CN115391087A - Message checking method, device, equipment and medium - Google Patents

Message checking method, device, equipment and medium Download PDF

Info

Publication number
CN115391087A
CN115391087A CN202211025551.4A CN202211025551A CN115391087A CN 115391087 A CN115391087 A CN 115391087A CN 202211025551 A CN202211025551 A CN 202211025551A CN 115391087 A CN115391087 A CN 115391087A
Authority
CN
China
Prior art keywords
verification
message
field data
verified
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211025551.4A
Other languages
Chinese (zh)
Inventor
赵尊晨
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Bank of China Ltd
Original Assignee
Bank of China Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Bank of China Ltd filed Critical Bank of China Ltd
Priority to CN202211025551.4A priority Critical patent/CN115391087A/en
Publication of CN115391087A publication Critical patent/CN115391087A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/08Error detection or correction by redundancy in data representation, e.g. by using checking codes
    • G06F11/10Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's
    • G06F11/1004Adding special bits or symbols to the coded information, e.g. parity check, casting out 9's or 11's to protect a block of data words, e.g. CRC or checksum
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • H04L63/123Applying verification of the received information received data contents, e.g. message integrity

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Signal Processing (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computing Systems (AREA)
  • Databases & Information Systems (AREA)
  • Quality & Reliability (AREA)
  • Data Mining & Analysis (AREA)
  • Software Systems (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The present application relates to the field of data processing technologies, and in particular, to a method, an apparatus, a device, and a medium for message verification. Obtaining a message to be checked; verifying the message to be verified based on a preset rule to obtain a verification result; and analyzing the message to be verified according to the verification result to generate an analysis record. Therefore, the message is automatically checked by using the preset rule and the check result is analyzed, so that the message checking efficiency is improved.

Description

Message checking method, device, equipment and medium
Technical Field
The present application relates to the field of data processing technologies, and in particular, to a method, an apparatus, a device, and a medium for packet verification.
Background
In the process of processing the message, it is necessary to verify whether the message has a problem.
Currently, the message is usually checked by manually verifying the message. However, the efficiency of manually validating the message is low.
Disclosure of Invention
The application provides a method, a device, equipment and a medium for message verification, which can improve the efficiency of message verification.
In a first aspect, the present application provides a method for message verification, where the method includes:
acquiring a message to be checked;
verifying the message to be verified based on a preset rule to obtain a verification result;
and analyzing the message to be verified according to the verification result to generate an analysis record.
Optionally, the preset rule is entered by:
acquiring a check rule template input by a user;
based on the check rule in the check rule base, checking the check rule template;
and taking the verification rule template meeting the verification condition as a preset rule.
Optionally, the analyzing the message to be verified according to the verification result to generate an analysis record includes:
if the verification result indicates that the message to be verified has a verification problem, determining problem field data;
determining a problem reason of the problem field data;
and generating an analysis record according to the problem reason.
Optionally, the determining a problem cause of the problem field data includes:
determining the problem reason of the problem field data according to the verification problem;
and/or the presence of a gas in the gas,
and determining target field data associated with the problem field data, and identifying the problem reason of the target field data.
Optionally, the method further comprises:
if the problem reason of the problem field data is not identified, determining target field data related to the problem field data;
and displaying the incidence relation between the question field data and the target field data.
Optionally, the method further comprises:
generating a verification report according to at least one of the verification result and the analysis record;
and displaying the verification report.
Optionally, the generating a verification report according to at least one of the verification result and the analysis record includes:
acquiring a verification report template;
and writing at least one of the verification result and the analysis record based on the verification report template to generate the verification report.
In a second aspect, the present application provides a device for message verification, where the device includes:
the device comprises an acquisition unit, a verification unit and a verification unit, wherein the acquisition unit is used for acquiring a message to be verified;
the verification unit is used for verifying the message to be verified based on a preset rule to obtain a verification result;
and the first analysis unit is used for analyzing the message to be verified according to the verification result and generating an analysis record.
Optionally, the preset rule is entered by:
acquiring a check rule template input by a user;
based on the check rule in the check rule base, checking the check rule template;
and taking the verification rule template meeting the verification condition as a preset rule.
Optionally, the first analysis unit is specifically configured to determine problem field data if the verification result indicates that the message to be verified has a verification problem; determining a problem reason of the problem field data; and generating an analysis record according to the problem reason.
Optionally, the first analyzing unit is configured to determine a cause of the problem field data, and includes:
the first analysis unit is used for determining the problem reason of the problem field data according to the verification problem;
and/or the presence of a gas in the atmosphere,
and determining target field data associated with the problem field data, and identifying the problem reason of the target field data.
Optionally, the apparatus further comprises:
the second analysis unit is used for determining target field data related to the problem field data if the problem reason of the problem field data is not identified;
and the first display unit is used for displaying the incidence relation between the question field data and the target field data.
Optionally, the apparatus further comprises:
the generating unit is used for generating a verification report according to at least one of the verification result and the analysis record;
and the second display unit is used for displaying the verification report.
Optionally, the generating unit is configured to generate a verification report according to at least one of the verification result and the analysis record, and includes:
the generating unit is used for acquiring a verification report template; and writing at least one of the verification result and the analysis record based on the verification report template to generate the verification report.
In a third aspect, the present application provides a device for message verification, where the device includes a processor and a memory:
the memory is used for storing a computer program and transmitting the computer program to the processor;
the processor is configured to execute the method for packet verification according to any one of the first aspect according to an instruction in the computer program.
In a fourth aspect, the present application provides a computer-readable storage medium for storing a computer program for executing the method for packet inspection according to any one of the first aspect.
The technical scheme of the application has the advantages that:
the application provides a message checking method, which comprises the steps of obtaining a message to be checked; verifying the message to be verified based on a preset rule to obtain a verification result; and analyzing the message to be verified according to the verification result to generate an analysis record. Therefore, the message to be verified is automatically verified by using the preset rule and the verification result is analyzed, so that the message verification efficiency is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art that other drawings can be obtained according to the drawings without inventive exercise.
Fig. 1 is a schematic flowchart of a method for message verification according to an embodiment of the present application;
fig. 2 is a schematic structural diagram of a message verification apparatus according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a device for message verification according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
When the message is checked, a technician or a service person is usually required to manually check the message, and then the message is analyzed and processed, so that the efficiency of manually checking the message is low.
Based on the above, the application provides a method, a device, equipment and a medium for message verification, by acquiring a message to be verified; verifying the message to be verified based on a preset rule to obtain a verification result; and analyzing the message to be verified according to the verification result to generate an analysis record. Therefore, the message to be verified is automatically verified by using the preset rule and the verification result is analyzed, so that the message verification efficiency is improved.
Referring to fig. 1, the figure is a schematic flow chart of a method for message verification according to an embodiment of the present application, where the method includes steps S101 to S103.
S101: and acquiring a message to be checked.
The message to be checked is a message which needs to be subjected to data check. The embodiment of the application does not limit the source of the message to be checked. As an example, the message to be checked is a service message used for information transmission in a service processing procedure. As another example, the message to be verified is a message stored in the database that needs to be verified.
The embodiment of the application does not limit the specific implementation manner of obtaining the message to be checked. As an example, the message to be checked may be selected from a service message. In a possible implementation manner, at a preset acquisition time for acquiring the message to be checked, a part of the service messages are selected from the service messages as the message to be checked. In another possible implementation manner, in response to an acquisition operation triggered by a verifier, a part of the service messages are selected from the service messages as messages to be verified.
S102: and verifying the message to be verified based on a preset rule to obtain a verification result.
After the message to be verified is obtained, the message to be verified can be verified by using a preset rule. If the message to be verified has verification problems, such as data null values, abnormal values and the like, the verification result of the message to be verified is obtained, and further analysis is performed. If the message to be verified is judged to have no verification problem, the verification result of the message to be verified can be directly obtained without further analysis.
The embodiment of the application does not limit the preset rule to verify the property of the message to be verified. As some examples, for the verification of a single message to be verified, one or more of accuracy, integrity, consistency, validity, uniqueness, timeliness and stability of the single message to be verified may be verified by using a preset rule. The accuracy refers to whether the message to be checked is consistent with the characteristics of the corresponding objective entity. The integrity refers to whether the message to be checked has missing records or missing fields. Consistency refers to whether values of the same attribute of the same entity are consistent in different systems. The validity refers to whether the message to be checked meets the condition defined by the user or is within a certain threshold value range. The uniqueness refers to whether the message to be checked has repeated records. The timeliness refers to whether the generation and supply of the message to be checked are timely. The stability is whether the fluctuation of the message to be checked is stable or not and is within an effective range or not.
As another example, for a plurality of associated messages to be checked, the fields and the response time between the plurality of messages to be checked may be checked by using a preset rule.
It can be understood that the specific aspect of the message to be verified detected by the preset rule can be expanded according to the actual condition of the message to be verified and the user requirement.
Specifically, as an example, the preset rule may include a constraint of a single field for checking. Such as rules including no null, comparison operation, including, no including, value range (interval), value range (enumeration), field length, field type, regular expression, and the like.
It should be noted that the step of checking the message to be checked may be executed multiple times. When no new message to be verified needs to be verified, the verified message to be verified can be repeatedly verified so as to ensure the accuracy of the verification result. When a new message to be verified needs to be verified, the new message to be verified can be verified by using a preset rule.
In a possible implementation manner, the embodiment of the present application provides two specific implementation manners of entering a preset rule, which are specifically referred to below.
S103: and analyzing the message to be verified according to the verification result to generate an analysis record.
The verification result can be two types, one type is that the message to be verified has a verification problem, and when the verification problem exists, the reason for the problem needs to be further analyzed, and the like; one is that the message to be checked has no check problem, and when there is no check problem, no analysis is needed.
In a possible implementation manner, this embodiment provides a specific implementation manner for analyzing the packet to be verified according to the verification result and generating an analysis record, which is specifically referred to below.
Based on the related content of S101-S103, obtaining the message to be checked; verifying the message to be verified based on a preset rule to obtain a verification result; and analyzing the message to be verified according to the verification result to generate an analysis record. Therefore, the preset rules are utilized to automatically check the message to be checked and analyze the check result, and the message checking efficiency is improved.
In a possible implementation manner, the embodiment of the present application provides two specific implementation manners for entering the preset rule.
The first method comprises the following steps: the preset rule may be determined based on a check rule template input by a user.
The embodiment of the application provides a specific implementation mode for entering a preset rule, which comprises the following three steps:
a1: and acquiring a check rule template input by a user.
The verification rule template may be a preset Excel template.
In a possible implementation manner, the user downloads a check rule template and fills a check rule in the check rule template, where the check rule may be one or multiple. After completion of the user fill-in, it may be entered by the user.
A2: and verifying the verification rule template based on the verification rules in the verification rule base.
After the check rule template input by the user is obtained, the check rule in the template is analyzed, and whether the check rule has a filling error or not is checked. And whether repeated check rule input exists can be judged based on the check rule in the check rule base.
A3: and taking the verification rule template meeting the verification condition as a preset rule.
The present application does not limit the specific determination manner of the verification condition, and as an example, the verification condition may be that the verification rule has no filling error and is not repeated with the original verification rule in the verification rule base.
And if the verification rule in the verification rule template has no filling error and is not repeated with the original verification rule after the analysis check of the A2, judging that the verification rule template is valid, automatically configuring the rule and completing the entry of the preset rule.
And if the verification rule in the verification rule template has at least one condition of filling error and repetition with the original verification rule after analysis and check, judging that the verification rule template is invalid. Alternatively, after the verification rule template is judged to be invalid, an invalid description of the verification rule template may be generated and notified to the user.
The step of entering the preset rules can realize batch entry of the preset rules, and the entry speed is optimized, so that the message verification efficiency is improved.
And the second method comprises the following steps: the message layer can be visually displayed, and a user can carry out regular configuration on the table of the message layer in a form of support pulling according to the message type needing to be checked.
In a possible implementation manner, an embodiment of the present application provides a specific implementation manner for analyzing the packet to be verified according to the verification result and generating an analysis record.
The embodiment of the present application provides a specific implementation manner for analyzing the packet to be verified and generating an analysis record according to the verification result, which includes the following three steps:
b1: and if the verification result indicates that the message to be verified has a verification problem, determining problem field data.
The problem field data is part of data of the message to be checked with problems. The problem field data may be one piece or a plurality of pieces.
The embodiment of the application does not limit the specific implementation manner of determining the problem field data. In a possible implementation manner, the problem field data may be determined by parsing the message to be verified into a plurality of parts, and verifying each part respectively.
B2: and determining the problem reason of the problem field data.
The embodiment of the application does not limit the specific implementation manner of determining the problem reason of the problem field data. As an example, at least two data processing modes, stored procedure and SQL (Structured Query Language) script, may be adapted. For the problem field data, the processing source, the processing steps and the like of the field data can be analyzed according to the storage process or the SQL script, and the problem reason of the field data can be determined.
In one possible implementation, the present embodiment provides a specific implementation manner for determining the cause of the problem field data.
Determining the problem reason of the problem field data according to the verification problem;
and/or the presence of a gas in the gas,
and determining target field data associated with the problem field data, and identifying the problem reason of the target field data.
The target field data is field data having a processing logical relationship with the problem field data. For example, the question field data may be obtained in combination with a plurality of target field data, or the target field data is generated from the question field data.
Specifically, attributes such as a processing source and a processing step of the problem field data, attributes such as a processing source and a processing step of the target field data associated with the problem field data, or both of them may be analyzed to determine the cause of the problem.
B3: and generating an analysis record according to the problem reason.
By utilizing the step of analyzing the problem reasons of the problem field data of the message to be verified, the problem reasons can be automatically determined without manual analysis, and the message verification efficiency is improved.
In one possible implementation, a verification report can also be generated based on the verification result and the analysis record. The method for checking the message provided by the embodiment of the application further comprises the following two steps besides the steps.
C1: and generating a verification report according to at least one of the verification result and the analysis record.
It should be noted that, when the message to be verified has a verification problem, a report can be generated according to the verification result and the analysis record; and when the message to be checked has no check problem, a report can be generated only according to the check result.
In a possible implementation manner, the present application provides two specific implementation manners for generating a verification report according to at least one of the verification result and the analysis record, please refer to the following.
C2: and displaying the verification report.
The embodiment of the application does not limit the specific implementation manner of displaying the verification report. As an example, the verification report may be displayed via a display coupled to the computer device.
And the verification report is generated by the verification and analysis result and displayed, so that the verification report is convenient to archive or be checked by a monitoring organization.
In a possible implementation manner, the present application provides a specific implementation manner for generating a verification report according to at least one of the verification result and the analysis record, including the following two steps:
d1: and acquiring a verification report template.
The verification report template can be obtained based on a verification report completed manually. And, the generated verification report is modifiable.
In a possible implementation manner, a modification record of the historical verification report may be obtained, and the verification report template is continuously optimized according to the modification record.
D2: and writing at least one of the verification result and the analysis record based on the verification report template to generate the verification report.
It should be noted that the inspection report may be generated according to the requirements of the user.
By utilizing the verification report template, the verification report is generated according to the verification result and the analysis record, and the verification and analysis result is displayed, so that the verification report template is convenient to archive or be checked by a monitoring mechanism. And the generated verification report is more accurate and refined by continuously optimizing the verification report template.
In a possible implementation manner, the method for packet verification provided in this embodiment of the present application further includes, in addition to the above steps:
e1: and if the problem reason of the problem field data is not identified, determining target field data associated with the problem field data.
The embodiment of the present application does not limit the specific implementation manner of determining the target field data associated with the problem field data. As an example, the same field data as the question field data portion may be queried and used as the target field data.
E2: and displaying the incidence relation between the question field data and the target field data.
The association relationship may be a processing logical relationship existing between the problem field data and the target field data. For example, the question field data may be obtained in combination with a plurality of target field data, or the target field data is generated from the question field data. These processing logic relationships can be used as association relationships.
The specific display manner is similar to that described above, and is not described in detail.
When the cause of the problem field data is analyzed, the specific cause may not be analyzed. Even if the reason is not analyzed, an analysis result can be generated, the association relationship between the problem field data and the field data associated with the problem field data is displayed, the relationship between the problem field data and the field data is visualized, and the user is helped to analyze the problem field data and the field data.
For convenience of understanding, the method for checking a packet in the embodiment of the present application is specifically described in a specific application scenario as follows:
firstly, a user downloads a check rule template provided by a system, fills in a plurality of check rules according to the template, and uploads the check rules. After the check rule input by the user is obtained, the input check rule is analyzed and checked, the input check rule is determined to have no filling error and not to be repeated with the original check rule, and the input check rule is configured. And when the configuration of the verification rule is completed, acquiring the message to be verified, verifying by using the configured verification rule, finding that the message has a verification error, and obtaining a verification result.
Because the message has a check error, the system automatically determines the problem field data of the message, analyzes the field data and the field data related to the field by using the SQL script, analyzes the processing source and the processing steps, finally determines the problem cause of the field data as the processing step error, and generates an analysis record.
After the analysis record is generated, the user needs to obtain a verification report, and the system generates the verification report by combining the verification result and the analysis record by using a verification report template. After the report is generated, the user makes appropriate modification to the report, and the system records the modification record so as to optimize the verification report template.
Referring to fig. 2, which is a schematic structural diagram of a device for message verification provided in an embodiment of the present application, the device includes:
an obtaining unit 201, configured to obtain a message to be checked;
a verification unit 202, configured to verify the message to be verified based on a preset rule, so as to obtain a verification result;
and the first analysis unit 203 is configured to analyze the message to be verified according to the verification result, and generate an analysis record.
Optionally, the preset rule is entered by: acquiring a check rule template input by a user; based on the check rule in the check rule base, checking the check rule template; and taking the verification rule template meeting the verification condition as a preset rule.
Optionally, the first analyzing unit 203 is specifically configured to determine problem field data if the verification result indicates that the message to be verified has a verification problem; determining a problem reason of the problem field data; and generating an analysis record according to the problem reason.
Optionally, the first analyzing unit 203 is configured to determine a cause of the problem field data, and includes: determining the problem reason of the problem field data according to the verification problem; and/or determining target field data associated with the problem field data and identifying the problem reason of the target field data.
Optionally, the apparatus further comprises: the second analysis unit is used for determining target field data related to the problem field data if the problem reason of the problem field data is not identified; and the first display unit is used for displaying the incidence relation between the question field data and the target field data.
Optionally, the apparatus further comprises: the generating unit is used for generating a verification report according to at least one of the verification result and the analysis record; and the second display unit is used for displaying the verification report.
Optionally, the generating unit is configured to generate a verification report according to at least one of the verification result and the analysis record, and includes: the generating unit is used for acquiring a verification report template; and writing at least one of the verification result and the analysis record based on the verification report template to generate the verification report.
Based on the method for message verification provided by the embodiment of the method, the application provides a device for message verification. Fig. 3 is a schematic structural diagram of a device for message verification according to an embodiment of the present application. The apparatus includes a processor 320 and a memory 310:
the memory 310 is used for storing a computer program and transmitting the computer program to the processor 320;
the processor 320 is configured to execute the method for packet verification according to any one of the first aspect according to instructions in the computer program.
Based on the method for message verification provided in the foregoing method embodiment, an embodiment of the present application provides a computer-readable storage medium, where the computer-readable storage medium is used to store a computer program, and the computer program is used to execute the method for message verification described in the foregoing embodiment.
It should be understood that in the present application, "at least one" means one or more, "a plurality" means two or more. "and/or" for describing an association relationship of associated objects, indicating that there may be three relationships, e.g., "a and/or B" may indicate: only A, only B and both A and B are present, wherein A and B may be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of single item(s) or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, "a and b", "a and c", "b and c", or "a and b and c", wherein a, b and c may be single or plural.
It is further noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrases "comprising a," "8230," "8230," or "comprising" does not exclude the presence of additional like elements in a process, method, article, or apparatus that comprises the element.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method for message verification is characterized by comprising the following steps:
acquiring a message to be checked;
verifying the message to be verified based on a preset rule to obtain a verification result;
and analyzing the message to be verified according to the verification result to generate an analysis record.
2. The message verification method according to claim 1, wherein the preset rule is entered by:
acquiring a check rule template input by a user;
based on the check rule in the check rule base, checking the check rule template;
and taking the verification rule template meeting the verification condition as a preset rule.
3. The message verification method according to claim 1, wherein the analyzing the message to be verified according to the verification result and generating an analysis record comprises:
if the verification result indicates that the message to be verified has a verification problem, determining problem field data;
determining a problem reason of the problem field data;
and generating an analysis record according to the problem reason.
4. The method for message verification according to claim 3, wherein the determining the cause of the problem field data comprises:
determining the problem reason of the problem field data according to the verification problem;
and/or the presence of a gas in the gas,
and determining target field data associated with the problem field data, and identifying the problem reason of the target field data.
5. The message checking method according to claim 3, wherein the method further comprises:
if the problem reason of the problem field data is not identified, determining target field data related to the problem field data;
and displaying the incidence relation between the question field data and the target field data.
6. The method for message verification according to claim 1, wherein the method further comprises:
generating a verification report according to at least one of the verification result and the analysis record;
and displaying the verification report.
7. The message checking method according to claim 6, wherein the generating a check report according to at least one of the check result and the analysis record comprises:
acquiring a verification report template;
and writing at least one of the verification result and the analysis record based on the verification report template to generate the verification report.
8. An apparatus for message verification, comprising:
the device comprises an acquisition unit, a verification unit and a verification unit, wherein the acquisition unit is used for acquiring a message to be verified;
the verification unit is used for verifying the message to be verified based on a preset rule to obtain a verification result;
and the first analysis unit is used for analyzing the message to be verified according to the verification result and generating an analysis record.
9. An apparatus for message verification, the apparatus comprising a processor and a memory:
the memory is used for storing a computer program and transmitting the computer program to the processor;
the processor is configured to perform the method of message checking according to any of claims 1 to 7 according to instructions in the computer program.
10. A computer-readable storage medium, characterized in that the computer-readable storage medium is used for storing a computer program for performing the method of message verification according to any of claims 1 to 7.
CN202211025551.4A 2022-08-25 2022-08-25 Message checking method, device, equipment and medium Pending CN115391087A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211025551.4A CN115391087A (en) 2022-08-25 2022-08-25 Message checking method, device, equipment and medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211025551.4A CN115391087A (en) 2022-08-25 2022-08-25 Message checking method, device, equipment and medium

Publications (1)

Publication Number Publication Date
CN115391087A true CN115391087A (en) 2022-11-25

Family

ID=84123450

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211025551.4A Pending CN115391087A (en) 2022-08-25 2022-08-25 Message checking method, device, equipment and medium

Country Status (1)

Country Link
CN (1) CN115391087A (en)

Similar Documents

Publication Publication Date Title
Dunn et al. From alpha to omega: A practical solution to the pervasive problem of internal consistency estimation
US8892534B2 (en) System and method for integrating data quality metrics into enterprise data management processes
US10013439B2 (en) Automatic generation of instantiation rules to determine quality of data migration
CN111722839B (en) Code generation method and device, electronic equipment and storage medium
US20080276225A1 (en) Testing Executable Logic
US20160162539A1 (en) Computer executable method of generating analysis data and apparatus performing the same and storage medium for the same
CN111428095B (en) Graph data quality verification method and graph data quality verification device
WO2018188222A1 (en) A2l file merging method and device
CN113434542B (en) Data relationship identification method and device, electronic equipment and storage medium
CN115391087A (en) Message checking method, device, equipment and medium
CN112631852B (en) Macro checking method, macro checking device, electronic equipment and computer readable storage medium
CN107273293B (en) Big data system performance test method and device and electronic equipment
CN115203300A (en) Data verification method and device
CN114077600A (en) ARM (advanced RISC machine) kernel-based data heterogeneous migration visual analysis method
CN115826928B (en) Program generating method, system, electronic device and computer readable storage medium
CN116483377B (en) Code detection method and device, electronic equipment and storage medium
US11830081B2 (en) Automated return evaluation with anomoly detection
CN113468158B (en) Data restoration method, system, electronic equipment and medium
CN116401177B (en) DDL correctness detection method, device and medium
CN113343659B (en) Analysis report generation method, device, equipment and storage medium
CN117370158A (en) Test processing method, system, electronic equipment and medium
CN114238092A (en) Software performance evaluation method, device, equipment and readable storage medium
CN114860305A (en) Data processing method and device
CN115309629A (en) Processing method and device for on-line environment configuration of program, equipment and medium
CN115757472A (en) Data comparison method and device, storage medium and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination