CN118096171A - Data gray level verification method, device, computer equipment, medium and product - Google Patents
Data gray level verification method, device, computer equipment, medium and product Download PDFInfo
- Publication number
- CN118096171A CN118096171A CN202410282980.2A CN202410282980A CN118096171A CN 118096171 A CN118096171 A CN 118096171A CN 202410282980 A CN202410282980 A CN 202410282980A CN 118096171 A CN118096171 A CN 118096171A
- Authority
- CN
- China
- Prior art keywords
- gray
- gray scale
- verification
- condition
- definition table
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012795 verification Methods 0.000 title claims abstract description 144
- 238000000034 method Methods 0.000 title claims abstract description 40
- 238000004590 computer program Methods 0.000 claims abstract description 38
- 230000006870 function Effects 0.000 claims abstract description 33
- 230000006854 communication Effects 0.000 claims description 50
- 238000004891 communication Methods 0.000 claims description 49
- 238000011144 upstream manufacturing Methods 0.000 claims description 10
- 238000013524 data verification Methods 0.000 claims description 5
- 238000010586 diagram Methods 0.000 description 5
- 238000012545 processing Methods 0.000 description 5
- 230000008859 change Effects 0.000 description 2
- 238000013500 data storage Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000000605 extraction Methods 0.000 description 2
- 238000004519 manufacturing process Methods 0.000 description 2
- 230000003068 static effect Effects 0.000 description 2
- OKTJSMMVPCPJKN-UHFFFAOYSA-N Carbon Chemical compound [C] OKTJSMMVPCPJKN-UHFFFAOYSA-N 0.000 description 1
- 230000001413 cellular effect Effects 0.000 description 1
- 229910021389 graphene Inorganic materials 0.000 description 1
- 238000003384 imaging method Methods 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000013508 migration Methods 0.000 description 1
- 230000005012 migration Effects 0.000 description 1
- 238000012986 modification Methods 0.000 description 1
- 230000004048 modification Effects 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 238000012827 research and development Methods 0.000 description 1
- 238000012546 transfer Methods 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/40—Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
- G06Q20/401—Transaction verification
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- Physics & Mathematics (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Economics (AREA)
- Marketing (AREA)
- Technology Law (AREA)
- Development Economics (AREA)
- Computer Security & Cryptography (AREA)
- Debugging And Monitoring (AREA)
Abstract
The application relates to a data gray scale verification method, a device, a computer device, a storage medium and a computer program product, wherein transaction parameters are acquired, a gray scale resource definition table is acquired locally and verified under the condition that a gray scale function main switch is in an on state and gray scale resource configuration conditions are met, the gray scale resource definition table is split under the condition that the gray scale resource definition table is verified to obtain at least one gray scale strategy, gray scale white list verification is sequentially carried out on the gray scale strategies, transaction data is executed in a gray scale environment under the condition that the gray scale white list verification of all the gray scale strategies is passed, various verification algorithms can be provided, the accuracy of the gray scale white list verification is improved, and therefore the transaction data is executed in the gray scale environment, and the stability and reliability of new functions or codes are improved.
Description
Technical Field
The present application relates to the field of big data technologies, and in particular, to a method, an apparatus, a computer device, a medium, and a product for verifying gray scale of data.
Background
In order to improve the functional online speed and the migration stability of new and old systems, matching verification needs to be performed on user transaction data, after verification is passed, user-oriented release is performed, improvement of research and development efficiency is achieved, and safety and stability of production are guaranteed.
In the related art, only a single authentication is generally performed, and the efficiency of authentication is low, resulting in a decrease in the accuracy of matching authentication.
Disclosure of Invention
In view of the foregoing, it is desirable to provide a gradation verification method, apparatus, computer device, medium, and product of data capable of improving the matching verification efficiency.
In a first aspect, the present application provides a data gray scale verification method, including:
Acquiring transaction parameters, wherein the transaction parameters comprise business keywords, expansion keywords, transaction data and context information;
Under the condition that the gray function main switch is in an on state and the gray resource configuration condition is met, a gray resource definition table is obtained locally, and verification is carried out on the gray resource definition table;
splitting the gray scale resource definition table to obtain at least one gray scale strategy under the condition that the verification of the gray scale resource definition table is passed;
And carrying out gray white list verification on the gray strategies in sequence, and executing transaction data in a gray environment under the condition that the gray white list verification of all the gray strategies passes.
In one embodiment, where the current communication mode is remote communication, the context information includes caller information of the upstream application; in the case that the current communication mode is text communication, the context information includes the packet Wen Yuan data and the packet additional information.
In one embodiment, the gray scale resource configuration condition is that the corresponding gray scale resource definition table is queried locally according to the service keywords and the expansion keywords.
In one embodiment, the step of verifying the gray resource definition table includes:
extracting gray resource fields from a gray resource definition table;
Under the condition that the gray resource field meets the data structure requirement condition, determining that the verification of the gray resource definition table passes;
And under the condition that the gray scale resource field does not meet the data structure requirement condition, determining that the gray scale resource definition table fails verification.
In one embodiment, the step of sequentially performing gray-scale white list verification on the gray-scale policy includes:
for each gray scale strategy, under the condition that a gray scale white list record corresponding to the gray scale strategy exists in a gray scale white list, a matching algorithm corresponding to a gray scale resource field of the gray scale strategy is obtained;
Extracting a message field from a message of transaction data, and matching the message field with a target field in a gray white list according to a matching algorithm under the condition that the message field is a non-null field;
Under the condition that the message field is successfully matched with the target field, determining that the gray white list verification of the gray strategy is passed;
And under the condition that the matching of the message field and the target field is unsuccessful, determining that the gray white list verification of the gray strategy is not passed.
In one embodiment, the method further comprises:
and executing transaction data in a non-gray scale environment under the condition that the gray scale function main switch is in an off state, a corresponding gray scale resource definition table is not queried locally, or a gray scale white list record corresponding to a gray scale strategy does not exist in the gray scale white list.
In a second aspect, the present application also provides a data gray scale verification device, including:
the data acquisition module is used for acquiring transaction parameters, wherein the transaction parameters comprise business keywords, expansion keywords, transaction data and context information;
The definition table verification module is used for locally acquiring a gray resource definition table and verifying the gray resource definition table under the condition that the gray function main switch is in an on state and the gray resource configuration condition is met;
the definition table splitting module is used for splitting the gray resource definition table to obtain at least one gray strategy under the condition that the verification of the gray resource definition table is passed;
The gray verification module is used for sequentially carrying out gray white list verification on the gray policies, and executing transaction data in a gray environment under the condition that the gray white list verification of all the gray policies passes.
In a third aspect, the present application also provides a computer device comprising a memory storing a computer program and a processor implementing the method steps of any one of the first aspects when the processor executes the computer program.
In a fourth aspect, the present application also provides a computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements the method steps of any of the first aspects.
In a fifth aspect, the application also provides a computer program product comprising a computer program which, when executed by a processor, implements the method steps of any of the first aspects.
According to the data gray scale verification method, device, computer equipment, storage medium and computer program product, through obtaining transaction parameters, when a gray scale function main switch is in an on state and gray scale resource configuration conditions are met, gray scale resource definition tables are obtained locally, verification is carried out on the gray scale resource definition tables, when verification of the gray scale resource definition tables is passed, the gray scale resource definition tables are split to obtain at least one gray scale strategy, gray scale white list verification is carried out on the gray scale strategies in sequence, and when the gray scale white list verification of all the gray scale strategies is passed, transaction data are executed in a gray scale environment, multiple verification algorithms can be provided, accuracy of the gray scale white list verification is improved, so that transaction data are executed in the gray scale environment, and stability and reliability of new functions or codes are improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the related art, the drawings that are required to be used in the embodiments or the related technical descriptions will be briefly described, and it is apparent that the drawings in the following description are only some embodiments of the present application, and other drawings may be obtained according to the drawings without inventive effort for those skilled in the art.
FIG. 1 is an application environment diagram of a method of gray scale verification of data in one embodiment;
FIG. 2 is a flow chart of a method of gray scale verification of data in one embodiment;
FIG. 3 is a flow chart of a method for verifying gray scale of data in another embodiment;
FIG. 4 is a block diagram showing the structure of a gradation verifying apparatus for data in one embodiment;
Fig. 5 is an internal structural diagram of a computer device in one embodiment.
Detailed Description
The present application will be described in further detail with reference to the drawings and examples, in order to make the objects, technical solutions and advantages of the present application more apparent. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the application.
The data gray verification method provided by the embodiment of the application can be applied to an application environment shown in fig. 1. Wherein the terminal 102 communicates with the server 104 via a network. The data storage system may store data that the server 104 needs to process. The data storage system may be integrated on the server 104 or may be located on a cloud or other network server. The terminal 102 user obtains transaction parameters from the server 104, obtains a gray resource definition table from the local when the gray function main switch is in an on state and meets the gray resource configuration condition, verifies the gray resource definition table, splits the gray resource definition table to obtain at least one gray policy when the gray resource definition table is verified, sequentially verifies the gray policy in a gray white list, and executes transaction data in a gray environment when the gray white list verification of all the gray policies is verified. The terminal 102 may be, but not limited to, various personal computers, notebook computers, smart phones, tablet computers, internet of things devices, and portable wearable devices, where the internet of things devices may be smart speakers, smart televisions, smart air conditioners, smart vehicle devices, and the like. The portable wearable device may be a smart watch, smart bracelet, headset, or the like. The server 104 may be implemented as a stand-alone server or as a server cluster of multiple servers.
In an exemplary embodiment, as shown in fig. 2, a data gray scale verification method is provided, and the method is applied to the terminal 102 in fig. 1 for illustration, and includes the following steps 202 to 208. Wherein:
S202: transaction parameters are obtained, and the transaction parameters comprise business keywords, extension keywords, transaction data and context information.
The business key words are used for identifying the type or interface name of the transaction, and busiKey is adopted in gray verification and used for inquiring a gray resource definition table and a gray strategy to determine whether gray processing is carried out on the current transaction; the expansion key words are used for identifying version numbers or other expansion information of the transactions and are indicated by extKey and used for distinguishing different versions or types of transactions so as to determine whether gray processing is carried out or not according to specific configuration; the transaction data is uploaded transaction data according to a data format required by the gray component; the context information is other information of the transaction parameters.
S204: and under the condition that the gray function main switch is in an on state and the gray resource configuration condition is met, acquiring a gray resource definition table from the local and verifying the gray resource definition table.
The gray function main switch is used for representing whether a gray environment needs to be executed or not, the gray environment is executed under the condition that the gray function main switch is in an on state, and the gray environment is returned to a non-gray environment under the condition that the gray function main switch is in an off state, and gray verification is not performed at the moment. The gray scale resource configuration conditions are parameters needed by local gray scale verification or not, and comprise a gray scale resource definition table, wherein the gray scale resource definition table is called according to transaction parameters and comprises a plurality of combination strategy definitions, and if the gray scale resource definition table does not exist locally, the gray scale resource definition table can be read from a database. And verifying the gray resource definition table, namely verifying whether the gray resource definition table meets the format requirement.
S206: and splitting the gray scale resource definition table to obtain at least one gray scale strategy under the condition that the verification of the gray scale resource definition table is passed.
Under the condition that the verification of the gray resource definition table is passed, splitting the gray resource definition table according to a combination strategy field in the gray resource definition table to obtain at least one specific gray strategy, and inquiring a local gray strategy table to obtain the specific configuration of each gray strategy.
S208: and carrying out gray white list verification on the gray strategies in sequence, and executing transaction data in a gray environment under the condition that the gray white list verification of all the gray strategies passes.
The gray scale policy is sequentially subjected to gray scale white list verification based on specific configuration of the gray scale policy, wherein the gray scale white list comprises a pre-defined white list field, the gray scale policy is subjected to gray scale white list verification by matching a specified field in the gray scale policy with a white list field in the gray scale white list, and transaction data is executed in a gray scale environment under the condition that the gray scale white list verification of all the gray scale policies is passed.
In the data gray scale verification method, the transaction parameters are obtained, when the gray scale function main switch is in an on state and the gray scale resource configuration condition is met, the gray scale resource definition table is obtained locally, verification is carried out on the gray scale resource definition table, when the gray scale resource definition table passes verification, the gray scale resource definition table is split to obtain at least one gray scale strategy, gray scale white list verification is sequentially carried out on the gray scale strategies, and when the gray scale white list verification of all the gray scale strategies passes, transaction data is executed in a gray scale environment, multiple verification algorithms can be provided, the accuracy of the gray scale white list verification is improved, so that the transaction data is executed in the gray scale environment, and the stability and reliability of new functions or codes are improved.
In one exemplary embodiment, where the current communication mode is remote communication, the context information includes caller information of the upstream application; in the case that the current communication mode is text communication, the context information includes the packet Wen Yuan data and the packet additional information.
The context information includes caller information of an upstream application in the case that the current communication mode is remote communication, and includes report Wen Yuan data and additional information of a report including a request header, a message header, a digital envelope in an xml message, a digital envelope certificate address, and the like in the case that the current communication mode is text communication, wherein the remote communication may be Remote Procedure Call, RPC communication, the text communication may be HyperText Transfer Protocol, and HTTP communication.
In this embodiment, the context information includes the caller information of the upstream application in the case that the current communication mode is remote communication, and the context information includes the report Wen Yuan data and the additional message information in the case that the current communication mode is text communication, so that data support in the communication process can be provided, and validity of the transaction parameters is ensured.
In an exemplary embodiment, the gray scale resource configuration condition is that the corresponding gray scale resource definition table is queried locally according to the service keyword and the extension keyword.
And if the corresponding gray resource definition table is not queried locally, the gray environment can be executed, and if the corresponding gray resource definition table is not queried locally, the gray environment is executed, wherein the service key is an interface name, the expansion key is a production version number, the service key is a transaction code, and the expansion key is a transaction type.
In this embodiment, by setting the gray scale resource configuration condition to locally query the corresponding gray scale resource definition table according to the service keyword and the extension keyword, the configuration resource necessary for the gray scale environment can be provided, so as to ensure that the transaction data is executed in the gray scale environment.
In one exemplary embodiment, the step of verifying the gray scale resource definition table includes: extracting gray resource fields from a gray resource definition table; under the condition that the gray resource field meets the data structure requirement condition, determining that the verification of the gray resource definition table passes; and under the condition that the gray scale resource field does not meet the data structure requirement condition, determining that the gray scale resource definition table fails verification.
And extracting a gray resource field from the gray resource definition table according to a field extractor defined in the gray resource definition table, if the data format of the gray resource field meets the requirement, considering that the gray resource field meets the data structure requirement, determining that the gray resource definition table passes verification, and if the data format of the gray resource field does not meet the requirement, considering that the gray resource field does not meet the data structure requirement, determining that the gray resource definition table does not pass verification, wherein the data format can be map, pojo, string, xml and other message formats.
In this embodiment, by extracting the gray resource field from the gray resource definition table, determining that the gray resource definition table passes verification when the gray resource field meets the data structure requirement condition, and determining that the gray resource definition table does not pass verification when the gray resource field does not meet the data structure requirement condition, the field extracted from the gray resource definition table can be ensured to conform to the expected data structure, and the consistency and accuracy of the data can be improved.
In an exemplary embodiment, the step of sequentially performing gray-white list verification on the gray policy includes: for each gray scale strategy, under the condition that a gray scale white list record corresponding to the gray scale strategy exists in a gray scale white list, a matching algorithm corresponding to a gray scale resource field of the gray scale strategy is obtained; extracting a message field from a message of transaction data, and matching the message field with a target field in a gray white list according to a matching algorithm under the condition that the message field is a non-null field; under the condition that the message field is successfully matched with the target field, determining that the gray white list verification of the gray strategy is passed; and under the condition that the matching of the message field and the target field is unsuccessful, determining that the gray white list verification of the gray strategy is not passed.
The method comprises the steps of inquiring policy records in a gray-scale white list according to gray-scale policy fields defined in a gray-scale resource definition table aiming at a current gray-scale policy, and acquiring a matching algorithm corresponding to the current gray-scale resource fields according to the policy records under the condition that the gray-scale white list records (i.e. the policy records) corresponding to the gray-scale policy exist in the gray-scale white list, wherein the matching algorithm can comprise precise matching, prefix matching, suffix matching, regular matching, hash matching and the like. Further, the policy record further comprises a field extraction expression field corresponding to the current gray level policy, a message field is extracted from the message of the transaction data according to the field extraction expression field, under the condition that the message field is a non-null field, the message field is matched with a target field in a gray level white list according to a matching algorithm corresponding to the current gray level policy, if the message field is successfully matched with the target field, the gray level white list verification of the gray level policy is determined to pass, if the message field is unsuccessfully matched with the target field, the gray level white list verification of the gray level policy is determined to not pass, the matching verification of the next gray level policy is performed until the gray level white lists of all the gray level policies pass, and the transaction data is executed in a gray level environment.
In this embodiment, by obtaining a matching algorithm corresponding to a gray resource field of a gray policy when a gray white list record corresponding to the gray policy exists in a gray white list for each gray policy, extracting a message field from a message of transaction data, matching a message field with a target field in the gray white list according to the matching algorithm when the message field is a non-null field, determining that gray white verification of the gray policy passes when the message field is successfully matched with the target field, determining that gray white verification of the gray policy does not pass when the message field is not successfully matched with the target field, and accurately matching the message field with the target field in the gray white list to realize accurate control of the gray policy, so that only the transaction data conforming to the conditions can pass verification, thereby improving accuracy of gray white verification.
In an exemplary embodiment, the method further comprises: and executing transaction data in a non-gray scale environment under the condition that the gray scale function main switch is in an off state, a corresponding gray scale resource definition table is not queried locally, or a gray scale white list record corresponding to a gray scale strategy does not exist in the gray scale white list.
When the gray function main switch is in an off state, the gray function main switch indicates that the execution of the gray environment is not needed, when the corresponding gray resource definition table is not queried locally, the local configuration does not support the execution of the gray environment, when the gray white list record corresponding to the gray strategy does not exist in the gray white list, the gray strategy verification is indicated not to pass, and the transaction data is directly executed in the non-gray environment.
In this embodiment, when the main switch of the gray function is in the off state, the corresponding gray resource definition table is not queried locally, or the gray white list record corresponding to the gray policy does not exist in the gray white list table, the transaction data is executed in the non-gray environment, so that a stable execution environment can be provided, and the reliability of transaction data processing is improved.
In an exemplary embodiment, as shown in fig. 3, there is provided a gray scale verification method of data, the method comprising the steps of:
S302: transaction parameters are obtained, and the transaction parameters comprise business keywords, extension keywords, transaction data and context information.
Wherein, the context information includes caller information of the upstream application in case that the current communication mode is remote communication; in the case that the current communication mode is text communication, the context information includes the packet Wen Yuan data and the packet additional information.
S304: under the condition that the gray function main switch is in an on state and the gray resource configuration condition is met, a gray resource definition table is locally acquired, and a gray resource field is extracted from the gray resource definition table; under the condition that the gray resource field meets the data structure requirement condition, determining that the verification of the gray resource definition table passes; and under the condition that the gray scale resource field does not meet the data structure requirement condition, determining that the gray scale resource definition table fails verification.
The gray scale resource configuration condition is that a corresponding gray scale resource definition table is queried locally according to the service keywords and the expansion keywords.
S306: and splitting the gray scale resource definition table to obtain at least one gray scale strategy under the condition that the verification of the gray scale resource definition table is passed.
S308: for each gray scale strategy, under the condition that a gray scale white list record corresponding to the gray scale strategy exists in a gray scale white list, a matching algorithm corresponding to a gray scale resource field of the gray scale strategy is obtained; extracting a message field from a message of transaction data, and matching the message field with a target field in a gray white list according to a matching algorithm under the condition that the message field is a non-null field; under the condition that the message field is successfully matched with the target field, determining that the gray white list verification of the gray strategy is passed; and under the condition that the matching of the message field and the target field is unsuccessful, determining that the gray white list verification of the gray strategy is not passed.
S310: in the case that the gray whitelist verification of all gray policies is passed, the transaction data is performed in a gray environment.
S312: and executing transaction data in a non-gray scale environment under the condition that the gray scale function main switch is in an off state, a corresponding gray scale resource definition table is not queried locally, or a gray scale white list record corresponding to a gray scale strategy does not exist in the gray scale white list.
In this embodiment, by acquiring the transaction parameters, when the main switch of the gray function is in an on state and meets the gray resource configuration condition, the gray resource definition table is acquired locally, and verified, when the gray resource definition table passes the verification, the gray resource definition table is split to obtain at least one gray policy, and the gray policies are sequentially verified, and when the gray whitelists of all the gray policies pass the verification, transaction data is executed in the gray environment, so that various verification algorithms can be provided, the accuracy of the gray whitelist verification is improved, and thus the transaction data is executed in the gray environment, and the stability and reliability of the new function or code are improved.
It should be understood that, although the steps in the flowcharts related to the above embodiments are sequentially shown as indicated by arrows, these steps are not necessarily sequentially performed in the order indicated by the arrows. The steps are not strictly limited to the order of execution unless explicitly recited herein, and the steps may be executed in other orders. Moreover, at least some of the steps in the flowcharts described in the above embodiments may include a plurality of steps or a plurality of stages, which are not necessarily performed at the same time, but may be performed at different times, and the order of the steps or stages is not necessarily performed sequentially, but may be performed alternately or alternately with at least some of the other steps or stages.
Based on the same inventive concept, the embodiment of the application also provides a data gray scale verification device for realizing the data gray scale verification method. The implementation of the solution provided by the device is similar to the implementation described in the above method, so the specific limitation in the embodiments of the gray scale verification device for one or more data provided below may refer to the limitation of the gray scale verification method for data hereinabove, and will not be described herein.
In an exemplary embodiment, as shown in fig. 4, there is provided a data gray scale verification apparatus including: a data acquisition module 10, a definition table verification module 20, a definition table splitting module 30, and a gray verification module 40, wherein:
The data acquisition module 10 is configured to acquire transaction parameters, where the transaction parameters include a service keyword, an extension keyword, transaction data, and context information.
The definition table verification module 20 is configured to obtain the gray scale resource definition table from the local and verify the gray scale resource definition table when the gray scale function main switch is in an on state and the gray scale resource configuration condition is satisfied.
The definition table splitting module 30 is configured to split the gray resource definition table to obtain at least one gray policy if the verification of the gray resource definition table is passed.
The gray verification module 40 is configured to sequentially perform gray whitelist verification on the gray policies, and execute transaction data in a gray environment when the gray whitelist verification of all the gray policies passes.
In an exemplary embodiment, the context information includes caller information of the upstream application in the case where the current communication mode is remote communication, which is referred to by the data acquisition module 10; in the case that the current communication mode is text communication, the context information includes the packet Wen Yuan data and the packet additional information.
In an exemplary embodiment, the gray scale resource configuration condition referred to by definition table verification module 20 is that the corresponding gray scale resource definition table is queried locally according to the service key and the extension key.
In an exemplary embodiment, definition table verification module 20 is further configured to extract gray resource fields from a gray resource definition table; under the condition that the gray resource field meets the data structure requirement condition, determining that the verification of the gray resource definition table passes; and under the condition that the gray scale resource field does not meet the data structure requirement condition, determining that the gray scale resource definition table fails verification.
In an exemplary embodiment, the gray verification module 40 is further configured to obtain, for each gray policy, a matching algorithm corresponding to a gray resource field of the gray policy in a case where there is a gray white list record corresponding to the gray policy in the gray white list; extracting a message field from a message of transaction data, and matching the message field with a target field in a gray white list according to a matching algorithm under the condition that the message field is a non-null field; under the condition that the message field is successfully matched with the target field, determining that the gray white list verification of the gray strategy is passed; and under the condition that the matching of the message field and the target field is unsuccessful, determining that the gray white list verification of the gray strategy is not passed.
In an exemplary embodiment, the gray verification module 40 is further configured to execute the transaction data in a non-gray environment in the event that the gray function master switch is in an off state, no corresponding gray resource definition table is queried locally, or no gray whitelist record corresponding to the gray policy exists in the gray whitelist list.
The respective modules in the gradation verification apparatus of the data described above may be implemented in whole or in part by software, hardware, and a combination thereof. The above modules may be embedded in hardware or may be independent of a processor in the computer device, or may be stored in software in a memory in the computer device, so that the processor may call and execute operations corresponding to the above modules.
In one exemplary embodiment, a computer device is provided, which may be a terminal, and an internal structure diagram thereof may be as shown in fig. 5. The computer device includes a processor, a memory, an input/output interface, a communication interface, a display unit, and an input means. The processor, the memory and the input/output interface are connected through a system bus, and the communication interface, the display unit and the input device are connected to the system bus through the input/output interface. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device includes a non-volatile storage medium and an internal memory. The non-volatile storage medium stores an operating system and a computer program. The internal memory provides an environment for the operation of the operating system and computer programs in the non-volatile storage media. The input/output interface of the computer device is used to exchange information between the processor and the external device. The communication interface of the computer device is used for carrying out wired or wireless communication with an external terminal, and the wireless mode can be realized through WIFI, a mobile cellular network, NFC (near field communication) or other technologies. The computer program, when executed by a processor, implements a method of gray scale verification of data. The display unit of the computer device is used for forming a visual picture, and can be a display screen, a projection device or a virtual reality imaging device. The display screen can be a liquid crystal display screen or an electronic ink display screen, and the input device of the computer equipment can be a touch layer covered on the display screen, can also be a key, a track ball or a touch pad arranged on the shell of the computer equipment, and can also be an external keyboard, a touch pad or a mouse and the like.
It will be appreciated by those skilled in the art that the structure shown in FIG. 5 is merely a block diagram of some of the structures associated with the present inventive arrangements and is not limiting of the computer device to which the present inventive arrangements may be applied, and that a particular computer device may include more or fewer components than shown, or may combine some of the components, or have a different arrangement of components.
In one exemplary embodiment, a computer device is provided comprising a memory and a processor, the memory having stored therein a computer program, the processor when executing the computer program performing the steps of: acquiring transaction parameters, wherein the transaction parameters comprise business keywords, expansion keywords, transaction data and context information; under the condition that the gray function main switch is in an on state and the gray resource configuration condition is met, a gray resource definition table is obtained locally, and verification is carried out on the gray resource definition table; splitting the gray scale resource definition table to obtain at least one gray scale strategy under the condition that the verification of the gray scale resource definition table is passed; and carrying out gray white list verification on the gray strategies in sequence, and executing transaction data in a gray environment under the condition that the gray white list verification of all the gray strategies passes.
In one embodiment, the context information includes caller information of the upstream application in the case where the current communication mode involved in executing the computer program is remote communication; in the case that the current communication mode is text communication, the context information includes the packet Wen Yuan data and the packet additional information.
In one embodiment, the gray scale resource configuration condition involved in executing the computer program by the processor is that the corresponding gray scale resource definition table is queried locally according to the service key and the expansion key.
In one embodiment, validating the gray resource definition table involved in executing the computer program by the processor comprises: extracting gray resource fields from a gray resource definition table; under the condition that the gray resource field meets the data structure requirement condition, determining that the verification of the gray resource definition table passes; and under the condition that the gray scale resource field does not meet the data structure requirement condition, determining that the gray scale resource definition table fails verification.
In one embodiment, the sequential gray whitelist verification of gray scale policies involved in executing a computer program by a processor comprises: for each gray scale strategy, under the condition that a gray scale white list record corresponding to the gray scale strategy exists in a gray scale white list, a matching algorithm corresponding to a gray scale resource field of the gray scale strategy is obtained; extracting a message field from a message of transaction data, and matching the message field with a target field in a gray white list according to a matching algorithm under the condition that the message field is a non-null field; under the condition that the message field is successfully matched with the target field, determining that the gray white list verification of the gray strategy is passed; and under the condition that the matching of the message field and the target field is unsuccessful, determining that the gray white list verification of the gray strategy is not passed.
In one embodiment, the processor when executing the computer program further performs the steps of: and executing transaction data in a non-gray scale environment under the condition that the gray scale function main switch is in an off state, a corresponding gray scale resource definition table is not queried locally, or a gray scale white list record corresponding to a gray scale strategy does not exist in the gray scale white list.
In one embodiment, a computer readable storage medium is provided having a computer program stored thereon, which when executed by a processor, performs the steps of: acquiring transaction parameters, wherein the transaction parameters comprise business keywords, expansion keywords, transaction data and context information; under the condition that the gray function main switch is in an on state and the gray resource configuration condition is met, a gray resource definition table is obtained locally, and verification is carried out on the gray resource definition table; splitting the gray scale resource definition table to obtain at least one gray scale strategy under the condition that the verification of the gray scale resource definition table is passed; and carrying out gray white list verification on the gray strategies in sequence, and executing transaction data in a gray environment under the condition that the gray white list verification of all the gray strategies passes.
In one embodiment, the context information includes caller information of the upstream application in the case where the current communication mode involved when the computer program is executed by the processor is remote communication; in the case that the current communication mode is text communication, the context information includes the packet Wen Yuan data and the packet additional information.
In one embodiment, the gray scale resource configuration condition involved in the execution of the computer program by the processor is to locally query the corresponding gray scale resource definition table according to the service key and the extension key.
In one embodiment, validating the gray resource definition table involved in execution of the computer program by the processor includes: extracting gray resource fields from a gray resource definition table; under the condition that the gray resource field meets the data structure requirement condition, determining that the verification of the gray resource definition table passes; and under the condition that the gray scale resource field does not meet the data structure requirement condition, determining that the gray scale resource definition table fails verification.
In one embodiment, the sequential gray whitelist verification of gray scale policies involved in the execution of a computer program by a processor comprises: for each gray scale strategy, under the condition that a gray scale white list record corresponding to the gray scale strategy exists in a gray scale white list, a matching algorithm corresponding to a gray scale resource field of the gray scale strategy is obtained; extracting a message field from a message of transaction data, and matching the message field with a target field in a gray white list according to a matching algorithm under the condition that the message field is a non-null field; under the condition that the message field is successfully matched with the target field, determining that the gray white list verification of the gray strategy is passed; and under the condition that the matching of the message field and the target field is unsuccessful, determining that the gray white list verification of the gray strategy is not passed.
In one embodiment, the computer program when executed by the processor further performs the steps of: and executing transaction data in a non-gray scale environment under the condition that the gray scale function main switch is in an off state, a corresponding gray scale resource definition table is not queried locally, or a gray scale white list record corresponding to a gray scale strategy does not exist in the gray scale white list.
In one embodiment, a computer program product is provided comprising a computer program which, when executed by a processor, performs the steps of: acquiring transaction parameters, wherein the transaction parameters comprise business keywords, expansion keywords, transaction data and context information; under the condition that the gray function main switch is in an on state and the gray resource configuration condition is met, a gray resource definition table is obtained locally, and verification is carried out on the gray resource definition table; splitting the gray scale resource definition table to obtain at least one gray scale strategy under the condition that the verification of the gray scale resource definition table is passed; and carrying out gray white list verification on the gray strategies in sequence, and executing transaction data in a gray environment under the condition that the gray white list verification of all the gray strategies passes.
In one embodiment, the context information includes caller information of the upstream application in the case where the current communication mode involved when the computer program is executed by the processor is remote communication; in the case that the current communication mode is text communication, the context information includes the packet Wen Yuan data and the packet additional information.
In one embodiment, the gray scale resource configuration condition involved in the execution of the computer program by the processor is to locally query the corresponding gray scale resource definition table according to the service key and the extension key.
In one embodiment, validating the gray resource definition table involved in execution of the computer program by the processor includes: extracting gray resource fields from a gray resource definition table; under the condition that the gray resource field meets the data structure requirement condition, determining that the verification of the gray resource definition table passes; and under the condition that the gray scale resource field does not meet the data structure requirement condition, determining that the gray scale resource definition table fails verification.
In one embodiment, the sequential gray whitelist verification of gray scale policies involved in the execution of a computer program by a processor comprises: for each gray scale strategy, under the condition that a gray scale white list record corresponding to the gray scale strategy exists in a gray scale white list, a matching algorithm corresponding to a gray scale resource field of the gray scale strategy is obtained; extracting a message field from a message of transaction data, and matching the message field with a target field in a gray white list according to a matching algorithm under the condition that the message field is a non-null field; under the condition that the message field is successfully matched with the target field, determining that the gray white list verification of the gray strategy is passed; and under the condition that the matching of the message field and the target field is unsuccessful, determining that the gray white list verification of the gray strategy is not passed.
In one embodiment, the computer program when executed by the processor further performs the steps of: and executing transaction data in a non-gray scale environment under the condition that the gray scale function main switch is in an off state, a corresponding gray scale resource definition table is not queried locally, or a gray scale white list record corresponding to a gray scale strategy does not exist in the gray scale white list.
Those skilled in the art will appreciate that implementing all or part of the above described methods may be accomplished by way of a computer program stored on a non-transitory computer readable storage medium, which when executed, may comprise the steps of the embodiments of the methods described above. Any reference to memory, database, or other medium used in embodiments provided herein may include at least one of non-volatile and volatile memory. The nonvolatile Memory may include Read-Only Memory (ROM), magnetic tape, floppy disk, flash Memory, optical Memory, high density embedded nonvolatile Memory, resistive random access Memory (ReRAM), magneto-resistive random access Memory (Magnetoresistive Random Access Memory, MRAM), ferroelectric Memory (Ferroelectric Random Access Memory, FRAM), phase change Memory (PHASE CHANGE Memory, PCM), graphene Memory, and the like. Volatile memory can include random access memory (Random Access Memory, RAM) or external cache memory, and the like. By way of illustration, and not limitation, RAM can be in various forms such as static random access memory (Static Random Access Memory, SRAM) or dynamic random access memory (Dynamic Random Access Memory, DRAM), etc. The databases referred to in the embodiments provided herein may include at least one of a relational database and a non-relational database. The non-relational database may include, but is not limited to, a blockchain-based distributed database, and the like. The processor referred to in the embodiments provided in the present application may be a general-purpose processor, a central processing unit, a graphics processor, a digital signal processor, a programmable logic unit, a data processing logic unit based on quantum computing, or the like, but is not limited thereto.
The technical features of the above embodiments may be arbitrarily combined, and all possible combinations of the technical features in the above embodiments are not described for brevity of description, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the description.
The foregoing examples illustrate only a few embodiments of the application and are described in detail herein without thereby limiting the scope of the application. It should be noted that it will be apparent to those skilled in the art that several variations and modifications can be made without departing from the spirit of the application, which are all within the scope of the application. Accordingly, the scope of the application should be assessed as that of the appended claims.
Claims (10)
1. A method for gray scale verification of data, the method comprising:
Acquiring transaction parameters, wherein the transaction parameters comprise business keywords, expansion keywords, transaction data and context information;
Under the condition that a gray function main switch is in an on state and a gray resource configuration condition is met, a gray resource definition table is obtained locally, and verification is carried out on the gray resource definition table;
splitting the gray scale resource definition table to obtain at least one gray scale strategy under the condition that the verification of the gray scale resource definition table is passed;
And sequentially carrying out gray-scale white list verification on the gray-scale strategies, and executing the transaction data in a gray-scale environment under the condition that the gray-scale white list verification of all the gray-scale strategies passes.
2. The method according to claim 1, wherein the context information comprises caller information of an upstream application in case the current communication mode is remote communication; in the case that the current communication mode is text communication, the context information includes the packet Wen Yuan data and the packet additional information.
3. The method of claim 1, wherein the gray scale resource configuration condition is that a corresponding gray scale resource definition table is locally queried according to the service key and the extension key.
4. The method of claim 1, wherein validating the gray resource definition table comprises:
extracting gray resource fields from the gray resource definition table;
Under the condition that the gray resource field meets the data structure requirement condition, determining that the gray resource definition table passes verification;
and under the condition that the gray scale resource field does not meet the requirement condition of the data structure, determining that the gray scale resource definition table fails verification.
5. The method of claim 4, wherein the sequentially performing gray whitelist verification on the gray scale policies comprises:
For each gray scale strategy, under the condition that a gray scale white list record corresponding to the gray scale strategy exists in a gray scale white list, a matching algorithm corresponding to a gray scale resource field of the gray scale strategy is obtained;
Extracting a message field from the message of the transaction data, and matching the message field with a target field in the gray-scale white list according to the matching algorithm under the condition that the message field is a non-null field;
Under the condition that the message field is successfully matched with the target field, determining that the gray white list verification of the gray strategy is passed;
and under the condition that the matching of the message field and the target field is unsuccessful, determining that the gray-scale white list verification of the gray-scale strategy is not passed.
6. The method according to any one of claims 1 to 5, further comprising:
And executing the transaction data in a non-gray scale environment under the condition that the gray scale function main switch is in an off state, a corresponding gray scale resource definition table is not queried locally, or a gray scale white list record corresponding to the gray scale strategy does not exist in the gray scale white list.
7. A device for gray scale verification of data, said device comprising:
the data acquisition module is used for acquiring transaction parameters, wherein the transaction parameters comprise business keywords, expansion keywords, transaction data and context information;
the definition table verification module is used for locally acquiring a gray resource definition table and verifying the gray resource definition table under the condition that the gray function main switch is in an on state and the gray resource configuration condition is met;
The definition table splitting module is used for splitting the gray resource definition table to obtain at least one gray strategy under the condition that the verification of the gray resource definition table is passed;
and the gray verification module is used for sequentially carrying out gray white list verification on the gray policies, and executing the transaction data in a gray environment under the condition that the gray white list verification of all the gray policies passes.
8. A computer device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the method of any of claims 1 to 6 when the computer program is executed.
9. A computer readable storage medium, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
10. A computer program product comprising a computer program, characterized in that the computer program, when being executed by a processor, implements the steps of the method of any of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410282980.2A CN118096171A (en) | 2024-03-13 | 2024-03-13 | Data gray level verification method, device, computer equipment, medium and product |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202410282980.2A CN118096171A (en) | 2024-03-13 | 2024-03-13 | Data gray level verification method, device, computer equipment, medium and product |
Publications (1)
Publication Number | Publication Date |
---|---|
CN118096171A true CN118096171A (en) | 2024-05-28 |
Family
ID=91163195
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202410282980.2A Pending CN118096171A (en) | 2024-03-13 | 2024-03-13 | Data gray level verification method, device, computer equipment, medium and product |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN118096171A (en) |
-
2024
- 2024-03-13 CN CN202410282980.2A patent/CN118096171A/en active Pending
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11360966B2 (en) | Information processing system and method of controlling information processing system | |
CN112783866B (en) | Data reading method, device, computer equipment and storage medium | |
CN114089921A (en) | Power system data storage method and device, computer equipment and storage medium | |
CN112286457B (en) | Object deduplication method and device, electronic equipment and machine-readable storage medium | |
CN111464319B (en) | Transaction storage and signature verification method based on centralized block chain type account book | |
CN117331956A (en) | Task processing method, device, computer equipment and storage medium | |
CN116303657A (en) | Group image generation method, group image generation device, computer device, and storage medium | |
CN118096171A (en) | Data gray level verification method, device, computer equipment, medium and product | |
CN110147531B (en) | Method, device and storage medium for identifying similar text content | |
CN116910115A (en) | Group query method, device, computer equipment and storage medium | |
CN116886604A (en) | Information routing method, device and computer equipment | |
CN118283099A (en) | Micro-service verification method, apparatus, device, storage medium and program product | |
CN116701184A (en) | Socket compatibility testing method and device, computer equipment and storage medium | |
CN118400433A (en) | Message processing method, device, computer equipment, readable storage medium and product | |
CN118606981A (en) | Data processing method and device for data access interface and computer equipment | |
CN118519866A (en) | Data processing performance determining method, device, computer equipment and storage medium | |
CN118193396A (en) | Test method, test apparatus, computer device, storage medium, and program product | |
CN117539866A (en) | Constant value checking method and device for valve cooling control system and computer equipment | |
CN118550886A (en) | Dynamic configuration method, device, computer equipment and medium of credential information | |
CN116662263A (en) | Data receiving and processing method and device and computer equipment | |
CN118606582A (en) | Abnormal link synchronization method, apparatus, computer device, readable storage medium, and program product | |
CN118449853A (en) | Access data processing method, device, computer equipment and readable storage medium | |
CN117194036A (en) | Contract information processing method and device and computer equipment | |
CN117236298A (en) | Report data generation method, report data generation device, computer equipment, report data generation medium and program product | |
CN117076498A (en) | Service data management method, device, computer equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |