Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Multi-type data verification method and device, computer system and readable storage medium

A data verification and database technology, which is applied in the communication field, can solve the problems of time waste, verification code business intrusion, high labor cost, etc., and achieve the effect of avoiding time and energy costs, reducing business intrusion, and reducing time

Pending Publication Date: 2020-02-07
PING AN BANK CO LTD
View PDF0 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The current verification framework, such as: hibernate validator, SpEL is very powerful, and provides great help for verifying business requests; however, when the current verification framework is used, it usually requires R&D personnel to check the status of the business request Write the corresponding verification code in real time, resulting in relatively strong business intrusion; the intrusiveness refers to the coupling between the two systems. The so-called intrusiveness refers to the scope of influence of the components designed by this framework on the system, such as To develop a system, you need to use a third-party framework. If the framework used needs to inherit or implement the classes and interfaces in the framework, it is said that the framework is intrusive; and developers must use the classes and interfaces in the configuration center when writing code. , to ensure that the verification code is available, which leads to the problem that the current verification code business is highly intrusive;;
[0003] Secondly, after the R&D personnel finish writing the verification code, it usually takes time to test whether the verification code meets the requirements, resulting in a lot of wasted time; moreover, the R&D personnel who usually write the verification code have high labor costs and need to spend a lot of time and effort cost, thus leading to high labor costs for enterprises

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multi-type data verification method and device, computer system and readable storage medium
  • Multi-type data verification method and device, computer system and readable storage medium
  • Multi-type data verification method and device, computer system and readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0052] see figure 1 and figure 2 , a kind of multi-type data verification method of the present embodiment, utilizes multi-type data verification device 1, comprises the following steps:

[0053] S1: Create a keyword library for storing keywords, a tag library for storing comparison tags, and a rule database for storing verification rules in the configuration center of the distributed cluster, and output to the server 2 that the creation is completed signal; the verification rule is used to express the corresponding relationship between the verification field and the keyword or comparison mark; wherein, the creation completion signal is output to the server 2 in the form of a communication signal;

[0054] S2: Receive the service request output by the server 2, use the keyword extraction method to obtain the key information in the service request, and extract the verification mark in the service request; respectively use the key information and the verification mark accordin...

Embodiment 2

[0137] see image 3 , a multi-type data verification device 1 of the present embodiment, comprising:

[0138] Create a receiving module 11, which is used to create a keyword library for storing keywords, a tag library for storing comparison marks, and a rule database for storing verification rules in the configuration center of the distributed cluster, and send The server 2 outputs a creation completion signal; the verification rule is used to express the corresponding relationship between the verification field and a keyword or a comparison mark; wherein, the creation completion signal is output to the server 2 in the form of a communication signal;

[0139] The rule chain formulating module 12 is used to receive the service request output by the server 2, adopt the keyword extraction method to obtain the key information in the service request, and extract the verification mark in the service request; respectively pass the key information Obtaining the verification field acc...

Embodiment 3

[0143] To achieve the above object, the present invention also provides a computer system, the computer system includes a plurality of computer equipment 3, the components of the multi-category data verification device 1 of embodiment 2 can be dispersed in different computer equipment, and the computer equipment can be It is a smartphone, tablet computer, laptop computer, desktop computer, rack server, blade server, tower server, or rack server (including an independent server, or a server cluster composed of multiple servers) that executes the program. The computer equipment in this embodiment at least includes but is not limited to: a memory 31 and a processor 32 that can communicate with each other through a system bus, such as Figure 4 shown. It should be pointed out that, Figure 4 Only the computer device is shown with the components - but it is understood that implementing all of the illustrated components is not a requirement and that more or fewer components may ins...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a multi-type data verification method and device, a computer system and a readable storage medium. The multi-type data verification method is based on Internet security, and comprises the following steps: creating a keyword library for storing keywords, a mark library for storing contrast marks, and a rule database for storing verification rules, and outputting a creation completion signal to a server; receiving a service request, obtaining key information in the service request by adopting a keyword extraction method, and extracting a verification mark in the service request; obtaining verification fields according to the verification rules through the key information and the verification marks, and summarizing the verification fields to form a verification chain;and verifying the service request by using the verification chain to obtain a verification result set, and outputting the verification result set. According to the multi-type data verification method,the situation that research and development personnel pay a lot of time and energy costs and thus the human cost investment of enterprises is high is avoided, and the business invasiveness is reduced, and the verification preparation work efficiency is improved.

Description

technical field [0001] The present invention relates to the field of communication technology, in particular to various data verification methods, devices, computer systems and readable storage media. Background technique [0002] The current verification framework, such as: hibernate validator, SpEL is very powerful, and provides great help for verifying business requests; however, when the current verification framework is used, it usually requires R&D personnel to check the status of the business request Write the corresponding verification code in real time, resulting in relatively strong business intrusion; the intrusion refers to the coupling between the two systems. The so-called intrusion refers to the scope of influence of the components designed by this framework on the system, such as To develop a system, you need to use a third-party framework. If the framework you use needs to inherit or implement the classes and interfaces in the framework, it is said that the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G06F11/07
CPCG06F11/0709Y02D10/00
Inventor 钟煜
Owner PING AN BANK CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products