WO2021036681A1 - 数据验证方法、装置、计算机设备和存储介质 - Google Patents

数据验证方法、装置、计算机设备和存储介质 Download PDF

Info

Publication number
WO2021036681A1
WO2021036681A1 PCT/CN2020/106175 CN2020106175W WO2021036681A1 WO 2021036681 A1 WO2021036681 A1 WO 2021036681A1 CN 2020106175 W CN2020106175 W CN 2020106175W WO 2021036681 A1 WO2021036681 A1 WO 2021036681A1
Authority
WO
WIPO (PCT)
Prior art keywords
node
verification
data
node data
target
Prior art date
Application number
PCT/CN2020/106175
Other languages
English (en)
French (fr)
Inventor
刘芳
吕小立
刘丽珍
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2021036681A1 publication Critical patent/WO2021036681A1/zh

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification

Definitions

  • This application relates to the field of computer technology, in particular to a data verification method, device, computer equipment, and storage medium method, device, computer equipment, and storage medium.
  • the node data in the transaction business will continue to change with the transaction business, and one transaction business can correspond to multiple node data.
  • the data of a certain node in the transaction business changes, the data of other nodes corresponding to the transaction business will also change.
  • the computer device can perform data verification on the change of node data according to the set data change rule to ensure that the data change of each node is correct.
  • a data verification method, device, computer equipment, and storage medium are provided.
  • a data verification method includes:
  • the node with the data change is identified as the target node, and the node data corresponding to the target node is identified as the target node data;
  • the verification node corresponding to the target node, where the verification node is other nodes whose node data in the business model changes as the target node data changes;
  • the reference node data is obtained according to the preset data change relationship between the target node and the verification node;
  • the verification node data corresponding to the verification node is verified according to the reference node data, and the verification result is obtained.
  • a data verification device includes:
  • the target node data acquisition module is used to identify the node with the data change as the target node when it is detected that the node data corresponding to the node in the business model changes, and the node data corresponding to the target node is recognized as the target node data;
  • the verification node obtaining module is used to obtain the verification node corresponding to the target node, where the verification node is other nodes whose node data in the business model changes as the target node data changes;
  • the reference node data obtaining module is used to obtain the reference node data corresponding to the target node data, the reference node data is obtained according to the preset data change relationship between the target node and the verification node;
  • the data verification module is used to verify the verification node data according to the reference node data to obtain the verification result.
  • a computer device includes a memory and one or more processors.
  • the memory stores computer-readable instructions.
  • the one or more processors perform the following steps:
  • the node with the data change is identified as the target node, and the node data corresponding to the target node is identified as the target node data;
  • the verification node corresponding to the target node, where the verification node is other nodes whose node data in the business model changes as the target node data changes;
  • the reference node data is obtained according to the preset data change relationship between the target node and the verification node;
  • the verification node data corresponding to the verification node is verified according to the reference node data, and the verification result is obtained.
  • One or more computer-readable storage media storing computer-readable instructions.
  • the one or more processors perform the following steps:
  • the node with the data change is identified as the target node, and the node data corresponding to the target node is identified as the target node data;
  • the verification node corresponding to the target node, where the verification node is other nodes whose node data in the business model changes as the target node data changes;
  • the reference node data is obtained according to the preset data change relationship between the target node and the verification node;
  • the verification node data corresponding to the verification node is verified according to the reference node data, and the verification result is obtained.
  • the computer equipment can directly obtain the reference node data corresponding to the target node data, which improves the acquisition of the reference node Data efficiency; since the obtained verification nodes are other nodes whose node data changes with the data of the target node, the computer equipment does not need to check the nodes in the business model one by one to determine whether there are nodes with node data changes. It is necessary to identify the target node to find the verification node corresponding to the target node data, thereby verifying the verification node data corresponding to the verification node, and improving the efficiency of data verification.
  • Fig. 1 is an application scenario diagram of a data verification method according to one or more embodiments
  • FIG. 2 is a schematic flowchart of a data verification method according to one or more embodiments
  • Fig. 3 is a schematic diagram of a process of obtaining a verification node according to one or more embodiments
  • Figure 4 is a block diagram of a data verification device according to one or more embodiments.
  • Figure 5 is a block diagram of a computer device according to one or more embodiments.
  • the XXX method provided in this application can be applied to the application environment as shown in FIG. 1.
  • the application environment includes computer equipment 110.
  • the computer device 110 may identify the node whose data has changed as the target node, and identify the node data corresponding to the target node as the target node data.
  • the computer device 110 may obtain the verification node corresponding to the target node, where the verification node is other nodes whose node data in the business model changes as the target node data changes.
  • the computer device 110 may obtain reference node data corresponding to the target node data, and the reference node data is obtained according to a preset data change relationship between the target node and the verification node.
  • the computer device 110 may verify the verification node data corresponding to the verification node according to the reference node data, and obtain the verification result.
  • the computer device 110 may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers and other devices.
  • a data verification method is provided, and a data verification method is provided, which can be applied in the process of data configuration, including the following steps:
  • Step 202 When it is detected that the node data corresponding to the node in the business model has changed, the node with the data change is identified as the target node, and the node data corresponding to the target node is identified as the target node data.
  • the business model can be pre-established and used to record information such as each node involved in the business process, the node data corresponding to each node, and the context between each node.
  • the nodes involved in the business process are total inventory, surplus inventory, active inventory, and sales volume.
  • the node data corresponding to each node is total inventory 100 pieces and surplus Inventory 50 pieces, active inventory 200 pieces, and sales volume 500 pieces.
  • the relationship between each node can be that the total inventory ranks first; the remaining inventory is connected to the total inventory and the active inventory and ranks second; the active inventory is respectively Connected with remaining inventory and sales volume, it is ranked third; sales volume is ranked last, and the business model can record information related to the business process corresponding to the inventory.
  • the target node data is used to indicate the changed node data, and there can be one or more target node data.
  • the target node can be used to indicate the node corresponding to the changed node data.
  • the node data corresponding to a certain node in the business model changes, the node data corresponding to other nodes in the business model can change with the change of the node data. Specifically, the node data corresponding to other nodes in the business model can be changed according to the configured data change relationship.
  • the computer equipment can detect the node data corresponding to each node included in the business model through the data detection tool. Specifically, the computer device can obtain the node data currently corresponding to each node in real time, and compare the obtained current node data with the node data obtained at the previous time to obtain the comparison result.
  • the computer device can detect that the node data corresponding to the node has changed.
  • the computer device can use the changed node data as the target node data.
  • the computer device can use each node data that has changed as the target node data.
  • the computer device can find the node corresponding to the target node data, and use the node as the target node.
  • Step 204 Obtain a verification node corresponding to the target node, where the verification node is other nodes whose node data in the business model changes as the target node data changes.
  • the verification node There is a data association between the verification node and the target node.
  • the target node data in the target node changes, the node data in the verification node corresponding to the target node also changes.
  • the business model contains each node and the node data corresponding to each node.
  • the node data in a node changes, the node data of other nodes may change accordingly, or the node data of other nodes may not occur. Variety.
  • the computer device can find the verification node corresponding to the target node according to the changed other node data.
  • each node included in the business model is total inventory, active inventory, and sales.
  • the node data corresponding to each node is 100 pieces of total inventory, 200 pieces of active inventory, and 500 pieces of sales.
  • the active inventory will be reduced by 50 pieces, and the data corresponding to the sales volume will not change.
  • the corresponding data of the active inventory will change. Therefore, when the target node is the total inventory, the corresponding verification The node is the active inventory.
  • Step 206 Obtain reference node data corresponding to the target node data.
  • the reference node data is obtained according to a preset data change relationship between the target node and the verification node.
  • the computer device may store the set data change relationship between the target node and the verification node.
  • the user can set the data change relationship between the target node and the verification node through a computer device, for example, can set the data change ratio between the target node and the verification node.
  • the reference node data can be used to indicate the data after the node data corresponding to the verification node changes when the target node data corresponding to the target node changes.
  • the computer device can obtain the reference node data corresponding to the target node data from the preset data changes between the target node and the verification node according to the target node data.
  • Step 208 Verify the verification node data according to the reference node data to obtain a verification result.
  • the computer device can further obtain verification node data corresponding to the verification node.
  • the computer device can verify the verification node data according to the reference node data. Specifically, the computer device can verify the data change of the verification node and obtain the verification result.
  • the computer device can directly obtain the reference node data corresponding to the target node data, which improves the efficiency of obtaining the reference node data;
  • the verification node of is the other nodes whose node data changes with the change of the target node data.
  • the computer equipment does not need to check the nodes in the business model one by one to determine whether there are nodes with node data changes, just identify the target node.
  • the verification node corresponding to the target node data is found, and the verification node data corresponding to the verification node is verified, which improves the efficiency of data verification.
  • the provided data verification method may further include a process of obtaining reference node data, which specifically includes: obtaining a preset data change relationship between the target node and the verification node; and calculating the target node according to the data change relationship The rate of change of data; the reference node data corresponding to the target node data is obtained according to the rate of change.
  • the computer device may store preset data change relationships between different target nodes and verification nodes.
  • the computer device may sequentially use each node included in the business model as the target node, and obtain the data change relationship between each target node and the verification node.
  • the data change rate of the target node can be expressed as the data change ratio between the target node and the verification node.
  • the target node and the corresponding target node data obtained by the computer equipment increase the total inventory by 50 pieces, and the preset data change ratio between the target node and the verification node is 1:-1, which is compared with the target node and the target node data
  • the corresponding verification node and verification node data are 100 pieces of active inventory.
  • the computer equipment can obtain the reference node data corresponding to the target node data according to the data change ratio of 1:1, which reduces the active inventory by 50 pieces.
  • a data verification method provided may further include a process of verifying verification node data to obtain a verification result, which specifically includes: when the reference node data is inconsistent with the verification node data, checking the verification node data corresponding to the verification node data.
  • the verification node is marked to obtain the marked verification node; the number of nodes of the marked verification node is counted; and the verification result is obtained according to the number of nodes.
  • the computer equipment can compare the reference node data with the verification node data and obtain the comparison result.
  • the computer device can obtain the verification result that the verification node data has passed; when the comparison result obtained by the computer device is that the reference node data is inconsistent with the verification node data , The computer device can search for the verification node corresponding to the verification node data, and mark the verification node to obtain the marked verification node.
  • the computer equipment can count the number of marked verification nodes. Specifically, the computer device can count the number of nodes through a counter. The computer device marks a verification node, and the counter is incremented by one. The computer device can count the number of nodes of the marked verification node based on the data in the counter.
  • the computer device can obtain the verification result according to the number of nodes, where the verification result may include the verified result and the unqualified result.
  • the computer device can compare the counted number of marked verification nodes with the number threshold, so as to obtain the verification result according to the comparison result.
  • the quantity threshold may be a specific value set in advance. For example, the quantity threshold may be 1, 2, 5, 6, 7, 10, etc., which are not limited here. After the computer device compares the number of nodes with the number threshold, the comparison result obtained is that the number of nodes is greater than the number threshold, and the computer device can obtain the verification result that the verification is unqualified; when the obtained comparison result is that the number of nodes is not greater than the number threshold, Computer equipment can be verified qualified verification results.
  • the computer device marks the verification node corresponding to the verification node data to obtain the marked verification node, and counts the number of the marked verification node according to The number of nodes gets the verification result.
  • the computer device marks the verification node and obtains the verification result according to the number of the marked verification node, which can improve the accuracy of the obtained verification result.
  • the error rate of all nodes in the business model can be obtained according to the verification result. Specifically, the computer device can separately obtain the number of marked nodes and the number of unmarked nodes, and calculate the error rate of the nodes in the business model. When the error rate calculated by the computer equipment is greater than the preset value, the computer equipment can sequentially display the marked error nodes in the interface. The computer equipment calculates the error rate of the nodes in the business model, which is convenient for users to process the error nodes and can improve the accuracy of data verification.
  • a data verification method provided may further include a process of finding a verification node, and the specific steps include:
  • Step 302 Obtain each node in the business model, and use each node as a test node in turn.
  • the business model can contain multiple nodes, and the test node can be a node in the business model.
  • Computer equipment can obtain each node included in the business model. Taking the business process corresponding to inventory as the business model as an example, the nodes involved are total inventory, remaining inventory, active inventory, and sales volume. Computer equipment can obtain each node in the business model.
  • the computer equipment can sequentially use each acquired node as a test node. For example, when the nodes obtained by the computer equipment are total inventory, remaining inventory, active inventory, and sales volume, the computer equipment can first use the total inventory as the test node, then the remaining inventory as the test node, and then the active inventory as the test node. Then use sales as a test node.
  • Step 304 When it is detected that the node data corresponding to the test node in the business model has changed, acquire other nodes in the business model whose node data has changed.
  • the computer device can detect the node data corresponding to the test node, and when it detects that the node data corresponding to the test node has changed, the computer device can search for other nodes in the business model whose node data has changed. Specifically, when the node data corresponding to the test node changes, the computer device can detect the node data corresponding to each node in the business model, and mark the node corresponding to the changed node data, so as to obtain the occurrence in the business model. Other nodes whose node data changes. For example, the various nodes included in the business model are total inventory, active inventory, and sales volume. The computer equipment detects that the node data corresponding to the total inventory has changed.
  • the computer equipment can check the node data corresponding to the active inventory and the node data corresponding to the sales volume. Through detection, it is obtained that the node data corresponding to the active inventory has changed, and the node data corresponding to the sales volume has also changed. The computer equipment can obtain the active inventory and sales volume of the node data that have changed.
  • Step 306 Use other nodes in the business model whose node data has changed as verification nodes corresponding to the test node.
  • the verification node is used to represent other nodes whose node data in the business model changes when the target node data changes.
  • the computer equipment obtains the node data corresponding to the test node changes, after other nodes in the business model whose node data changes, because the node data corresponding to other nodes obtained is based on the change of the node data corresponding to the test node
  • the node data corresponding to other nodes in the business model changes.
  • the computer device can use other nodes that have changed node data as verification nodes corresponding to the test node. .
  • the computer device obtains each node included in the business model, and uses each node as a test node in turn.
  • it detects that the node data corresponding to the test node in the business model changes it obtains the occurrence node in the business model.
  • For other nodes with data changes take other nodes with node data changes in the business model as verification nodes corresponding to the test node.
  • the computer equipment changes according to the node data corresponding to the test node, it searches for other nodes in the business model whose node data has changed, and uses the other nodes as verification nodes corresponding to the test node, so that the obtained verification node is the location of the test node.
  • a data verification method provided may also include a process of establishing a business model.
  • the computer equipment can store a pre-established business model.
  • the computer equipment can obtain each node input by the user.
  • the computer equipment can obtain the priority of each input node respectively, and then sort the nodes according to the priority of each node, thereby Get the business model.
  • the computer device can store the corresponding relationship between each node and the priority.
  • the computer device can find the corresponding relationship of each node according to the stored corresponding relationship between each node and priority. Priority, thus sorting each node.
  • the computer equipment can edit the established business model according to the model editing instructions. Specifically, when the computer device detects the model editing instruction, the computer device can extract the model identifier in the model editing instruction, where the model identifier is used to distinguish different business models. The computer device can find the corresponding business model according to the model identifier, so as to edit the found business model.
  • the model editing instruction may also contain specific nodes, which are used by the computer equipment to edit the nodes. For example, the computer device finds that the business model corresponding to the model identifier is the A business model according to the model editing instruction. Then, the computer device can extract the node in the model editing instruction as the total inventory.
  • the editing instruction is to increase, and the computer device can be in the A business model Add a node of total inventory to complete the editing of the business model.
  • the computer equipment edits the business model according to the model editing instructions, and then verifies the nodes in turn according to the sequence of each node in the edited business model, which improves the efficiency of verification.
  • a data verification method provided may also include a process of editing a test node.
  • the specific process includes: obtaining an editing instruction, where the editing instruction includes a test node identifier, and the test node identifier is used to distinguish Different test nodes; find the test node corresponding to the test node identifier, and use the test node corresponding to the test node identifier as the target test node; establish the correspondence between the target test node and other nodes in the business model according to the editing instructions.
  • the computer equipment can edit the verification node corresponding to the test node.
  • the computer device may obtain the editing instruction, where the editing instruction may be generated by the user operating the computer device.
  • the user can trigger the touch display screen in the computer device to make the computer device generate editing instructions; the user can also trigger the buttons in the computer device to generate editing instructions, etc., which is not limited here.
  • the edit instruction may include a test node identifier, which is used to distinguish different test nodes.
  • the computer device can extract the test node identifier in the editing instruction, and find the corresponding test node according to the test node identifier, and the computer device can use the found test node as the target test node.
  • the computer equipment can establish the correspondence between the target test node and other nodes in the business model according to the editing instructions.
  • the computer device can use other nodes in the business model as verification nodes corresponding to the target test node according to the editing instruction, that is, establish the correspondence between the target test node and other nodes in the business model.
  • the business model is the inventory business process.
  • the nodes obtained by the computer equipment are total inventory, remaining inventory, active inventory, and sales volume. Among them, the total inventory is the target test node, and the verification node corresponding to the total inventory includes active inventory and
  • the computer equipment can edit the remaining inventory node as the verification node corresponding to the total inventory according to the editing instruction.
  • the computer device obtains an editing instruction, where the editing instruction contains a test node identifier, and the test node identifier is used to distinguish different test nodes, find the test node corresponding to the test node identifier, and compare it with the test node
  • the corresponding test node is identified as the target test node, and the corresponding relationship between the target test node and the verification node is established according to the editing instruction.
  • the computer device establishes the corresponding relationship between the target test node and the verification node according to the editing instruction, which can improve the accuracy of the obtained verification node corresponding to the target test node, thereby improving the accuracy of data verification.
  • the provided data verification method may further include a process of modifying the verification node.
  • the specific process includes: obtaining a modification instruction for the verification node, wherein the modification instruction includes the modification node data; and extracting the modification. Modify the node data in the instruction, and modify the verification node data corresponding to the verification node according to the modified node data to obtain the modified verification node data; use the modified verification node data as the verification node data corresponding to the verification node.
  • the computer equipment can modify the verification node.
  • the computer device may obtain the modification instruction for the verification node, and modify the verification node data corresponding to the verification node according to the modification instruction.
  • the modification instruction may be generated by the user operating the computer device.
  • the user can trigger the touch display screen in the computer device to cause the computer device to generate a modification instruction; the user can also trigger a button in the computer device to generate a modification instruction, etc., which is not limited here.
  • the modification instruction may include modification node data, and the computer device may modify the verification node data according to the modification node data.
  • the computer device can extract the modified node data in the modification instruction, and modify the verification node data according to the modified node data.
  • the modified node data extracted by the computer device is to modify 100 pieces of node data in the total inventory of verification nodes to 200 pieces, and the computer device can modify the node data in the total inventory to 200 pieces according to the modified node data.
  • the computer device obtains the modification instruction for the verification node, where the modification instruction contains the modification node data, extracts the modification node data in the modification instruction, and verifies the verification node corresponding to the verification node according to the modification node data.
  • the node data is modified to obtain the modified verification node data, and the modified verification node data is used as the verification node data corresponding to the verification node.
  • the computer device can modify the verification node data according to the modification instruction, and can update the verification node data corresponding to the verification node in real time, thereby improving the accuracy of data verification.
  • a data verification device including: a target node data acquisition module 410, a verification node acquisition module 420, a reference node data acquisition module 430, and a data verification module 440, wherein:
  • the node data acquisition module 410 is configured to, when detecting that the node data corresponding to the node in the business model changes, identify the node with the data change as the target node, and identify the node data corresponding to the target node as the target node data.
  • the verification node obtaining module 420 is configured to obtain the verification node corresponding to the target node, where the verification node is other nodes whose node data in the business model changes as the target node data changes.
  • the reference node data obtaining module 430 is configured to obtain reference node data corresponding to the target node data, and the reference node data is obtained according to a preset data change relationship between the target node and the verification node.
  • the data verification module 440 is configured to verify the verification node data according to the reference node data to obtain a verification result.
  • the provided data verification device may further include a node data comparison module, which is used to: obtain the node data currently corresponding to each node in the business model in real time; and compare the obtained current node data with the previous time. The obtained node data is compared to detect whether the node data corresponding to the node in the business model has changed.
  • the reference node data obtaining module 430 is also used to obtain the preset data change relationship between the target node and the verification node; calculate the change rate of the target node data according to the data change relationship; The reference node data corresponding to the node data.
  • the data verification module 440 is further configured to mark the verification node corresponding to the verification node data when the reference node data is inconsistent with the verification node data, to obtain the marked verification node; and count the marked verification nodes The number of nodes; the verification result is obtained according to the number of nodes.
  • the data verification module 440 is also used to obtain a preset number threshold; compare the number of nodes with the number threshold; when the obtained comparison result is that the number of nodes is greater than the number threshold, a verification result that the verification is unqualified is obtained ; When the obtained comparison result is that the number of nodes is not greater than the number threshold, a qualified verification result is obtained.
  • the verification node acquisition module 420 is also used to acquire each node in the business model, and use each node as a test node in turn; when it is detected that the node data corresponding to the test node in the business model has changed, acquire Other nodes in the business model with node data changes; take other nodes in the business model with node data changes as verification nodes corresponding to the test node.
  • the verification node obtaining module 420 is also used to obtain an editing instruction, where the editing instruction includes a test node identifier, and the test node identifier is used to distinguish different test nodes; to find the test node corresponding to the test node identifier , And use the test node corresponding to the test node identifier as the target test node; according to the editing instruction, establish the correspondence between the target test node and other nodes in the business model.
  • the provided data verification device may further include a verification node data acquisition module for acquiring a modification instruction to the verification node, wherein the modification instruction includes the modification node data; and the modification in the modification instruction is extracted Node data, and modify the verification node data corresponding to the verification node according to the modified node data to obtain the modified verification node data; use the modified verification node data as the verification node data corresponding to the verification node.
  • a verification node data acquisition module for acquiring a modification instruction to the verification node, wherein the modification instruction includes the modification node data; and the modification in the modification instruction is extracted Node data, and modify the verification node data corresponding to the verification node according to the modified node data to obtain the modified verification node data; use the modified verification node data as the verification node data corresponding to the verification node.
  • the provided data verification device may further include a business model building module for obtaining each node input by the user; obtaining the priority of each input node respectively; and comparing each node according to the priority of each node Sort and get the business model.
  • the provided data verification device may further include a business model editing module, which is used to extract a model identifier in the model editing instruction when a model editing instruction is detected, wherein the model identifier is used to distinguish different models.
  • a business model editing module which is used to extract a model identifier in the model editing instruction when a model editing instruction is detected, wherein the model identifier is used to distinguish different models.
  • Business model find the corresponding business model according to the model identifier, and edit the found business model.
  • each module in the above verification device can be implemented in whole or in part by software, hardware, and a combination thereof.
  • the above-mentioned modules may be embedded in the form of hardware or independent of the processor in the computer equipment, or may be stored in the memory of the computer equipment in the form of software, so that the processor can call and execute the operations corresponding to the above-mentioned modules.
  • a computer device is provided.
  • the computer device may be a server, and its internal structure diagram may be as shown in FIG. 5.
  • the computer equipment includes a processor, a memory, a network interface, and a database connected through a system bus. Among them, the processor of the computer device is used to provide calculation and control capabilities.
  • the memory of the computer device includes a non-volatile or volatile storage medium and internal memory.
  • the non-volatile or volatile storage medium stores an operating system, computer readable instructions, and a database.
  • the internal memory provides an environment for the operation of the operating system and computer-readable instructions in the non-volatile storage medium.
  • the database of the computer equipment is used to store xxx data.
  • the network interface of the computer device is used to communicate with an external terminal through a network connection.
  • the computer readable instruction is executed by the processor to realize a data verification method.
  • FIG. 5 is only a block diagram of a part of the structure related to the solution of the present application, and does not constitute a limitation on the computer device to which the solution of the present application is applied.
  • the specific computer device may Including more or fewer parts than shown in the figure, or combining some parts, or having a different arrangement of parts.
  • a computer device includes a memory and one or more processors.
  • the memory stores computer-readable instructions.
  • the one or more processors perform the following steps:
  • the node with the data change is identified as the target node, and the node data corresponding to the target node is identified as the target node data;
  • the verification node corresponding to the target node, where the verification node is other nodes whose node data in the business model changes as the target node data changes;
  • the reference node data is obtained according to the preset data change relationship between the target node and the verification node;
  • the verification node data corresponding to the verification node is verified according to the reference node data, and the verification result is obtained.
  • the processor further implements the following steps when executing the computer-readable instructions: obtaining the node data currently corresponding to each node in the business model in real time; comparing the obtained current node data with the node obtained at the previous time Data is compared to detect whether the node data corresponding to the node in the business model has changed
  • the processor further implements the following steps when executing the computer-readable instructions: obtaining the preset data change relationship between the target node and the verification node; calculating the change rate of the target node data according to the data change relationship; Obtain the reference node data corresponding to the target node data at a rate.
  • the processor further implements the following steps when executing the computer-readable instructions: when the reference node data is inconsistent with the verification node data, marking the verification node corresponding to the verification node data to obtain the marked verification node; Count the number of nodes of the marked verification node; get the verification result according to the number of nodes.
  • the processor further implements the following steps when executing the computer-readable instructions: obtain a preset number threshold; compare the number of nodes with the number threshold; when the comparison result is that the number of nodes is greater than the number threshold, obtain Verify the unqualified verification result; when the comparison result obtained is that the number of nodes is not greater than the number threshold, the verified verification result is obtained.
  • the processor further implements the following steps when executing the computer-readable instructions: obtain each node in the business model, and use each node as a test node in turn; when the node data corresponding to the test node in the business model is detected When a change occurs, obtain other nodes in the business model whose node data has changed; take other nodes in the business model whose node data has changed as verification nodes corresponding to the test node.
  • the processor further implements the following steps when executing the computer-readable instruction: acquiring an editing instruction, where the editing instruction includes a test node identifier, and the test node identifier is used to distinguish different test nodes; finding and testing nodes Identify the corresponding test node, and use the test node corresponding to the test node identifier as the target test node; according to the editing instructions, establish the correspondence between the target test node and other nodes in the business model.
  • the processor further implements the following steps when executing the computer-readable instructions: obtaining a modification instruction to the verification node, where the modification instruction includes the modification node data; extracting the modification node data in the modification instruction, and according to Modify the node data, modify the verification node data corresponding to the verification node, and obtain the modified verification node data; use the modified verification node data as the verification node data corresponding to the verification node.
  • the processor further implements the following steps when executing the computer-readable instructions: obtain each node input by the user; obtain the priority of each input node respectively; sort each node according to the priority of each node to obtain Business model.
  • the processor further implements the following steps when executing the computer-readable instruction: when the model editing instruction is detected, the model identifier in the model editing instruction is extracted, where the model identifier is used to distinguish different business models; The model identification finds the corresponding business model, and edits the found business model.
  • One or more computer-readable storage media storing computer-readable instructions.
  • the one or more processors perform the following steps:
  • the node with the data change is identified as the target node, and the node data corresponding to the target node is identified as the target node data;
  • the verification node corresponding to the target node, where the verification node is other nodes whose node data in the business model changes as the target node data changes;
  • the reference node data is obtained according to the preset data change relationship between the target node and the verification node;
  • the verification node data corresponding to the verification node is verified according to the reference node data, and the verification result is obtained.
  • the computer-readable storage medium may be non-volatile or volatile.
  • the following steps are also implemented: obtaining the node data currently corresponding to each node in the business model in real time; and comparing the obtained current node data with the node obtained at the previous moment The data is compared to detect whether the node data corresponding to the nodes in the business model has changed.
  • the following steps are further implemented: obtaining the preset data change relationship between the target node and the verification node; calculating the data change rate of the target node according to the data change relationship; The rate of change obtains reference node data corresponding to the target node data.
  • the following steps are also implemented: when the reference node data is inconsistent with the verification node data, the verification node corresponding to the verification node data is marked to obtain the marked verification node ; Count the number of nodes of the marked verification node; get the verification result according to the number of nodes.
  • the processor further implements the following steps when executing the computer program computer readable instructions: obtaining a preset number threshold; comparing the number of nodes with the number threshold; when the obtained comparison result is that the number of nodes is greater than the number threshold , Get the verification result that the verification is unqualified; when the obtained comparison result is that the number of nodes is not greater than the number threshold, get the verification result that the verification is qualified.
  • each node in the business model is obtained, and each node is used as a test node in turn; when the node corresponding to the test node in the business model is detected When the data changes, obtain other nodes in the business model where the node data changes; take other nodes in the business model where the node data changes are the verification nodes corresponding to the test node.
  • the following steps are also implemented: obtaining an editing instruction, where the editing instruction includes a test node identifier, and the test node identifier is used to distinguish different test nodes; search and test The node identifier corresponds to the test node, and the test node corresponding to the test node identifier is used as the target test node; according to the editing instruction, the corresponding relationship between the target test node and other nodes in the business model is established.
  • the following steps are also implemented: obtaining a modification instruction to the verification node, wherein the modification instruction includes the modification node data; extracting the modification node data in the modification instruction, and According to the modified node data, the verification node data corresponding to the verification node is modified to obtain the modified verification node data; the modified verification node data is used as the verification node data corresponding to the verification node.
  • the following steps are also implemented: obtain each node input by the user; obtain the priority of each input node respectively; sort each node according to the priority of each node, Get the business model.
  • the following steps are further implemented: when the model editing instruction is detected, the model identification in the model editing instruction is extracted, where the model identification is used to distinguish different business models; Find the corresponding business model according to the model identifier, and edit the found business model.
  • Non-volatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • Volatile memory may include random access memory (RAM) or external cache memory.
  • RAM is available in many forms, such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double data rate SDRAM (DDRSDRAM), enhanced SDRAM (ESDRAM), synchronous chain Channel (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.
  • SRAM static RAM
  • DRAM dynamic RAM
  • SDRAM synchronous DRAM
  • DDRSDRAM double data rate SDRAM
  • ESDRAM enhanced SDRAM
  • SLDRAM synchronous chain Channel
  • RDRAM synchronous chain Channel
  • RDRAM direct RAM
  • DRAM direct memory bus dynamic RAM
  • RDRAM memory bus dynamic RAM

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Debugging And Monitoring (AREA)

Abstract

一种数据验证方法,涉及计算机技术领域,包括:当检测到业务模型中的节点所对应的节点数据发生变化时,将发生数据变化的节点识别为目标节点,并将目标节点对应的节点数据识别为目标节点数据(202);获取目标节点对应的验证节点,其中,验证节点为业务模型中节点数据随着目标节点数据变化而变化的其他节点(204);获取与目标节点数据对应的参考节点数据,参考节点数据根据预先设置的目标节点与验证节点之间的数据变化关系得到(206);根据参考节点数据对验证节点对应的验证节点数据进行验证,得到验证结果(208)。

Description

数据验证方法、装置、计算机设备和存储介质
相关申请的交叉引用
本申请要求于2019年8月30日提交中国专利局,申请号为2019108186181,申请名称为“数据验证方法、装置、计算机设备和存储介质”的中国专利申请的优先权,其全部内容通过引用结合在本申请中。
技术领域
本申请涉及计算机技术领域,特别是涉及一种数据验证方法、装置、计算机设备和存储介质方法、装置、计算机设备和存储介质。
背景技术
随着互联网技术和计算机技术的迅速发展,出现了电子商务等网上交易方式。在进行网上交易时,交易业务中的节点数据会随着交易业务不断变化,其中,一个交易业务可以对应有多个节点数据。当交易业务中某个节点数据发生变化时,与该交易业务对应的其他节点数据也会发生变化。具体的,计算机设备可以根据设置的数据变化规则对节点数据的变化情况进行数据验证,以保证每个节点的数据变化都是正确的。
然而,发明人意识到,目前对节点数据的变化情况进行验证时,存在验证过程繁琐的问题。
发明内容
根据本申请公开的各种实施例,提供一种数据验证方法、装置、计算机设备和存储介质。
一种数据验证方法,方法包括:
当检测到业务模型中的节点所对应的节点数据发生变化时,将发生数据变化的节点识别为目标节点,并将目标节点对应的节点数据识别为目标节点数据;
获取目标节点对应的验证节点,其中,验证节点为业务模型中节点数据随着目标节点数据变化而变化的其他节点;
获取与目标节点数据对应的参考节点数据,参考节点数据根据预先设置的目标节点与验证节点之间的数据变化关系得到;及
根据参考节点数据对验证节点对应的验证节点数据进行验证,得到验证结果。
一种数据验证装置,包括:
目标节点数据获取模块,用于当检测到业务模型中的节点所对应的节点数据发生变化时,将发生数据变化的节点识别为目标节点,并将目标节点对应的节点数据识别为目标节 点数据;
验证节点获取模块,用于获取目标节点对应的验证节点,其中,验证节点为业务模型中节点数据随着目标节点数据变而变化的其他节点;
参考节点数据获取模块,用于获取与目标节点数据对应的参考节点数据,参考节点数据根据预先设置的目标节点与验证节点之间的数据变化关系得到;及
数据验证模块,用于根据参考节点数据对验证节点数据进行验证,得到验证结果。
一种计算机设备,包括存储器和一个或多个处理器,存储器中储存有计算机可读指令,计算机可读指令被处理器执行时,使得一个或多个处理器执行以下步骤:
当检测到业务模型中的节点所对应的节点数据发生变化时,将发生数据变化的节点识别为目标节点,并将目标节点对应的节点数据识别为目标节点数据;
获取目标节点对应的验证节点,其中,验证节点为业务模型中节点数据随着目标节点数据变化而变化的其他节点;
获取与目标节点数据对应的参考节点数据,参考节点数据根据预先设置的目标节点与验证节点之间的数据变化关系得到;及
根据参考节点数据对验证节点对应的验证节点数据进行验证,得到验证结果。
一个或多个存储有计算机可读指令的计算机可读存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行以下步骤:
当检测到业务模型中的节点所对应的节点数据发生变化时,将发生数据变化的节点识别为目标节点,并将目标节点对应的节点数据识别为目标节点数据;
获取目标节点对应的验证节点,其中,验证节点为业务模型中节点数据随着目标节点数据变化而变化的其他节点;
获取与目标节点数据对应的参考节点数据,参考节点数据根据预先设置的目标节点与验证节点之间的数据变化关系得到;及
根据参考节点数据对验证节点对应的验证节点数据进行验证,得到验证结果。
上述数据验证方法、装置、计算机设备和存储介质,根据预先设置好的目标节点与验证之间的数据变化关系,计算机设备可以直接获取到与目标节点数据对应的参考节点数据,提高了获取参考节点数据的效率;由于获取到的验证节点是节点数据随着目标节点数据变化而变化的其他节点,计算机设备无需依次对业务模型中的节点进行一一检测以确定是否存在节点数据变化的节点,只需识别出目标节点就可以查找到与目标节点数据对应的验证节点,从而对验证节点对应的验证节点数据进行验证,提高了数据验证的效率。
本申请的一个或多个实施例的细节在下面的附图和描述中提出。本申请的其它特征和优点将从说明书、附图以及权利要求书变得明显。
附图说明
为了更清楚地说明本申请实施例中的技术方案,下面将对实施例中所需要使用的附图 作简单地介绍,显而易见地,下面描述中的附图仅仅是本申请的一些实施例,对于本领域普通技术人员来讲,在不付出创造性劳动的前提下,还可以根据这些附图获得其它的附图。
图1为根据一个或多个实施例中数据验证方法的应用场景图;
图2为根据一个或多个实施例中数据验证方法的流程示意图;
图3为根据一个或多个实施例中获取验证节点的流程示意图;
图4为根据一个或多个实施例中数据验证装置的框图;
图5为根据一个或多个实施例中计算机设备的框图。
具体实施方式
为了使本申请的技术方案及优点更加清楚明白,以下结合附图及实施例,对本申请进行进一步详细说明。应当理解,此处描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
本申请提供的XXX方法,可以应用于如图1所示的应用环境中。该应用环境包括计算机设备110。当检测到业务模型中的节点所对应的节点数据发生变化时,计算机设备110可以将发生数据变化的节点识别为目标节点,并将目标节点对应的节点数据识别为目标节点数据。计算机设备110可以获取目标节点对应的验证节点,其中,验证节点为业务模型中节点数据随着目标节点数据变化而变化的其他节点。计算机设备110可以获取与目标节点数据对应的参考节点数据,参考节点数据根据预先设置的目标节点与验证节点之间的数据变化关系得到。计算机设备110可以根据参考节点数据对验证节点对应的验证节点数据进行验证,得到验证结果。其中,计算机设备110可以但不限于是各种个人计算机、笔记本电脑、智能手机、平板电脑等设备。
在其中一个实施例中,如图2所示,提供了一种数据验证方法,提供了一种数据验证方法,可以应用在数据配置的过程中,包括以下步骤:
步骤202,当检测到业务模型中的节点所对应的节点数据发生变化时,将发生数据变化的节点识别为目标节点,并将目标节点对应的节点数据识别为目标节点数据。
业务模型可以是预先建立好的,用于记录业务流程中涉及到的各个节点、各个节点对应的节点数据、各个节点之间的前后关系等信息。举例说明,以业务流程为库存对应的业务流程为例,业务流程中涉及到的各个节点分别是总库存、剩余库存、活动库存、销量,各个节点对应的节点数据分别是总库存100件、剩余库存50件、活动库存200件、销量500件,各个节点之间的前后关系可以是总库存排在第一位;剩余库存分别和总库存、活动库存连接,排在第二位;活动库存分别和剩余库存、销量连接,排在第三位;销量排在最后一位,业务模型中可以记录有涉及到库存对应的业务流程的信息。
目标节点数据用于表示发生变化的节点数据,目标节点数据可以有一个,也可以有多个。目标节点可以用于表示发生变化的节点数据所对应的节点,当目标节点数据有一个时,对应的目标节点也有一个;当目标节点数据有多个时,对应的目标节点也有多个。
业务模型中的某一个节点所对应的节点数据发生变化时,业务模型中的其他节点对应的节点数据可以跟随该节点数据的变化而变化。具体的,业务模型中的其他节点对应的节点数据可以按照配置的数据变化关系进行数据变化。在配置数据变化时,计算机设备可以通过数据检测工具对业务模型中包含的各个节点所对应的节点数据进行检测。具体的,计算机设备可以实时获取各个节点当前所对应的节点数据,并将获取的当前的节点数据与上一时刻获取到的节点数据进行比较,得到比较结果。当比较结果为当前的节点数据与上一时刻获取到的节点数据不相同时,计算机设备可以检测出节点所对应的节点数据发生了变化。计算机设备可以将发生了变化的节点数据作为目标节点数据,当存在多个节点数据均发生变化时,计算机设备可以将发生数据变化的各个节点数据均作为目标节点数据。计算机设备可以查找到与目标节点数据对应的节点,并将该节点作为目标节点。
步骤204,获取目标节点对应的验证节点,其中,验证节点为业务模型中节点数据随着目标节点数据变化而变化的其他节点。
验证节点与目标节点之间存在数据关联,当目标节点中的目标节点数据发生变化时,目标节点对应的验证节点中的节点数据也会跟着发生变化。一个目标节点对应的验证节点可以是一个,还可以是多个,在此不做限定。
业务模型中包含有各个节点以及各个节点对应的节点数据,其中,一个节点中的节点数据发生变化时,可以存在有其他节点的节点数据跟着发生变化,也可以存在有其他节点的节点数据不发生变化。当目标节点中的目标节点数据发生变化时,计算机设备可以根据发生变化的其他节点数据查找到与目标节点对应的验证节点。
举例说明,业务模型中包含的各个节点分别是总库存、活动库存、销量,各个节点对应的节点数据分别是总库存100件、活动库存200件、销量500件,当总库存增加50件时,活动库存就会减少50件,而销量对应的数据是不会变化的,那么,当总库存增加50件时,会引起活动库存对应数据的变化,因此,目标节点为总库存时,对应的验证节点为活动库存。
步骤206,获取与目标节点数据对应的参考节点数据,参考节点数据根据预先设置的目标节点与验证节点之间的数据变化关系得到。
计算机设备中可以存储有设置好的目标节点与验证节点之间的数据变化关系。具体的,用户可以通过计算机设备对目标节点与验证节点之间的数据变化关系进行设置,例如,可以对目标节点与验证节点之间的数据变化比例进行设置。
参考节点数据可以用于表示目标节点对应的目标节点数据变化时,验证节点对应的节点数据变化后的数据。计算机设备在获取到目标节点对应的验证节点后,可以根据目标节点数据从预先设置好的目标节点与验证节点之间的数据变化中,得到与目标节点数据对应的参考节点数据。
步骤208,根据参考节点数据对验证节点数据进行验证,得到验证结果。
计算机设备在获取到验证节点后,可以进一步获取验证节点对应的验证节点数据。 计算机设备可以根据参考节点数据对验证节点数据进行验证。具体的,计算机设备可以对验证节点数据变化的情况进行验证,得到验证结果。
在本实施例中,根据预先设置好的目标节点与验证之间的数据变化关系,计算机设备可以直接获取到与目标节点数据对应的参考节点数据,提高了获取参考节点数据的效率;由于获取到的验证节点是节点数据随着目标节点数据变化而变化的其他节点,计算机设备无需依次对业务模型中的节点进行一一检测以确定是否存在节点数据变化的节点,只需识别出目标节点就可以查找到与目标节点数据对应的验证节点,从而对验证节点对应的验证节点数据进行验证,提高了数据验证的效率。
在其中一个实施例中,提供的一种数据验证方法还可以包括获取参考节点数据的过程,具体包括:获取预先设置的目标节点与验证节点之间的数据变化关系;根据数据变化关系计算目标节点数据的变化率;根据变化率获取与目标节点数据对应的参考节点数据。
计算机设备中可以存储有预先设置的不同目标节点与验证节点之间的数据变化关系。计算机设备可以依次将业务模型包含的各个节点作为目标节点,并分别获取各个目标节点与验证节点之间的数据变化关系。
目标节点数据的变化率可以表示为目标节点与验证节点之间的数据变化比例。例如,计算机设备获取到的目标节点以及对应的目标节点数据是总库存增加50件,预先设置好的目标节点与验证节点之间的数据变化比例为1:-1,与目标节点以及目标节点数据对应的验证节点以及验证节点数据是活动库存100件,计算机设备可以根据数据变化比例1:1,得到与目标节点数据对应的参考节点数据为活动库存减少50件。
在另一个实施例中,提供的一种数据验证方法还可以包括对验证节点数据进行验证得到验证结果的过程,具体包括:当参考节点数据与验证节点数据不一致时,对与验证节点数据对应的验证节点进行标记,得到标记后的验证节点;统计标记后的验证节点的节点数量;根据节点数量得到验证结果。
计算机设备可以将参考节点数据与验证节点数据进行比对,并得到比对结果。当计算机设备得到的比对结果是参考节点数据与验证节点数据一致时,计算机设备可以得到验证节点数据验证通过的验证结果;当计算机设备得到的比对结果是参考节点数据与验证节点数据不一致时,计算机设备可以查找与验证节点数据对应的验证节点,并对验证节点进行标记,得到标记后的验证节点。
由于获取到的验证节点可以有多个,因此标记后的验证节点也可以有多个。计算机设备在得到标记后的验证节点后,可以统计标记后的验证节点的节点数量。具体的,计算机设备可以通过计数器来对节点数量进行统计,计算机设备标记一个验证节点,计数器就累计加一,计算机设备可以根据计数器中的数据统计出标记后的验证节点的节点数量。
计算机设备可以根据节点数量得到验证结果,其中,验证结果可以包括验证合格的结果和验证不合格的结果。计算机设备可以将统计出的标记后的验证节点的节点数量与数量阈值进行比较,从而根据比较结果得到验证结果。数量阈值可以是预先设置的一个具体 的数值,例如,数量阈值可以是1、2、5、6、7、10等数值,在此不做限定。计算机设备在将节点数量与数量阈值进行比较后,得到的比较结果是节点数量大于数量阈值时,计算机设备可以得到验证不合格的验证结果;当得到的比较结果是节点数量不大于数量阈值时,计算机设备可以得到验证合格的验证结果。
在本实施例中,当参考节点数据与验证节点数据不一致时,计算机设备通过对与验证节点数据对应的验证节点进行标记,得到标记后的验证节点,统计标记后的验证节点的节点数量,根据节点数量得到验证结果。计算机设备通过对验证节点进行标记,并根据标记后的验证节点的节点数量得到验证结果,可以提高得到的验证结果的准确性。
在其中一个实施例中,计算机设备在对各个节点进行一一验证后,可以根据验证结果得到业务模型中所有节点的出错率。具体的,计算机设备可以分别获取标记后的节点的数量以及未标记的节点的数量,计算出业务模型中节点的出错率。当计算机设备计算出来的出错率大于预设数值时,计算机设备可以在界面中依次展示被标记的出错的节点。计算机设备通过计算出业务模型中节点的出错率,便于用户对出错的节点进行处理,可以提高数据验证的准确性。
在其中一个实施例中,提供的一种数据验证方法还可以包括查找验证节点的过程,具体步骤包括:
步骤302,获取业务模型中的各个节点,依次将各个节点作为测试节点。
业务模型中可以包含有多个节点,测试节点可以是业务模型中的一个节点。计算机设备可以获取业务模型中包含的各个节点。以业务模型是库存对应的业务流程为例,涉及到的各个节点分别是总库存、剩余库存、活动库存、销量,计算机设备可以获取到业务模型中的各个节点。
计算机设备可以依次将获取到的各个节点作为测试节点。例如,计算机设备获取到的各个节点分别是总库存、剩余库存、活动库存、销量时,计算机设备可以先将总库存作为测试节点,再将剩余库存作为测试节点,再将活动库存作为测试节点,再将销量作为测试节点。
步骤304,当检测到业务模型中的测试节点所对应的节点数据发生变化时,获取业务模型中发生节点数据变化的其他节点。
计算机设备可以对测试节点对应的节点数据进行检测,当检测到测试节点对应的节点数据发生变化时,计算机设备可以查找业务模型中发生节点数据变化的其他节点。具体的,当测试节点对应的节点数据发生变化时,计算机设备可以对业务模型中各个节点对应的节点数据进行检测,并对发生变化的节点数据对应的节点进行标记,从而获取到业务模型中发生节点数据变化的其他节点。举例说明,业务模型中包含的各个节点分别是总库存、活动库存、销量,计算机设备检测到总库存对应节点数据发生了变化,计算机设备可以对活动库存对应的节点数据、销量对应的节点数据进行检测,从而得到活动库存对应的节点数据发生了变化,销量对应的节点数据也发生了变化,计算机设备可以获取到节点数据发 生了变化的活动库存和销量。
步骤306,将业务模型中发生节点数据变化的其他节点作为与测试节点对应的验证节点。
验证节点用于表示目标节点数据发生变化时所引起业务模型中节点数据发生变化的其他节点。计算机设备在获取到测试节点所对应的节点数据发生变化时,业务模型中发生节点数据变化的其他节点后,由于获取到的其他节点所对应的节点数据是根据测试节点所对应的节点数据的变化而变化的,因此测试节点对应的节点数据发生变化时引起了业务模型中的其他节点对应的节点数据发生了变化,计算机设备可以将发生了节点数据变化的其他节点作为也测试节点对应的验证节点。
在本实施例中,计算机设备通过获取业务模型中包含的各个节点,依次将各个节点作为测试节点,当检测到业务模型中的测试节点所对应的节点数据发生变化时,获取业务模型中发生节点数据变化的其他节点,将业务模型中发生节点数据变化的其他节点作为与测试节点对应的验证节点。计算机设备根据测试节点所对应的节点数据发生变化时,查找业务模型中发生节点数据变化的其他节点,并将其他节点作为与测试节点对应的验证节点,可以使得获取到的验证节点是测试节点所对应的节点数据发生变化时,所引起业务模型中节点数据发生变化的其他节点,建立了测试节点与验证节点之间的对应关系,可以快速的查找到验证节点,进而对验证节点所对应的验证节点数据进行验证,提高了数据验证的效率。
在其中一个实施例中,提供的一种数据验证方法还可以包括建立业务模型的过程。计算机设备中可以存储有预先建立好的业务模型,计算机设备可以获取用户输入的各个节点,计算机设备可以分别获取输入的各个节点的优先级,再根据各个节点的优先级对各个节点进行排序,从而得到业务模型。其中,计算机设备中可以存储有各个节点与优先级的对应关系,计算机设备获取到的用户输入的各个节点后,计算机设备可以根据存储的各个节点与优先级的对应关系,查找到各个节点对应的优先级,从而对各个节点进行排序。排序后的各个节点中,可以有一个主节点以及多个子节点。
计算机设备可以根据模型编辑指令对建立好的业务模型进行编辑。具体的,当计算机设备检测到模型编辑指令时,计算机设备可以提取模型编辑指令中的模型标识,其中,模型标识用于区分不同的业务模型。计算机设备可以根据模型标识查找到对应的业务模型,从而对查找到的业务模型进行编辑。模型编辑指令中还可以包含有具体的节点,用于计算机设备对节点进行编辑。举例说明,计算机设备根据模型编辑指令查找到模型标识对应的业务模型为A业务模型,接着,计算机设备可以提取模型编辑指令中的节点为总库存,编辑指令为增加,计算机设备可以在A业务模型中增加一个总库存的节点,从而完成对业务模型的编辑。计算机设备根据模型编辑指令对业务模型进行编辑,进而根据编辑后的业务模型中各个节点的顺序依次对节点进行验证,提高了验证的效率。
在其中一个实施例中,提供的一种数据验证方法还可以包括对测试节点进行编辑的 过程,具体过程包括:获取编辑指令,其中,编辑指令中包含有测试节点标识,测试节点标识用于区分不同的测试节点;查找与测试节点标识对应的测试节点,并将与测试节点标识对应的测试节点作为目标测试节点;根据编辑指令,建立目标测试节点与业务模型中其他节点之间的对应关系。
计算机设备可以对测试节点对应的验证节点进行编辑。具体的,计算机设备可以获取编辑指令,其中,编辑指令可以是用户对计算机设备进行操作产生的。例如,用户可以触发计算机设备中的触摸显示屏,使得计算机设备产生编辑指令;用户还可以通过触发计算机设备中的按钮产生编辑指令等,在此不做限定。编辑指令中可以包含有测试节点标识,用于区分不同的测试节点。计算机设备可以提取出编辑指令中的测试节点标识,并根据测试节点标识查找到对应的测试节点,计算机设备可以将查找到的测试节点作为目标测试节点。
计算机设备可以根据编辑指令建立目标测试节点与业务模型中其他节点之间的对应关系。具体的,计算机设备可以根据编辑指令将业务模型中的其他节点作为目标测试节点对应的验证节点,即建立目标测试节点与业务模型中其他节点之间的对应关系。举例说明,业务模型为库存的业务流程,计算机设备获取到的各个节点分别是总库存、剩余库存、活动库存、销量,其中,总库存为目标测试节点,总库存对应的验证节点有活动库存和销量,计算机设备在接收到对编辑指令后,可以根据编辑指令将剩余库存这个节点编辑为总库存对应的验证节点。
在本实施例中,计算机设备通过获取编辑指令,其中,编辑指令中包含有测试节点标识,测试节点标识用于区分不同的测试节点,查找与测试节点标识对应的测试节点,并将与测试节点标识对应的测试节点作为目标测试节点,根据编辑指令,建立目标测试节点与验证节点之间的对应关系。计算机设备根据编辑指令建立目标测试节点与验证节点之间的对应关系,可以提高获取的目标测试节点对应的验证节点的准确性,进而提高数据验证的准确性。
在其中一个实施例中,提供的一种数据验证方法还可以包括对验证节点进行修改的过程,具体过程包括:获取对验证节点的修改指令,其中,修改指令中包含有修改节点数据;提取修改指令中的修改节点数据,并根据修改节点数据,对与验证节点对应的验证节点数据进行修改,得到修改后的验证节点数据;将修改后的验证节点数据作为与验证节点对应的验证节点数据。
计算机设备可以对验证节点进行修改。具体的,计算机设备可以获取对验证节点的修改指令,根据修改指令对验证节点对应的验证节点数据进行修改。其中,修改指令可以是用户对计算机设备进行操作产生的。例如,用户可以触发计算机设备中的触摸显示屏,使得计算机设备产生修改指令;用户还可以通过触发计算机设备中的按钮产生修改指令等,在此不做限定。修改指令中可以包含有修改节点数据,计算机设备可以根据修改节点数据对验证节点数据进行修改。
计算机设备可以提取出修改指令中的修改节点数据,并根据修改节点数据对验证节点数据进行修改。例如,计算机设备提取出的修改节点数据是将验证节点总库存中的节点数据100件修改为200件,计算机设备可以根据修改节点数据将总库存中的节点数据修改为200件。
在本实施例中,计算机设备通过获取对验证节点的修改指令,其中,修改指令中包含有修改节点数据,提取修改指令中的修改节点数据,并根据修改节点数据,对与验证节点对应的验证节点数据进行修改,得到修改后的验证节点数据,将修改后的验证节点数据作为与验证节点对应的验证节点数据。计算机设备可以根据修改指令对验证节点数据进行修改,可以实时更新验证节点对应的验证节点数据,从而提高数据验证的准确性。
应该理解的是,虽然上述各个流程图中的各个步骤按照箭头的指示依次显示,但是这些步骤并不是必然按照箭头指示的顺序依次执行。除非本文中有明确的说明,这些步骤的执行并没有严格的顺序限制,这些步骤可以以其它的顺序执行。而且,上述各个流程图中的至少一部分步骤可以包括多个子步骤或者多个阶段,这些子步骤或者阶段并不必然是在同一时刻执行完成,而是可以在不同的时刻执行,这些子步骤或者阶段的执行顺序也不必然是依次进行,而是可以与其它步骤或者其它步骤的子步骤或者阶段的至少一部分轮流或者交替地执行。
在其中一个实施例中,如图4所示,提供了一种数据验证装置,包括:目标节点数据获取模块410、验证节点获取模块420、参考节点数据获取模块430和数据验证模块440,其中:
节点数据获取模块410,用于当检测到业务模型中的节点所对应的节点数据发生变化时,将发生数据变化的节点识别为目标节点,并将目标节点对应的节点数据识别为目标节点数据。
验证节点获取模块420,用于获取目标节点对应的验证节点,其中,验证节点为业务模型中节点数据随着目标节点数据变而变化的其他节点。
参考节点数据获取模块430,用于获取与目标节点数据对应的参考节点数据,参考节点数据根据预先设置的目标节点与验证节点之间的数据变化关系得到。
数据验证模块440,用于根据参考节点数据对验证节点数据进行验证,得到验证结果。
在其中一个实施例中,提供的一种数据验证装置还可以包括节点数据比较模块,用于:实时获取业务模型中各个节点当前所对应的节点数据;将获取的当前的节点数据与上一时刻获取到的节点数据进行比较,检测业务模型中的节点所对应的节点数据是否发生变化。在其中一个实施例中,参考节点数据获取模块430还用于获取预先设置的目标节点与验证节点之间的数据变化关系;根据数据变化关系计算目标节点数据的变化率;根据变化率获取与目标节点数据对应的参考节点数据。
在其中一个实施例中,数据验证模块440还用于当参考节点数据与验证节点数据不一致时,对与验证节点数据对应的验证节点进行标记,得到标记后的验证节点;统计标记后的验证节点的节点数量;根据节点数量得到验证结果。
在其中一个实施例中,数据验证模块440还用于获取预先设置的数量阈值;将节点数量与数量阈值进行比较;当得到的比较结果是节点数量大于数量阈值时,得到验证不合格的验证结果;当得到的比较结果是节点数量不大于数量阈值时,得到验证合格的验证结果。
在其中一个实施例中,验证节点获取模块420还用于获取业务模型中的各个节点,依次将各个节点作为测试节点;当检测到业务模型中的测试节点所对应的节点数据发生变化时,获取业务模型中发生节点数据变化的其他节点;将业务模型中发生节点数据变化的其他节点作为与测试节点对应的验证节点。
在其中一个实施例中,验证节点获取模块420还用于获取编辑指令,其中,编辑指令中包含有测试节点标识,测试节点标识用于区分不同的测试节点;查找与测试节点标识对应的测试节点,并将与测试节点标识对应的测试节点作为目标测试节点;根据编辑指令,建立目标测试节点与业务模型中其他节点之间的对应关系。
在其中一个实施例中,提供的一种数据验证装置还可以包括验证节点数据获取模块,用于获取对验证节点的修改指令,其中,修改指令中包含有修改节点数据;提取修改指令中的修改节点数据,并根据修改节点数据,对与验证节点对应的验证节点数据进行修改,得到修改后的验证节点数据;将修改后的验证节点数据作为与验证节点对应的验证节点数据。
在其中一个实施例中,提供的一种数据验证装置还可以包括业务模型构建模块,用于获取用户输入的各个节点;分别获取输入的各个节点的优先级;根据各个节点的优先级对各个节点进行排序,得到业务模型。
在其中一个实施例中,提供的一种数据验证装置还可以包括业务模型编辑模块,用于当检测到模型编辑指令时,提取模型编辑指令中的模型标识,其中,模型标识用于区分不同的业务模型;根据模型标识查找到对应的业务模型,对查找到的业务模型进行编辑。
验证装置的具体限定可以参见上文中对于验证方法的限定,在此不再赘述。上述验证装置中的各个模块可全部或部分通过软件、硬件及其组合来实现。上述各模块可以硬件形式内嵌于或独立于计算机设备中的处理器中,也可以以软件形式存储于计算机设备中的存储器中,以便于处理器调用执行以上各个模块对应的操作。
在其中一个实施例中,提供了一种计算机设备,该计算机设备可以是服务器,其内部结构图可以如图5所示。该计算机设备包括通过系统总线连接的处理器、存储器、网络接口和数据库。其中,该计算机设备的处理器用于提供计算和控制能力。该计算机设备的存储器包括非易失性或易失性存储介质、内存储器。该非易失性或易失性存储介质存储有操作系统、计算机可读指令和数据库。该内存储器为非易失性存储介质中的操作系统和计算 机可读指令的运行提供环境。该计算机设备的数据库用于存储xxx数据。该计算机设备的网络接口用于与外部的终端通过网络连接通信。该计算机可读指令被处理器执行时以实现一种数据验证方法。
本领域技术人员可以理解,图5中示出的结构,仅仅是与本申请方案相关的部分结构的框图,并不构成对本申请方案所应用于其上的计算机设备的限定,具体的计算机设备可以包括比图中所示更多或更少的部件,或者组合某些部件,或者具有不同的部件布置。
一种计算机设备,包括存储器和一个或多个处理器,存储器中储存有计算机可读指令,计算机可读指令被处理器执行时,使得一个或多个处理器执行以下步骤:
当检测到业务模型中的节点所对应的节点数据发生变化时,将发生数据变化的节点识别为目标节点,并将目标节点对应的节点数据识别为目标节点数据;
获取目标节点对应的验证节点,其中,验证节点为业务模型中节点数据随着目标节点数据变化而变化的其他节点;
获取与目标节点数据对应的参考节点数据,参考节点数据根据预先设置的目标节点与验证节点之间的数据变化关系得到;及
根据参考节点数据对验证节点对应的验证节点数据进行验证,得到验证结果。
在其中一个实施例中,处理器执行序计算机可读指令时还实现以下步骤:实时获取业务模型中各个节点当前所对应的节点数据;将获取的当前的节点数据与上一时刻获取到的节点数据进行比较,检测业务模型中的节点所对应的节点数据是否发生变化
在其中一个实施例中,处理器执行计算机可读指令时还实现以下步骤:获取预先设置的目标节点与验证节点之间的数据变化关系;根据数据变化关系计算目标节点数据的变化率;根据变化率获取与目标节点数据对应的参考节点数据。
在其中一个实施例中,处理器执行计算机可读指令时还实现以下步骤:当参考节点数据与验证节点数据不一致时,对与验证节点数据对应的验证节点进行标记,得到标记后的验证节点;统计标记后的验证节点的节点数量;根据节点数量得到验证结果。
在其中一个实施例中,处理器执行计算机可读指令时还实现以下步骤:获取预先设置的数量阈值;将节点数量与数量阈值进行比较;当得到的比较结果是节点数量大于数量阈值时,得到验证不合格的验证结果;当得到的比较结果是节点数量不大于数量阈值时,得到验证合格的验证结果。
在其中一个实施例中,处理器执行计算机可读指令时还实现以下步骤:获取业务模型中的各个节点,依次将各个节点作为测试节点;当检测到业务模型中的测试节点所对应的节点数据发生变化时,获取业务模型中发生节点数据变化的其他节点;将业务模型中发生节点数据变化的其他节点作为与测试节点对应的验证节点。
在其中一个实施例中,处理器执行计算机可读指令时还实现以下步骤:获取编辑指令,其中,编辑指令中包含有测试节点标识,测试节点标识用于区分不同的测试节点;查找与测试节点标识对应的测试节点,并将与测试节点标识对应的测试节点作为目标测试节点; 根据编辑指令,建立目标测试节点与业务模型中其他节点之间的对应关系。
在其中一个实施例中,处理器执行计算机可读指令时还实现以下步骤:获取对验证节点的修改指令,其中,修改指令中包含有修改节点数据;提取修改指令中的修改节点数据,并根据修改节点数据,对与验证节点对应的验证节点数据进行修改,得到修改后的验证节点数据;将修改后的验证节点数据作为与验证节点对应的验证节点数据。
在其中一个实施例中,处理器执行计算机可读指令时还实现以下步骤:获取用户输入的各个节点;分别获取输入的各个节点的优先级;根据各个节点的优先级对各个节点进行排序,得到业务模型。
在其中一个实施例中,处理器执行计算机可读指令时还实现以下步骤:当检测到模型编辑指令时,提取模型编辑指令中的模型标识,其中,模型标识用于区分不同的业务模型;根据模型标识查找到对应的业务模型,对查找到的业务模型进行编辑。
一个或多个存储有计算机可读指令的计算机可读存储介质,计算机可读指令被一个或多个处理器执行时,使得一个或多个处理器执行以下步骤:
当检测到业务模型中的节点所对应的节点数据发生变化时,将发生数据变化的节点识别为目标节点,并将目标节点对应的节点数据识别为目标节点数据;
获取目标节点对应的验证节点,其中,验证节点为业务模型中节点数据随着目标节点数据变化而变化的其他节点;
获取与目标节点数据对应的参考节点数据,参考节点数据根据预先设置的目标节点与验证节点之间的数据变化关系得到;及
根据参考节点数据对验证节点对应的验证节点数据进行验证,得到验证结果。
其中,该计算机可读存储介质可以是非易失性,也可以是易失性的。
在其中一个实施例中,计算机可读指令被处理器执行时还实现以下步骤:实时获取业务模型中各个节点当前所对应的节点数据;将获取的当前的节点数据与上一时刻获取到的节点数据进行比较,检测业务模型中的节点所对应的节点数据是否发生变化。在其中一个实施例中,计算机可读指令被处理器执行时还实现以下步骤:获取预先设置的目标节点与验证节点之间的数据变化关系;根据数据变化关系计算目标节点数据的变化率;根据变化率获取与目标节点数据对应的参考节点数据。
在其中一个实施例中,计算机可读指令被处理器执行时还实现以下步骤:当参考节点数据与验证节点数据不一致时,对与验证节点数据对应的验证节点进行标记,得到标记后的验证节点;统计标记后的验证节点的节点数量;根据节点数量得到验证结果。
在其中一个实施例中,处理器执行计算机程序计算机可读指令时还实现以下步骤:获取预先设置的数量阈值;将节点数量与数量阈值进行比较;当得到的比较结果是节点数量大于数量阈值时,得到验证不合格的验证结果;当得到的比较结果是节点数量不大于数量阈值时,得到验证合格的验证结果。
在其中一个实施例中,计算机可读指令被处理器执行时还实现以下步骤:获取业务模 型中的各个节点,依次将各个节点作为测试节点;当检测到业务模型中的测试节点所对应的节点数据发生变化时,获取业务模型中发生节点数据变化的其他节点;将业务模型中发生节点数据变化的其他节点作为与测试节点对应的验证节点。
在其中一个实施例中,计算机可读指令被处理器执行时还实现以下步骤:获取编辑指令,其中,编辑指令中包含有测试节点标识,测试节点标识用于区分不同的测试节点;查找与测试节点标识对应的测试节点,并将与测试节点标识对应的测试节点作为目标测试节点;根据编辑指令,建立目标测试节点与业务模型中其他节点之间的对应关系。
在其中一个实施例中,计算机可读指令被处理器执行时还实现以下步骤:获取对验证节点的修改指令,其中,修改指令中包含有修改节点数据;提取修改指令中的修改节点数据,并根据修改节点数据,对与验证节点对应的验证节点数据进行修改,得到修改后的验证节点数据;将修改后的验证节点数据作为与验证节点对应的验证节点数据。
在其中一个实施例中,计算机可读指令被处理器执行时还实现以下步骤:获取用户输入的各个节点;分别获取输入的各个节点的优先级;根据各个节点的优先级对各个节点进行排序,得到业务模型。
在其中一个实施例中,计算机可读指令被处理器执行时还实现以下步骤:当检测到模型编辑指令时,提取模型编辑指令中的模型标识,其中,模型标识用于区分不同的业务模型;根据模型标识查找到对应的业务模型,对查找到的业务模型进行编辑。
本领域普通技术人员可以理解实现上述实施例方法中的全部或部分流程,是可以通过计算机可读指令来指令相关的硬件来完成,的计算机可读指令可存储于一非易失性计算机可读取存储介质中,该计算机可读指令在执行时,可包括如上述各方法的实施例的流程。其中,本申请所提供的各实施例中所使用的对存储器、存储、数据库或其它介质的任何引用,均可包括非易失性和/或易失性存储器。非易失性存储器可包括只读存储器(ROM)、可编程ROM(PROM)、电可编程ROM(EPROM)、电可擦除可编程ROM(EEPROM)或闪存。易失性存储器可包括随机存取存储器(RAM)或者外部高速缓冲存储器。作为说明而非局限,RAM以多种形式可得,诸如静态RAM(SRAM)、动态RAM(DRAM)、同步DRAM(SDRAM)、双数据率SDRAM(DDRSDRAM)、增强型SDRAM(ESDRAM)、同步链路(Synchlink)DRAM(SLDRAM)、存储器总线(Rambus)直接RAM(RDRAM)、直接存储器总线动态RAM(DRDRAM)、以及存储器总线动态RAM(RDRAM)等。。
以上实施例的各技术特征可以进行任意的组合,为使描述简洁,未对上述实施例中的各个技术特征所有可能的组合都进行描述,然而,只要这些技术特征的组合不存在矛盾,都应当认为是本说明书记载的范围。
以上实施例仅表达了本申请的几种实施方式,其描述较为具体和详细,但并不能因此而理解为对发明专利范围的限制。应当指出的是,对于本领域的普通技术人员来说,在不脱离本申请构思的前提下,还可以做出若干变形和改进,这些都属于本申请的保护范围。因此,本申请专利的保护范围应以所附权利要求为准。

Claims (20)

  1. 一种数据验证方法,包括:
    当检测到业务模型中的节点所对应的节点数据发生变化时,将发生数据变化的节点识别为目标节点,并将所述目标节点对应的节点数据识别为目标节点数据;
    获取所述目标节点对应的验证节点,其中,所述验证节点为所述业务模型中节点数据随着所述目标节点数据变化而变化的其他节点;
    获取与所述目标节点数据对应的参考节点数据,所述参考节点数据根据预先设置的目标节点与验证节点之间的数据变化关系得到;及
    根据所述参考节点数据对所述验证节点对应的验证节点数据进行验证,得到验证结果。
  2. 根据权利要求1所述的方法,其中,所述当检测到业务模型中的节点所对应的节点数据发生变化时,将发生数据变化的节点识别为目标节点,并将所述目标节点对应的节点数据识别为目标节点数据之前,所述方法还包括:
    实时获取业务模型中各个节点当前所对应的节点数据;
    将获取的当前的节点数据与上一时刻获取到的节点数据进行比较,检测所述业务模型中的节点所对应的节点数据是否发生变化。
  3. 根据权利要求1所述的方法,其中,所述获取与所述目标节点数据对应的参考节点数据,包括:
    获取预先设置的目标节点与验证节点之间的数据变化关系;
    根据所述数据变化关系计算所述目标节点数据的变化率;及
    根据所述变化率获取与所述目标节点数据对应的参考节点数据。
  4. 根据权利要求1所述的方法,其中,所述根据所述参考节点数据对所述验证节点对应的验证节点数据进行验证,得到验证结果,包括:
    当所述参考节点数据与所述验证节点数据不一致时,对与所述验证节点数据对应的验证节点进行标记,得到标记后的验证节点;
    统计所述标记后的验证节点的节点数量;及
    根据所述节点数量得到验证结果。
  5. 根据权利要求4所述的方法,其中,所述根据所述节点数量得到验证结果包括:
    获取预先设置的数量阈值;
    将所述节点数量与所述数量阈值进行比较;
    当得到的比较结果是所述节点数量大于所述数量阈值时,得到验证不合格的验证结果;
    当得到的比较结果是所述节点数量不大于所述数量阈值时,得到验证合格的验证结果。
  6. 根据权利要求1所述的方法,其中,还包括:
    获取所述业务模型中的各个节点,依次将各个所述节点作为测试节点;
    当检测到所述业务模型中的所述测试节点所对应的节点数据发生变化时,获取所述业务模型中发生节点数据变化的其他节点;及
    将所述业务模型中发生节点数据变化的其他节点作为与所述测试节点对应的验证节点。
  7. 根据权利要求4所述的方法,其中,还包括:
    获取编辑指令,其中,所述编辑指令中包含有测试节点标识,所述测试节点标识用于区分不同的测试节点;
    查找与所述测试节点标识对应的测试节点,并将与所述测试节点标识对应的测试节点作为目标测试节点;及
    根据所述编辑指令,建立所述目标测试节点与所述业务模型中其他节点之间的对应关系。
  8. 根据权利要求1所述的方法,其中,还包括:
    获取对所述验证节点的修改指令,其中,所述修改指令中包含有修改节点数据;
    提取所述修改指令中的所述修改节点数据,并根据所述修改节点数据,对与所述验证节点对应的验证节点数据进行修改,得到修改后的验证节点数据;及
    将所述修改后的验证节点数据作为与所述验证节点对应的验证节点数据。
  9. 根据权利要求1所述的方法,其中,还包括:
    获取用户输入的各个节点;
    分别获取输入的各个节点的优先级;
    根据各个节点的优先级对各个节点进行排序,得到业务模型。
  10. 根据权利要求1所述的方法,其中,还包括:
    当检测到模型编辑指令时,提取模型编辑指令中的模型标识,其中,模型标识用于区分不同的业务模型;
    根据模型标识查找到对应的业务模型,对查找到的业务模型进行编辑。
  11. 一种数据验证装置,包括:
    目标节点数据获取模块,用于当检测到业务模型中的节点所对应的节点数据发生变化时,将发生数据变化的节点识别为目标节点,并将所述目标节点对应的节点数据识别为目标节点数据;
    验证节点获取模块,用于获取所述目标节点对应的验证节点,其中,所述验证节点为所述业务模型中节点数据随着所述目标节点数据变而变化的其他节点;
    参考节点数据获取模块,用于获取与所述目标节点数据对应的参考节点数据,所述参考节点数据根据预先设置的目标节点与验证节点之间的数据变化关系得到;及
    数据验证模块,用于根据所述参考节点数据对所述验证节点数据进行验证,得到验证结果。
  12. 一种计算机设备,包括存储器及一个或多个处理器,所述存储器中储存有计算机可读指令,所述计算机可读指令被所述一个或多个处理器执行时,使得所述一个或多个处理器执行以下步骤:
    当检测到业务模型中的节点所对应的节点数据发生变化时,将发生数据变化的节点识别为目标节点,并将所述目标节点对应的节点数据识别为目标节点数据;
    获取所述目标节点对应的验证节点,其中,所述验证节点为所述业务模型中节点数据随着所述目标节点数据变化而变化的其他节点;
    获取与所述目标节点数据对应的参考节点数据,所述参考节点数据根据预先设置的目标节点与验证节点之间的数据变化关系得到;及
    根据所述参考节点数据对所述验证节点对应的验证节点数据进行验证,得到验证结果。
  13. 根据权利要求12所述的计算机设备,其中,所述处理器执行所述计算机可读指令时还执行以下步骤:
    获取预先设置的目标节点与验证节点之间的数据变化关系;
    根据所述数据变化关系计算所述目标节点数据的变化率;及
    根据所述变化率获取与所述目标节点数据对应的参考节点数据。
  14. 根据权利要求12所述的计算机设备,其中,所述处理器执行所述计算机可读指令时还执行以下步骤:
    当所述参考节点数据与所述验证节点数据不一致时,对与所述验证节点数据对应的验证节点进行标记,得到标记后的验证节点;
    统计所述标记后的验证节点的节点数量;及
    根据所述节点数量得到验证结果。
  15. 根据权利要求12所述的计算机设备,其中,所述处理器执行所述计算机可读指令时还执行以下步骤:
    获取所述业务模型中的各个节点,依次将各个所述节点作为测试节点;
    当检测到所述业务模型中的所述测试节点所对应的节点数据发生变化时,获取所述业务模型中发生节点数据变化的其他节点;及
    将所述业务模型中发生节点数据变化的其他节点作为与所述测试节点对应的验证节点。
  16. 根据权利要求12所述的计算机设备,其中,所述处理器执行所述计算机可读指令时还执行以下步骤:
    获取编辑指令,其中,所述编辑指令中包含有测试节点标识,所述测试节点标识用于区分不同的测试节点;
    查找与所述测试节点标识对应的测试节点,并将与所述测试节点标识对应的测试节点作为目标测试节点;及
    根据所述编辑指令,建立所述目标测试节点与所述业务模型中其他节点之间的对应关系。
  17. 一个或多个存储有计算机可读指令的计算机可读存储介质,所述计算机可读指令被一个或多个处理器执行时,使得所述一个或多个处理器执行以下步骤:
    当检测到业务模型中的节点所对应的节点数据发生变化时,将发生数据变化的节点识别为目标节点,并将所述目标节点对应的节点数据识别为目标节点数据;
    获取所述目标节点对应的验证节点,其中,所述验证节点为所述业务模型中节点数据随着所述目标节点数据变化而变化的其他节点;
    获取与所述目标节点数据对应的参考节点数据,所述参考节点数据根据预先设置的目标节点与验证节点之间的数据变化关系得到;及
    根据所述参考节点数据对所述验证节点对应的验证节点数据进行验证,得到验证结果。
  18. 根据权利要求17所述的存储介质,其中,所述计算机可读指令被所述处理器执行时还执行以下步骤:
    获取预先设置的目标节点与验证节点之间的数据变化关系;
    根据所述数据变化关系计算所述目标节点数据的变化率;及
    根据所述变化率获取与所述目标节点数据对应的参考节点数据。
  19. 根据权利要求17所述的存储介质,其中,所述计算机可读指令被所述处理器执行时还执行以下步骤:
    当所述参考节点数据与所述验证节点数据不一致时,对与所述验证节点数据对应的验证节点进行标记,得到标记后的验证节点;
    统计所述标记后的验证节点的节点数量;及
    根据所述节点数量得到验证结果。
  20. 根据权利要求17所述的存储介质,其中,所述计算机可读指令被所述处理器执行时还执行以下步骤:
    获取所述业务模型中的各个节点,依次将各个所述节点作为测试节点;
    当检测到所述业务模型中的所述测试节点所对应的节点数据发生变化时,获取所述业务模型中发生节点数据变化的其他节点;及
    将所述业务模型中发生节点数据变化的其他节点作为与所述测试节点对应的验证节点。
PCT/CN2020/106175 2019-08-30 2020-07-31 数据验证方法、装置、计算机设备和存储介质 WO2021036681A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910818618.1 2019-08-30
CN201910818618.1A CN110659517A (zh) 2019-08-30 2019-08-30 数据验证方法、装置、计算机设备和存储介质

Publications (1)

Publication Number Publication Date
WO2021036681A1 true WO2021036681A1 (zh) 2021-03-04

Family

ID=69036847

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2020/106175 WO2021036681A1 (zh) 2019-08-30 2020-07-31 数据验证方法、装置、计算机设备和存储介质

Country Status (2)

Country Link
CN (1) CN110659517A (zh)
WO (1) WO2021036681A1 (zh)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110659517A (zh) * 2019-08-30 2020-01-07 深圳壹账通智能科技有限公司 数据验证方法、装置、计算机设备和存储介质
CN113114675B (zh) * 2021-04-13 2021-12-10 珠海市鸿瑞信息技术股份有限公司 基于工业控制的安全审计系统及方法

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180089266A1 (en) * 2016-09-28 2018-03-29 Microsoft Technology Licensing, Llc Direct table association in in-memory databases
CN108416656A (zh) * 2018-03-12 2018-08-17 上海哔哩哔哩科技有限公司 高可用库存管理方法、服务器及高可用库存管理系统
CN108428075A (zh) * 2017-02-13 2018-08-21 菜鸟智能物流控股有限公司 一种库存信息更新方法和装置
CN108763474A (zh) * 2018-05-29 2018-11-06 中国建设银行股份有限公司 获取交易相关性及执行回归测试的方法、装置及存储介质
CN109376993A (zh) * 2018-09-18 2019-02-22 深圳壹账通智能科技有限公司 流程验证方法、装置、计算机设备和存储介质
CN110659517A (zh) * 2019-08-30 2020-01-07 深圳壹账通智能科技有限公司 数据验证方法、装置、计算机设备和存储介质

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110008118B (zh) * 2019-03-13 2023-03-10 深圳壹账通智能科技有限公司 页面数据测试方法、装置、计算机设备和存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20180089266A1 (en) * 2016-09-28 2018-03-29 Microsoft Technology Licensing, Llc Direct table association in in-memory databases
CN108428075A (zh) * 2017-02-13 2018-08-21 菜鸟智能物流控股有限公司 一种库存信息更新方法和装置
CN108416656A (zh) * 2018-03-12 2018-08-17 上海哔哩哔哩科技有限公司 高可用库存管理方法、服务器及高可用库存管理系统
CN108763474A (zh) * 2018-05-29 2018-11-06 中国建设银行股份有限公司 获取交易相关性及执行回归测试的方法、装置及存储介质
CN109376993A (zh) * 2018-09-18 2019-02-22 深圳壹账通智能科技有限公司 流程验证方法、装置、计算机设备和存储介质
CN110659517A (zh) * 2019-08-30 2020-01-07 深圳壹账通智能科技有限公司 数据验证方法、装置、计算机设备和存储介质

Also Published As

Publication number Publication date
CN110659517A (zh) 2020-01-07

Similar Documents

Publication Publication Date Title
CN109510737B (zh) 协议接口测试方法、装置、计算机设备和存储介质
WO2020186786A1 (zh) 文件处理方法、装置、计算机设备和存储介质
CN108573371B (zh) 数据审批方法、装置、计算机设备和存储介质
CN109474578B (zh) 报文消息校验方法、装置、计算机设备和存储介质
WO2021042914A1 (zh) 测试数据生成方法、装置、计算机设备和存储介质
CN109992601B (zh) 待办事项信息的推送方法、装置和计算机设备
WO2020119419A1 (zh) 基于图像识别的测试方法、装置、计算机设备及存储介质
CN111027295B (zh) 数据处理方法、装置、计算机设备和存储介质
WO2019041925A1 (zh) 工作流数据处理方法、装置、存储介质和计算机设备
WO2020233091A1 (zh) 业务数据回退方法、装置、计算机设备和存储介质
CN111611172A (zh) 项目测试缺陷分析方法、装置、设备及存储介质
WO2021036681A1 (zh) 数据验证方法、装置、计算机设备和存储介质
WO2019153589A1 (zh) 消息数据处理方法、装置、计算机设备和存储介质
WO2019148712A1 (zh) 钓鱼网站检测方法、装置、计算机设备和存储介质
CN104715203A (zh) 信息泄漏漏洞的定量分析的方法和系统
CN111191250B (zh) 一种验证方法及装置、用于验证的装置、服务器和终端
WO2020232883A1 (zh) 脚本缺陷扫描方法、装置、计算机设备和存储介质
WO2020237508A1 (zh) 一种断言验证代码绑定方法及装置
CN108399125B (zh) 自动化测试方法、装置、计算机设备和存储介质
CN114610635A (zh) 接口测试用例生成方法、装置、计算机设备及存储介质
US10241957B2 (en) Workload patterns for realistic load recreation in performance testing
US20230018381A1 (en) Method for automatically identifying design changes in building information model
WO2019153978A1 (zh) 终端指纹测试方法、装置、计算机设备和存储介质
CN112559526A (zh) 数据表导出方法、装置、计算机设备及存储介质
CN109542947B (zh) 数据统计方法、装置、计算机设备和存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20857729

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 28/06/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 20857729

Country of ref document: EP

Kind code of ref document: A1