CN116011029A - Information verification method, information verification device, computer equipment and storage medium - Google Patents

Information verification method, information verification device, computer equipment and storage medium Download PDF

Info

Publication number
CN116011029A
CN116011029A CN202310001638.6A CN202310001638A CN116011029A CN 116011029 A CN116011029 A CN 116011029A CN 202310001638 A CN202310001638 A CN 202310001638A CN 116011029 A CN116011029 A CN 116011029A
Authority
CN
China
Prior art keywords
information
verification
sub
application
application information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310001638.6A
Other languages
Chinese (zh)
Inventor
黄小芹
刘若愚
刘明飞
曹思萌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202310001638.6A priority Critical patent/CN116011029A/en
Publication of CN116011029A publication Critical patent/CN116011029A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application relates to an information verification method, an information verification device, computer equipment and a storage medium. The method comprises the steps of receiving application information to be verified, which is input based on at least one information input source and is used for applying resource borrowing service using certificates, acquiring corresponding verification configuration information according to a source identifier of the information input source, determining a verification rule used for verifying each item of sub-application information in the application information based on the verification configuration information, and carrying out basic data verification including information format verification, information integrity verification, information validity verification and the like on each item of sub-application information in the application information according to the verification rule. Compared with the traditional mode of checking according to respective checking modes in different application channels, the scheme has the advantages that after application information of different information input sources is received, basic data checking is carried out on the application information by determining checking configuration information corresponding to the information input sources, and information checking efficiency is improved.

Description

Information verification method, information verification device, computer equipment and storage medium
Technical Field
The present invention relates to the field of information processing technologies, and in particular, to an information verification method, an information verification device, a computer device, a storage medium, and a computer program product.
Background
With the continuous development of information technology and the arrival of information age, a resource borrowing service use certificate is provided for solving the increasing product acquisition demands of people, and the resource borrowing service can be executed and corresponding resources are acquired through the resource borrowing service use certificate. Before the resource borrowing service use certificate is used, the corresponding resource borrowing service use certificate is required to be acquired through application, and the application information is checked. At present, a plurality of channels can apply for resource borrowing service use certificates, and each channel has a specific information input mode. At present, the method for checking the application information of the resource borrowing service use certificate is usually to check in different application channels according to respective checking modes. However, after the verification of the application information, the application information needs to enter a subsequent unified approval process, and the verification is performed by the channels respectively, so that the efficiency is reduced during approval due to the difference between the input mode and the verification mode.
Therefore, the current method for checking the application information of the resource borrowing service use certificate has the defect of low efficiency.
Disclosure of Invention
In view of the foregoing, it is desirable to provide an information verification method, apparatus, computer device, computer-readable storage medium, and computer program product that can improve the efficiency of information verification.
In a first aspect, the present application provides an information verification method, where the method includes:
receiving application information to be verified, which is input based on at least one information input source, and acquiring a source identifier of the information input source; the application information is information for applying a resource borrowing service use certificate;
acquiring corresponding verification configuration information according to the source identifier, and determining a verification rule for verifying each item of sub-application information in the application information based on the verification configuration information; the verification rules corresponding to the sub-application information of the same information type input based on different information input sources are the same;
according to the verification rule, verifying basic data of each piece of sub-application information in the application information; the basic data verification comprises at least two of information format verification, information integrity verification and information validity verification.
In one embodiment, the method further comprises:
acquiring source identifiers corresponding to the information input sources aiming at a plurality of information input sources corresponding to the resource borrowing service system;
generating a verification rule corresponding to the sub-application information of each information type according to a plurality of information types of the recordable sub-application information provided by the information input source, obtaining verification configuration information corresponding to the information input source according to the plurality of verification rules, associating a source identifier of the information input source with the verification configuration information and storing the verification configuration information;
In the verification configuration information corresponding to different information input sources, the verification rules corresponding to the sub-application information of the same information type are the same.
In one embodiment, the method further comprises:
acquiring a source identifier and an information input template of a new information input source corresponding to a resource borrowing service system; the information input template is used for indicating the information type of the input sub-application information;
generating a corresponding check rule according to the sub-application information of each information type in the information input template, obtaining new check configuration information based on the check rule, and associating and storing the source identification of the information input source with the new check configuration information.
In one embodiment, the method further comprises:
detecting modification information aiming at a target verification rule, and determining verification configuration information containing the target verification rule as the verification configuration information to be modified; the target check rule is a check rule corresponding to sub-application information of the target information type;
and modifying the target verification rule in the verification configuration information to be modified according to the modification information, and storing the modified verification configuration information.
In one embodiment, the method further comprises:
detecting a newly added check rule of sub-application information aiming at a known information type, and acquiring a source identifier of an information input source to be updated; the input sub-application information of the information input source to be updated comprises the sub-application information of the known information type;
and acquiring verification configuration information corresponding to the source identifier of the information input source to be updated, taking the verification configuration information as verification configuration information to be updated, adding the newly added verification rule into the verification configuration information to be updated, and storing the verification configuration information after the verification rule is newly added.
In one embodiment, the verifying the basic data of each piece of sub-application information in the application information according to the verification rule includes:
aiming at each piece of sub-application information in the application information, if the sub-application information is verified to be in accordance with the corresponding information format according to the verification rule, and the sub-application information is matched with qualified sub-application information stored in a source database, determining that the sub-application information passes through the information format verification and the information validity verification;
and aiming at the application information of each information input source, if the number of the sub-application information passing through the information format check sum information validity check is larger than or equal to the number of the sub-application information in the check configuration information corresponding to the information input source, and the types of the plurality of sub-application information in the application information correspond to the types of the plurality of sub-application information in the check configuration information corresponding to the information input source, determining that the application information passes through the information integrity check.
In one embodiment, the sub-application information includes a telephone number of a user applying for resource borrowing service usage credentials;
the verifying, according to the verification rule in the verification configuration information, that the sub-application information accords with the corresponding information format, and that the sub-application information matches with the qualified sub-application information stored in the source database, and determining that the sub-application information passes the information format verification and the information validity verification, includes:
according to the verification rule, if the telephone number is detected to meet the following verification rule, determining that the telephone number passes through the information format verification and the information validity verification: the telephone number is all digits, the digit length of the telephone number is a preset length, a number issuer corresponding to the telephone number exists in a source database, and the telephone number accords with a coding rule corresponding to the number issuer.
In one embodiment, after performing the basic data verification on each piece of sub-application information in the application information according to the verification rule, the method further includes:
transmitting the target application information checked by the basic data to an approval system corresponding to the resource borrowing service system; the approval system is used for determining whether to allow the user corresponding to the application information to apply for the resource borrowing service using certificate based on the target application information.
In one embodiment, after performing the basic data verification on each piece of sub-application information in the application information according to the verification rule, the method further includes:
detecting unqualified application information which fails to pass the basic data verification, and determining a target information input source corresponding to the unqualified application information from the at least one information input source;
and generating corresponding verification failure information according to the source identifier corresponding to the target information input source, and returning the verification failure information to the target information input source.
In a second aspect, the present application provides an information verification apparatus, the apparatus including:
the receiving module is used for receiving application information to be verified, which is input based on at least one information input source, and acquiring a source identifier of the information input source; the application information is information for applying a resource borrowing service use certificate;
the determining module is used for acquiring corresponding verification configuration information according to the source identifier, and determining a verification rule for verifying each item of sub-application information in the application information based on the verification configuration information; the verification rules corresponding to the sub-application information of the same information type input based on different information input sources are the same;
The verification module is used for verifying basic data of each piece of sub-application information in the application information according to the verification rule; the basic data verification comprises at least two of information format verification, information integrity verification and information validity verification.
In a third aspect, the present application provides a computer device comprising a memory storing a computer program and a processor implementing the steps of the method described above when the processor executes the computer program.
In a fourth aspect, the present application provides a computer readable storage medium having stored thereon a computer program which when executed by a processor performs the steps of the method described above.
In a fifth aspect, the present application provides a computer program product comprising a computer program which, when executed by a processor, implements the steps of the method described above.
According to the information verification method, the information verification device, the computer equipment, the storage medium and the computer program product, the application information to be verified, which is input based on at least one information input source and is used for applying resource borrowing business use certificates, is received, corresponding verification configuration information is obtained according to the source identification of the information input source, verification rules for verifying each item of sub-application information in the application information are determined based on the verification configuration information, and basic data verification including information format verification, information integrity verification, information validity verification and the like is carried out on each item of sub-application information in the application information according to the verification rules. Compared with the traditional mode of checking according to respective checking modes in different application channels, the scheme has the advantages that after application information of different information input sources is received, basic data checking is carried out on the application information by determining checking configuration information corresponding to the information input sources, and information checking efficiency is improved.
Drawings
FIG. 1 is a diagram of an application environment for a method of information verification in one embodiment;
FIG. 2 is a flow chart of a method of information verification in one embodiment;
FIG. 3 is a flowchart illustrating steps for adding an information entry source in one embodiment;
FIG. 4 is a flowchart illustrating steps for modifying or adding check rules in one embodiment;
FIG. 5 is a flow chart of a verification step in one embodiment;
FIG. 6 is a flow chart of a method of checking information according to another embodiment;
FIG. 7 is a block diagram of an information verification device in one embodiment;
fig. 8 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application will be further described in detail with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the present application.
The information verification method provided by the embodiment of the application can be applied to an application environment shown in fig. 1. The terminal 102 communicates with the approval system 104 through a network, and the terminal 102 may also communicate with different information input channels, each of which may be a different information input source. The terminal 102 may receive application information for applying for the resource borrowing service usage certificate sent from different information input sources, the terminal 102 obtains verification configuration information corresponding to the information input source, and performs basic data verification on the application information based on the verification configuration information, the terminal 102 may send the application information passing the verification to the approval system 104, and the approval system 104 may approve the application information to determine whether to allow the application of the resource borrowing service usage certificate. The terminal 102 may be, but is not limited to, various personal computers, notebook computers, smart phones, and tablet computers. The approval system 104 may be implemented as a stand-alone server or as a cluster of servers.
In one embodiment, as shown in fig. 2, an information verification method is provided, and the method is applied to the terminal in fig. 1 for illustration, and includes the following steps:
step S202, receiving application information to be verified, which is input based on at least one information input source, and acquiring a source identifier of the information input source; the application information is information for applying a resource borrowing service use certificate.
The application information may be information for applying a resource borrowing service usage certificate. When the user owns the resource borrowing service using certificate, resource borrowing can be carried out according to a certain rule, a certain number of resources are obtained, and the corresponding resources are required to be returned in a certain time. The information input source can be one end of the application, and a plurality of information input sources can be provided, and can comprise hardware equipment, a webpage end and other information input sources. Specifically, the input through the hardware equipment comprises information input through an application in a mobile phone or application form input through a teller from a background system; information input through the webpage end comprises information input in an application webpage of resource borrowing service use certificates and the like. Because the calling and checking interfaces of different information input sources are inconsistent, or the slight differences in the checking rules can cause inconsistent application form data input by different channels, namely, the checking modes of application information initiated by different information input sources are different. The terminal needs to determine different verification modes according to different information input sources. The different information input sources can also correspond to different source identifiers, and the terminal can acquire the source identifier of the information input source after receiving the application information to be verified, which is input by at least one information input source. Each information input source can correspond to one source identifier, the terminal can determine the source identifier of the information input source based on an application request which is sent by the information input source and contains application information and attribute information of the information input source, for example, the terminal can inquire the attribute information into an identifier database, so that the terminal can obtain the source identifier corresponding to the information input source for sending the application information from a plurality of source identifiers in the identifier database.
Step S204, corresponding verification configuration information is obtained according to the source identifier, and verification rules for verifying each item of sub-application information in the application information are determined based on the verification configuration information; the verification rules corresponding to the sub-application information of the same information type input based on different information input sources are the same.
The method comprises the steps that, according to different information input sources, the input modes of the user applying for resource borrowing service using certificates are different, for example, input templates used by the different information input sources are different, and therefore formats of input similar information are different, and various information in the application information needs to be checked by using different check rules for the different information input sources. Each verification rule of different information input sources can be stored in the verification configuration information, and after the terminal obtains the source identifier of the information input source, the terminal can obtain the corresponding verification configuration information according to the source identifier. The verification configuration information and the source identifier are in one-to-one correspondence, the application information can comprise a plurality of pieces of sub-application information, and the verification configuration information can comprise a plurality of verification rules of the plurality of pieces of sub-application information of the corresponding information input source. The terminal may determine a verification rule for verifying each item of sub-application information in the application information based on the verification configuration information.
Specifically, different information input sources are different information input application channels. And after receiving the entry information triggering admission information of the channel, the terminal starts to check. After receiving the input information of the channels, the terminal can read the verification configuration information for verification according to different channels, so that different basic data verification rules are loaded according to the verification configuration information. For example, the terminal may be configured to read different verification configuration information in the form of a variable configuration, and the information input sources may include a mobile phone, a web page, HTML5 (HyperText Markup Language, hypertext 5) and the like. The verification configuration information for each information entry source may be as follows: the [ { "id": "mobile_linking", "conf": "/-," mobile_linking_config. Conf "}, {" id ":" online_page "," conf ":"/-, online_page_config. Conf "}, {" id ":" ies_flow "," conf ":"/-/ies_flow_config. Conf "}, {" id ":" h5_apply "," conf ":"/-apply_config. Conf "} ]. Wherein, "id" represents a source identifier of the information input source, and "conf" represents verification configuration information corresponding to the information input source, and the verification configuration information comprises various verification rules. The terminal can acquire the verification configuration information of different information input sources according to different key and value values. The verification configuration information of each information input source can be set in the terminal in a preset value mode, so that the terminal can find corresponding verification configuration information based on the source identification.
And the terminal can verify the same verification rule corresponding to the sub-application information of the same information type input by different information input sources. For example, for telephone numbers, the formats of telephone numbers input by different information input sources may be different, but the telephone numbers have the same composition mode, and the terminal can verify sub-application information of the same information type of different information input sources by verifying key composition parts of the telephone numbers.
Step S206, according to the verification rule, verifying the basic data of each piece of sub-application information in the application information; the basic data verification comprises at least two of information format verification, information integrity verification and information validity verification.
The application information may include a plurality of sub-application information. The verification of the terminal to the sub-application information can be a basic data verification, which is used for verifying at least two of the information format, the information integrity and the information validity of each item of sub-application information. After the terminal acquires the verification rule corresponding to the information input source, basic data verification can be performed on each item of sub-application information in the application information. Specifically, after the terminal acquires the verification configuration information, the terminal performs admission verification and starts to match different sub-application information based on the verification configuration information, and a verification rule of each item of sub-application information is determined. For example, the sub-application information includes basic data verification such as phone number verification and residence address verification in the personal information. Therefore, the terminal can carry out basic data verification on each item of sub-application information based on the verification rule of each item of sub-application information.
And after the terminal performs corresponding basic data verification on the sub-application information, two conditions of verification passing and verification failing can be obtained. When all sub-applications corresponding to one information input source pass through basic data verification, determining that basic data verification of application information corresponding to the information input source passes; when any piece of sub-application information corresponding to one information input source passes the corresponding basic data verification, determining that the basic data verification of the application information corresponding to the information input source does not pass.
The terminal can check whether the application information passes through the basic data or not based on the application information, and correspondingly process the application information. For example, in some embodiments, for the target application information checked by the basic data, the terminal may send the target application information checked by the basic data to an approval system corresponding to the resource borrowing service system, so that the approval system may determine whether to allow the user corresponding to the application information to apply for the resource borrowing service usage certificate based on the target application information. For example, the approval system can perform credit evaluation on the target application information of the user, further determine whether to allow the user to apply for resource borrowing service using certificates, and return corresponding application results to the terminal, so that the terminal can return the application results to the information input source.
In addition, in some embodiments, there may be a plurality of information input sources, for the target application information that fails the basic data verification, the terminal may determine, from at least one information input source, the target information input source corresponding to the failed application information when detecting the failed application information that fails the basic data verification, that is, the terminal needs to determine the application source corresponding to the failed application information, so that the terminal may generate corresponding verification failure information according to the source identifier corresponding to the target information input source, and return the verification failure information to the target information input source, so that a user may view the verification failure information in the target information input source. The verification failure information may include a sub-application information item that fails verification, and information such as a reason that the sub-application information fails verification.
In the information verification method, application information to be verified, which is input based on at least one information input source, for applying for resource borrowing service use certificates is received, corresponding verification configuration information is obtained according to the source identification of the information input source, verification rules for verifying each item of sub-application information in the application information are determined based on the verification configuration information, and basic data verification including information format verification, information integrity verification, information validity verification and the like is carried out on each item of sub-application information in the application information according to the verification rules. Compared with the traditional mode of checking according to respective checking modes in different application channels, the scheme has the advantages that after application information of different information input sources is received, basic data checking is carried out on the application information by determining checking configuration information corresponding to the information input sources, and information checking efficiency is improved.
In one embodiment, further comprising: acquiring source identifiers corresponding to the information input sources aiming at a plurality of information input sources corresponding to the resource borrowing service system; generating a verification rule corresponding to the sub-application information of each information type according to a plurality of information types of the recordable sub-application information provided by the information input source, obtaining verification configuration information corresponding to the information input source according to the plurality of verification rules, associating a source identifier of the information input source with the verification configuration information and storing the verification configuration information; in the verification configuration information corresponding to different information input sources, the verification rules corresponding to the sub-application information of the same information type are the same.
In this embodiment, the terminal may generate and store corresponding verification configuration information in advance based on the verification manner of each information input source. The plurality of information entry sources may be information entry sources in a resource borrowing services system. The terminal can acquire the source identifiers corresponding to the information input sources, so that the terminal can acquire a plurality of source identifiers. When a user applies for resource borrowing service using certificates at different information input sources, the application templates corresponding to the information input sources are required to be used, and corresponding multiple items of sub-application information is input according to the formats corresponding to the application templates. The application template comprises a plurality of pieces of input sub-application information, and the plurality of pieces of input sub-application information are of various information types. And, there may be a plurality of the information input sources. For each information input source, the terminal can generate verification rules corresponding to the sub-application information of each information type according to a plurality of information types of the input sub-application information provided by the information input source. Because each information input source can correspond to sub-application information with multiple information types, the verification rules corresponding to each information input source can be multiple, the terminal can obtain verification configuration information corresponding to the information input source according to the multiple verification rules, and the terminal can correlate source identification and verification configuration information of the information input source, wherein in the verification configuration information corresponding to different information input sources, the verification rules corresponding to the sub-application information with the same information type are the same, i.e. the terminal can verify the sub-application information with the same information type by using the same verification rules, for example, the terminal can uniformly verify telephone numbers in the application information by using the same verification rules. In addition, the terminal can store the associated source identifier and the verification configuration information, so that the subsequent terminal can find the corresponding verification configuration information based on the source identifier.
According to the embodiment, the terminal can generate and store the corresponding verification configuration information in advance based on the information type of the application information of the inputtable sub-information of the information input source, so that the terminal can verify the application information of different information input sources by searching the corresponding verification configuration information, and the efficiency of information verification is improved.
In one embodiment, further comprising: acquiring a source identifier and an information input template of a new information input source corresponding to the resource borrowing service system; the information input template is used for indicating the information type of the input sub-application information; generating a corresponding check rule according to the sub-application information of each information type in the information input template, obtaining new check configuration information based on the check rule, and associating and storing the source identification of the information input source with the new check configuration information.
In this embodiment, after the terminal completes the storing of the plurality of verification configuration information corresponding to the plurality of information input sources in advance, the terminal may also detect whether there is a newly added information input source. For a new information input source corresponding to the resource borrowing service system, the terminal can acquire a source identification and an information input template of the new information input source. Wherein the information entry template may be used to indicate the type of information of the enterable sub-application information. The terminal can generate corresponding check rules according to the sub-application information of each information type in the information input template, wherein the number of the check rules generated by the terminal can be multiple, the terminal can obtain new check configuration information based on the generated check rules, and the source identification of the newly added information input source is associated with the new check configuration information and then stored, so that the information input source is increased.
Specifically, the flow of the new information input source may be as shown in fig. 3, and fig. 3 is a schematic flow chart of a step of adding the new information input source in an embodiment. Wherein the information entry source may also be referred to as an information entry channel. When the information input channels are required to be added in the prior art, the channels are required to be newly added, the information corresponding to the newly added channels is checked, and the code repetition degree of the information checking part is high. After the application information is provided to the approval system, as the information of different channels is the verification module maintained by each, the unified type of data verification is inconsistent under the condition of different channels, if the mobile phone number format of the channel A is +86xxxx, and if the mobile phone number format of the channel B is xxxx, the data can pass the verification, so that the data is not standard. In this embodiment, only the configuration file of the channel, that is, the verification configuration information, is newly added when the channel is newly added, and verification item matching is performed. For example, it is detected whether an existing check item of the same information type as the check item in the newly added check configuration information exists in the system. After the matching is finished, if the stock has corresponding verification, multiplexing the original data verification, namely, using the existing verification rule to verify the matched newly-added verification items, thereby ensuring that the verification information of the same type of different channels is consistent.
According to the embodiment, the terminal can generate and store the corresponding verification configuration information based on the information type of the application information of the inputtable sub-of the newly added information input source, so that the terminal can verify the application information of different information input sources by searching the corresponding verification configuration information, and the efficiency of information verification is improved.
In one embodiment, further comprising: detecting modification information aiming at a target verification rule, and determining verification configuration information containing the target verification rule as the verification configuration information to be modified; the target check rule is a check rule corresponding to sub-application information of the target information type; and modifying the target verification rule in the verification configuration information to be modified according to the modification information, and storing the modified verification configuration information.
In this embodiment, the verification rule in the verification configuration information may also be modified, for example, at the information input source end, when the related staff modifies the application information of the inputtable sub-corresponding to the information input source, the information input source may trigger the verification rule to modify the information. When the terminal detects the modification information aiming at the target check rule, the terminal can determine the check configuration information containing the target check rule as the check configuration information to be modified. The target check rule is a check rule corresponding to sub-application information of the target information type. The terminal can modify the target verification rule in the verification configuration information to be modified according to the modification information, and store the modified verification configuration information, so that the modification and update of the verification configuration information are completed.
In addition, in some embodiments, the terminal may also detect newly added verification rule information of the information input source, for example, the information input source is newly added with verification of sub-application information of a certain known information type. At this time, the terminal may detect a verification rule for newly adding sub-application information of a known information type, and the terminal may obtain a source identifier of an information input source to be updated, where the information input source to be updated may be the information input source corresponding to the newly adding verification rule. And, in addition, the processing unit, the data to be updated may include the sub-application information of the known information type. The terminal can acquire the verification configuration information corresponding to the source identifier of the information input source to be updated as the verification configuration information to be updated, and adds the newly added verification rule into the verification configuration information to be updated, so that updated verification configuration information is obtained, and the terminal can store the verification configuration information after the verification rule is added. The verification configuration information after the verification rule is added may include sub-application information after the verification rule is added.
Specifically, the flow of adding a verification rule and modifying the verification rule may be as shown in fig. 4, and fig. 4 is a schematic flow chart of the step of modifying or adding the verification rule in one embodiment. Wherein each of the above-mentioned check rules is also referred to as each basic check. In the prior art, if the verification rule needs to be newly added or modified, the basic information verification corresponding to each channel needs to be modified, the code repetition degree of the information verification part is high, and the modification repeated workload is large. In this embodiment, if a new verification rule needs to be added or a verification rule needs to be modified, only a configuration file corresponding to the verification rule of the information input channel needs to be modified to perform verification item matching. For example, to detect whether there is an existing verification rule corresponding to the above-described new or modified verification rule. The information type of the sub-application information corresponding to the existing check rule is the same as the information type of the newly added or modified check rule sub-application information. If the terminal detects that the existing check rule exists, the terminal can modify the original check rule, so that synchronous updating of different information input channels is realized; if the terminal detects that no existing check rule exists, the terminal newly adds the corresponding check rule, and updates the check rules of different information input channels by updating the check configuration information.
Through the embodiment, the terminal can synchronously update the verification configuration information in the terminal when detecting the new verification rule of the information input source or the modification information of the verification rule, and further the terminal can utilize each verification rule in the updated verification configuration information to apply for verification of the resource borrowing service use certificate, so that the efficiency of information verification is improved.
In one embodiment, according to a verification rule, performing basic data verification on each piece of sub-application information in application information, including: aiming at each item of sub-application information in the application information, if the sub-application information is verified to be in accordance with the corresponding information format according to the verification rule, and the sub-application information is matched with the qualified sub-application information stored in the source database, determining that the sub-application information passes through the information format verification and the information validity verification; and aiming at the application information of each information input source, if the number of the sub-application information passing through the information format check and the information validity check is larger than or equal to the number of the sub-application information in the check configuration information corresponding to the information input source, and the types of the plurality of sub-application information in the application information correspond to the types of the plurality of sub-application information in the check configuration information corresponding to the information input source, determining that the application information passes through the information integrity check.
In this embodiment, the basic data verification includes at least two of information format verification, information integrity verification and information validity verification. After receiving the application information, the terminal can detect whether each piece of sub-application information accords with the corresponding information format based on the corresponding verification rule for each piece of sub-application information in the application information, and if so, the terminal determines that the application information passes the verification of the information format; the terminal can be in communication connection with the source database, a plurality of grid-closing application information can be stored in the source database, the terminal can detect whether each piece of sub-application information is matched with qualified sub-application information stored in the source database, and if so, the terminal can determine that the sub-application information passes through information validity verification.
When the terminal passes the information format check and the information validity check, the terminal can also check the information integrity of the application information. For the application information of each information input source, the terminal can detect whether the number of the sub-application information passing through the information format check sum information validity check in the application information is greater than or equal to the number of the sub-application information in the check configuration information corresponding to the information input source, and detect whether the types of the plurality of the sub-application information in the application information are corresponding to the types of the plurality of the sub-application information in the check configuration information corresponding to the information input source. If the terminal detects that the number of the sub-application information passing through the information format check sum information validity check in the application information is greater than or equal to the number of the sub-application information in the check configuration information corresponding to the information input source, and that the types of the plurality of the sub-application information in the application information and the types of the plurality of the sub-application information in the check configuration information corresponding to the information input source have corresponding relations, the terminal can determine that the application information passes through the information integrity check. The terminal may determine the application information checked by the information integrity as application information checked by the basic data.
Through the embodiment, the terminal can check the information integrity after determining that the application information passes the information format check and the information validity check based on the corresponding check rule, so that the check efficiency of the application information is improved.
In one embodiment, for each item of sub-application information in the application information, according to a verification rule in the verification configuration information, verifying that the sub-application information accords with a corresponding information format, and the sub-application information is matched with qualified sub-application information stored in a source database, determining that the sub-application information passes through information format verification and information validity verification, including: according to the verification rule, if the phone number is detected to meet the following verification rule, determining that the phone number passes through the information format verification and the information validity verification: the telephone number is all digits, the digit length of the telephone number is a preset length, and a number issuer corresponding to the telephone number exists in the source database and accords with the coding rule corresponding to the number issuer.
In this embodiment, the sub-application information includes a phone number of a user applying for a resource borrowing service usage certificate. For the sub-application information, the terminal can check the information format and the information validity of the telephone number through the check rule corresponding to the telephone number. The checking rule of the telephone number comprises whether the telephone number is full number, whether the number length of the telephone number is preset length, whether a number issuer corresponding to the telephone number exists in the source data, and whether the telephone number accords with the coding rule corresponding to the number issuer. If the terminal detects that the telephone number meets the code rule corresponding to the number issuer in the source database, if the telephone number meets the code rule corresponding to the number issuer, the terminal can determine that the telephone number passes the information format check and the information validity check.
Specifically, as shown in fig. 5, fig. 5 is a schematic flow chart of the verification step in one embodiment. The information verification rules can form a verification rule base for different information verification requirements, basic data verification of application information can comprise verification of certificate numbers, identity verification, mailbox verification and the like, and taking phone number verification as an example, after receiving application information from an information input channel, a terminal can read verification configuration information corresponding to the channel, initialize the phone numbers and initialize the application information into a verification module of the terminal. The verification of the telephone number starts and the terminal can determine whether the telephone number is all digits. If the data is passed, the checked mark of the check is set to be 1, and under the condition that the data is unchanged, the check can be skipped next time, and then the next step is carried out; if the information is not passed, the terminal can return the error information to prompt the service personnel, and the service personnel resumes receiving the application information of the information input channel after modifying the information.
The terminal can also judge whether the length of the telephone number is 11, if the telephone number passes, the checked mark is set to be 1, and the next step is continued; if the information is not passed, the terminal returns the error information to prompt the service personnel, and the service personnel resumes receiving the application information of the information input channel after modifying the information.
The terminal can also judge whether the telephone number accords with the legal operator or not, namely the qualified sub-application information is the telephone number which accords with the legal operator, and firstly acquire the legal operator information in the cache. The terminal can acquire legal operator information from qualified sub-application information in a cache of the source database. If the legal operator information in the terminal cache exists, the terminal directly reads the information in the cache and checks the current telephone number. If the legal operator information in the cache does not exist, the terminal needs to recall the operator interface, acquire the legal operator information and then check. If the legal operator information of the telephone number passes the verification, the terminal can check whether all verification items in the basic verification of the telephone number pass the verification currently, if so, the message record is filed for evaluating the message integrity, and the verification module is ended. If the verification is not passed, the terminal can set the verified mark of the verification to be 0, return error information to the corresponding information input source, and the verification module is ended.
According to the embodiment, the terminal can carry out corresponding verification on each item of sub-application information based on the verification rule of the information input source corresponding to each item of sub-application information, so that the efficiency of information verification is improved.
In one embodiment, as shown in fig. 6, fig. 6 is a flow chart of an information verification method in another embodiment. In this embodiment, the application information may be used to apply for resource borrowing service usage credentials. The terminal can receive application information of the information input source for applying resource borrowing service use certificates. The application information comprises the sub-application information, applicant information, other information and the like. After receiving the application information of different information input sources, the terminal can read the corresponding verification configuration information according to the information input sources, and perform basic data verification matching according to the verification configuration information, namely, match each item of sub-application information in the application information with each item of verification rules in the verification configuration information. After the matching is completed, the terminal can utilize the verification rule obtained by the matching to carry out basic data verification on the corresponding sub-application information, including information format verification, information validity verification, information integrity verification and the like. After the terminal verification is completed, a verification result can be returned to the corresponding information input source. For example, if the verification is not passed, the terminal returns verification failure information to the corresponding information input source, so that service personnel are reminded of modifying the information; if the information integrity check is passed, the terminal can return check passing information to the corresponding information input source. And the terminal can push the application information and the integrity evaluation result which pass the verification to the approval system, so that the approval system can determine whether to allow the user to apply for resource borrowing service using certificates or not based on the application information and the integrity evaluation result, and return the corresponding approval result to the terminal, and the terminal can return the approval result to the corresponding information input source.
Through the embodiment, after the terminal receives the application information of different information input sources, the terminal determines that the verification configuration information corresponding to the information input sources carries out basic data verification on the application information, so that the efficiency of information verification is improved. And the problems of low data input efficiency and easy error of first-line staff under different channels are solved, great convenience is brought to data input of business staff, the requirement of reporting timeliness can be met, and the data input efficiency and quality are ensured. From the secondary development angle of developers, after unified verification of data information is performed, the developers are also enabled to be more convenient and quicker, code multiplexing is improved, and development efficiency is improved.
It should be understood that, although the steps in the flowcharts related to the embodiments described above are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides an information verification device for realizing the above related information verification method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitation in the embodiments of one or more information verification devices provided below may refer to the limitation of the information verification method hereinabove, and will not be repeated herein.
In one embodiment, as shown in fig. 7, there is provided an information verification apparatus including: a receiving module 500, a determining module 502 and a checking module 504, wherein:
the receiving module 500 is configured to receive application information to be verified, which is input based on at least one information input source, and obtain a source identifier of the information input source; the application information is information for applying a resource borrowing service use certificate.
The determining module 502 is configured to obtain corresponding verification configuration information according to the source identifier, and determine a verification rule for verifying each item of sub-application information in the application information based on the verification configuration information; the verification rules corresponding to the sub-application information of the same information type input based on different information input sources are the same.
The verification module 504 is configured to perform basic data verification on each piece of sub-application information in the application information according to a verification rule; the basic data verification comprises at least two of information format verification, information integrity verification and information validity verification.
In one embodiment, the apparatus further comprises: the configuration module is used for acquiring source identifiers corresponding to the information input sources aiming at a plurality of information input sources corresponding to the resource borrowing service system; generating a verification rule corresponding to the sub-application information of each information type according to a plurality of information types of the recordable sub-application information provided by the information input source, obtaining verification configuration information corresponding to the information input source according to the plurality of verification rules, associating a source identifier of the information input source with the verification configuration information and storing the verification configuration information; in the verification configuration information corresponding to different information input sources, the verification rules corresponding to the sub-application information of the same information type are the same.
In one embodiment, the apparatus further comprises: the channel adding module is used for acquiring a source identifier and an information input template of a new information input source corresponding to the resource borrowing service system; the information input template is used for indicating the information type of the input sub-application information; generating a corresponding check rule according to the sub-application information of each information type in the information input template, obtaining new check configuration information based on the check rule, and associating and storing the source identification of the information input source with the new check configuration information.
In one embodiment, the apparatus further comprises: the modification module is used for detecting modification information aiming at the target verification rule and determining verification configuration information containing the target verification rule as the verification configuration information to be modified; the target check rule is a check rule corresponding to sub-application information of the target information type; and modifying the target verification rule in the verification configuration information to be modified according to the modification information, and storing the modified verification configuration information.
In one embodiment, the apparatus further comprises: the rule newly-added module is used for detecting a newly-added check rule of the sub-application information aiming at the known information type and acquiring a source identifier of an information input source to be updated; the input sub-application information of the information input source to be updated comprises sub-application information of known information types; and acquiring verification configuration information corresponding to the source identifier of the information input source to be updated, taking the verification configuration information as the verification configuration information to be updated, adding the newly added verification rule into the verification configuration information to be updated, and storing the verification configuration information after the newly added verification rule.
In one embodiment, the verification module 504 is specifically configured to determine, for each item of sub-application information in the application information, that the sub-application information passes the information format verification and the information validity verification according to the verification rule if the sub-application information is verified to conform to the corresponding information format, and the sub-application information is matched with the qualified sub-application information stored in the source database; and aiming at the application information of each information input source, if the number of the sub-application information passing through the information format check and the information validity check is larger than or equal to the number of the sub-application information in the check configuration information corresponding to the information input source, and the types of the plurality of sub-application information in the application information correspond to the types of the plurality of sub-application information in the check configuration information corresponding to the information input source, determining that the application information passes through the information integrity check.
In one embodiment, the verification module 504 is specifically configured to determine that the phone number passes the information format verification and the information validity verification according to the verification rule if it is detected that the phone number meets the following verification rule: the telephone number is all digits, the digit length of the telephone number is a preset length, and a number issuer corresponding to the telephone number exists in the source database and accords with the coding rule corresponding to the number issuer.
In one embodiment, the apparatus further comprises: the uploading module is used for sending the target application information which passes through the basic data verification to an approval system corresponding to the resource borrowing service system; the approval system is used for determining whether to allow the user corresponding to the application information to apply for the resource borrowing service using certificate based on the target application information.
In one embodiment, the apparatus further comprises: the return module is used for detecting unqualified application information which fails to pass basic data verification and determining a target information input source corresponding to the unqualified application information from at least one information input source; and generating corresponding verification failure information according to the source identifier corresponding to the target information input source, and returning the verification failure information to the target information input source.
The respective modules in the above information verification apparatus may be implemented in whole or in part by software, hardware, and combinations thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one embodiment, a computer device is provided, which may be a terminal, and the internal structure thereof may be as shown in fig. 8. The computer device includes a processor, a memory, a communication interface, a display screen, and an input device connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program is executed by a processor to implement an information verification method. The display unit of the computer device is used for forming a visual picture, and can be a display screen, a projection device or a virtual reality imaging device. The display screen can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be a key, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in fig. 8 is merely a block diagram of some of the structures associated with the present application and is not limiting of the computer device to which the present application may be applied, and that a particular computer device may include more or fewer components than shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, a computer device is provided that includes a memory having a computer program stored therein and a processor that implements the above-described information verification method when the computer program is executed by the processor.
In one embodiment, a computer readable storage medium is provided, on which a computer program is stored, which when executed by a processor implements the above-described information verification method.
In an embodiment, a computer program product is provided, comprising a computer program which, when executed by a processor, implements the above-described information verification method.
It should be noted that, user information (including but not limited to user equipment information, user personal information, etc.) and data (including but not limited to data for analysis, stored data, presented data, etc.) referred to in the present application are information and data authorized by the user or sufficiently authorized by each party.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in the various embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magnetic random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (Phase Change Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in the form of a variety of forms, such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), and the like. The databases referred to in the various embodiments provided herein may include at least one of relational databases and non-relational databases. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processors referred to in the embodiments provided herein may be general purpose processors, central processing units, graphics processors, digital signal processors, programmable logic units, quantum computing-based data processing logic units, etc., without being limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The above examples only represent a few embodiments of the present application, which are described in more detail and are not to be construed as limiting the scope of the present application. It should be noted that it would be apparent to those skilled in the art that various modifications and improvements could be made without departing from the spirit of the present application, which would be within the scope of the present application. Accordingly, the scope of protection of the present application shall be subject to the appended claims.

Claims (13)

1. An information verification method, the method comprising:
receiving application information to be verified, which is input based on at least one information input source, and acquiring a source identifier of the information input source; the application information is information for applying a resource borrowing service use certificate;
acquiring corresponding verification configuration information according to the source identifier, and determining a verification rule for verifying each item of sub-application information in the application information based on the verification configuration information; the verification rules corresponding to the sub-application information of the same information type input based on different information input sources are the same;
According to the verification rule, verifying basic data of each piece of sub-application information in the application information; the basic data verification comprises at least two of information format verification, information integrity verification and information validity verification.
2. The method according to claim 1, wherein the method further comprises:
acquiring source identifiers corresponding to the information input sources aiming at a plurality of information input sources corresponding to the resource borrowing service system;
generating a verification rule corresponding to the sub-application information of each information type according to a plurality of information types of the recordable sub-application information provided by the information input source, obtaining verification configuration information corresponding to the information input source according to the plurality of verification rules, associating a source identifier of the information input source with the verification configuration information and storing the verification configuration information;
in the verification configuration information corresponding to different information input sources, the verification rules corresponding to the sub-application information of the same information type are the same.
3. The method according to claim 2, wherein the method further comprises:
acquiring a source identifier and an information input template of a new information input source corresponding to a resource borrowing service system; the information input template is used for indicating the information type of the input sub-application information;
Generating a corresponding check rule according to the sub-application information of each information type in the information input template, obtaining new check configuration information based on the check rule, and associating and storing the source identification of the information input source with the new check configuration information.
4. The method according to claim 2, wherein the method further comprises:
detecting modification information aiming at a target verification rule, and determining verification configuration information containing the target verification rule as the verification configuration information to be modified; the target check rule is a check rule corresponding to sub-application information of the target information type;
and modifying the target verification rule in the verification configuration information to be modified according to the modification information, and storing the modified verification configuration information.
5. The method according to claim 2, wherein the method further comprises:
detecting a newly added check rule of sub-application information aiming at a known information type, and acquiring a source identifier of an information input source to be updated; the input sub-application information of the information input source to be updated comprises the sub-application information of the known information type;
and acquiring verification configuration information corresponding to the source identifier of the information input source to be updated, taking the verification configuration information as verification configuration information to be updated, adding the newly added verification rule into the verification configuration information to be updated, and storing the verification configuration information after the verification rule is newly added.
6. The method of claim 1, wherein the performing basic data verification on each piece of sub-application information in the application information according to the verification rule includes:
aiming at each piece of sub-application information in the application information, if the sub-application information is verified to be in accordance with the corresponding information format according to the verification rule, and the sub-application information is matched with qualified sub-application information stored in a source database, determining that the sub-application information passes through the information format verification and the information validity verification;
and aiming at the application information of each information input source, if the number of the sub-application information passing through the information format check sum information validity check is larger than or equal to the number of the sub-application information in the check configuration information corresponding to the information input source, and the types of the plurality of sub-application information in the application information correspond to the types of the plurality of sub-application information in the check configuration information corresponding to the information input source, determining that the application information passes through the information integrity check.
7. The method of claim 6, wherein the sub-application information includes a telephone number of a user applying for resource borrowing service usage credentials;
The verifying, according to the verification rule in the verification configuration information, that the sub-application information accords with the corresponding information format, and that the sub-application information matches with the qualified sub-application information stored in the source database, and determining that the sub-application information passes the information format verification and the information validity verification, includes:
according to the verification rule, if the telephone number is detected to meet the following verification rule, determining that the telephone number passes through the information format verification and the information validity verification: the telephone number is all digits, the digit length of the telephone number is a preset length, a number issuer corresponding to the telephone number exists in a source database, and the telephone number accords with a coding rule corresponding to the number issuer.
8. The method of claim 1, wherein after performing basic data verification on each piece of sub-application information in the application information according to the verification rule, further comprises:
transmitting the target application information checked by the basic data to an approval system corresponding to the resource borrowing service system; the approval system is used for determining whether to allow the user corresponding to the application information to apply for the resource borrowing service using certificate based on the target application information.
9. The method of claim 1, wherein after performing basic data verification on each piece of sub-application information in the application information according to the verification rule, further comprises:
detecting unqualified application information which fails to pass the basic data verification, and determining a target information input source corresponding to the unqualified application information from the at least one information input source;
and generating corresponding verification failure information according to the source identifier corresponding to the target information input source, and returning the verification failure information to the target information input source.
10. An information verification apparatus, the apparatus comprising:
the receiving module is used for receiving application information to be verified, which is input based on at least one information input source, and acquiring a source identifier of the information input source; the application information is information for applying a resource borrowing service use certificate;
the determining module is used for acquiring corresponding verification configuration information according to the source identifier, and determining a verification rule for verifying each item of sub-application information in the application information based on the verification configuration information; the verification rules corresponding to the sub-application information of the same information type input based on different information input sources are the same;
The verification module is used for verifying basic data of each piece of sub-application information in the application information according to the verification rule; the basic data verification comprises at least two of information format verification, information integrity verification and information validity verification.
11. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any one of claims 1 to 9 when the computer program is executed.
12. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 9.
13. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any one of claims 1 to 9.
CN202310001638.6A 2023-01-03 2023-01-03 Information verification method, information verification device, computer equipment and storage medium Pending CN116011029A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310001638.6A CN116011029A (en) 2023-01-03 2023-01-03 Information verification method, information verification device, computer equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310001638.6A CN116011029A (en) 2023-01-03 2023-01-03 Information verification method, information verification device, computer equipment and storage medium

Publications (1)

Publication Number Publication Date
CN116011029A true CN116011029A (en) 2023-04-25

Family

ID=86029575

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310001638.6A Pending CN116011029A (en) 2023-01-03 2023-01-03 Information verification method, information verification device, computer equipment and storage medium

Country Status (1)

Country Link
CN (1) CN116011029A (en)

Similar Documents

Publication Publication Date Title
WO2021217846A1 (en) Interface data processing method and apparatus, and computer device and storage medium
WO2020192141A1 (en) Method and device for simulating interface, computer apparatus, and storage medium
CN114640503A (en) Application system verification method and device, computer equipment and storage medium
CN108809896A (en) A kind of information calibration method, device and electronic equipment
CN116561003A (en) Test data generation method, device, computer equipment and storage medium
CN116011029A (en) Information verification method, information verification device, computer equipment and storage medium
CN115481026A (en) Test case generation method and device, computer equipment and storage medium
CN115495452A (en) Data processing method, data processing device, computer equipment and storage medium
CN114385722A (en) Interface attribute consistency checking method and device, electronic equipment and storage medium
CN115879895B (en) Protocol admittance method, device, computer equipment and storage medium
CN117688550B (en) Account password substitution filling method and device, computer equipment and storage medium
CN114327377B (en) Method and device for generating demand tracking matrix, computer equipment and storage medium
CN115687074A (en) Business system testing method and device, computer equipment and storage medium
CN116225830A (en) Service operation log reporting method and device, computer equipment and storage medium
CN117435651A (en) Test data processing method, device, computer equipment and storage medium
CN117271563A (en) Data query method, apparatus, computer device, storage medium, and program product
CN116881116A (en) Interface test method, apparatus, computer device, storage medium, and program product
CN117130881A (en) Page performance testing method and device, computer equipment and storage medium
CN117539866A (en) Constant value checking method and device for valve cooling control system and computer equipment
CN117319022A (en) Vulnerability detection method, vulnerability detection device, computer equipment and storage medium
CN116760826A (en) Resource allocation method, apparatus, device, storage medium and program product
CN116128518A (en) Electronic archive management method, device, equipment and storage medium
CN117196802A (en) Method, apparatus, device, storage medium and program product for processing delegated service
CN117688550A (en) Account password substitution filling method and device, computer equipment and storage medium
CN116303561A (en) Data query method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination