CN117807618A - Data processing method and device, storage medium and electronic equipment - Google Patents

Data processing method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN117807618A
CN117807618A CN202410194245.6A CN202410194245A CN117807618A CN 117807618 A CN117807618 A CN 117807618A CN 202410194245 A CN202410194245 A CN 202410194245A CN 117807618 A CN117807618 A CN 117807618A
Authority
CN
China
Prior art keywords
data
verification
target
receiving ends
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202410194245.6A
Other languages
Chinese (zh)
Inventor
王宝松
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Industrial and Commercial Bank of China Ltd ICBC
ICBC Technology Co Ltd
Original Assignee
Industrial and Commercial Bank of China Ltd ICBC
ICBC Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Industrial and Commercial Bank of China Ltd ICBC, ICBC Technology Co Ltd filed Critical Industrial and Commercial Bank of China Ltd ICBC
Priority to CN202410194245.6A priority Critical patent/CN117807618A/en
Publication of CN117807618A publication Critical patent/CN117807618A/en
Pending legal-status Critical Current

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The application discloses a data processing method, a data processing device, a storage medium and electronic equipment. Relates to the field of financial science and technology and other related fields, and the method comprises the following steps: acquiring target business data requested by a target receiving end based on a target data acquisition request initiated by the target receiving end; acquiring a target data verification rule corresponding to a target receiving end from a verification rule library; performing verification processing on the target service data based on the target data verification rule to obtain a verification result; and under the condition that the verification result indicates that the target service data passes the verification, encrypting the target service data, and sending the encrypted target service data to a target receiving end. According to the method and the device, the problems that in the related art, data of a transmitting end are checked through a data receiving end, data are found after service data reach and are decrypted by the receiving end, the process which is finished at the data transmitting end is required to be repeated, the service is reworked, and the service cost is increased are solved.

Description

Data processing method and device, storage medium and electronic equipment
Technical Field
The present invention relates to financial science and technology and other related fields, and in particular, to a data processing method, a data processing device, a storage medium and an electronic device.
Background
In order to ensure the security of data transmission, the data needs to be encrypted and then sent to a data receiving end, and generally, when the receiving end receives the data, the receiving end has relevant basic verification and business verification. The data verification work is completely put at a position which is relatively back, and the receiving end can be used for verifying only when the data reaches the receiving end and is decrypted by the receiving end, so that the data sending end is informed of which data are not matched. If the data arrives at the receiving end and is checked that the data format is problematic, the cost of finding the data problem is too high, for example, the sending end may need to be checked layer by layer before the data arrives at the receiving end and then sent to the platform, and the platform sends the data to the data receiving end.
Aiming at the problems that in the related art, data of a transmitting end is checked through a data receiving end, service data reaches and is decrypted by the receiving end, and then the data problem is found, so that the process which is finished at the data transmitting end is all required to be repeated, the service is reworked, and the service cost is increased, no effective solution is proposed at present.
Disclosure of Invention
The main purpose of the present application is to provide a data processing method, apparatus, storage medium and electronic device, so as to solve the problems in the related art that, by checking data of a transmitting end by a data receiving end, service data reaches and decrypts the receiving end and then discovers data, so that the flow which is finished at the data transmitting end all needs to be reworked again and again, and service cost is increased.
To achieve the above object, according to one aspect of the present application, there is provided a data processing method. The method comprises the following steps: acquiring target business data requested by a target receiving end based on a target data acquisition request initiated by the target receiving end; obtaining target data verification rules corresponding to the target receiving ends from a verification rule base, wherein the verification rule base comprises N corresponding relations between identifications corresponding to the N receiving ends respectively and the data verification rules, and N is an integer greater than or equal to 2; performing verification processing on the target service data based on the target data verification rule to obtain a verification result; and under the condition that the verification result indicates that the target service data passes the verification, encrypting the target service data, and sending the encrypted target service data to the target receiving end.
Optionally, the method further comprises: acquiring inspection rule files corresponding to the N receiving ends respectively; analyzing the inspection rule files corresponding to the N receiving ends respectively to obtain data inspection rules corresponding to the N receiving ends respectively and identifiers corresponding to the N receiving ends respectively; and constructing the verification rule base based on the data verification rules respectively corresponding to the N receiving ends and the identifiers respectively corresponding to the N receiving ends.
Optionally, the analyzing the inspection rule files corresponding to the N receiving ends respectively to obtain the data inspection rules corresponding to the N receiving ends respectively and the identifiers corresponding to the N receiving ends respectively includes: identifying text information in the test rule files corresponding to the N receiving ends respectively to obtain data test texts corresponding to the N receiving ends respectively; performing entity recognition on the data verification texts corresponding to the N receiving ends respectively to obtain entity recognition results corresponding to the N receiving ends respectively, wherein the entity recognition results at least comprise identifications and verification keywords corresponding to the receiving ends; performing intention recognition on the data verification texts respectively corresponding to the N receiving ends to obtain verification intention respectively corresponding to the N receiving ends; and generating data verification rules respectively corresponding to the N receiving ends based on the verification intents respectively corresponding to the N receiving ends and the verification keywords respectively corresponding to the N receiving ends.
Optionally, the generating the data verification rule corresponding to the N receiving ends respectively based on the verification intents corresponding to the N receiving ends respectively and the verification keywords corresponding to the N receiving ends respectively includes: carrying out semantic analysis on the verification keywords corresponding to the N receiving ends respectively to obtain semantic analysis results of the verification keywords corresponding to the N receiving ends respectively; based on the verification intents respectively corresponding to the N receiving ends and semantic analysis results of the verification keywords respectively corresponding to the N receiving ends, keyword screening processing is carried out to obtain keyword screening results respectively corresponding to the N receiving ends; and generating data verification rules corresponding to the N receiving ends respectively based on the verification intents corresponding to the N receiving ends respectively and the keyword screening results corresponding to the N receiving ends respectively.
Optionally, after the verifying rule base is constructed based on the data verifying rules respectively corresponding to the N receiving ends and the identifiers respectively corresponding to the N receiving ends, the method further includes: under the condition that the change of the inspection rule file corresponding to any one receiving end in the N receiving ends is detected, acquiring a new inspection rule file corresponding to any one receiving end; analyzing the new check rule file corresponding to any receiving end to obtain a new data check rule corresponding to any receiving end; and updating the new data verification rule corresponding to any receiving end to the verification rule library.
Optionally, the verifying the target service data based on the target data verification rule to obtain a verification result includes: detecting whether the target service data meets K verification conditions in the target data verification rule, wherein K is an integer greater than or equal to 1; under the condition that the target service data meets the K verification conditions, determining that the verification result is verification passing; and under the condition that the target service data does not meet any one of the K verification conditions, determining that the verification result is that verification fails.
Optionally, the method further comprises: and generating prompt information under the condition that the verification result indicates that the target service data is not verified, wherein the prompt information is at least used for indicating the reason that the target service data is not verified.
To achieve the above object, according to another aspect of the present application, there is provided a data processing apparatus. The device comprises: the data acquisition module is used for acquiring target service data requested by the target receiving end based on a target data acquisition request initiated by the target receiving end; the rule acquisition module is used for acquiring target data verification rules corresponding to the target receiving ends from a verification rule base, wherein the verification rule base comprises N corresponding relations between identifications corresponding to the N receiving ends respectively and the data verification rules, and N is an integer greater than or equal to 2; the verification module is used for carrying out verification processing on the target service data based on the target data verification rule to obtain a verification result; and the encryption module is used for carrying out encryption processing on the target service data and sending the encrypted target service data to the target receiving end under the condition that the verification result indicates that the target service data passes verification.
To achieve the above object, according to another aspect of the present application, there is also provided a nonvolatile storage medium storing a plurality of instructions adapted to be loaded by a processor and to perform the data processing method of any one of the above.
To achieve the above object, according to another aspect of the present application, there is also provided an electronic device including one or more processors and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement any one of the data processing methods.
Through the application, the following steps are adopted: acquiring target business data requested by a target receiving end based on a target data acquisition request initiated by the target receiving end; obtaining target data verification rules corresponding to the target receiving ends from a verification rule base, wherein the verification rule base comprises N corresponding relations between identifications corresponding to the N receiving ends respectively and the data verification rules, and N is an integer greater than or equal to 2; performing verification processing on the target service data based on the target data verification rule to obtain a verification result; and under the condition that the verification result indicates that the target service data passes the verification, encrypting the target service data, and transmitting the encrypted target service data to the target receiving end, so that the purposes that the data is encrypted and transmitted only when the verification rule is used for verifying the service data, namely the data passing the verification of the transmitting end, are achieved, and the problems that the data is discovered after the service data reaches and is decrypted by the data receiving end in the related technology, the process of going over at the data transmitting end is all required to be reworked again, the service is reworked, and the service cost is increased are solved. Thereby achieving the effects of improving the transmission efficiency of the service data and avoiding the repetition of the transmission flow of the service data.
Drawings
The accompanying drawings, which are included to provide a further understanding of the application, illustrate and explain the application and are not to be construed as limiting the application. In the drawings:
FIG. 1 is a schematic diagram of a data processing interaction according to the prior art; and
FIG. 2 is a flow chart of a data processing method provided in accordance with an embodiment of the present application;
FIG. 3 is a schematic diagram of an alternative data processing method according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a data processing apparatus provided in accordance with an embodiment of the present application;
fig. 5 is a schematic diagram of an electronic device provided according to an embodiment of the present application.
Detailed Description
It should be noted that, in the case of no conflict, the embodiments and features in the embodiments may be combined with each other. The present application will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
In order to make the present application solution better understood by those skilled in the art, the following description will be made in detail and with reference to the accompanying drawings in the embodiments of the present application, it is apparent that the described embodiments are only some embodiments of the present application, not all embodiments. All other embodiments, which can be made by one of ordinary skill in the art based on the embodiments herein without making any inventive effort, shall fall within the scope of the present application.
It should be noted that the terms "first," "second," and the like in the description and claims of the present application and the above figures are used for distinguishing between similar objects and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used may be interchanged where appropriate in order to describe the embodiments of the present application described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
For convenience of description, the following will describe some terms or terms related to the embodiments of the present application:
an entity recognition technology, a natural language processing technology, is used for recognizing specific entities in texts, such as person names, place names, organization names and the like. The technology can automatically identify specific entities from a large amount of text data, and classify and label the entities.
Intent recognition technology, a natural language processing technology, is used to recognize user intent in text or speech. The technique is capable of analyzing text or voice content entered by a user, from which the user's specific intent is identified, such as querying information, subscribing to a service, seeking help, and the like.
FIG. 1 is a schematic diagram of a data processing interaction according to the prior art, as shown in FIG. 1, wherein A is a data initiating terminal, and A1, A2 and A3 respectively represent a system for initiating business of a company in a certain industry; b is a data receiving end, and B1, B2 and B3 respectively represent a business receiving system of a certain company in a certain industry. The data processing scheme in the related technology is that an initiating terminal A encrypts service data and then transmits the encrypted data to a service platform, the service platform transmits the encrypted data to a receiving terminal B, the receiving terminal B decrypts the data after receiving the data, the service platform informs the initiating terminal A of whether the data of the sending terminal A has problems according to the data verification rule of the receiving terminal B, and the service platform informs the initiating terminal A of the verification result. The data can only be verified if it reaches the receiving end B. In the above mode, the data verification is post, that is, the data receiving end verifies the data of the transmitting end, the data problem is found after the service data reaches the receiving end, so that the flow which is finished at the data transmitting end all needs to be repeated for one time, the service is reworked, and the service cost is increased.
It should be noted that, related information (including, but not limited to, user equipment information, user personal information, etc.) and data (including, but not limited to, data for presentation, analyzed data, etc.) related to the present application are information and data authorized by the user or sufficiently authorized by each party. For example, an interface is provided between the system and the relevant user or institution, before acquiring the relevant information, the system needs to send an acquisition request to the user or institution through the interface, and acquire the relevant information after receiving the consent information fed back by the user or institution.
The present application will be described with reference to preferred implementation steps, and fig. 2 is a flowchart of a data processing method according to an embodiment of the present application, as shown in fig. 2, where the method includes the following steps:
step S101, acquiring target business data requested by a target receiving end based on a target data acquisition request initiated by the target receiving end.
Alternatively, the execution subject of steps S101 to S104 may be the transmitting end. The service interaction relationship between the sending end and the target receiving end can be established through the same service platform. After the target receiving end initiates the target data acquisition request to the transmitting end, the transmitting end determines target service data to be transmitted to the target receiving end according to the target data acquisition request.
Step S102, obtaining target data verification rules corresponding to target receiving ends from a verification rule base, wherein the verification rule base comprises N corresponding relations between identifications corresponding to the receiving ends respectively and the data verification rules, and N is an integer greater than or equal to 2.
Optionally, to ensure that the acquired service data meets the requirement, each receiving end corresponds to a corresponding data verification rule, and only data with a verification compliance can be normally received. Based on the above, after determining the target service data to be sent to the target receiving end, the target data verification rule corresponding to the target receiving end is required to be obtained from the verification rule base before the target service data is sent to the target receiving end, so as to be used for verifying the target service data.
Specifically, the checking rule base includes the corresponding relation between the identifiers corresponding to the plurality of receiving ends and the data checking rules, that is, the checking rule base stores the data checking rules corresponding to each receiving end in advance. The target data acquisition request sent by the target receiving end carries the identification of the target receiving end, and the target data verification rule corresponding to the target receiving end can be quickly searched from the verification rule base based on the identification of the target receiving end. By the method, before the target service data is sent to the target receiving end, the target receiving end is subjected to quick search of the target data verification rule corresponding to the target receiving end based on the pre-constructed verification rule base, so that the target service data can be quickly verified at the data sending end later, the target service data received by the target receiving end are ensured to be in accordance with the corresponding data verification rule, the target service data are not required to be verified after the data are decrypted, and further the verification efficiency of the target service data is improved.
And step S103, performing verification processing on the target service data based on the target data verification rule to obtain a verification result.
Optionally, after the sending end searches the target verification rule corresponding to the target receiving end based on the verification rule base, the sending end can verify the target service data, and directly determine whether the target service data needs to be sent to the target receiving end according to the verification result. The target service data does not need to be decrypted and sent to the target receiving end, and the target receiving end successfully decrypts the target service data and then verifies the target service data. The method can simplify the data verification process, ensure that the target business data received by the target receiving end all conform to the corresponding data verification rule, and further remarkably improve the data acquisition efficiency.
In an alternative embodiment, the method further comprises: acquiring inspection rule files corresponding to the N receiving ends respectively; analyzing the inspection rule files corresponding to the N receiving ends respectively to obtain data inspection rules corresponding to the N receiving ends respectively and identifiers corresponding to the N receiving ends respectively; and constructing a verification rule base based on the data verification rules respectively corresponding to the N receiving ends and the identifiers respectively corresponding to the N receiving ends.
Optionally, the construction of the check rule base is required before the check rule is found. The check rule base can be built by a receiving end or synchronized to a transmitting end after a service platform is built. The check rule file of each of the N receiving ends may be one or more of a web page file, a word file and an excel file, and the check rule file may be sent to the service platform in advance before the N receiving ends formally initiate a data acquisition request to the sending end, or may be a published check rule file obtained by the service platform from a web page, an account number and other positions of the corresponding receiving end through a web crawler and other technologies. The N receiving ends respectively corresponding to the check rule files are subjected to text analysis, so that a data check rule and a corresponding identifier corresponding to each receiving end can be obtained; based on the data check rule and the corresponding mark, the check rule base can be formed for the subsequent check of the service data directly from the data transmitting end.
Optionally, the data sending end obtains a service data checking rule base from the service platform. Because the data transmitted from the data transmitting end to the data receiving end is encrypted data, the service platform cannot decrypt the data after the data is transmitted to the service platform, the service platform cannot check the related data for the data receiving end, and only the data in the clear text can be checked, so that a check rule base is required to be given to the data transmitting end, and the data transmitting end checks the data. The service platform can provide corresponding functions, and provide data check rule bases for the data sending end meeting the conditions, wherein the check rule bases can be binary data, and the data sending end is invisible after acquiring the data check rule bases.
In an alternative embodiment, analyzing the inspection rule files corresponding to the N receiving ends respectively to obtain data inspection rules corresponding to the N receiving ends respectively and identifiers corresponding to the N receiving ends respectively, where the analyzing includes: identifying text information in the test rule file corresponding to the N receiving ends respectively to obtain data test texts corresponding to the N receiving ends respectively; performing entity recognition on the data verification texts corresponding to the N receiving ends respectively to obtain entity recognition results corresponding to the N receiving ends respectively, wherein the entity recognition results at least comprise identifications and verification keywords corresponding to the receiving ends; performing intention recognition on data verification texts corresponding to the N receiving ends respectively to obtain verification intention corresponding to the N receiving ends respectively; based on the verification intents respectively corresponding to the N receiving ends and the verification keywords respectively corresponding to the N receiving ends, generating data verification rules respectively corresponding to the N receiving ends.
Optionally, after the inspection rule files corresponding to the N receiving ends respectively are obtained, the inspection rule files are parsed into texts by using a corresponding program or software, for example, the text parsed by the inspection rule files may include one or more texts related to the rules, for example: the term "applicant's age is between 18 years and 50 years" is a text associated with a rule. And further carrying out entity recognition on the analyzed text, and recognizing entity words in the text to obtain an entity recognition result, wherein the entity recognition result comprises information such as identification of a corresponding receiving end, verification keywords and the like; further carrying out intention recognition on data verification texts corresponding to the N receiving ends respectively to obtain verification intention corresponding to the N receiving ends respectively; the entity recognition result is used for indicating word characteristics in text information corresponding to the checking rule file, and the checking intention is used for indicating main purposes and intentions of the text information in the checking rule file. The data verification rule corresponding to each receiving end can be accurately determined through the identification and matching of the verification keywords and the verification intents in the entity identification result.
Optionally, but not limited to, based on Word vector Word2Vec model, entity recognition is performed on the data check texts corresponding to the N receiving ends respectively, so as to obtain entity recognition results corresponding to the N receiving ends respectively.
Optionally, a combination of entity recognition and intent recognition technology (for example, using an open source machine learning framework rasa open source framework) may be used to manually check whether the target service data of the receiving end to be placed meets the data verification rule corresponding to the receiving end after the specific data verification rule entry and the specific data verification rule are obtained. Such as the following for the example of text recognition in ras open source frame format:
# intent check age (i.e., intent: check age);
-applicant (applicant) [ age ] (age): between [18 years ] (start age starter) - [50 years ] (end age endage);
the above indicates that the entity "applicant", "age", "start age", "end age" is identified, so the data check rule established by the text identifying such entity may be referred to as an age check rule.
In an alternative embodiment, based on the verification intents respectively corresponding to the N receiving ends and the verification keywords respectively corresponding to the N receiving ends, generating the data verification rule respectively corresponding to the N receiving ends includes: carrying out semantic analysis on the verification keywords corresponding to the N receiving ends respectively to obtain semantic analysis results of the verification keywords corresponding to the N receiving ends respectively; based on the verification intents respectively corresponding to the N receiving ends and the semantic analysis results of the verification keywords respectively corresponding to the N receiving ends, keyword screening processing is carried out to obtain keyword screening results respectively corresponding to the N receiving ends; based on the verification intents respectively corresponding to the N receiving ends and the keyword screening results respectively corresponding to the N receiving ends, generating data verification rules respectively corresponding to the N receiving ends.
Optionally, the verification keywords corresponding to the N receiving ends respectively obtained through entity identification may not be all related to the verification intention, based on this, after the verification keywords corresponding to the N receiving ends respectively are obtained, the action and meaning of the verification keywords in the text can be understood through semantic analysis on the obtained verification keywords, so as to improve the accuracy of extraction of the verification keywords. The overall intention and the main body of the text are understood by combining the intention recognition technology, the intention or the main body of the text can be deduced through understanding the temperature learning of the keywords and the understanding of the text, the keywords are further screened based on the recognized intention or main body, and the verification rules are recognized based on the keyword screening result. By the method, the accuracy of data verification rule acquisition can be further improved.
In an alternative embodiment, after constructing the verification rule base based on the data verification rules respectively corresponding to the N receiving ends and the identifiers respectively corresponding to the N receiving ends, the method further includes: under the condition that the change of the inspection rule file corresponding to any one receiving end in the N receiving ends is detected, acquiring a new inspection rule file corresponding to any one receiving end; analyzing the new check rule file corresponding to any one receiving end to obtain a new data check rule corresponding to any one receiving end; and updating the new data verification rule corresponding to any receiving end to a verification rule base.
Optionally, the data sending end obtains the latest service data checking rule base from the service platform. For the same service platform, as the data sending end and the data receiving end are dynamically changed, the data checking rules of the data receiving end are also dynamically changed, and the service platform can update the service checking rule base according to the changes, thereby improving the accuracy of acquiring the corresponding data checking rules of each receiving end, realizing the accurate checking of the service data before encryption sending, and ensuring that the service data received by the receiving end is really needed by the receiving end and meets the conditions. Likewise, the data transmitting end can acquire the latest service check rule base from the service platform.
In an alternative embodiment, the verifying the target service data based on the target data verification rule to obtain a verification result includes: detecting whether the target service data meets K check conditions in a target data check rule, wherein K is an integer greater than or equal to 1; under the condition that the target service data meets K verification conditions, determining that a verification result is verification passing; and under the condition that the target service data does not meet any one of the K verification conditions, determining that the verification result is that the verification is not passed.
Optionally, when verifying the target service data based on the target data verification rule, whether verification conditions included in the target verification rule are all satisfied needs to be considered, if both the verification conditions are satisfied, the target service data is verified, the subsequent encryption transmission processing can be normally performed, if any one of the verification conditions is not satisfied, it is directly determined that the target service data is not verified, and the subsequent encryption transmission operation cannot be normally performed.
Step S104, when the verification result indicates that the target service data passes the verification, the target service data is encrypted, and the encrypted target service data is sent to the target receiving end.
Optionally, if the target service data passes the verification, it indicates that the target service data meets the data requirement of the target receiving end, and at this time, the target data may be transmitted to the target receiving end in an encrypted manner. Through the mode, the data acquired by the target receiving end can be ensured to accord with the corresponding data verification rule.
In an alternative embodiment, the method further comprises: and generating prompt information under the condition that the verification result indicates that the target service data is not verified, wherein the prompt information is at least used for indicating the reason that the target service data is not verified.
Optionally, if the target service data is not checked, that is, the target service data does not meet the data requirement of the target receiving end, the target service data does not need to be sent to the target receiving end at this time, and corresponding prompt information is generated to prompt the reason that the target service data is not checked. By the method, the real reason that the target service data verification fails can be found in time, so that the reason that the data cannot be normally sent can be quickly and accurately found out, and the data can be eliminated in time.
Through the steps S101 to S104, the purpose that before data is sent to the receiving end, the data verification rule corresponding to the receiving end is matched from the verification rule library, and encryption sending of the data is only performed under the condition that service data verification passes based on the verification rule is achieved, and the problems that in the related art, the data is found after the service data reaches and is decrypted to the receiving end through the data receiving end, the running-out process at the data sending end needs to be all reworked again, and service cost is increased are solved. Thereby improving the transmission efficiency of the service data and avoiding the repeated transmission flow of the service data.
Based on the foregoing embodiments and optional embodiments, an optional implementation manner is provided in the present application, and fig. 3 is a flowchart of an optional data processing method according to an embodiment of the present application, as shown in fig. 3, where the method includes:
step S1, a business platform (namely a main server) constructs an industry data receiving end check library. And collecting the check rule of the data receiving end which needs to be accessed into the service platform. Because related data items of an industry are basically fixed, and in order to smoothly process a service, a data receiving end generally discloses a service processing verification rule, and the rule is generally one or more of web pages, word files and excel files of an enterprise. The method specifically comprises the following sub-steps of:
step S11, a check rule file of the data receiving end of each access service platform is obtained, where the check rule file may be one or more of a web page file, a word file, and an excel file, the check rule file of the corresponding receiving end may be obtained by using a web crawler technology, and resolved into a text by using a corresponding program or software, for example, the text resolved by the check rule file may include one or more rules in a text form: "applicant's age is between 18 and 50 years old.
Step S12, analyzing the verification rule file into an actual data verification rule:
according to the actual situation, whether the target data of the receiving end to be placed meets the data verification rule corresponding to the receiving end can be checked manually after a specific data verification rule item and a specific data verification rule are obtained by manual work or by using a combination of an entity recognition technology and an intention recognition technology (such as using an open source machine learning framework ras open source framework). Such as the following for the example of text recognition in ras open source frame format:
# intent check age (i.e., intent: check age);
-applicant (applicant) [ age ] (age): between [18 years ] (start age starter) - [50 years ] (end age endage);
the above indicates that the entity "applicant", "age", "start age", "end age" is identified, so the data check rule established by the text identifying such entity may be referred to as an age check rule.
Step S13, inputting the data verification rule corresponding to the receiving end into a verification rule base:
the output in step S12 is entered into the rule engine' S check rule base by means of a rule engine (e.g. open source rule engine Drools, etc.), using a program, to form the business data check rule base of the industry.
The method is used for constructing the industry receiving end data verification rule base, and the verification rule base is established by means of web crawler technology, manual assistance and the like.
Step S2, the data transmitting end acquires a service data check rule base from the service platform. Because the data transmitted from the data transmitting end to the data receiving end is encrypted data, the service platform cannot decrypt the data after the data is transmitted to the service platform, the service platform cannot check the related data for the data receiving end, and only the data in the clear text can be checked, so that a check rule base is required to be given to the data transmitting end, and the data transmitting end checks the data. The service platform can provide corresponding functions, and provide data check rule bases for the data sending end meeting the conditions, wherein the check rule bases can be binary data, and the data sending end is invisible after acquiring the data check rule bases.
And S3, the data sending end and the data initiating end call a service platform checking function. After the data sending terminal acquires the data verification rule base, the data receiving terminal is selected, the verification rule base can select the verification rule of the specific data receiving terminal, whether the verification is passed or not is given, a specific prompt is given for the fact that the verification is not passed, and the reason that the specific data item is not passed is indicated. The data transmitting end can select whether the data is continuously transmitted (transmitted after encryption) according to the verification result.
And S4, the data transmitting end acquires the latest service data verification rule base from the service platform. Because the data transmitting end and the data receiving end are dynamically changed, the data checking rules of the data receiving end are also dynamically changed, and the service platform can update the service checking rule base according to the changes. The service platform also provides the function that the data transmitting end can acquire the latest service check rule base from the service platform.
The embodiment of the application solves a scene that one industry relates to data transmission terminals (enterprises/systems), service platforms and data receiving terminals (enterprises/systems), data are transmitted to the data receiving terminals after being encrypted, and the data receiving terminals perform data verification. The data verification is carried out at the data receiving end in advance, namely, the data is verified in a post-positioned mode, so that service cost is too high. The embodiment of the application is suitable for the service platform system.
It should be noted that the steps illustrated in the flowcharts of the figures may be performed in a computer system such as a set of computer executable instructions, and that although a logical order is illustrated in the flowcharts, in some cases the steps illustrated or described may be performed in an order other than that illustrated herein.
The embodiment of the application also provides a data processing device, and it should be noted that the data processing device of the embodiment of the application can be used for executing the data processing method provided by the embodiment of the application. The following describes a data processing apparatus provided in an embodiment of the present application.
Fig. 4 is a schematic diagram of a data processing apparatus according to an embodiment of the present application. As shown in fig. 4, the apparatus includes: a data acquisition module 400, a rule acquisition module 402, a verification module 404, an encryption module 406, wherein,
the data acquisition module 400 is configured to acquire target service data requested by the target receiving end based on a target data acquisition request initiated by the target receiving end;
the rule acquisition module 402 is connected to the data acquisition module 400, and is configured to acquire a target data verification rule corresponding to a target receiving end from a verification rule base, where the verification rule base includes correspondence between identifiers corresponding to N receiving ends respectively and the data verification rule, and N is an integer greater than or equal to 2;
The verification module 404 is connected to the rule acquisition module 402, and is configured to perform verification processing on the target service data based on the target data verification rule, so as to obtain a verification result;
the encryption module 406 is connected to the verification module 404, and is configured to encrypt the target service data and send the encrypted target service data to the target receiving end when the verification result indicates that the target service data passes the verification.
In the present application, the data acquisition module 400 is configured to acquire target service data requested by the target receiving end based on a target data acquisition request initiated by the target receiving end; the rule acquisition module 402 is connected to the data acquisition module 400, and is configured to acquire a target data verification rule corresponding to a target receiving end from a verification rule base, where the verification rule base includes correspondence between identifiers corresponding to N receiving ends respectively and the data verification rule, and N is an integer greater than or equal to 2; the verification module 404 is connected to the rule acquisition module 402, and is configured to perform verification processing on the target service data based on the target data verification rule, so as to obtain a verification result; the encryption module 406 is connected to the verification module 404, and is configured to encrypt the target service data and send the encrypted target service data to the target receiving end when the verification result indicates that the verification of the target service data is passed, so as to achieve the purpose that the data is encrypted and sent only when the verification rule is passed and the service data is passed based on the verification rule, and solve the problem that in the related art, the data problem is found after the service data reaches and is decrypted by the data receiving end, and therefore, the process that the data transmitting end runs out needs to be reworked again and the service is reworked, and the service cost is increased. Thereby achieving the effects of improving the transmission efficiency of the service data and avoiding the repetition of the transmission flow of the service data.
In an alternative embodiment, the apparatus further comprises: the first acquisition submodule is used for acquiring the inspection rule files corresponding to the N receiving ends respectively; the first analysis submodule is used for analyzing the inspection rule files corresponding to the N receiving ends respectively to obtain data inspection rules corresponding to the N receiving ends respectively and identifiers corresponding to the N receiving ends respectively; the first construction submodule is used for constructing a verification rule base based on the data verification rules respectively corresponding to the N receiving ends and the identifiers respectively corresponding to the N receiving ends.
In an alternative embodiment, the first parsing sub-module includes: the first recognition sub-module is used for recognizing text information in the test rule files corresponding to the N receiving ends respectively to obtain data test texts corresponding to the N receiving ends respectively; the second recognition sub-module is used for carrying out entity recognition on the data verification texts corresponding to the N receiving ends respectively to obtain entity recognition results corresponding to the N receiving ends respectively, wherein the entity recognition results at least comprise identifications and verification keywords corresponding to the receiving ends; the third recognition sub-module is used for carrying out intention recognition on the data check texts corresponding to the N receiving ends respectively to obtain check intention corresponding to the N receiving ends respectively; the first generation sub-module is used for generating data verification rules corresponding to the N receiving ends respectively based on the verification intents corresponding to the N receiving ends respectively and the verification keywords corresponding to the N receiving ends respectively.
In an alternative embodiment, the first generating sub-module includes: the first analysis submodule is used for carrying out semantic analysis on the check keywords corresponding to the N receiving ends respectively to obtain semantic analysis results of the check keywords corresponding to the N receiving ends respectively; the first screening sub-module is used for carrying out keyword screening processing based on the verification intents respectively corresponding to the N receiving ends and the semantic analysis results of the verification keywords respectively corresponding to the N receiving ends to obtain keyword screening results respectively corresponding to the N receiving ends; and the second generation sub-module is used for generating data verification rules corresponding to the N receiving ends respectively based on the verification intents corresponding to the N receiving ends respectively and the keyword screening results corresponding to the N receiving ends respectively.
In an alternative embodiment, the apparatus further comprises: the second acquisition sub-module is used for acquiring a new inspection rule file corresponding to any one receiving end under the condition that the inspection rule file corresponding to any one receiving end is detected to be changed in the N receiving ends; the second analysis submodule is used for analyzing the new check rule file corresponding to any one receiving end to obtain a new data check rule corresponding to any one receiving end; and the first updating sub-module is used for updating the new data verification rule corresponding to any receiving end to the verification rule base.
In an alternative embodiment, the verification module includes: the first detection submodule is used for detecting whether the target service data meets K verification conditions in a target data verification rule, wherein K is an integer greater than or equal to 1; the first determining submodule is used for determining that the verification result is verification passing under the condition that the target service data meets K verification conditions; and the second determining submodule is used for determining that the verification result is that the verification is not passed under the condition that the target service data does not meet any one of the K verification conditions.
In an alternative embodiment, the apparatus further comprises: and the third generation sub-module is used for generating prompt information when the verification result indicates that the verification of the target service data is not passed, wherein the prompt information is at least used for indicating the reason that the verification of the target service data is not passed.
It should be noted that each of the above modules may be implemented by software or hardware, for example, in the latter case, it may be implemented by: the above modules may be located in the same processor; alternatively, the various modules described above may be located in different processors in any combination.
It should be noted that, the data obtaining module 400, the rule obtaining module 402, the verification module 404, and the encryption module 406 correspond to steps S101 to S104 in the embodiment, and the modules are the same as the examples and application scenarios implemented by the corresponding steps, but are not limited to the disclosure of the foregoing embodiments. It should be noted that the above modules may be run in a computer terminal as part of the apparatus.
It should be noted that, the optional or preferred implementation manner of this embodiment may be referred to the related description in the embodiment, and will not be repeated herein.
The data processing apparatus includes a processor and a memory, the units and the like are stored as program units in the memory, and the processor executes the program units stored in the memory to realize the corresponding functions.
The processor includes a kernel, and the kernel fetches the corresponding program unit from the memory. The kernel may be provided with one or more, and data processing is performed by adjusting the kernel parameters.
The memory may include volatile memory, random Access Memory (RAM), and/or nonvolatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM), among other forms in computer readable media, the memory including at least one memory chip.
The embodiment of the application provides a nonvolatile storage medium, on which a program is stored, which when executed by a processor, implements the above-described data processing method.
The embodiment of the application provides a processor, which is used for running a program, wherein the data processing method is executed when the program runs.
As shown in fig. 5, an embodiment of the present application provides an electronic device, where the electronic device 10 includes a processor, a memory, and a program stored on the memory and executable on the processor, and the processor implements the following steps when executing the program: acquiring target business data requested by a target receiving end based on a target data acquisition request initiated by the target receiving end; obtaining target data verification rules corresponding to target receiving ends from a verification rule base, wherein the verification rule base comprises N corresponding relations between identifications corresponding to the N receiving ends respectively and the data verification rules, and N is an integer greater than or equal to 2; performing verification processing on the target service data based on the target data verification rule to obtain a verification result; and under the condition that the verification result indicates that the target service data passes the verification, encrypting the target service data, and sending the encrypted target service data to a target receiving end. The device herein may be a server, PC, PAD, cell phone, etc.
The present application also provides a computer program product adapted to perform, when executed on a data processing device, a program initialized with the method steps of: acquiring target business data requested by a target receiving end based on a target data acquisition request initiated by the target receiving end; obtaining target data verification rules corresponding to target receiving ends from a verification rule base, wherein the verification rule base comprises N corresponding relations between identifications corresponding to the N receiving ends respectively and the data verification rules, and N is an integer greater than or equal to 2; performing verification processing on the target service data based on the target data verification rule to obtain a verification result; and under the condition that the verification result indicates that the target service data passes the verification, encrypting the target service data, and sending the encrypted target service data to a target receiving end.
Optionally, the above computer program product is further adapted to execute a program initialized with the method steps of: acquiring inspection rule files corresponding to the N receiving ends respectively; analyzing the inspection rule files corresponding to the N receiving ends respectively to obtain data inspection rules corresponding to the N receiving ends respectively and identifiers corresponding to the N receiving ends respectively; and constructing a verification rule base based on the data verification rules respectively corresponding to the N receiving ends and the identifiers respectively corresponding to the N receiving ends.
Optionally, the above computer program product is further adapted to execute a program initialized with the method steps of: identifying text information in the test rule file corresponding to the N receiving ends respectively to obtain data test texts corresponding to the N receiving ends respectively; performing entity recognition on the data verification texts corresponding to the N receiving ends respectively to obtain entity recognition results corresponding to the N receiving ends respectively, wherein the entity recognition results at least comprise identifications and verification keywords corresponding to the receiving ends; performing intention recognition on data verification texts corresponding to the N receiving ends respectively to obtain verification intention corresponding to the N receiving ends respectively; based on the verification intents respectively corresponding to the N receiving ends and the verification keywords respectively corresponding to the N receiving ends, generating data verification rules respectively corresponding to the N receiving ends.
Optionally, the above computer program product is further adapted to execute a program initialized with the method steps of: carrying out semantic analysis on the verification keywords corresponding to the N receiving ends respectively to obtain semantic analysis results of the verification keywords corresponding to the N receiving ends respectively; based on the verification intents respectively corresponding to the N receiving ends and the semantic analysis results of the verification keywords respectively corresponding to the N receiving ends, keyword screening processing is carried out to obtain keyword screening results respectively corresponding to the N receiving ends; based on the verification intents respectively corresponding to the N receiving ends and the keyword screening results respectively corresponding to the N receiving ends, generating data verification rules respectively corresponding to the N receiving ends.
Optionally, after constructing the check rule base based on the data check rules respectively corresponding to the N receiving ends and the identifiers respectively corresponding to the N receiving ends, the method further includes: under the condition that the change of the inspection rule file corresponding to any one receiving end in the N receiving ends is detected, acquiring a new inspection rule file corresponding to any one receiving end; analyzing the new check rule file corresponding to any one receiving end to obtain a new data check rule corresponding to any one receiving end; and updating the new data verification rule corresponding to any receiving end to a verification rule base.
Optionally, the above computer program product is further adapted to execute a program initialized with the method steps of: detecting whether the target service data meets K check conditions in a target data check rule, wherein K is an integer greater than or equal to 1; under the condition that the target service data meets K verification conditions, determining that a verification result is verification passing; and under the condition that the target service data does not meet any one of the K verification conditions, determining that the verification result is that the verification is not passed.
Optionally, the above computer program product is further adapted to execute a program initialized with the method steps of: and generating prompt information under the condition that the verification result indicates that the target service data is not verified, wherein the prompt information is at least used for indicating the reason that the target service data is not verified.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In one typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include volatile memory in a computer-readable medium, random Access Memory (RAM) and/or nonvolatile memory, etc., such as Read Only Memory (ROM) or flash RAM. Memory is an example of a computer-readable medium.
Computer readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device. Computer-readable media, as defined herein, does not include transitory computer-readable media (transmission media), such as modulated data signals and carrier waves.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article or apparatus that comprises an element.
It will be appreciated by those skilled in the art that embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The foregoing is merely exemplary of the present application and is not intended to limit the present application. Various modifications and changes may be made to the present application by those skilled in the art. Any modifications, equivalent substitutions, improvements, etc. which are within the spirit and principles of the present application are intended to be included within the scope of the claims of the present application.

Claims (10)

1. A method of data processing, comprising:
acquiring target business data requested by a target receiving end based on a target data acquisition request initiated by the target receiving end;
obtaining target data verification rules corresponding to the target receiving ends from a verification rule base, wherein the verification rule base comprises N corresponding relations between identifications corresponding to the N receiving ends respectively and the data verification rules, and N is an integer greater than or equal to 2;
Performing verification processing on the target service data based on the target data verification rule to obtain a verification result;
and under the condition that the verification result indicates that the target service data passes the verification, encrypting the target service data, and sending the encrypted target service data to the target receiving end.
2. The method according to claim 1, wherein the method further comprises:
acquiring inspection rule files corresponding to the N receiving ends respectively;
analyzing the inspection rule files corresponding to the N receiving ends respectively to obtain data inspection rules corresponding to the N receiving ends respectively and identifiers corresponding to the N receiving ends respectively;
and constructing the verification rule base based on the data verification rules respectively corresponding to the N receiving ends and the identifiers respectively corresponding to the N receiving ends.
3. The method of claim 2, wherein the parsing the inspection rule files corresponding to the N receiving ends respectively to obtain the data inspection rules corresponding to the N receiving ends respectively and the identifiers corresponding to the N receiving ends respectively, includes:
Identifying text information in the test rule files corresponding to the N receiving ends respectively to obtain data test texts corresponding to the N receiving ends respectively;
performing entity recognition on the data verification texts corresponding to the N receiving ends respectively to obtain entity recognition results corresponding to the N receiving ends respectively, wherein the entity recognition results at least comprise identifications and verification keywords corresponding to the receiving ends;
performing intention recognition on the data verification texts respectively corresponding to the N receiving ends to obtain verification intention respectively corresponding to the N receiving ends;
and generating data verification rules respectively corresponding to the N receiving ends based on the verification intents respectively corresponding to the N receiving ends and the verification keywords respectively corresponding to the N receiving ends.
4. The method of claim 3, wherein the generating the data verification rule corresponding to each of the N receiving ends based on the verification intents corresponding to each of the N receiving ends and the verification keywords corresponding to each of the N receiving ends includes:
carrying out semantic analysis on the verification keywords corresponding to the N receiving ends respectively to obtain semantic analysis results of the verification keywords corresponding to the N receiving ends respectively;
Based on the verification intents respectively corresponding to the N receiving ends and semantic analysis results of the verification keywords respectively corresponding to the N receiving ends, keyword screening processing is carried out to obtain keyword screening results respectively corresponding to the N receiving ends;
and generating data verification rules corresponding to the N receiving ends respectively based on the verification intents corresponding to the N receiving ends respectively and the keyword screening results corresponding to the N receiving ends respectively.
5. The method according to claim 2, wherein after the verifying rule base is constructed based on the data verifying rules respectively corresponding to the N receiving ends and the identifiers respectively corresponding to the N receiving ends, the method further comprises:
under the condition that the change of the inspection rule file corresponding to any one receiving end in the N receiving ends is detected, acquiring a new inspection rule file corresponding to any one receiving end;
analyzing the new check rule file corresponding to any receiving end to obtain a new data check rule corresponding to any receiving end;
and updating the new data verification rule corresponding to any receiving end to the verification rule library.
6. The method of claim 5, wherein the performing the verification process on the target service data based on the target data verification rule to obtain a verification result includes:
detecting whether the target service data meets K verification conditions in the target data verification rule, wherein K is an integer greater than or equal to 1;
under the condition that the target service data meets the K verification conditions, determining that the verification result is verification passing;
and under the condition that the target service data does not meet any one of the K verification conditions, determining that the verification result is that verification fails.
7. The method according to any one of claims 1 to 5, further comprising:
and generating prompt information under the condition that the verification result indicates that the target service data is not verified, wherein the prompt information is at least used for indicating the reason that the target service data is not verified.
8. A data processing apparatus, comprising:
the data acquisition module is used for acquiring target service data requested by the target receiving end based on a target data acquisition request initiated by the target receiving end;
The rule acquisition module is used for acquiring target data verification rules corresponding to the target receiving ends from a verification rule base, wherein the verification rule base comprises N corresponding relations between identifications corresponding to the N receiving ends respectively and the data verification rules, and N is an integer greater than or equal to 2;
the verification module is used for carrying out verification processing on the target service data based on the target data verification rule to obtain a verification result;
and the encryption module is used for carrying out encryption processing on the target service data and sending the encrypted target service data to the target receiving end under the condition that the verification result indicates that the target service data passes verification.
9. A non-volatile storage medium storing a plurality of instructions adapted to be loaded by a processor and to perform the data processing method of any one of claims 1 to 7.
10. An electronic device comprising one or more processors and a memory for storing one or more programs, wherein the one or more programs, when executed by the one or more processors, cause the one or more processors to implement the data processing method of any of claims 1-7.
CN202410194245.6A 2024-02-21 2024-02-21 Data processing method and device, storage medium and electronic equipment Pending CN117807618A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202410194245.6A CN117807618A (en) 2024-02-21 2024-02-21 Data processing method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202410194245.6A CN117807618A (en) 2024-02-21 2024-02-21 Data processing method and device, storage medium and electronic equipment

Publications (1)

Publication Number Publication Date
CN117807618A true CN117807618A (en) 2024-04-02

Family

ID=90431670

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202410194245.6A Pending CN117807618A (en) 2024-02-21 2024-02-21 Data processing method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN117807618A (en)

Similar Documents

Publication Publication Date Title
US10848310B2 (en) Method and device for identifying user identity
US11640349B2 (en) Real time application error identification and mitigation
CN106686599B (en) Method and equipment for risk management of application information
CN111314306A (en) Interface access method and device, electronic equipment and storage medium
WO2018028448A1 (en) Authentication method, device and authentication client
KR20200093007A (en) Model training system and method, and storage medium
CN112241506B (en) User behavior backtracking method, device, equipment and system
CN112200585B (en) Service processing method, device, equipment and system
CN113435862B (en) Bill processing method and device based on mailbox
CN106649426A (en) Data analysis method, data analysis platform and server
CN112434348B (en) Data verification processing method, device and equipment
CN108846292B (en) Desensitization rule generation method and device
WO2020206838A1 (en) Code snippet translation method and apparatus, computer device, and storage medium
CN111124421B (en) Abnormal contract data detection method and device for blockchain intelligent contract
CN110990492B (en) Information processing method, device and equipment
CN112528201A (en) Method and device for calling third-party platform, computer equipment and storage medium
US11301522B1 (en) Method and apparatus for collecting information regarding dark web
US20190227916A1 (en) Methods, systems, apparatuses and devices for facilitating execution of test cases
CN113094283A (en) Data acquisition method, device, equipment and storage medium
CN115526551B (en) Agricultural product traceability data processing method based on artificial intelligence and cloud platform
CN117807618A (en) Data processing method and device, storage medium and electronic equipment
Rodriguez et al. ROI: a method for identifying organizations receiving personal data
CN111563126B (en) Data processing method and device based on block chain system and electronic equipment
CN106708872B (en) Method and device for identifying associated object
CN110908575B (en) Data processing method, computer storage medium and electronic device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination