WO2023273218A1 - Procédé de vérification de paquets json et appareil de vérification de paquets json - Google Patents

Procédé de vérification de paquets json et appareil de vérification de paquets json Download PDF

Info

Publication number
WO2023273218A1
WO2023273218A1 PCT/CN2021/139563 CN2021139563W WO2023273218A1 WO 2023273218 A1 WO2023273218 A1 WO 2023273218A1 CN 2021139563 W CN2021139563 W CN 2021139563W WO 2023273218 A1 WO2023273218 A1 WO 2023273218A1
Authority
WO
WIPO (PCT)
Prior art keywords
message
value
source
target
json
Prior art date
Application number
PCT/CN2021/139563
Other languages
English (en)
Chinese (zh)
Inventor
夏柱昌
夏勇
Original Assignee
深圳前海微众银行股份有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳前海微众银行股份有限公司 filed Critical 深圳前海微众银行股份有限公司
Publication of WO2023273218A1 publication Critical patent/WO2023273218A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • H04L9/3239Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions involving non-keyed hash functions, e.g. modification detection codes [MDCs], MD5, SHA or RIPEMD
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/133Protocols for remote procedure calls [RPC]

Definitions

  • This application relates to the technical field of financial technology (Fintech), in particular to a method for checking JSON messages and a device for checking JSON messages.
  • Json Java Script Object Notation, JS object notation, a lightweight data exchange format, JS is called Java Script, which is a programming language
  • Java Script Java Script
  • All of them have a very wide range of applications, especially for Java (an object-oriented programming language) application development and data testing, check whether the JSON messages before and after the interface change are consistent, and whether the JSON messages of the same data source are processed by multiple parties Whether the returned data is consistent, etc., are all necessary and frequent operations.
  • JSON message checking method is to use tools such as Beyond Compare (a text file comparison tool) or based on a simple Json open source package to compare data consistency.
  • Beyond Compare a text file comparison tool
  • these checking methods cannot implement data consistency checks in situations where the data nesting level of the JSON message itself is deep, fields change, or there is an unsorted data list in the JSON message, resulting in low efficiency of the JSON message consistency check.
  • the main purpose of this application is to propose a JSON message checking method and a JSON message checking device, aiming at solving the existing technical problem of low checking efficiency for JSON message consistency checking.
  • the application provides a checking method of a JSON message, and the checking method of the JSON message includes the following steps:
  • Checking is performed according to the source Value and the target Value to obtain a message checking result of the to-be-checked JSON message.
  • the present application also provides a JSON message checking device, the JSON message checking device includes:
  • a message check preparation module configured to obtain a JSON message to be checked and a preset message check rule, wherein the message check rule is configured based on the JSON message to be checked;
  • a message conversion module configured to convert the first source message in the JSON message to be checked into the second source message of the Map data structure, and convert the first target message in the JSON message to be checked Be converted into the second target message of Map data structure;
  • a Value determination module configured to determine the source Value from the second source message according to the message checking rules if the MD5 values of the second source message and the second target message are inconsistent after comparison value, and determine the target Value value from the second target message according to the message checking rule;
  • a checking module configured to check according to the source Value and the target Value to obtain a message checking result of the to-be-checked JSON message.
  • each functional module of the device for checking JSON messages in the present application implements the steps of the checking method for JSON messages as described above during operation.
  • the present application also provides a terminal device, which includes: a memory, a processor, and a check program for JSON messages stored on the memory and operable on the processor, When the checking program of the JSON message is executed by the processor, the above-mentioned steps of the checking method of the JSON message are realized.
  • the present application also provides a computer storage medium, the computer storage medium is stored with a check program for JSON messages, and when the check program for JSON messages is executed by a processor, the above-mentioned The steps of the verification method of the JSON message.
  • the present application also provides a computer program product, the computer program product includes a check program for JSON messages, and when the check program for JSON messages is executed by a processor, the above-mentioned JSON message is implemented.
  • the steps of the verification method of the document includes a check program for JSON messages, and when the check program for JSON messages is executed by a processor, the above-mentioned JSON message is implemented.
  • the present application obtains the JSON message to be checked and the preset message checking rule, wherein, the message checking rule is configured based on the JSON message to be checked; the first in the JSON message to be checked The source message is converted into the second source message of the Map data structure, and the first target message in the JSON message to be checked is converted into the second target message of the Map data structure; The MD5 value of the second source message is inconsistent with the second target message, then determine the source Value value from the second source message according to the message checking rule, and determine the source Value value from the second source message according to the message checking rule Determining a target Value in the second target message; checking according to the source Value and the target Value to obtain a message check result of the unchecked JSON message.
  • this application converts the JSON message into a Map data structure, and according to the pre-configured message check rules based on The Map data structure determines the Value value to check the consistency of the message. In this way, it can realize convenient and accurate processing and checking of any field of the JSON message, effectively avoiding the situation that the traditional method cannot be checked, and improving the JSON report. The efficiency of document consistency check.
  • Fig. 1 is the schematic structural diagram of the verification device of the JSON message of the hardware operating environment involved in the scheme of the embodiment of the present application;
  • Fig. 2 is the schematic flow chart of the checking method one embodiment of the JSON message of the present application
  • Fig. 3 is the description of fields in the message checking rules involved in an embodiment of the checking method of the JSON message of the present application
  • Fig. 4 is the data table associated with the preset checking application involved in an embodiment of the checking method of the JSON message of the present application
  • Fig. 5 is a schematic diagram of the application process involved in an embodiment of the checking method of the JSON message of the present application
  • FIG. 6 is a block diagram of an embodiment of a device for checking JSON messages of the present application.
  • FIG. 1 is a schematic structural diagram of a terminal device in a hardware operating environment involved in the solution of the embodiment of the present application.
  • the terminal device in this embodiment of the present application is a terminal device configured to check the consistency of the JSON message.
  • the terminal device may be a PC, a smart phone, or a server device on which a virtual machine runs.
  • the terminal device may include: a processor 1001 , such as a CPU, a network interface 1004 , a user interface 1003 , a memory 1005 , and a communication bus 1002 .
  • the communication bus 1002 is used to realize connection and communication between these components.
  • the user interface 1003 may include a display screen (Display), an input unit such as a keyboard (Keyboard), and the optional user interface 1003 may also include a standard wired interface and a wireless interface.
  • the network interface 1004 may include a standard wired interface and a wireless interface (such as a WI-FI interface).
  • the memory 1005 can be a high-speed RAM memory, or a stable memory (non-volatile memory), such as a disk memory.
  • the memory 1005 may also be a storage device independent of the aforementioned processor 1001 .
  • the structure of the terminal device shown in FIG. 1 does not constitute a limitation on the device, and may include more or less components than those shown in the figure, or combine some components, or arrange different components.
  • the memory 1005 as a computer storage medium may include an operating system, a network communication module, a user interface module, and a checking program for JSON messages.
  • the network interface 1004 is mainly used to connect the background server and carry out data communication with the background server;
  • the user interface 1003 is mainly used to connect the client (client) and carry out data communication with the client;
  • the device 1001 can be used to call the verification program of the JSON message stored in the memory 1005, and perform the operations in the following JSON message verification method.
  • Json Java Script Object Notation, JS object notation, a lightweight data exchange format, JS is called Java Script, which is a programming language
  • Java Script Java Script
  • JSON message checking method is to use tools such as Beyond Compare (a text file comparison tool) or based on a simple Json open source package to compare data consistency.
  • Beyond Compare a text file comparison tool
  • these checking methods cannot implement data consistency checks in situations where the data nesting level of the JSON message itself is deep, fields change, or there is an unsorted data list in the JSON message, resulting in low efficiency of the JSON message consistency check.
  • FIG. 2 is a schematic flow chart of the first embodiment of the method for checking JSON messages of this application, the method for checking JSON messages of this application is applied to
  • the checking method of the JSON message in this application includes:
  • Step S10 obtaining the JSON message to be checked and a preset message checking rule, wherein the message checking rule is configured based on the JSON message to be checked;
  • the preset message checking rules are pre-configured and generated based on the JSON message to be checked, and stored in the corresponding checking rule base, so as to perform consistent
  • the checking rule base may be MySQL (a relational database management system) or SQLite (a light database) maintained in the local storage space of the terminal device.
  • the terminal device obtains the JSON message to be checked that currently needs to be checked for consistency from the database storing the JSON message, and obtains the consistency check for the JSON message to be checked from the check rule library that stores message checking rules. Checked packet check rules.
  • the database storing JSON messages is a specific storage space independently configured on the terminal side in the local storage space and named "JSON message library".
  • the space can also be maintained as MySQL or SQLite.
  • the terminal device will write the JSON messages generated during development, testing and even operation into the "JSON message library”.
  • a request for consistency check of the source message and target message generated before and after a certain interface change, that is, the source message and target message are regarded as the JSON message to be checked, and the JSON message library is obtained from the "JSON message library".
  • the JSON message to be checked is ready for subsequent consistency check.
  • the terminal device obtains the JSON message to be checked from the "JSON message library", it also synchronously obtains the pre-configured generation based on the JSON message to be checked in the "checking rule base" for use in Check the message checking rules to check whether the source message and the target message in the JSON message to be checked are consistent.
  • the checking method of the JSON message of the present application may also include:
  • Step S50 generating a message checking rule for performing consistency check on the JSON message to be checked based on the configuration of the JSON message to be checked.
  • the terminal device After the terminal device receives the request for consistency check on the JSON message and determines the JSON message to be checked pointed to by the request, it immediately generates a consistency check message based on the configuration of the JSON message to be checked.
  • the message check rule of the sex check is used, and the message check rule is stored for calling.
  • the terminal device after the terminal device generates a message checking rule for consistency checking of the JSON message to be checked based on the configuration of the JSON message to be checked, it can follow the received JSON message The time of the request for the consistency check of the message, and the message check rule is stored in the check rule base. In this way, when the terminal device starts to check the consistency of the JSON message to be checked, it can accurately extract the message checking rule from the checking rule base according to the requested time and use it to perform consistency check on the JSON message to be checked. gender check.
  • the terminal device after the terminal device is configured to generate a message checking rule for consistency checking of the JSON message to be checked, it can also directly store the message checking rule in the checking rule base according to the current time, so that the terminal device When the consistency check for the JSON message to be checked is started immediately based on the request, the terminal device can extract the latest message check rule from the check rule base according to the current time for the consistency check of the JSON message to be checked gender check.
  • the terminal device can be set to respond to the next new request after executing the current request Request), so that no other message checking rules are configured and generated after the current time, then the latest message checking rules generated by the current configuration are the rules used to check the consistency of the JSON message to be checked.
  • the above step S50 based on the configuration of the JSON message to be checked, generates a message checking rule for performing consistency check on the JSON message to be checked, which may include:
  • Step S501 obtaining a preset message checking requirement, and analyzing the data structure of the JSON message to be checked;
  • the terminal device In the process of determining the to-be-checked JSON message that currently needs to be checked for consistency, and thereby generating a message checking rule based on the configuration of the to-be-checked JSON message, the terminal device first obtains the report for the consistency check of the to-be-checked JSON message document verification requirements, and synchronously parse the data structure of the JSON message to be verified.
  • the terminal device can obtain the message checking requirements for consistency checking from the received request for consistency checking on JSON messages to be checked, and the message checking requirements include but Not limited to: comparing fields directly, comparing arrays, and comparing arrays within arrays.
  • the terminal device receives a request for consistency comparison between the source message and the target message before and after a certain interface change, and determines the source message and the target message together as the JSON to be checked After the message, the terminal device further determines from the request based on the mature command analysis technology that the current message check requirement for the consistency check of the JSON message to be checked is to directly compare fields, compare arrays, or compare arrays in arrays. Moreover, based on the mature data structure analysis technology, the terminal device analyzes and determines the data structures such as all the fields contained in the source message and the target message respectively.
  • Step S502 generate a message checking rule corresponding to the data structure according to the message checking requirement configuration and used for checking the consistency of the JSON message to be checked.
  • the terminal device After the terminal device obtains the message verification requirement for the consistency check of the JSON message to be checked, and parses out the data structure of the JSON message to be checked, it configures and generates the corresponding data structure according to the message checking requirement. Therefore, it can be used as a message checking rule for accurately checking the consistency of the checking JSON message.
  • to_path target.x.y
  • the terminal device parses and obtains all the fields contained in the source message and the target message, it can be configured to generate corresponding to all the fields so that it can be used to accurately check the source message and the target message
  • the message check rule for target message consistency is: INSERT INTO sys_checkrule_def(id,group_id,compare_type,from_path,to_path,check_first_only_if_list,check_size_if_list,from_check_fields,to_check_fields,remark)VALUES('T3_ACCT_INFO_NEW_ALUE02','FO3_UEW_IN' 'custNumber','CUST_NUMBER','N','N',”,”,”,'Compare T3accountInfos external content').
  • the terminal device obtains the message verification requirement from the request for consistency check of the JSON message to be checked: compare the arrays of the source message and the target message, so as to determine the message generated by the required configuration.
  • the name of the array needs to be configured, and the fields that do not want to be compared in the array can be configured in "sys_rmb_compare_def.ignore_field_from” and "sys_rmb_compare_def.ignore_fieldto”, and the terminal device parses and obtains that the source message and the target message respectively contain After all the fields, you can configure and generate a packet check rule that corresponds to all the fields and can be used to accurately check the consistency between the source packet and the target packet: INSERT INTO sys_checkrule_def(id,group_id,compare_type,from_path ,to_path,check_first_only_if_list,check_size_if_list,from_check_fields
  • the terminal device obtains the message verification requirement from the request for consistency check of the JSON message to be checked: compare the array within the array for the source message and the target message, so as to determine the required configuration
  • "#" needs to be used to separate the arrays of different nesting levels, and after the terminal device parses and obtains all the fields contained in the source message and the target message, it can be configured to generate and match all the fields.
  • the message check rule that corresponds to the field and can be used to accurately check the consistency between the source message and the target message is: INSERT INTO sys_checkrule_def(id,group_id,compare_type,from_path,to_path,check_first_only_if_list,check_size_if_list,from_check_fields,to_check_fields,remark )VALUES('T3_ACCT_INFO_NEW_03','T3_ACCT_INFO_NEW','LIST_LIST','accountInfos#subAccountInfo','ACCOUNT_INFOS#SUB_ACCOUNT_INFO','N','N',
  • the data structure of the JSON message to be checked is synchronously analyzed by obtaining the message checking requirement for the consistency check of the JSON message to be checked, thereby configuring and generating the data according to the message checking requirement.
  • the structure corresponds to the message checking rule that can be used to accurately check the consistency of the checked JSON message.
  • this application does not require additional development work, and only dynamically configures the corresponding message according to the message verification requirements.
  • the text checking rules By using the text checking rules, the consistency checking of complex, customizable and multi-level JSON messages can be realized, which further improves the checking efficiency.
  • Step S20 converting the first source message in the JSON message to be checked into the second source message of the Map data structure, and converting the first target message in the JSON message to be checked into Map data the second target message of the structure;
  • the terminal device After obtaining the to-be-checked JSON message that needs to be checked for consistency, the terminal device further converts the first source message in the to-be-checked JSON message into the second source message of the Map data structure, and also The first target message in the to-be-checked JSON message is also converted into the second target message of the Map data structure.
  • the terminal device receives a request for consistency check of the source message and the target message generated before and after a certain interface change in the "JSON message library", so that the source message and the target message As the JSON message to be checked, and after obtaining the JSON message to be checked from the "JSON message library" to prepare for the consistency check, the terminal device will use the source message as the first source message to use the second A source message is converted into a second source message of the Map data structure, and the terminal device also uses the target message as the first target message to convert the first target message into the second target of the Map data structure message, so that the value value can be conveniently determined and compared with the second source message and the second target message according to the Map data structure.
  • the Map data structure includes: an ordinary Map data structure and a nested Map data structure, in step S20, "the first source in the JSON message to be checked
  • the step of converting the message into the "second source message of the Map data structure" may include:
  • Step S201 determining the first message data in common form and/or the second message data in nested form in the first source message
  • the terminal device converts the first source message in the JSON message to be checked into the second source message of the Map data structure, it first determines the first message data and/or The second packet data in nested form.
  • the first message data in common form is the message content in the form of K-V in the JSON message
  • the second message data in the nested form is the K-V form in the JSON message.
  • Step S202 converting the first message data into the second source message of the common Map data structure, and/or converting the second message data into the nested Map data structure second source message;
  • the terminal device After the first source message determines the first message data in common form and/or the second message data in nested form, the terminal device respectively performs Converting, that is, directly converting the first message data into a second source message of a common Map data structure, and/or correspondingly converting the second message data into a second source of a nested Map data structure message.
  • the common Map data structure is WeMap(K, V), and the message of the WeMap(K, V) can be obtained directly based on the value algorithm WeMap.get(K) to obtain the corresponding Value; while the nested Map data structure is WeMap(K,List(WeMap((K1,V1),(K2,V2), «))), the WeMap(K,List(WeMap((K1, V1), (K2, V2),...))) messages need the value algorithm corresponding to the nesting level to obtain the Value value of the corresponding nesting level, that is, get the corresponding value through WeMap.get(K.K1) V1, WeMap.get(K.K2) obtains the corresponding V2, and the List(WeMap((K1,V1),(K2,V2),...)) can be obtained through WeMap.get(K), where V1 , V2 respectively refer to the Value corresponding to the first level and the Value corresponding to the second level. By analogy, it can support the extraction of the corresponding Value
  • step S20 the step of "converting the first target message in the JSON message to be checked into the second target message of the Map data structure"
  • Step S203 determining the third message data in common form and/or the fourth message data in nested form in the first target message
  • the terminal device converts the first target message in the JSON message to be checked into the second target message of the Map data structure, it first determines the third message data in a common form in the first target message and/or Or the fourth message data in a nested form.
  • Step S204 converting the third message data into the second target message of the common Map data structure, and/or converting the fourth message data into the nested Map data structure Second target message.
  • the terminal device After the terminal device determines the third message data in common form and/or the fourth message data in nested form in the first target message, it respectively performs Converting, that is, directly converting the third message data into a second target message of a common Map data structure, and/or correspondingly converting the fourth message data into a second target of a nested Map data structure message.
  • step S204 the step of "converting the fourth message data into the second target message of the nested Map data structure" may include:
  • Step S2041 cyclically detect the Value value type corresponding to the key value in each nesting level of the fourth message data, wherein the Value value type includes: ordinary Value value, JSON array and JSON object;
  • the terminal device converts the message data in the nested form in the JSON message to be checked into a message of the nested Map data structure, it loops for each level to obtain the Key value , Obtain the Value value corresponding to the Key and determine the type of the Value value.
  • the terminal device performs, for each nesting level of the fourth message data, first obtaining the Key value, and then obtain the Value value corresponding to the Key, and determine whether the type of the Value value is a normal Value value, JSON array, or JSON object.
  • Step S2042 if it is detected that the type of the Value is the normal Value, record the key value as a Map data structure to obtain the second target message.
  • the terminal device determines that the type of the Value value is a normal Value value, the terminal device directly sets the value of the nesting level
  • the key value of the key is directly recorded as a Map data structure. In this way, after the key values of all nested levels are recorded as a Map data structure, the second goal of converting the fourth message data into a nested Map data structure is completed. message.
  • the terminal device loops through the operations of obtaining the Key value, obtaining the Value value corresponding to the Key, and judging the type of the Value value.
  • the type is a JSON array (Array)
  • the type of the Value value is a JSON object (Object)
  • further treat the Value value as a "Json object” and write the value in the Map data: (Key, toWeMap(Value)), so that it is called in subsequent processing
  • the terminal device can directly write the Value value into the Map data, that is, write the value in the Map data
  • toList is to parse all the Key-Values in the List type and store them in the Map data structure.
  • the terminal device After the terminal device judges that the type of the Value value is a JSON array (Array), it further uses the Value value as a "List type" to enter the next level of loop processing, and writes the value in the Map data: (Key,toList( Value)), further call the "toList” to start recirculation execution for each value in the List: the operation of obtaining the Value value and judging the type of the Value value, and, similarly, the terminal device is judging the type of the Value value , if it is judged that the type of the Value value is a Json array, then continue to use the Value value as a "List type” to enter the next level of loop processing, and the List writes the value: (toList(Value)), so, you can Recursively call "toList” to recursively process the value inside the List; and when it is judged that the type of the Value value is a Json object, the Value is treated as a Json object, and the value is written into the List: (toWeMap(Value)),
  • the process that the terminal device converts the second message data in the nested form into the second source message of the nested Map data structure is the same as converting the fourth message data in the nested form into the nested Map data.
  • the process of the second target packet of the structure is the same, and will not be repeated here.
  • Step S30 if the MD5 values of the second source message and the second target message are inconsistent according to the comparison, then determine the source Value value from the second source message according to the message checking rule, and determining a target Value from the second target message according to the message checking rule;
  • the terminal device converts the first source message and the first target message in the JSON message to be checked into the second source message and the second target message of the Map data structure, and then first targets the second source message
  • the message and the second target message are compared with the MD5 value of the whole text, so that when the MD5 values of the second source message and the second target message are not the same, further according to the acquired Based on the message checking rule for consistency checking of the JSON message to be checked, the source Value is determined in the second source message, and the target Value is determined in the second target message for subsequent checking.
  • the terminal device compares the MD5 value of the whole text of the second source message and the second target message, and compares the second source message and the second target message When the MD5 values of the two target messages are the same, the terminal device can directly obtain the message checking result of the successful consistency check between the source message and the target message in the JSON message to be checked.
  • Step S40 check according to the source Value and the target Value to obtain a message check result of the JSON message to be checked.
  • the terminal device After determining the source value in the second source message and determining the target value in the second target message, the terminal device compares whether the source value and the target value are the same, and determines the corresponding Simultaneously, in the JSON message to be checked, the message checking result of the consistency check of the source message and the target message is obtained correspondingly; otherwise, when it is determined that they are different, correspondingly, in the JSON message to be checked, The check result of the message that the consistency check between the source message and the target message fails.
  • step 2 in the example of the terminal device performing a consistency check on the JSON message to be checked through the verification application (the verification APP shown in the figure) in the application process shown in Figure 5.
  • the terminal device passes the verification application
  • the source Value corresponding to the same Key is determined from the second source message and the second target message directly according to the value path corresponding to the Value type in the message check rule value and the target Value value
  • the terminal device compares whether the source Value value is the same as the target Value value, and if the source Value value is the same as the target Value value, it obtains the current verification according to the message
  • the rule checks the consistency of the JSON message to be checked, and the message check result is successful. On the contrary, if the source value and the target value are not the same, the message check result is failed, and the failure is recorded s reason.
  • the source value includes: an inner source value
  • the target value includes: an inner target value
  • Step S301 determining the first value path corresponding to the preset Value message check type in the message check rule
  • the terminal device may specifically acquire the preset Value message check type by parsing the received request for consistency check on the JSON message to be checked.
  • the terminal device determines the source value and the target value from the second source message and the second target message respectively according to the obtained message check rule, if the value obtained for the consistency check of the JSON message to be checked is Message check type, then according to the Value message check type in the second source message and the second target message, it is determined to be corresponding to the Value type for extracting the inner layer source Value value and the inner layer target Value The first value path for the value.
  • Step S302 determining the inner source Value value from the second source message according to the first value path, and determining the inner layer value from the second target message according to the value path Target Value.
  • the terminal device determines the first value path from the message verification rules according to the type of the Value message verification, it further obtains the innermost content in the multi-level second source message according to the first value path.
  • the layer source Value value and also obtain the innermost layer target Value value in the multi-level second target message according to the first value acquisition path.
  • the second source message of the Map data structure obtained by converting the first source message in the JSON message to be checked by the terminal device is: WeMap(K,List(WeMap(K1,List(WeMap( (K2,V2),(K3,V3),...)))))).
  • the terminal device obtains the Value message check type, and uses the Value message check type to determine the first value path from the message check rules: Key is K.K1.K2, then the terminal device directly According to the Key is K.K1.K2 from the second source message: WeMap(K,List(WeMap(K1,List(WeMap((K2,V2),(K3,V3),...)))))) , get the innermost V2 as the inner source Value.
  • the terminal device may obtain the innermost inner target Value from the second target packet.
  • step S40 may include:
  • Step S401 comparing the inner source Value with the inner target Value to obtain a comparison result
  • Step S402 if the comparison result is that the inner source Value and the inner target Value are the same, then obtain a message check result indicating that the consistency check of the to-be-checked JSON message is successful.
  • the terminal device follows the first value path: Key is K.K1.K2, and from the second source message: WeMap(K,List(WeMap(K1,List(WeMap((K2,V2),( In K3,V3),...)))), the innermost V2 is obtained as the inner source Value value, and, according to the first value path: Key is K.K1.K2, from the The second target message with the same Map data structure in the second source message obtains the innermost inner target Value value, and then the terminal device compares whether the inner source Value value is the same as the inner target Value value, And, when comparing the source value of the inner layer with the target value of the inner layer, it is obtained that the message checking result of the consistency checking of the JSON message to be checked according to the message checking rule is successful, and the opposite , if the source value is not the same as the target value, the message check result is failed, and the reason for the failure is recorded.
  • the source Value includes: a first source field Value
  • the target Value includes: a first target field Value
  • the above step S30 may also include:
  • Step S303 determining the second value path corresponding to the preset List message check type in the message check rule
  • the terminal device may specifically obtain the preset List message check type by parsing the received request for consistency check on the JSON message to be checked.
  • the terminal device determines the source value and the target value from the second source message and the second target message respectively according to the obtained message checking rules, if it obtains the List for consistency check for the JSON message to be checked Message check type, then according to the List message check type in the second source message and the second target message, determine that it is corresponding to the List type for extracting the first source field Value value and the first target The second path to obtain the value of the field Value.
  • Step S304 Determine the value of the first source field Value from each piece of source message data in the second source message according to the second value path, and determine the value of the first source field Value from the first value path according to the second value path.
  • the value of the first target field Value is determined in each piece of source message data of the second target message.
  • the terminal device After the terminal device determines the second value path from the message verification rules according to the type of the List message check, it further selects among the source message data of the multi-level second source message according to the second value path. , to obtain the first source field Value value of each level of source message data, and, also according to the second value path, among the source message data of the multi-level second target message, to obtain each Value of the first target field of hierarchical source packet data.
  • the second source message of the Map data structure obtained by the terminal device by converting the first source message in the JSON message to be checked is WeMap(K, List(WeMap((K1 ,V1),(K2,V2), etc)).
  • the terminal device obtains the Value message check type, and uses the List message check type to determine the second value path from the message check rules: Key is K, then the terminal device directly follows the Key as K obtains the first source message data corresponding to the outermost List from the second source message: WeMap(K,List(WeMap((K1,V1),(K2,V2),...)))
  • the source field Value value is: List(WeMap((K1,V1),(K2,V2),...)), and so on to obtain the first source field Value value of all the source message data corresponding to each level of List.
  • the terminal device may obtain the Value of the first target field of each level of source message data from each piece of source message data in the second target message.
  • step S40 may also include:
  • Step S403 sorting each of the source message data and each of the target message data according to the sorting manner corresponding to the List type in the message checking rule;
  • the terminal device may configure a sorting field in the message checking rule based on the received request for consistency checking on the JSON message to be checked.
  • the terminal device After the terminal device obtains the first source field Value value of the source message data corresponding to each layer List of the second source message, and the target message data corresponding to each layer List of the second target message After the value of the first target field Value, the terminal device first sorts the multiple pieces of message data in the List of each level according to the sorting field configured in the message checking rule to obtain the sorted message data.
  • Step S404 checking whether the number of the first data pieces of each of the sorted source message data and each of the target message data is consistent;
  • the terminal device sorts each piece of source message data and each piece of target message data, the first data number of each piece of source message data and each piece of target message data after the sorting is according to the message checking rule Is it consistent.
  • the terminal device After the terminal device respectively sorts the multiple pieces of message data in the List of each level according to the sorting field configured in the message checking rule to obtain the sorted message data, it detects the number of items in the message checking rule. Whether the check rule for the number of data items in the List is configured (assumed to be: check that the number of items in the source message data and the target message data are the same, or, check that the number of items in the source message data cannot be less than the number of target message data number of items, etc.), thus, if it is detected that the check rule is configured in the message check rule, the number of message data items in the List of each level corresponds to each target item after sorting the source message data. After the message data is sorted, compare the number of message data items in the list of each level to determine whether the numbers are the same. If they are not the same, return the verification failure and record the reason for the failure.
  • Step S405 if it is checked that the number of the first data items is consistent, then compare the value of the first source field Value with the value of the first target field;
  • Step S406 when the value of the first source field Value and the value of the first target field are the same after comparison, obtain a message check result indicating that the consistency check of the JSON message to be checked is successful.
  • the terminal device When the terminal device checks that the number of first data pieces of each piece of source message data and each piece of target message data is consistent after sorting, it further performs the determined first source field Value value and the first target field Value value. Compare; and when comparing the first source field Value value and the first target field Value value, correspondingly obtain the message that the consistency check of the source message and the target message is successful in the JSON message to be checked. Text check results.
  • the process for the terminal device to check whether the first source field Value and the first target field Value are consistent is the same as the above-mentioned process for checking whether the source Value and the target Value are consistent. I won't go into too much detail here.
  • the terminal device checks the first source field Value value and the first target field Value value it also checks whether there is a configuration that must check the first piece of data in the message check rule, and, similarly, if it exists but checks to The second source message and the second target message do not conform to the rules, and the result of the message check is failure, and the reason for the failure is recorded; and the terminal device checks for each source message data or target message in each layer List The data can be checked one by one according to the fields.
  • the source Value includes: a second source field Value
  • the target Value includes: a second target field Value.
  • the above step S30 may also include:
  • Step S305 determining the third value path corresponding to the preset List_List message checking type in the message checking rule
  • the terminal device may specifically obtain the preset List_List message check type by parsing the received request for consistency check on the JSON message to be checked.
  • the terminal device determines the source value and the target value from the second source message and the second target message respectively according to the obtained message checking rules, if it obtains the List_List for consistency checking of the JSON message to be checked Message check type, then according to the List_List message check type in the second source message and the second target message, determine that it is corresponding to the List_List type for extracting the second source field Value value and the second target The third value path of the value of the field Value.
  • Step S306 Determine the value of the second source field Value from each piece of source message data in the second source message according to the third value path, and determine the value of the second source field Value from the first value path according to the third path.
  • the value of the second target field Value is determined in each item of target message data of the second target message.
  • the terminal device determines the third value-taking path from the message checking rules according to the message checking type of List_List, that is, further according to the third value-taking path, among the source message data of the multi-level second source message , to obtain the second source field Value value of each level of source message data, and, also according to the third value path, among the source message data of the multi-level second target message, to obtain each The value of the second target field Value of the hierarchical source message data.
  • the second source message of the Map data structure obtained by the terminal device by converting the first source message in the JSON message to be checked is WeMap(K, List(WeMap) in the form of K, List(List) (K1,List(WeMap((K2,V2),(K3,V3), etc))))).
  • the terminal device obtains the List_List message check type, and uses the List_List message check type to determine the third value path from the message check rule: Key is K
  • the terminal device directly follows the Key as K obtains the second source message data corresponding to the outermost List from the second source message: WeMap(K,List(WeMap((K1,V1),(K2,V2),...))).
  • the Value value of the source field is: Value is List(K1,List(WeMap((K2,V2),(K3,V3), «))), and so on to get all the source message data corresponding to each level of List The value of the second source field.
  • the terminal device can obtain the value of the second target field of the source message data of each level from each piece of source message data in the second target message.
  • step S40 may also include:
  • Step S407 checking the second number of data pieces of the source message data and the target message data layer by layer from outside to inside according to the hierarchical order;
  • the hierarchical order is the hierarchical order of the respective message data in the second source message and the second target message indicated by each layer of List in the Map data structure, for example , when the second source message is WeMap(K,List(WeMap(K1,List(WeMap((K2,V2),(K3,V3),...))))))) in the form of K,List(List),
  • the outermost source message data indicated by List is: WeMap(K,List(WeMap(K1,List(WeMap((K2,V2),(K3,V3),...))))))))))))
  • the innermost source message data indicated by the List is: WeMap((K2, V2), (K3, V3),).
  • the terminal device detects whether a check rule for the number of data items in the List is configured in the message check rule, and when it detects that the check rule is configured in the message check rule, it checks each source message Data, according to the order of levels indicated by the List, the number of source message data in each level of List is compared with the number of target message data in each level of List to determine whether the numbers are the same, if If the number of checks is not the same, return check failure and record the reason for the failure.
  • Step S408 if it is checked that the number of the second data pieces is the same, compare the value of the second source field Value with the value of the second target field;
  • Step S409 when the value of the second source field Value and the value of the second target field are the same after comparison, obtain a message check result indicating that the consistency check of the JSON message to be checked is successful.
  • the terminal device checks layer by layer that the number of data pieces of each piece of source message data and each piece of target message data is consistent, it further compares the determined value of the second source field with the value of the second target field ; and when the second source field Value value is consistent with the second target field Value value, correspondingly obtain the message check that the consistency check between the source message and the target message is successful in the JSON message to be checked result.
  • the process for the terminal device to check whether the value of the second source field is consistent with the value of the second target field is the same as the process for checking whether the value of the source value and the target value are consistent. I won't go into too much detail here.
  • the terminal device checks the data in the inner List according to the hierarchical order it is based on List(WeMap(K1,List(Map((K2,V2),(K3,V3),...))))))))))))))))))),
  • K1 to determine the Value value is List(WeMap((K2,V2),(K3,V3),...)
  • the check rule is the same as the above terminal equipment in determining The verification process when the message verification type is List type.
  • the application JSON may also include:
  • Step S60 recording the message checking result in a data table associated with a preset checking application for output, wherein the running mode of the preset checking application is a background running mode; or,
  • Step S70 outputting the message checking result through a preset API.
  • the terminal device can perform the process of performing the consistency check for the JSON message to be checked in the above steps by checking that the application is running in the background.
  • the terminal device can also embed a functional business module, and the business module that performs the message checking function embedded in any application performs the above-mentioned steps to perform the process of consistency checking for the JSON message to be checked.
  • the terminal device After the terminal device checks the consistency of the JSON message to be checked in the background operation mode through the checking application and obtains the message checking result, it will directly record the checking result of the message in the data table associated with the checking application, and based on Display the data table to output the verification result of the message.
  • the terminal device After the terminal device performs the checking process of the JSON message to be checked based on the background operation mode through the checking application, and after obtaining the message checking result of the consistency check, the terminal device writes the message checking as shown in Figure 4 In the field "compare_status" of the message table (assumed to be named: sys_compare_payload) describing the checking application (when the message checking result is a failure, the checking exception information will be written in the field "error_msg", so that the message table When displaying, the verification result of the message can be output.
  • compare_status of the message table (assumed to be named: sys_compare_payload) describing the checking application (when the message checking result is a failure, the checking exception information will be written in the field "error_msg", so that the message table When displaying, the verification result of the message can be output.
  • the data table associated with the checking application can also be stored in MySQL or SQLLite like the checking rule library storing message checking rules or the JSON message library storing JSON messages.
  • the terminal device After the terminal device checks the consistency of the JSON message to be checked and obtains the message checking result through the business module embedded in the application that performs the message checking function, it will obtain the JSON message to be checked and the message checking result through the business module.
  • the application program interface enabled at the time of the rule directly feeds back the verification result of the message.
  • the terminal device uses the business module again to obtain the JSON message to be checked
  • the API interface the application program interface enabled when checking the rules with the message, directly returns the message check (when the message check result is a failure, the exception information is also checked synchronously through the API interface.
  • the terminal device when the terminal device outputs the message check result for the consistency check of the JSON message to be checked by checking the message table of the application or the application program interface of the business module, if the If the message verification result is failure, the terminal device can also synchronously issue an alarm for the inconsistency of the to-be-checked JSON message.
  • the terminal device can perform the process of checking the consistency of the JSON message to be checked in the above steps by checking that the application is running in the background, or the terminal device can also be embedded in a functional business module.
  • the business module that performs the message checking function embedded in any application executes the above-mentioned steps to check the consistency of the JSON message to be checked.
  • this application implements running in the background as an application to directly check the source JSON message and the target JSON message , or embedded into other applications, and perform data verification through the API interface, which improves the flexibility of JSON message consistency verification.
  • the checking method of the JSON message provided by this application is to obtain the JSON message to be checked that currently needs to be checked for consistency from the database storing the JSON message through the terminal device, and obtain from the checking rule base storing the message checking rules.
  • a message checking rule for consistency checking of the JSON message to be checked the first source message in the JSON message to be checked is converted into a second source message of the Map data structure, and the The first target message in the JSON message to be checked is also converted into the second target message of the Map data structure; according to the message checking rule obtained for the consistency check of the JSON message to be checked, Determine the source Value value in the second source message, and determine the target Value value in the second target message for subsequent checking; by comparing whether the source Value value and the target Value value are the same, and determine the corresponding Simultaneously, in the JSON message to be checked, the message checking result of the consistency check of the source message and the target message is obtained correspondingly; otherwise, when it is determined that they are different, correspondingly, in the JSON
  • this application converts the JSON message into a Map data structure, and according to the pre-configured message check rules based on The Map data structure determines the Value value to check the consistency of the message. In this way, it can realize convenient and accurate processing and checking of any field of the JSON message, effectively avoiding the situation that the traditional method cannot be checked, and improving the JSON report. The efficiency of document consistency check.
  • the present application also provides a checking device for a JSON message, please refer to Figure 6, the checking device for the JSON message includes:
  • the message check preparation module 10 is used to obtain the JSON message to be checked and a preset message check rule, wherein the message check rule is configured based on the JSON message to be checked;
  • Message conversion module 20 for converting the first source message in the JSON message to be checked into the second source message of the Map data structure, and converting the first target message in the JSON message to be checked The text is converted into the second target message of the Map data structure;
  • Value determination module 30 configured to determine the source from the second source message according to the message checking rules if the MD5 values of the second source message and the second target message are inconsistent after comparison Value value, and determine the target Value value from the second target message according to the message checking rule;
  • a checking module 40 configured to check according to the source Value and the target Value to obtain a message checking result of the to-be-checked JSON message.
  • the source Value value includes: an inner layer source Value value
  • the target Value value includes: an inner layer target Value value
  • the Value determination module 30 includes:
  • a first path determination unit configured to determine a first value path corresponding to the preset Value message check type in the message check rule
  • a first Value determination unit configured to determine the inner source Value value from the second source message according to the first value path, and determine the inner source Value value from the second target message according to the value path determining the inner target Value;
  • Check module 40 including:
  • a first comparison unit configured to compare the inner source Value with the inner target Value to obtain a comparison result
  • the first result determination unit is configured to obtain a message that the consistency check of the JSON message to be checked is successful if the comparison result is that the inner source value and the inner target value are the same. Check the results.
  • the source Value value includes: a first source field Value value
  • the target Value value includes: a first target field Value value
  • the Value determination module 30 includes:
  • a second path determination unit configured to determine a second value path corresponding to the preset List message check type in the message check rule
  • a second Value determination unit configured to determine the value of the first source field Value from each piece of source message data in the second source message according to the second value path, and according to the second value path The path determines the value of the first target field Value from each piece of source message data in the second target message.
  • checking module 40 includes:
  • a sorting unit configured to sort each of the source message data and each of the target message data according to the sorting manner corresponding to the List type in the message checking rule;
  • a first checking unit configured to check whether the number of first pieces of data in each of the sorted source message data and each of the target message data is consistent
  • the second comparison unit is configured to compare the value of the first source field with the value of the first target field if the number of the first data pieces is checked to be consistent;
  • the second result determination unit is configured to obtain a message check that the consistency check of the JSON message to be checked is successful when the value of the first source field is the same as that of the first target field. result.
  • the source Value value includes: a second source field Value value
  • the target Value value includes: a second target field Value value
  • the Value determination module 30 includes:
  • a third path determination unit configured to determine a third value path corresponding to the preset List_List message check type in the message check rule
  • a third Value determination unit configured to determine the value of the second source field Value from each piece of source message data in the second source message according to the third value path, and according to the third value path The path determines the value of the second target field Value from each item of target message data in the second target message.
  • checking module 40 includes:
  • the second checking unit is configured to check the second number of data pieces of the source message data and the target message data layer by layer from outside to inside according to the hierarchical order;
  • a third comparison unit configured to compare the second source field Value with the second target field Value if the number of the second data pieces is found to be consistent
  • the third result determination unit is configured to obtain a message check that the consistency check of the JSON message to be checked is successful when the value of the second source field Value and the value of the second target field are the same after comparison. result.
  • checking device of the JSON message of the present application also includes:
  • a generating module configured to obtain a preset message checking requirement, and parse the data structure of the JSON message to be checked, so as to generate the data structure corresponding to the JSON message to be checked according to the message checking requirement. Packet checking rules for checking the consistency of the packets.
  • the device further includes:
  • the first output module is configured to record the message checking result in a data table associated with a preset checking application for output, wherein the running mode of the preset checking application is a background running mode; or,
  • the second output module is configured to output the message checking result through a preset application program interface.
  • Map data structure includes: a common Map data structure and a nested Map data structure
  • the message conversion module 20 is also used for:
  • the message conversion module 20 is also used for:
  • message conversion module 20 is also used for:
  • the Value value type includes: ordinary Value value, JSON array and JSON object;
  • the application also provides a checking device for a JSON message.
  • the checking device for a JSON message includes: a memory, a processor, and a checking program for a JSON message stored on the memory and operable on the processor.
  • the present application also provides a computer storage medium.
  • the checking program of the JSON message is stored on the computer storage medium of the application, and the checking program of the JSON message is implemented when the processor executes the steps of the checking method of the JSON message as described above.
  • the method implemented when the JSON message checking program running on the processor is executed can refer to the various embodiments of the JSON message checking method in this application, and will not be repeated here.
  • the present application also provides a computer program product.
  • the computer program product of the present application includes a JSON message checking program, and when the JSON message checking program is executed by a processor, the steps of the JSON message checking method described above are implemented.
  • the method implemented when the JSON message checking program running on the processor is executed can refer to the various embodiments of the JSON message checking method in this application, and will not be repeated here.
  • the term “comprises”, “comprises” or any other variation thereof is intended to cover a non-exclusive inclusion such that a process, method, article or system comprising a set of elements includes not only those elements, It also includes other elements not expressly listed, or elements inherent in the process, method, article, or system. Without further limitations, an element defined by the phrase “comprising a " does not preclude the presence of additional identical elements in the process, method, article or system comprising that element.
  • the methods of the above embodiments can be implemented by means of software plus a necessary general-purpose hardware platform, and of course also by hardware, but in many cases the former is better implementation.
  • the technical solution of the present application can be embodied in the form of a software product in essence or the part that contributes to the prior art, and the computer software product is stored in a storage medium as described above (such as ROM/RAM , magnetic disk, optical disk), including several instructions to make a terminal device (which may be a mobile phone, computer, server, air conditioner, or network device, etc.) execute the methods described in various embodiments of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Debugging And Monitoring (AREA)

Abstract

La présente demande se rapporte au domaine technique de la technologie financière (Fintech) et divulgue un procédé de vérification de paquets JSON et un appareil de vérification de paquets JSON. Le procédé consiste : à acquérir un paquet JSON à vérifier et une règle de vérification de paquet prédéfinie, la règle de vérification de paquet étant obtenue par configuration sur la base du paquet JSON à vérifier ; à convertir un premier paquet source dans le paquet JSON à vérifier en un second paquet source d'une structure de données Map et à convertir un premier paquet cible dans le paquet JSON à vérifier en un second paquet cible de la structure de données Map ; si une valeur MD5 du second paquet source est incompatible avec une valeur MD5 du second paquet cible après comparaison, à déterminer une valeur source à partir du second paquet source selon la règle de vérification de paquet et à déterminer une valeur cible à partir du second paquet cible selon la règle de vérification de paquet ; et à réaliser une vérification en fonction de la valeur source et de la valeur cible pour obtenir un résultat de vérification de paquet du paquet JSON à vérifier.
PCT/CN2021/139563 2021-06-30 2021-12-20 Procédé de vérification de paquets json et appareil de vérification de paquets json WO2023273218A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202110746878.X 2021-06-30
CN202110746878.XA CN113489593B (zh) 2021-06-30 2021-06-30 Json报文的核对方法和json报文的核对装置

Publications (1)

Publication Number Publication Date
WO2023273218A1 true WO2023273218A1 (fr) 2023-01-05

Family

ID=77939273

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/139563 WO2023273218A1 (fr) 2021-06-30 2021-12-20 Procédé de vérification de paquets json et appareil de vérification de paquets json

Country Status (2)

Country Link
CN (1) CN113489593B (fr)
WO (1) WO2023273218A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117370398A (zh) * 2023-11-15 2024-01-09 航天信息(广东)有限公司 一种变更数据的比对方法及装置

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113489593B (zh) * 2021-06-30 2022-11-08 深圳前海微众银行股份有限公司 Json报文的核对方法和json报文的核对装置
CN114338835A (zh) * 2021-12-31 2022-04-12 中企云链(北京)金融信息服务有限公司 数据报文动态转换方法以及装置、存储介质、电子装置

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110162509A (zh) * 2019-04-26 2019-08-23 平安普惠企业管理有限公司 文件比对方法、装置、计算机设备及存储介质
CN110377704A (zh) * 2019-07-22 2019-10-25 北京百度网讯科技有限公司 数据一致性的检测方法、装置和计算机设备
CN112084109A (zh) * 2020-09-01 2020-12-15 中国银联股份有限公司 系统测试方法、装置、设备及介质
US20210034587A1 (en) * 2019-08-02 2021-02-04 Timescale, Inc. Type-specific compression in database systems
CN112416944A (zh) * 2020-12-03 2021-02-26 云知声智能科技股份有限公司 一种同步业务数据的方法和设备
CN113489593A (zh) * 2021-06-30 2021-10-08 深圳前海微众银行股份有限公司 Json报文的核对方法和json报文的核对装置

Family Cites Families (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107547688B (zh) * 2017-09-06 2020-07-10 新华三技术有限公司 一种报文处理方法和装置
CN111181857B (zh) * 2018-11-09 2020-12-29 深圳市中兴微电子技术有限公司 一种报文处理方法及装置、存储介质、光网络终端
CN110912655B (zh) * 2019-12-24 2023-01-20 瑞斯康达科技发展股份有限公司 一种数据冗余备份方法、装置、设备及介质
CN112491901B (zh) * 2020-11-30 2023-03-24 北京锐驰信安技术有限公司 一种网络流量精细化筛选装置及方法
CN112699137B (zh) * 2021-01-04 2023-09-12 远光软件股份有限公司 一种跨系统的财务数据处理方法及装置

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110162509A (zh) * 2019-04-26 2019-08-23 平安普惠企业管理有限公司 文件比对方法、装置、计算机设备及存储介质
CN110377704A (zh) * 2019-07-22 2019-10-25 北京百度网讯科技有限公司 数据一致性的检测方法、装置和计算机设备
US20210034587A1 (en) * 2019-08-02 2021-02-04 Timescale, Inc. Type-specific compression in database systems
CN112084109A (zh) * 2020-09-01 2020-12-15 中国银联股份有限公司 系统测试方法、装置、设备及介质
CN112416944A (zh) * 2020-12-03 2021-02-26 云知声智能科技股份有限公司 一种同步业务数据的方法和设备
CN113489593A (zh) * 2021-06-30 2021-10-08 深圳前海微众银行股份有限公司 Json报文的核对方法和json报文的核对装置

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117370398A (zh) * 2023-11-15 2024-01-09 航天信息(广东)有限公司 一种变更数据的比对方法及装置
CN117370398B (zh) * 2023-11-15 2024-05-28 航天信息(广东)有限公司 一种变更数据的比对方法及装置

Also Published As

Publication number Publication date
CN113489593B (zh) 2022-11-08
CN113489593A (zh) 2021-10-08

Similar Documents

Publication Publication Date Title
WO2023273218A1 (fr) Procédé de vérification de paquets json et appareil de vérification de paquets json
US11487772B2 (en) Multi-party data joint query method, device, server and storage medium
US9483386B2 (en) Information interaction test device and method based on automatic generation of associated test cases
US11068457B2 (en) Creating index in blockchain-type ledger
CN112181804B (zh) 一种参数校验方法、设备以及存储介质
US20200175118A1 (en) Systems and methods for dynamically expanding natural language processing agent capacity
CN109740129B (zh) 基于区块链的报表生成方法、装置、设备及可读存储介质
CN101930400A (zh) Sdk自动化测试系统及方法
CN109800258A (zh) 数据文件部署方法、装置、计算机设备及存储介质
CN111026670B (zh) 测试用例的生成方法、测试用例的生成装置及存储介质
CN109871289A (zh) 一种远程过程调用rpc服务生成方法及装置
CN112232881A (zh) 一种数据检测方法、装置、电子设备及存储介质
CN107276912B (zh) 存储器、报文处理方法及分布式存储系统
CN114168149A (zh) 一种数据转换方法及装置
CN112395339B (zh) 系统间数据准入校验方法、装置、计算机设备和存储介质
CN112235124B (zh) 一种皮基站配置方法、装置、存储介质和电子装置
CN110728118B (zh) 跨数据平台的数据处理方法、装置、设备及存储介质
US20110213663A1 (en) Service intelligence module program product
CN114281549A (zh) 数据的处理方法及装置
CN114866627A (zh) 报文核对方法、装置、处理器及电子设备
CN113742529A (zh) 一种多笔表格前端处理方法及装置
CN113204558A (zh) 数据表结构自动更新方法和装置
CN117573730B (zh) 数据处理方法、装置、设备、可读存储介质及程序产品
CN113190236B (zh) Hql脚本校验方法及装置
CN117555533B (zh) 代码生成方法、电子设备及存储介质

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21948143

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE