CN107315958A - The legality identification method and device of data object - Google Patents
The legality identification method and device of data object Download PDFInfo
- Publication number
- CN107315958A CN107315958A CN201610266858.1A CN201610266858A CN107315958A CN 107315958 A CN107315958 A CN 107315958A CN 201610266858 A CN201610266858 A CN 201610266858A CN 107315958 A CN107315958 A CN 107315958A
- Authority
- CN
- China
- Prior art keywords
- verified
- data object
- information
- configuration file
- rule
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
Landscapes
- Engineering & Computer Science (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
This application discloses the legality identification method of data object and device.One embodiment of methods described includes:In response to receiving data object to be verified, the type of data object to be verified is judged;Loading and the checking configuration file of the type matching of data object to be verified;Parsing verifies configuration file to generate rule objects corresponding with data object to be verified;And data object to be verified is verified based on rule objects corresponding with data object to be verified, and export the result information.The embodiment realizes the efficient verification to different types of data object.
Description
Technical field
The application is related to field of computer technology, and in particular to Internet technical field, especially relates to
And the legality identification method of data object.
Background technology
Spring MVC flourish and for the use of being provided for internet developer it is easy
Data tie up fixed sum data formatted presentation function, for example:Foreground (such as terminal) incoming word
Symbol string (String) categorical data, service end can be more easily using Spring MVC frameworks
String is tied to date data (Date) type, can also be more convenient by Date data class
Type changes into String types and provides page presentation.But for the legitimacy of foreground incoming data
Checking, lacks ripe easy-to-use validation framework.
In the prior art, the corresponding service logic difference logarithm in each operation layer of reception data
According to progress legitimate verification.However, operation layer causes that operation layer seems very swelling to data check
It is swollen, and the really inadequate simple and clear of business processing code.In addition, data validation
Code can not be multiplexed well, each new demand new business almost must deduplication write identical or phase
Near check logic.
The content of the invention
The purpose of the application be to propose a kind of legality identification method of improved data object and
Device, to solve the technical problem that background section above is mentioned.
In a first aspect, this application provides a kind of legality identification method of data object, it is described
Method includes:In response to receiving data object to be verified, the class of data object to be verified is judged
Type;Loading and the checking configuration file of the type matching of data object to be verified;Parsing checking is matched somebody with somebody
File is put to generate rule objects corresponding with data object to be verified;And based on it is to be verified
The corresponding rule objects of data object are verified to data object to be verified, and export checking knot
Fruit information;Wherein, rule objects include at least one rule.
In certain embodiments, data object to be verified to the form data that terminal is sent by entering
Row data are bound and generated.
In certain embodiments, the result information includes being proved to be successful information and authentication failed letter
Breath;Data object to be verified is tested based on rule objects corresponding with data object to be verified
Demonstrate,proving, and export the result includes:The attribute information of data object to be verified is obtained, wherein,
Attribute information includes the property value and/or key-value pair of data object to be verified;Based on number to be verified
The attribute information of data object to be verified is verified according to the corresponding rule objects of object;If treating
Whole attribute informations of checking data object are matched with rule objects, then output is proved to be successful letter
Breath, otherwise exports authentication failed information.
In certain embodiments, the legality identification method of data object also includes:It is pre-configured with
Mode of operation is verified, wherein, checking mode of operation includes complete Validation Mode;If number to be verified
Matched according to whole attribute informations of object with rule objects, then output is proved to be successful information, no
Then output authentication failed information further comprises:By each attribute information of data object to be verified point
Do not matched with rule objects, if in the presence of with the unmatched attribute information of rule objects, it is defeated
Go out authentication failed information;Wherein, authentication failed information includes prompt message, and prompt message includes
With the unmatched attribute information of rule objects.
In certain embodiments, checking mode of operation also includes default authentication pattern;If to be verified
Whole attribute informations of data object are matched with rule objects, then output is proved to be successful information,
Otherwise output authentication failed information further comprises:If any attribute letter of data object to be verified
Breath is mismatched with rule objects, then exports authentication failed information.
In certain embodiments, the legality identification method of data object also includes:In response to connecing
Receive configuration file and update request, configuration file is updated;Wherein, configuration file updates
Request includes at least one of following:Configuration file increase request, configuration file removal request and
Configuration file modification request.
Second aspect, it is described this application provides a kind of legitimate verification device of data object
Device includes:Type judging module, is configured in response to receiving data object to be verified,
Judge the type of data object to be verified;Rules loader, is configured to loading and number to be verified
According to the checking configuration file of the type matching of object;Rule parsing device, is configured to parsing checking
Configuration file is to generate rule objects corresponding with data object to be verified;And checking actuator,
It is configured to enter data object to be verified based on rule objects corresponding with data object to be verified
Row checking, and export the result information;Wherein, rule objects include at least one rule.
In certain embodiments, data object to be verified to the form data that terminal is sent by entering
Row data are bound and generated.
In certain embodiments, the result information includes being proved to be successful information and authentication failed letter
Breath;Checking actuator is further configured to:The attribute information of data object to be verified is obtained,
Wherein, attribute information includes the property value and/or key-value pair of data object to be verified;Based on treating
The corresponding rule objects of checking data object are tested the attribute information of data object to be verified
Card;If whole attribute informations of data object to be verified are matched with rule objects, output is tested
Successful information is demonstrate,proved, authentication failed information is otherwise exported.
In certain embodiments, the legitimate verification device of data object, in addition to:Configure mould
Block, is configured to be pre-configured with checking mode of operation, wherein, checking mode of operation includes complete
Validation Mode;Checking actuator is further configured to:By each attribute of data object to be verified
Information is matched with rule objects respectively, if in the presence of with the unmatched attribute information of rule objects,
Then export authentication failed information;Wherein, authentication failed information includes prompt message, prompt message
Including with the unmatched attribute information of rule objects.
In certain embodiments, checking mode of operation also includes default authentication pattern;Checking is performed
Device is further configured to:If any attribute information of data object to be verified and rule objects are not
Matching, then export authentication failed information.
In certain embodiments, the legitimate verification device of data object also includes:Configuration file
Update module, is configured to update request in response to receiving configuration file, configuration file is entered
Row updates;Wherein, configuration file renewal request includes at least one of following:Configuration file increase
Request, configuration file removal request and configuration file modification request.
The legality identification method and device for the data object that the application is provided, by loading with treating
Verify data object type matching checking configuration file, parsing checking configuration file generation with
The corresponding rule objects of data object to be verified, then rule-based object come to data pair to be verified
As being verified, the checking to different types of data object is realized.In addition, the present embodiment
Method independently data object can be verified, tested so as to effectively improve data object
The efficiency of card.
Brief description of the drawings
Retouched by reading with reference to the detailed of being made to non-limiting example of being made of the following drawings
State, other features, objects and advantages will become more apparent upon:
Fig. 1 is that the application can apply to exemplary system architecture figure therein;
Fig. 2 is one embodiment of the legality identification method of the data object according to the application
Indicative flowchart;
Fig. 3 is another embodiment of the legality identification method of the data object according to the application
Indicative flowchart;
If Fig. 4 be data object to be verified in Fig. 3 whole attribute informations and rule objects
Matching, then output is proved to be successful information, two kinds of the step for otherwise exporting authentication failed information
The indicative flowchart of optional implementation;
Fig. 5 is one embodiment of the legitimate verification device according to the data object of the application
Structural representation;
Fig. 6 is adapted for for realizing the terminal device of the embodiment of the present application or the computer of server
The structural representation of system.
Embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is appreciated that
, specific embodiment described herein is used only for explaining related invention, rather than to the hair
Bright restriction.It also should be noted that, illustrate only for the ease of description, in accompanying drawing with
About the related part of invention.
It should be noted that in the case where not conflicting, embodiment and embodiment in the application
In feature can be mutually combined.Describe this in detail below with reference to the accompanying drawings and in conjunction with the embodiments
Application.
Fig. 1, which is shown, can apply the legality identification method or data of the data object of the application
The exemplary system architecture 100 of the embodiment of the legitimate verification device of object.
As shown in figure 1, system architecture 100 can include terminal device 101,102,103,
Network 104 and server 105.Network 104 is used in the and of terminal device 101,102,103
The medium of communication link is provided between server 105.Network 104 can include various connection classes
Type, such as wired, wireless communication link or fiber optic cables etc..
User can pass through network 104 and server 105 with using terminal equipment 101,102,103
Interaction, to receive or send message etc..It can be provided with terminal device 101,102,103
Various telecommunication customer end applications, such as web browser applications, the application of shopping class, searching class are answered
With, JICQ, mailbox client, social platform software etc..
Terminal device 101,102,103 can be browsed with display screen and supported web page
Various electronic equipments, including but not limited to smart mobile phone, tablet personal computer, E-book reader,
(Moving Picture Experts Group Audio Layer III, dynamic image is special for MP3 player
Family's compression standard audio aspect 3), MP4 (Moving Picture Experts Group Audio
Layer IV, dynamic image expert's compression standard audio aspect 4) player, portable meter on knee
Calculation machine and desktop computer etc..
Server 105 can be to provide the server of various services, for example to terminal device 101,
102nd, 103 data uploaded carry out the authentication server of verification process.Authentication server can be right
The data received are analyzed and are verified, and by the result (for example, for characterizing terminal
The whether legal the result information of data that equipment 101,102,103 is uploaded) feed back to end
End equipment.
It should be noted that the legitimate verification side for the data object that the embodiment of the present application is provided
Method is typically performed by server 105, correspondingly, and the legitimate verification device of data object is general
It is arranged in server 105.
It should be understood that the number of the terminal device, network and server in Fig. 1 is only signal
Property.According to needs are realized, can have any number of terminal device, network and server.
With continued reference to Fig. 2, it illustrates the legitimate verification side of the data object according to the application
The flow 200 of one embodiment of method.The legality identification method of described data object, bag
Include following steps:
Step 210, in response to receiving data object to be verified, data object to be verified is judged
Type.
In the present embodiment, the electronics of the legality identification method operation of data object thereon is set
Standby (such as the server shown in Fig. 1) can pass through wired connection mode or wireless connection side
The terminal that formula is used from user receives data object to be verified.It is pointed out that above-mentioned wireless
Connected mode can include but is not limited to 3G/4G connections, WiFi connections, bluetooth connection, WiMAX
Connection, Zigbee connections, UWB (ultra wideband) connections and other are currently known
Or the radio connection developed in the future.
For example, user can browse shopping class website using the web browser installed in terminal,
Or user can be accessed using the shopping class application installed in terminal and provide the shopping class application
Server.When user is by browsing final determination purchase intention (for example, clicking on the page
" buying immediately " control or " addition shopping cart " control etc.) when, server can be to end
End sends prompt message, to point out user to be logged in or register operation.Then, user can be
Relevant position input identity information (such as user name, password) in webpage or application is with progress
Register, or, can be related by inputting if user's shopping website unregistered before this
Identity information carry out registration operation.
After completion logins or registers with operation, user further can enter to webpage or application
Row operation (for example, clicking on " submission " control on the page), the identity information of input is carried
Hand over to server.
In application scenes, the identity information of user's input can be in the form of form data
Upload onto the server.Server, can be to this after the form data of terminal upload is received
Form data carries out data binding, so as to generate data object to be verified.
Step 220, loading and the checking configuration file of the type matching of data object to be verified.
In some optional implementations, after terminal to server uploads form data,
The classification of the form data can be identified for server, for example, server judges the list
Data are user's registration data or User logs in data.Complete the data binding of form data
Afterwards, server just can load corresponding checking configuration file according to the classification of form data.
In application scenes, checking configuration file can be stored in the data pair of the present embodiment
On the server of the legality identification method operation of elephant thereon, or, in other application scenarios
In, checking configuration file can also be stored in legitimacy that can be with the data object of the present embodiment
The server of verification method operation thereon carries out other terminal devices and/or the service of data interaction
On device.
Step 230, parsing verifies configuration file to generate rule corresponding with data object to be verified
Then object.
Herein, the rule objects generated after parsing can include at least one rule.
In application scenes, a portion rule in the rule objects generated after parsing
Verified available for the data format to terminal input message.If being used for for example, terminal is inputted
The numeral for the year, month, day for representing user's birthday is included in the identity information of registration shopping class website.
These rules for example may determine that whether just these characterize the digital digit of year, month, day respectively
Really (for example, characterize " year " digit whether be four), and these numeral whether locate
(for example, whether the numeral for characterizing " moon " is between 1~12 within default number range
Natural number) etc..
In addition, in application scenes, wherein one in the rule objects generated after parsing
Divider then can also be used to further verify terminal input message.For example, user inputs
Information be wherein one in username and password for logging in shopping website, rule objects
Divider can also then verify whether the user name and the password correspond to.
Step 240, based on rule objects corresponding with data object to be verified to data to be verified
Object is verified, and exports the result information.
, can be by judging data object to be verified and these in some optional implementations
Whether at least a portion in rule matches, to determine whether these data objects to be verified can be with
Pass through checking.The server of the legality identification method operation of the data object of the present embodiment thereon
(can e.g., it be logged in after checking terminates to information corresponding with data object to be verified is submitted
Or the identity information of registration shopping website) terminal send for indicating the information whether by testing
The result information of card.
The method that above-described embodiment of the application is provided is by loading the class with data object to be verified
Checking configuration file, parsing checking configuration file generation and the data object pair to be verified of type matching
The rule objects answered, then rule-based object are verified to data object to be verified, are realized
Checking to different types of data object.In addition, the method for the present embodiment can be independently
Data object is verified, so as to effectively improve the efficiency of data object checking.
It is shown in Figure 3, it is the legitimate verification side of the data object of another embodiment of the application
The indicative flowchart of method.
In the method for the present embodiment, step 310~step 330 can be used with implementing shown in Fig. 2
The similar mode of step 210~230 in example is realized.
From unlike the embodiment shown in Fig. 2, the method for the present embodiment further comprises:
Step 340, the attribute information of data object to be verified is obtained, wherein, attribute information bag
Include the property value and/or key-value pair of data object to be verified.
In application scenes, for example, data to be verified can be obtained by reflex mechanism
The attribute information of object.
Step 350, based on rule objects corresponding with data object to be verified to data to be verified
The attribute information of object is verified.
In application scenes, the rule that rule objects are included for example can be to number to be verified
Provided according to the required item of object, scope, numeral, letter etc..Or, further,
Data object to be verified can also be included URL (URL) link, it is quick
Sense word etc. is provided.
Step 360, judge data object to be verified whole attribute informations whether with rule objects
Matching.
Step 370, if matching, output is proved to be successful information.
Step 380, otherwise, authentication failed information is exported.
In some optional implementations, the method for the present embodiment can further include:
It is pre-configured with checking mode of operation.Herein, checking mode of operation can for example include
Full Validation Mode and default authentication pattern.
In these optional implementations, in the method for the present embodiment, step 360~380 can
To be realized using flow as shown in Figure 4.
Specifically, if checking mode of operation is complete Validation Mode, as shown in figure 4,
In step 410, by each attribute information of data object to be verified respectively with rule objects carry out
Match somebody with somebody.
Then, at step 420, judge whether to believe with the unmatched attribute of rule objects
Breath.
Then, in step 430, if in the presence of output authentication failed information.Otherwise, exist
In step 440, output is proved to be successful information.
In other words, if checking mode of operation be complete Validation Mode, by as above the step of
410~440, can by data object to be verified with the unmatched whole attribute informations of rule objects
Search and obtain.So, can also be to end when exporting authentication failed information to terminal
In end output data object to be verified, which is partly illegal data, so as to point out user
Change this partial data.
On the other hand, if checking mode of operation is default authentication pattern, in step 450,
In the attribute information for judging data object to be verified, if exist and the unmatched category of rule objects
Property information.
In step 460, if in the presence of with the unmatched attribute information of rule objects, output test
Demonstrate,prove failure information.Otherwise, in step 470, output is proved to be successful information.
In other words, if checking mode of operation be default authentication pattern, by as above the step of
450~470, once the attribute information for detecting data object to be verified is not present with rule objects not
The attribute information matched somebody with somebody, then do not continue checking, and export authentication failed information to terminal.Such one
Come, can be promptly to the information of terminal user's feedback validation failure, so that user resubmits
Legal data, further increase verification efficiency.
In some optional implementations, the method for each embodiment of the application can also be further
Including:
Request is updated in response to receiving configuration file, configuration file is updated.
In these optional implementations, configuration file renewal request includes at least one of following:
Configuration file increase request, configuration file removal request and configuration file modification request.
So, by more new configuration file, the increasing of proof rule can be just readily achieved
Plus, delete and change so that the application of the present processes is more extensive.
With further reference to Fig. 5, as the realization to method shown in above-mentioned each figure, the application is provided
One embodiment of the legitimate verification device of data object a kind of, the device embodiment and figure
Embodiment of the method shown in 2 is corresponding, and the device specifically can apply in various electronic equipments.
As shown in figure 5, the legitimate verification device 500 of the data object described in the present embodiment is wrapped
Include:Type judging module 510, rules loader 520, rule parsing device 530 and checking are performed
Device 540.
Wherein, type judging module 510 is configurable in response to receiving data pair to be verified
As judging the type of data object to be verified.
Rules loader 520 is configurable to loading and the type matching of data object to be verified
Verify configuration file.
Rule parsing device 530 is configurable to parsing checking configuration file to generate and number to be verified
According to the corresponding rule objects of object.
It is right based on rule corresponding with data object to be verified that checking actuator 540 is configurable to
As being verified to data object to be verified, and export the result information.Wherein, rule is right
As including at least one rule.
In some optional implementations, data object to be verified passes through the table that is sent to terminal
Forms data carries out data binding and generated.
In some optional implementations, the result information includes being proved to be successful information and tested
Demonstrate,prove failure information.
In these optional implementations, checking actuator 540 can be further configured to:
The attribute information of data object to be verified is obtained, wherein, attribute information includes data pair to be verified
The property value and/or key-value pair of elephant;Treated based on rule objects corresponding with data object to be verified
The attribute information of checking data object is verified;If whole attributes letter of data object to be verified
Breath is matched with rule objects, then output is proved to be successful information, otherwise exports authentication failed information.
In some optional implementations, the legitimate verification device of data object can also be wrapped
Include configuration module 550.
Configuration module 550 is configurable to be pre-configured with checking mode of operation.Wherein, work is verified
Operation mode can include complete Validation Mode.
In these optional implementations, checking actuator 540, which may further be configured, to be used for:
Each attribute information of data object to be verified is matched with rule objects respectively, if in the presence of with
The unmatched attribute information of rule objects, then export authentication failed information;Wherein, authentication failed
Information includes prompt message, and prompt message includes and the unmatched attribute information of rule objects.
In other optional implementations, checking mode of operation can also include default authentication
Pattern.
In these optional implementations, checking actuator 540 can also further configure use
In:If any attribute information of data object to be verified is mismatched with rule objects, output is tested
Demonstrate,prove failure information.
In some optional implementations, the legitimate verification device of data object can also enter
One step includes configuration file update module 560.
Configuration file update module 560 is configurable to please in response to receiving configuration file renewal
Ask, configuration file is updated;Wherein, configuration file, which updates request, includes following at least one
:Configuration file increase request, configuration file removal request and configuration file modification request.
It will be understood by those skilled in the art that the legitimate verification device 500 of above-mentioned data object
Also include some other known features, such as processor, memory, for unnecessarily mould
Embodiment of the disclosure is pasted, these known structures are not shown in Figure 5.
Below with reference to Fig. 6, it illustrates suitable for for realizing the terminal device of the embodiment of the present application
Or the structural representation of the computer system 600 of server.
As shown in fig. 6, computer system 600 includes CPU (CPU) 601, its
Can according to the program being stored in read-only storage (ROM) 602 or from storage part 608
The program that is loaded into random access storage device (RAM) 603 and perform various appropriate actions
And processing.In RAM 603, the system that is also stored with 600 operates required various program sums
According to.CPU 601, ROM 602 and RAM 603 are connected with each other by bus 604.Input
/ output (I/O) interface 605 is also connected to bus 604.
I/O interfaces 605 are connected to lower component:Importation 606 including keyboard, mouse etc.;
Including cathode-ray tube (CRT), liquid crystal display (LCD) etc. and loudspeaker etc.
Output par, c 607;Storage part 608 including hard disk etc.;And including such as LAN card,
The communications portion 609 of the NIC of modem etc..Communications portion 609 is via such as
The network of internet performs communication process.Driver 610 is also according to needing to be connected to I/O interfaces
605.Detachable media 611, such as disk, CD, magneto-optic disk, semiconductor memory etc.,
Be arranged on as needed on driver 610, in order to the computer program that reads from it according to
Need to be mounted into storage part 608.
Especially, in accordance with an embodiment of the present disclosure, the process described above with reference to flow chart can be with
It is implemented as computer software programs.For example, embodiment of the disclosure includes a kind of computer journey
Sequence product, it includes being tangibly embodied in the computer program on machine readable media, the meter
Calculation machine program bag, which contains, is used for the program code of the method shown in execution flow chart.Implement such
In example, the computer program can be downloaded and installed by communications portion 609 from network,
And/or be mounted from detachable media 611.
Flow chart and block diagram in accompanying drawing, it is illustrated that according to the system of the various embodiments of the application,
Architectural framework in the cards, function and the operation of method and computer program product.This point
On, each square frame in flow chart or block diagram can represent a module, program segment or code
A part, the part of the module, program segment or code is used for comprising one or more
The executable instruction of logic function as defined in realizing.It should also be noted that being used as replacement at some
In realization, the function of being marked in square frame can also be with different from the order marked in accompanying drawing hair
It is raw.For example, two square frames succeedingly represented can essentially be performed substantially in parallel, they
Sometimes it can also perform in the opposite order, this is depending on involved function.It is also noted that
It is, each square frame in block diagram and/or flow chart and the square frame in block diagram and/or flow chart
Combination, can be realized with the special hardware based system of defined function or operation is performed,
Or can be realized with the combination of specialized hardware and computer instruction.
Being described in unit involved in the embodiment of the present application can be real by way of software
It is existing, it can also be realized by way of hardware.Described unit can also be arranged on processing
In device, for example, can be described as:A kind of processor includes type judging module, rule loading
Device, rule parsing device and checking actuator.Wherein, the title of these modules is under certain conditions
The restriction in itself to the module is not constituted, for example, type judging module is also described as
" in response to receiving data object to be verified, judge the mould of the type of data object to be verified
Block ".
As on the other hand, present invention also provides a kind of nonvolatile computer storage media,
The nonvolatile computer storage media can be described in above-described embodiment included in device
Nonvolatile computer storage media;Can also be individualism, without non-in supplying terminal
Volatile computer storage medium.Above-mentioned nonvolatile computer storage media be stored with one or
The multiple programs of person, when one or more of programs are performed by an equipment so that described
Equipment:In response to receiving data object to be verified, the type of data object to be verified is judged;
Loading and the checking configuration file of the type matching of data object to be verified;Parsing checking configuration text
Part is to generate rule objects corresponding with data object to be verified;And based on data to be verified
The corresponding rule objects of object are verified to data object to be verified, and export the result letter
Breath.
Above description is only the preferred embodiment of the application and saying to institute's application technology principle
It is bright.It will be appreciated by those skilled in the art that invention scope involved in the application, is not limited
In the technical scheme of the particular combination of above-mentioned technical characteristic, do not departed from while should cover yet
In the case of the inventive concept, it is combined by above-mentioned technical characteristic or its equivalent feature
Formed by other technical schemes.Such as features described above and (but not limited to) disclosed herein
Technical characteristic with similar functions carries out technical scheme formed by replacement mutually.
Claims (12)
1. a kind of legality identification method of data object, it is characterised in that including:
In response to receiving data object to be verified, the type of the data object to be verified is judged;
Loading and the checking configuration file of the type matching of the data object to be verified;
The parsing checking configuration file is to generate rule corresponding with the data object to be verified
Object;And
Based on rule objects corresponding with the data object to be verified to the data pair to be verified
As being verified, and export the result information;
Wherein, the rule objects include at least one rule.
2. according to the method described in claim 1, it is characterised in that:
The data object to be verified data binding is carried out by the form data that is sent to terminal and
Generation.
3. according to the method described in claim 1, it is characterised in that the result information
Including being proved to be successful information and authentication failed information;
It is described to be based on rule objects corresponding with the data object to be verified to the number to be verified
Being verified according to object, and export the result includes:
The attribute information of the data object to be verified is obtained, wherein, the attribute information includes
The property value and/or key-value pair of the data object to be verified;
Based on rule objects corresponding with the data object to be verified to the data pair to be verified
The attribute information of elephant is verified;
If the whole attribute information of the data object to be verified with the rule objects
Match somebody with somebody, then output is proved to be successful information, otherwise exports authentication failed information.
4. method according to claim 3, it is characterised in that also include:
Checking mode of operation is pre-configured with, wherein, the checking mode of operation includes complete checking
Pattern;
If the whole attribute information of the data object to be verified is right with the rule
As matching, then output is proved to be successful information, otherwise exports authentication failed information and further comprises:
Each attribute information of the data object to be verified is entered with the rule objects respectively
Row matching, if in the presence of with the unmatched attribute information of the rule objects, export authentication failed
Information;
Wherein, the authentication failed information includes prompt message, and the prompt message includes and institute
State the unmatched attribute information of rule objects.
5. method according to claim 4, it is characterised in that the checking mode of operation
Also include default authentication pattern;
If the whole attribute information of the data object to be verified is right with the rule
As matching, then output is proved to be successful information, otherwise exports authentication failed information and further comprises:
If any attribute information of the data object to be verified and the rule objects are not
Match somebody with somebody, then export authentication failed information.
6. the method according to claim 1-5 any one, it is characterised in that also include:
Request is updated in response to receiving configuration file, the configuration file is updated;
Wherein, the configuration file renewal request includes at least one of following:
Configuration file increase request, configuration file removal request and configuration file modification request.
7. a kind of legitimate verification device of data object, it is characterised in that including:
Type judging module, is configured to, in response to receiving data object to be verified, judge institute
State the type of data object to be verified;
Rules loader, is configured to loading and the type matching of the data object to be verified
Verify configuration file;
Rule parsing device, be configured to parse the checking configuration file with generate with it is described to be tested
Demonstrate,prove the corresponding rule objects of data object;And
Actuator is verified, it is right to be configured to be based on rule corresponding with the data object to be verified
As being verified to the data object to be verified, and export the result information;
Wherein, the rule objects include at least one rule.
8. device according to claim 7, it is characterised in that:
The data object to be verified data binding is carried out by the form data that is sent to terminal and
Generation.
9. device according to claim 8, it is characterised in that the result information
Including being proved to be successful information and authentication failed information;
The checking actuator is further configured to:
The attribute information of the data object to be verified is obtained, wherein, the attribute information includes
The property value and/or key-value pair of the data object to be verified;
Based on rule objects corresponding with the data object to be verified to the data pair to be verified
The attribute information of elephant is verified;
If the whole attribute information of the data object to be verified with the rule objects
Match somebody with somebody, then output is proved to be successful information, otherwise exports authentication failed information.
10. device according to claim 9, it is characterised in that also include:
Configuration module, is configured to be pre-configured with checking mode of operation, wherein, the checking work
Operation mode includes complete Validation Mode;
The checking actuator is further configured to:
Each attribute information of the data object to be verified is entered with the rule objects respectively
Row matching, if in the presence of with the unmatched attribute information of the rule objects, export authentication failed
Information;
Wherein, the authentication failed information includes prompt message, and the prompt message includes and institute
State the unmatched attribute information of rule objects.
11. device according to claim 10, it is characterised in that the checking Working mould
Formula also includes default authentication pattern;
The checking actuator is further configured to:
If any attribute information of the data object to be verified and the rule objects are not
Match somebody with somebody, then export authentication failed information.
12. the device according to claim 7-11 any one, it is characterised in that also wrap
Include:
Configuration file update module, is configured to update request in response to receiving configuration file,
The configuration file is updated;
Wherein, the configuration file renewal request includes at least one of following:
Configuration file increase request, configuration file removal request and configuration file modification request.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610266858.1A CN107315958A (en) | 2016-04-26 | 2016-04-26 | The legality identification method and device of data object |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610266858.1A CN107315958A (en) | 2016-04-26 | 2016-04-26 | The legality identification method and device of data object |
Publications (1)
Publication Number | Publication Date |
---|---|
CN107315958A true CN107315958A (en) | 2017-11-03 |
Family
ID=60185272
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610266858.1A Pending CN107315958A (en) | 2016-04-26 | 2016-04-26 | The legality identification method and device of data object |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN107315958A (en) |
Cited By (11)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN108959218A (en) * | 2018-04-26 | 2018-12-07 | 北京五八信息技术有限公司 | Form validation method and device, electronic equipment and computer readable storage medium |
CN109190396A (en) * | 2018-08-27 | 2019-01-11 | 杭州安恒信息技术股份有限公司 | A kind of data automatic verification method, device and equipment |
CN109783751A (en) * | 2018-12-14 | 2019-05-21 | 平安普惠企业管理有限公司 | Form validation method and terminal device |
CN109901892A (en) * | 2017-12-11 | 2019-06-18 | 北京京东尚科信息技术有限公司 | A kind of method and apparatus of dynamic attribute verifying |
CN110021291A (en) * | 2018-12-26 | 2019-07-16 | 阿里巴巴集团控股有限公司 | A kind of call method and device of speech synthesis file |
CN110233842A (en) * | 2019-06-10 | 2019-09-13 | 腾讯科技(深圳)有限公司 | A kind of method of calibration and relevant apparatus of request |
CN110427745A (en) * | 2019-07-02 | 2019-11-08 | 五八有限公司 | Identifying code acquisition methods, device, electronic equipment and computer-readable medium |
CN111311290A (en) * | 2020-04-17 | 2020-06-19 | 广州信天翁信息科技有限公司 | Method for digitizing and verifying articles and related device |
CN111966673A (en) * | 2020-08-18 | 2020-11-20 | 深圳市维度统计咨询股份有限公司 | Big data based data auditing method and device and storage medium |
CN112380167A (en) * | 2020-11-17 | 2021-02-19 | 深圳市和讯华谷信息技术有限公司 | Batch data verification method and device, computer equipment and storage medium |
CN113282353A (en) * | 2021-06-08 | 2021-08-20 | 苏州沁游网络科技有限公司 | Data verification method, electronic equipment and storage medium |
Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101075989A (en) * | 2007-03-23 | 2007-11-21 | 腾讯科技(深圳)有限公司 | Method and system for verifying field validity |
CN101576823A (en) * | 2009-06-11 | 2009-11-11 | 阿里巴巴集团控股有限公司 | Method for verifying form control and device |
CN101727466A (en) * | 2008-10-31 | 2010-06-09 | 北大方正集团有限公司 | Method and device for verifying service data object |
CN102103639A (en) * | 2011-01-26 | 2011-06-22 | 北京京东世纪贸易有限公司 | Data verification method and device |
CN102413162A (en) * | 2011-07-29 | 2012-04-11 | 互动在线(北京)科技有限公司 | Website front-end verification method and device |
CN104049972A (en) * | 2014-06-18 | 2014-09-17 | 北京京东尚科信息技术有限公司 | Data verification method and system |
CN105068812A (en) * | 2015-08-19 | 2015-11-18 | 深圳联友科技有限公司 | Form generation method and device |
-
2016
- 2016-04-26 CN CN201610266858.1A patent/CN107315958A/en active Pending
Patent Citations (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN101075989A (en) * | 2007-03-23 | 2007-11-21 | 腾讯科技(深圳)有限公司 | Method and system for verifying field validity |
CN101727466A (en) * | 2008-10-31 | 2010-06-09 | 北大方正集团有限公司 | Method and device for verifying service data object |
CN101576823A (en) * | 2009-06-11 | 2009-11-11 | 阿里巴巴集团控股有限公司 | Method for verifying form control and device |
CN102103639A (en) * | 2011-01-26 | 2011-06-22 | 北京京东世纪贸易有限公司 | Data verification method and device |
CN102413162A (en) * | 2011-07-29 | 2012-04-11 | 互动在线(北京)科技有限公司 | Website front-end verification method and device |
CN104049972A (en) * | 2014-06-18 | 2014-09-17 | 北京京东尚科信息技术有限公司 | Data verification method and system |
CN105068812A (en) * | 2015-08-19 | 2015-11-18 | 深圳联友科技有限公司 | Form generation method and device |
Cited By (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109901892A (en) * | 2017-12-11 | 2019-06-18 | 北京京东尚科信息技术有限公司 | A kind of method and apparatus of dynamic attribute verifying |
CN108959218A (en) * | 2018-04-26 | 2018-12-07 | 北京五八信息技术有限公司 | Form validation method and device, electronic equipment and computer readable storage medium |
CN109190396A (en) * | 2018-08-27 | 2019-01-11 | 杭州安恒信息技术股份有限公司 | A kind of data automatic verification method, device and equipment |
CN109783751A (en) * | 2018-12-14 | 2019-05-21 | 平安普惠企业管理有限公司 | Form validation method and terminal device |
CN110021291A (en) * | 2018-12-26 | 2019-07-16 | 阿里巴巴集团控股有限公司 | A kind of call method and device of speech synthesis file |
CN110233842B (en) * | 2019-06-10 | 2021-07-27 | 腾讯科技(深圳)有限公司 | Request verification method and related device |
CN110233842A (en) * | 2019-06-10 | 2019-09-13 | 腾讯科技(深圳)有限公司 | A kind of method of calibration and relevant apparatus of request |
CN110427745A (en) * | 2019-07-02 | 2019-11-08 | 五八有限公司 | Identifying code acquisition methods, device, electronic equipment and computer-readable medium |
CN110427745B (en) * | 2019-07-02 | 2022-03-08 | 五八有限公司 | Verification code obtaining method and device, electronic equipment and computer readable medium |
CN111311290A (en) * | 2020-04-17 | 2020-06-19 | 广州信天翁信息科技有限公司 | Method for digitizing and verifying articles and related device |
CN111311290B (en) * | 2020-04-17 | 2023-08-08 | 广州信天翁信息科技有限公司 | Article digitizing and verifying method and related device |
CN111966673A (en) * | 2020-08-18 | 2020-11-20 | 深圳市维度统计咨询股份有限公司 | Big data based data auditing method and device and storage medium |
CN111966673B (en) * | 2020-08-18 | 2021-06-25 | 深圳市维度数据科技股份有限公司 | Big data based data auditing method and device and storage medium |
CN112380167A (en) * | 2020-11-17 | 2021-02-19 | 深圳市和讯华谷信息技术有限公司 | Batch data verification method and device, computer equipment and storage medium |
CN113282353A (en) * | 2021-06-08 | 2021-08-20 | 苏州沁游网络科技有限公司 | Data verification method, electronic equipment and storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN107315958A (en) | The legality identification method and device of data object | |
US20240087009A1 (en) | Data reconciliation based on computer analysis of data | |
CN107357914B (en) | Information processing method and device | |
US12021842B2 (en) | Headless browser system with virtual API | |
CN110490721B (en) | Financial voucher generating method and related product | |
CN109828903A (en) | Automated testing method, device, computer installation and storage medium | |
CN105653933B (en) | Plug-in loading method and device | |
CN107295095A (en) | The method and apparatus for pushing and showing advertisement | |
CN106605246A (en) | Systems and methods for authenticating a user based on a computing device | |
CN105474574A (en) | Systems and methods for authentication using a device identifier | |
CN103139761B (en) | The method and communication terminal of a kind of information real-time show | |
CN106874471A (en) | Information-pushing method and device | |
CN105141632B (en) | Method and apparatus for checking the page | |
CN105701198B (en) | Page verification method and device | |
CN110020358A (en) | Method and apparatus for generating dynamic page | |
CN107562548A (en) | The method and apparatus for transmitting data | |
CN107547524A (en) | A kind of page detection method, device and equipment | |
CN107391277A (en) | Information processing method and device | |
US20140157144A1 (en) | Network system | |
CN107341025A (en) | Using update method and device | |
CN106257879A (en) | A kind of method and apparatus downloading application | |
CN106682491A (en) | Application downloading method and device | |
CN103577180A (en) | Data processing method and data processing device | |
CN107426588A (en) | One kind obtains configuration information of television method, system and storage device | |
CN108062423A (en) | Information-pushing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20171103 |