code languages, the method for injecting the tangent plane programs into the service application programs is different. Such as: for the section program written by Java, the section program written by Java can be injected to the position of the tangent point by adopting the Java technology. Aiming at the tangent plane program written by the PHP, the tangent plane program can be injected into an interpreter of the PHP in a PHP expansion mode.
S108: and inputting the data to be verified and the data verification rule into the tangent plane program as input parameters, so as to perform data verification on the data to be verified according to the data verification rule through the tangent plane program.
In this embodiment, after the tangent plane program is injected into the business application program, the server may input the data to be verified and the data verification rule as input parameters into the tangent plane program. Namely, the tangent plane program obtains the data to be verified and the data verification rule from the service application program. After the section program acquires the data to be verified and the data verification rule, the data to be verified can be verified through the section program according to the data verification rule, and a verification result is obtained. The section program includes a designated data check function written by a designated code language, and the designated code language may include: the runt code language. Compared with a data check function written by code languages such as Java, java Script and Python in a service application program, the specified data check function written by the run code language can check data more quickly, and the data check efficiency is improved.
The data verification may refer to determining whether data to be verified conforms to a data verification rule.
When the data to be verified is verified through the tangent plane program, the data to be verified can be processed according to a preset hash algorithm to obtain a hash value corresponding to the data to be verified. And then, judging whether the hash value corresponding to the data to be checked exists in the stored hash list.
If the hash value corresponding to the data to be verified exists in the hash list, the verification result matched with the hash value corresponding to the data to be verified can be found from the stored verification results, and the verification result is returned to the service application program. The verification result matched with the hash value corresponding to the data to be verified can be searched from the hash list.
In the embodiment of the present specification, the hash value corresponding to the data that has been verified and the verification result corresponding to the hash value are stored, which can facilitate quick return of the verification result when the verified data is verified again, thereby improving data verification efficiency.
And if the hash value corresponding to the data to be verified does not exist in the hash list, performing data verification on the data to be verified according to the data verification rule to obtain a verification result.
Under the condition that the hash value corresponding to the data to be verified cannot be found in the hash list, it is indicated that the data to be verified needs to be subjected to data verification through a specified data verification function in the section program once the data to be verified is not subjected to data verification.
Since the runt code language can be compatible with other common code languages, such as: java, java Script, python and the like, so that code statements written by other common code languages can call functions written by a run code language, and therefore section programs written by different code languages can call specified data check functions written by the run code language.
Specifically, through the section program, a designated data verification function in the section program can be called, so that the designated data verification function performs data verification on the data to be verified according to the data verification rule, a verification result corresponding to the data to be verified is obtained, and the verification result corresponding to the data to be verified is returned.
Further, the data to be verified and the data verification rule can be input into a designated data verification function in the section program through the section program, so that the designated data verification function performs data verification on the data to be verified according to the data verification rule, and a verification result corresponding to the data to be verified is obtained.
After the tangent plane program obtains the verification result, the hash value corresponding to the data to be verified may be added to the hash list, and the hash value corresponding to the data to be verified and the verification result corresponding to the data to be verified are correspondingly stored. The verification result corresponding to the data to be verified can be stored in the hash list.
As can be seen from the method shown in fig. 1, in this specification, data to be verified is obtained first, and then a data verification function to be called and a data verification rule for verifying the data to be verified are determined from a business application. And determining a tangent plane program matched with the data verification function from the tangent plane program library and injecting the tangent plane program into a tangent point in the service application program through a tangent plane base corresponding to the service application program. Injecting the tangent program into the tangent point in the business application program through the tangent base. And performing data verification on the input data to be verified through the tangent plane program according to the data verification rule input into the tangent plane program. In the method, the service application program and the section program of the data verification are mutually decoupled, so that the maintenance cost of the section program of the data verification can be reduced, and the maintenance efficiency can be improved.
Based on the same idea, the data verification method provided in the embodiments of the present specification further provides a corresponding apparatus, a storage medium, and an electronic device.
Fig. 2 is a schematic structural diagram of a data verification apparatus provided in an embodiment of the present specification, where the apparatus includes:
an obtaining module 201, configured to obtain data to be verified;
a first determining module 202, configured to determine, according to the data to be verified, a data verification rule for performing data verification on the data to be verified and a data verification function to be called in a service application;
a second determining module 203, configured to determine, from a preset tangent plane library, a tangent plane program matched with the data verification function through a tangent plane base corresponding to the service application program, and determine a tangent point corresponding to the tangent plane program injected into the service application program, where the tangent plane base includes a program code for acquiring the tangent plane program and injecting the tangent plane program into the tangent point;
an injection module 204, configured to inject the tangent program into the tangent point in the business application program through the tangent base;
the verification module 205 is configured to input the data to be verified and the data verification rule as input parameters into the tangent plane program, so as to perform data verification on the data to be verified according to the data verification rule through the tangent plane program.
Optionally, the verification module 205 is specifically configured to process the data to be verified according to a preset hash algorithm, so as to obtain a hash value corresponding to the data to be verified; judging whether the hash value exists in a stored hash list or not; and if the hash value does not exist in the hash list, performing data verification on the data to be verified according to the data verification rule to obtain a verification result.
Optionally, after obtaining the verification result, the verification module 205 is further configured to add the hash value to the hash list, and correspondingly store the verification result and the hash value.
Optionally, the checking module 205 is specifically configured to, if the hash value exists in the hash list, search for a checking result corresponding to the hash value.
Optionally, the data verification rule includes: and carrying out a regular expression required by data verification on the data to be verified.
The present specification also provides a computer readable storage medium storing a computer program, which when executed by a processor can be used to execute the data verification method provided in fig. 1.
Based on the data verification method shown in fig. 1, the embodiment of the present specification further provides a schematic structural diagram of the unmanned device shown in fig. 3. As shown in fig. 3, the drone includes, at the hardware level, a processor, an internal bus, a network interface, a memory, and a non-volatile memory, although it may include hardware required for other services. The processor reads the corresponding computer program from the non-volatile memory into the memory and then runs the computer program to implement the data verification method shown in fig. 1.
Of course, besides the software implementation, the present specification does not exclude other implementations, such as logic devices or a combination of software and hardware, and the like, that is, the execution subject of the following processing flow is not limited to each logic unit, and may be hardware or logic devices.
In the 90 s of the 20 th century, improvements in a technology could clearly distinguish between improvements in hardware (e.g., improvements in circuit structures such as diodes, transistors, switches, etc.) and improvements in software (improvements in process flow). However, as technology advances, many of today's process flow improvements have been seen as direct improvements in hardware circuit architecture. Designers almost always obtain the corresponding hardware circuit structure by programming an improved method flow into the hardware circuit. Thus, it cannot be said that an improvement in the process flow cannot be realized by hardware physical blocks. For example, a Programmable Logic Device (PLD) (e.g., a Field Programmable Gate Array (FPGA)) is an integrated circuit whose Logic functions are determined by a user programming the Device. A digital system is "integrated" on a PLD by the designer's own programming without requiring the chip manufacturer to design and fabricate application-specific integrated circuit chips. Furthermore, nowadays, instead of manually manufacturing an Integrated Circuit chip, such Programming is often implemented by "logic compiler" software, which is similar to a software compiler used in program development and writing, but the original code before compiling is also written by a specific Programming Language, which is called Hardware Description Language (HDL), and HDL is not only one but many, such as ABEL (Advanced Boolean Expression Language), AHDL (alternate Hardware Description Language), traffic, CUPL (core universal Programming Language), HDCal, jhddl (Java Hardware Description Language), lava, lola, HDL, PALASM, rhyd (Hardware Description Language), and vhigh-Language (Hardware Description Language), which is currently used in most popular applications. It will also be apparent to those skilled in the art that hardware circuitry for implementing the logical method flows can be readily obtained by a mere need to program the method flows with some of the hardware description languages described above and into an integrated circuit.
The controller may be implemented in any suitable manner, for example, the controller may take the form of, for example, a microprocessor or processor and a computer-readable medium storing computer-readable program code (e.g., software or firmware) executable by the (micro) processor, logic gates, switches, an Application Specific Integrated Circuit (ASIC), a programmable logic controller, and an embedded microcontroller, examples of which include, but are not limited to, the following microcontrollers: ARC 625D, atmel AT91SAM, microchip PIC18F26K20, and Silicone Labs C8051F320, the memory controller may also be implemented as part of the control logic for the memory. Those skilled in the art will also appreciate that, in addition to implementing the controller as pure computer readable program code, the same functionality can be implemented by logically programming method steps such that the controller is in the form of logic gates, switches, application specific integrated circuits, programmable logic controllers, embedded microcontrollers and the like. Such a controller may thus be considered a hardware component, and the means included therein for performing the various functions may also be considered as a structure within the hardware component. Or even means for performing the functions may be conceived to be both a software module implementing the method and a structure within a hardware component.
The systems, apparatuses, modules or units described in the above embodiments may be specifically implemented by a computer chip or an entity, or implemented by a product with certain functions. One typical implementation device is a computer. In particular, the computer may be, for example, a personal computer, a laptop computer, a cellular telephone, a camera phone, a smartphone, a personal digital assistant, a media player, a navigation device, an email device, a game console, a tablet computer, a wearable device, or a combination of any of these devices.
For convenience of description, the above devices are described as being divided into various units by function, and are described separately. Of course, the functionality of the various elements may be implemented in the same one or more pieces of software and/or hardware in the practice of this description.
As will be appreciated by one skilled in the art, embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, the description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The description has been described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the description. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising one of 8230; \8230;" 8230; "does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises that element.
As will be appreciated by one skilled in the art, embodiments of the present description may be provided as a method, system, or computer program product. Accordingly, the description may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the description may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
This description may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The specification may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
All the embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from other embodiments. In particular, for the system embodiment, since it is substantially similar to the method embodiment, the description is simple, and for the relevant points, reference may be made to the partial description of the method embodiment.
The above description is only an example of the present specification, and is not intended to limit the present specification. Various modifications and alterations to this description will become apparent to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present specification should be included in the scope of the claims of the present specification.

Claims (10)

1. A method of data verification, the method comprising:
acquiring data to be checked;
determining a data verification rule for performing data verification on the data to be verified and a data verification function to be called in a service application program according to the data to be verified;
determining a tangent plane program matched with the data verification function from a preset tangent plane program library and determining a tangent point corresponding to the tangent plane program injected into the service application program through a tangent plane base corresponding to the service application program, wherein the tangent plane base comprises a program code for acquiring the tangent plane program and injecting the tangent plane program into the tangent point;
injecting, by the tangent plane base, the tangent plane program into the tangent point in the business application;
and inputting the data to be verified and the data verification rule as input parameters into the tangent plane program, so that the data to be verified is verified according to the data verification rule through the tangent plane program.
2. The method according to claim 1, wherein the data verification is performed on the data to be verified according to the data verification rule, and specifically includes:
processing the data to be verified according to a preset hash algorithm to obtain a hash value corresponding to the data to be verified;
judging whether the hash value exists in a stored hash list or not;
and if the hash value does not exist in the hash list, performing data verification on the data to be verified according to the data verification rule to obtain a verification result.
3. The method of claim 2, after obtaining the verification result, the method further comprising:
and adding the hash value into the hash list, and correspondingly storing the verification result and the hash value.
4. The method of claim 2, further comprising:
and if the hash value exists in the hash list, searching a check result corresponding to the hash value.
5. The method of any one of claims 1 to 4, wherein the data verification rules comprise: and carrying out a regular expression required by data verification on the data to be verified.
6. A data verification apparatus, comprising:
the acquisition module is used for acquiring data to be checked;
the first determining module is used for determining a data checking rule for checking the data to be checked and a data checking function to be called in a service application program according to the data to be checked;
the second determination module is used for determining a tangent plane program matched with the data verification function from a preset tangent plane program library through a tangent plane base corresponding to the service application program and determining a tangent point corresponding to the tangent plane program injected into the service application program, and the tangent plane base comprises a program code for acquiring the tangent plane program and injecting the tangent plane program into the tangent point;
the injection module is used for injecting the tangent plane program into the tangent point in the business application program through the tangent plane base;
and the verification module is used for inputting the data to be verified and the data verification rule into the tangent plane program as input parameters so as to perform data verification on the data to be verified according to the data verification rule through the tangent plane program.
7. The apparatus according to claim 6, wherein the verification module is specifically configured to process the data to be verified according to a preset hash algorithm, so as to obtain a hash value corresponding to the data to be verified; judging whether the hash value exists in a stored hash list or not; and if the hash value does not exist in the hash list, performing data verification on the data to be verified according to the data verification rule to obtain a verification result.
8. The apparatus of claim 7, the verification module further configured to add the hash value to the hash list and save the verification result corresponding to the hash value.
9. A computer-readable storage medium, in which a computer program is stored which, when being executed by a processor, carries out the method of any one of the preceding claims 1 to 5.
10. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of any of the preceding claims 1-5 when executing the program.
CN202211282363.XA 2022-10-19 2022-10-19 Data verification method and device, storage medium and electronic equipment Pending CN115357762A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211282363.XA CN115357762A (en) 2022-10-19 2022-10-19 Data verification method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211282363.XA CN115357762A (en) 2022-10-19 2022-10-19 Data verification method and device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN115357762A true CN115357762A (en) 2022-11-18

Family

ID=84007915

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211282363.XA Pending CN115357762A (en) 2022-10-19 2022-10-19 Data verification method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN115357762A (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111752797A (en) * 2020-06-23 2020-10-09 厦门美柚股份有限公司 Terminal log processing method and device, terminal and storage medium
CN115185605A (en) * 2022-07-18 2022-10-14 支付宝(杭州)信息技术有限公司 Service execution method, device, storage medium and electronic equipment

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111752797A (en) * 2020-06-23 2020-10-09 厦门美柚股份有限公司 Terminal log processing method and device, terminal and storage medium
CN115185605A (en) * 2022-07-18 2022-10-14 支付宝(杭州)信息技术有限公司 Service execution method, device, storage medium and electronic equipment

Similar Documents

Publication Publication Date Title
US11687645B2 (en) Security control method and computer system
CN115378735B (en) Data processing method and device, storage medium and electronic equipment
US8484625B2 (en) Method and apparatus to vet an executable program using a model
US10216510B2 (en) Silent upgrade of software with dependencies
CN109032825B (en) Fault injection method, device and equipment
CN109542506B (en) System capable of flexibly configuring interface and rapidly delivering service
Do et al. Enhancing user privacy on android mobile devices via permissions removal
CN115374481B (en) Data desensitization processing method and device, storage medium and electronic equipment
CN110445769B (en) Access method and device of business system
CN111291374B (en) Application program detection method, device and equipment
US10956232B2 (en) Instructing the use of application programming interface commands in a runtime environment
CN115185534A (en) Data desensitization method and device, readable storage medium and electronic equipment
CN115357940A (en) Data processing method and device, storage medium and electronic equipment
CN112073374B (en) Information interception method, device and equipment
CN115185605A (en) Service execution method, device, storage medium and electronic equipment
CN101950339B (en) Security protection method and system of computer
CN112269644B (en) Verification method, system and device for subprocess calling and readable storage medium
CN115659340B (en) Counterfeit applet identification method and device, storage medium and electronic equipment
CN110941443B (en) Method and device for modifying file name in SDK (software development kit) and electronic equipment
CN115186269A (en) Vulnerability mining method and device, storage medium and electronic equipment
CN115617471A (en) Service calling method and device, storage medium and electronic equipment
CN115495343A (en) Safety maintenance method and device, storage medium and electronic equipment
CN115357762A (en) Data verification method and device, storage medium and electronic equipment
CN107451050B (en) Function acquisition method and device and server
US11520866B2 (en) Controlling processor instruction execution

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20221118