CN107315958A - The legality identification method and device of data object - Google Patents

The legality identification method and device of data object Download PDF

Info

Publication number
CN107315958A
CN107315958A CN201610266858.1A CN201610266858A CN107315958A CN 107315958 A CN107315958 A CN 107315958A CN 201610266858 A CN201610266858 A CN 201610266858A CN 107315958 A CN107315958 A CN 107315958A
Authority
CN
China
Prior art keywords
verified
data object
information
configuration file
rule
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610266858.1A
Other languages
Chinese (zh)
Inventor
王勇
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201610266858.1A priority Critical patent/CN107315958A/en
Publication of CN107315958A publication Critical patent/CN107315958A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)

Abstract

This application discloses the legality identification method of data object and device.One embodiment of methods described includes:In response to receiving data object to be verified, the type of data object to be verified is judged;Loading and the checking configuration file of the type matching of data object to be verified;Parsing verifies configuration file to generate rule objects corresponding with data object to be verified;And data object to be verified is verified based on rule objects corresponding with data object to be verified, and export the result information.The embodiment realizes the efficient verification to different types of data object.

Description

The legality identification method and device of data object
Technical field
The application is related to field of computer technology, and in particular to Internet technical field, especially relates to And the legality identification method of data object.
Background technology
Spring MVC flourish and for the use of being provided for internet developer it is easy Data tie up fixed sum data formatted presentation function, for example:Foreground (such as terminal) incoming word Symbol string (String) categorical data, service end can be more easily using Spring MVC frameworks String is tied to date data (Date) type, can also be more convenient by Date data class Type changes into String types and provides page presentation.But for the legitimacy of foreground incoming data Checking, lacks ripe easy-to-use validation framework.
In the prior art, the corresponding service logic difference logarithm in each operation layer of reception data According to progress legitimate verification.However, operation layer causes that operation layer seems very swelling to data check It is swollen, and the really inadequate simple and clear of business processing code.In addition, data validation Code can not be multiplexed well, each new demand new business almost must deduplication write identical or phase Near check logic.
The content of the invention
The purpose of the application be to propose a kind of legality identification method of improved data object and Device, to solve the technical problem that background section above is mentioned.
In a first aspect, this application provides a kind of legality identification method of data object, it is described Method includes:In response to receiving data object to be verified, the class of data object to be verified is judged Type;Loading and the checking configuration file of the type matching of data object to be verified;Parsing checking is matched somebody with somebody File is put to generate rule objects corresponding with data object to be verified;And based on it is to be verified The corresponding rule objects of data object are verified to data object to be verified, and export checking knot Fruit information;Wherein, rule objects include at least one rule.
In certain embodiments, data object to be verified to the form data that terminal is sent by entering Row data are bound and generated.
In certain embodiments, the result information includes being proved to be successful information and authentication failed letter Breath;Data object to be verified is tested based on rule objects corresponding with data object to be verified Demonstrate,proving, and export the result includes:The attribute information of data object to be verified is obtained, wherein, Attribute information includes the property value and/or key-value pair of data object to be verified;Based on number to be verified The attribute information of data object to be verified is verified according to the corresponding rule objects of object;If treating Whole attribute informations of checking data object are matched with rule objects, then output is proved to be successful letter Breath, otherwise exports authentication failed information.
In certain embodiments, the legality identification method of data object also includes:It is pre-configured with Mode of operation is verified, wherein, checking mode of operation includes complete Validation Mode;If number to be verified Matched according to whole attribute informations of object with rule objects, then output is proved to be successful information, no Then output authentication failed information further comprises:By each attribute information of data object to be verified point Do not matched with rule objects, if in the presence of with the unmatched attribute information of rule objects, it is defeated Go out authentication failed information;Wherein, authentication failed information includes prompt message, and prompt message includes With the unmatched attribute information of rule objects.
In certain embodiments, checking mode of operation also includes default authentication pattern;If to be verified Whole attribute informations of data object are matched with rule objects, then output is proved to be successful information, Otherwise output authentication failed information further comprises:If any attribute letter of data object to be verified Breath is mismatched with rule objects, then exports authentication failed information.
In certain embodiments, the legality identification method of data object also includes:In response to connecing Receive configuration file and update request, configuration file is updated;Wherein, configuration file updates Request includes at least one of following:Configuration file increase request, configuration file removal request and Configuration file modification request.
Second aspect, it is described this application provides a kind of legitimate verification device of data object Device includes:Type judging module, is configured in response to receiving data object to be verified, Judge the type of data object to be verified;Rules loader, is configured to loading and number to be verified According to the checking configuration file of the type matching of object;Rule parsing device, is configured to parsing checking Configuration file is to generate rule objects corresponding with data object to be verified;And checking actuator, It is configured to enter data object to be verified based on rule objects corresponding with data object to be verified Row checking, and export the result information;Wherein, rule objects include at least one rule.
In certain embodiments, data object to be verified to the form data that terminal is sent by entering Row data are bound and generated.
In certain embodiments, the result information includes being proved to be successful information and authentication failed letter Breath;Checking actuator is further configured to:The attribute information of data object to be verified is obtained, Wherein, attribute information includes the property value and/or key-value pair of data object to be verified;Based on treating The corresponding rule objects of checking data object are tested the attribute information of data object to be verified Card;If whole attribute informations of data object to be verified are matched with rule objects, output is tested Successful information is demonstrate,proved, authentication failed information is otherwise exported.
In certain embodiments, the legitimate verification device of data object, in addition to:Configure mould Block, is configured to be pre-configured with checking mode of operation, wherein, checking mode of operation includes complete Validation Mode;Checking actuator is further configured to:By each attribute of data object to be verified Information is matched with rule objects respectively, if in the presence of with the unmatched attribute information of rule objects, Then export authentication failed information;Wherein, authentication failed information includes prompt message, prompt message Including with the unmatched attribute information of rule objects.
In certain embodiments, checking mode of operation also includes default authentication pattern;Checking is performed Device is further configured to:If any attribute information of data object to be verified and rule objects are not Matching, then export authentication failed information.
In certain embodiments, the legitimate verification device of data object also includes:Configuration file Update module, is configured to update request in response to receiving configuration file, configuration file is entered Row updates;Wherein, configuration file renewal request includes at least one of following:Configuration file increase Request, configuration file removal request and configuration file modification request.
The legality identification method and device for the data object that the application is provided, by loading with treating Verify data object type matching checking configuration file, parsing checking configuration file generation with The corresponding rule objects of data object to be verified, then rule-based object come to data pair to be verified As being verified, the checking to different types of data object is realized.In addition, the present embodiment Method independently data object can be verified, tested so as to effectively improve data object The efficiency of card.
Brief description of the drawings
Retouched by reading with reference to the detailed of being made to non-limiting example of being made of the following drawings State, other features, objects and advantages will become more apparent upon:
Fig. 1 is that the application can apply to exemplary system architecture figure therein;
Fig. 2 is one embodiment of the legality identification method of the data object according to the application Indicative flowchart;
Fig. 3 is another embodiment of the legality identification method of the data object according to the application Indicative flowchart;
If Fig. 4 be data object to be verified in Fig. 3 whole attribute informations and rule objects Matching, then output is proved to be successful information, two kinds of the step for otherwise exporting authentication failed information The indicative flowchart of optional implementation;
Fig. 5 is one embodiment of the legitimate verification device according to the data object of the application Structural representation;
Fig. 6 is adapted for for realizing the terminal device of the embodiment of the present application or the computer of server The structural representation of system.
Embodiment
The application is described in further detail with reference to the accompanying drawings and examples.It is appreciated that , specific embodiment described herein is used only for explaining related invention, rather than to the hair Bright restriction.It also should be noted that, illustrate only for the ease of description, in accompanying drawing with About the related part of invention.
It should be noted that in the case where not conflicting, embodiment and embodiment in the application In feature can be mutually combined.Describe this in detail below with reference to the accompanying drawings and in conjunction with the embodiments Application.
Fig. 1, which is shown, can apply the legality identification method or data of the data object of the application The exemplary system architecture 100 of the embodiment of the legitimate verification device of object.
As shown in figure 1, system architecture 100 can include terminal device 101,102,103, Network 104 and server 105.Network 104 is used in the and of terminal device 101,102,103 The medium of communication link is provided between server 105.Network 104 can include various connection classes Type, such as wired, wireless communication link or fiber optic cables etc..
User can pass through network 104 and server 105 with using terminal equipment 101,102,103 Interaction, to receive or send message etc..It can be provided with terminal device 101,102,103 Various telecommunication customer end applications, such as web browser applications, the application of shopping class, searching class are answered With, JICQ, mailbox client, social platform software etc..
Terminal device 101,102,103 can be browsed with display screen and supported web page Various electronic equipments, including but not limited to smart mobile phone, tablet personal computer, E-book reader, (Moving Picture Experts Group Audio Layer III, dynamic image is special for MP3 player Family's compression standard audio aspect 3), MP4 (Moving Picture Experts Group Audio Layer IV, dynamic image expert's compression standard audio aspect 4) player, portable meter on knee Calculation machine and desktop computer etc..
Server 105 can be to provide the server of various services, for example to terminal device 101, 102nd, 103 data uploaded carry out the authentication server of verification process.Authentication server can be right The data received are analyzed and are verified, and by the result (for example, for characterizing terminal The whether legal the result information of data that equipment 101,102,103 is uploaded) feed back to end End equipment.
It should be noted that the legitimate verification side for the data object that the embodiment of the present application is provided Method is typically performed by server 105, correspondingly, and the legitimate verification device of data object is general It is arranged in server 105.
It should be understood that the number of the terminal device, network and server in Fig. 1 is only signal Property.According to needs are realized, can have any number of terminal device, network and server.
With continued reference to Fig. 2, it illustrates the legitimate verification side of the data object according to the application The flow 200 of one embodiment of method.The legality identification method of described data object, bag Include following steps:
Step 210, in response to receiving data object to be verified, data object to be verified is judged Type.
In the present embodiment, the electronics of the legality identification method operation of data object thereon is set Standby (such as the server shown in Fig. 1) can pass through wired connection mode or wireless connection side The terminal that formula is used from user receives data object to be verified.It is pointed out that above-mentioned wireless Connected mode can include but is not limited to 3G/4G connections, WiFi connections, bluetooth connection, WiMAX Connection, Zigbee connections, UWB (ultra wideband) connections and other are currently known Or the radio connection developed in the future.
For example, user can browse shopping class website using the web browser installed in terminal, Or user can be accessed using the shopping class application installed in terminal and provide the shopping class application Server.When user is by browsing final determination purchase intention (for example, clicking on the page " buying immediately " control or " addition shopping cart " control etc.) when, server can be to end End sends prompt message, to point out user to be logged in or register operation.Then, user can be Relevant position input identity information (such as user name, password) in webpage or application is with progress Register, or, can be related by inputting if user's shopping website unregistered before this Identity information carry out registration operation.
After completion logins or registers with operation, user further can enter to webpage or application Row operation (for example, clicking on " submission " control on the page), the identity information of input is carried Hand over to server.
In application scenes, the identity information of user's input can be in the form of form data Upload onto the server.Server, can be to this after the form data of terminal upload is received Form data carries out data binding, so as to generate data object to be verified.
Step 220, loading and the checking configuration file of the type matching of data object to be verified.
In some optional implementations, after terminal to server uploads form data, The classification of the form data can be identified for server, for example, server judges the list Data are user's registration data or User logs in data.Complete the data binding of form data Afterwards, server just can load corresponding checking configuration file according to the classification of form data.
In application scenes, checking configuration file can be stored in the data pair of the present embodiment On the server of the legality identification method operation of elephant thereon, or, in other application scenarios In, checking configuration file can also be stored in legitimacy that can be with the data object of the present embodiment The server of verification method operation thereon carries out other terminal devices and/or the service of data interaction On device.
Step 230, parsing verifies configuration file to generate rule corresponding with data object to be verified Then object.
Herein, the rule objects generated after parsing can include at least one rule.
In application scenes, a portion rule in the rule objects generated after parsing Verified available for the data format to terminal input message.If being used for for example, terminal is inputted The numeral for the year, month, day for representing user's birthday is included in the identity information of registration shopping class website. These rules for example may determine that whether just these characterize the digital digit of year, month, day respectively Really (for example, characterize " year " digit whether be four), and these numeral whether locate (for example, whether the numeral for characterizing " moon " is between 1~12 within default number range Natural number) etc..
In addition, in application scenes, wherein one in the rule objects generated after parsing Divider then can also be used to further verify terminal input message.For example, user inputs Information be wherein one in username and password for logging in shopping website, rule objects Divider can also then verify whether the user name and the password correspond to.
Step 240, based on rule objects corresponding with data object to be verified to data to be verified Object is verified, and exports the result information.
, can be by judging data object to be verified and these in some optional implementations Whether at least a portion in rule matches, to determine whether these data objects to be verified can be with Pass through checking.The server of the legality identification method operation of the data object of the present embodiment thereon (can e.g., it be logged in after checking terminates to information corresponding with data object to be verified is submitted Or the identity information of registration shopping website) terminal send for indicating the information whether by testing The result information of card.
The method that above-described embodiment of the application is provided is by loading the class with data object to be verified Checking configuration file, parsing checking configuration file generation and the data object pair to be verified of type matching The rule objects answered, then rule-based object are verified to data object to be verified, are realized Checking to different types of data object.In addition, the method for the present embodiment can be independently Data object is verified, so as to effectively improve the efficiency of data object checking.
It is shown in Figure 3, it is the legitimate verification side of the data object of another embodiment of the application The indicative flowchart of method.
In the method for the present embodiment, step 310~step 330 can be used with implementing shown in Fig. 2 The similar mode of step 210~230 in example is realized.
From unlike the embodiment shown in Fig. 2, the method for the present embodiment further comprises:
Step 340, the attribute information of data object to be verified is obtained, wherein, attribute information bag Include the property value and/or key-value pair of data object to be verified.
In application scenes, for example, data to be verified can be obtained by reflex mechanism The attribute information of object.
Step 350, based on rule objects corresponding with data object to be verified to data to be verified The attribute information of object is verified.
In application scenes, the rule that rule objects are included for example can be to number to be verified Provided according to the required item of object, scope, numeral, letter etc..Or, further, Data object to be verified can also be included URL (URL) link, it is quick Sense word etc. is provided.
Step 360, judge data object to be verified whole attribute informations whether with rule objects Matching.
Step 370, if matching, output is proved to be successful information.
Step 380, otherwise, authentication failed information is exported.
In some optional implementations, the method for the present embodiment can further include:
It is pre-configured with checking mode of operation.Herein, checking mode of operation can for example include Full Validation Mode and default authentication pattern.
In these optional implementations, in the method for the present embodiment, step 360~380 can To be realized using flow as shown in Figure 4.
Specifically, if checking mode of operation is complete Validation Mode, as shown in figure 4, In step 410, by each attribute information of data object to be verified respectively with rule objects carry out Match somebody with somebody.
Then, at step 420, judge whether to believe with the unmatched attribute of rule objects Breath.
Then, in step 430, if in the presence of output authentication failed information.Otherwise, exist In step 440, output is proved to be successful information.
In other words, if checking mode of operation be complete Validation Mode, by as above the step of 410~440, can by data object to be verified with the unmatched whole attribute informations of rule objects Search and obtain.So, can also be to end when exporting authentication failed information to terminal In end output data object to be verified, which is partly illegal data, so as to point out user Change this partial data.
On the other hand, if checking mode of operation is default authentication pattern, in step 450, In the attribute information for judging data object to be verified, if exist and the unmatched category of rule objects Property information.
In step 460, if in the presence of with the unmatched attribute information of rule objects, output test Demonstrate,prove failure information.Otherwise, in step 470, output is proved to be successful information.
In other words, if checking mode of operation be default authentication pattern, by as above the step of 450~470, once the attribute information for detecting data object to be verified is not present with rule objects not The attribute information matched somebody with somebody, then do not continue checking, and export authentication failed information to terminal.Such one Come, can be promptly to the information of terminal user's feedback validation failure, so that user resubmits Legal data, further increase verification efficiency.
In some optional implementations, the method for each embodiment of the application can also be further Including:
Request is updated in response to receiving configuration file, configuration file is updated.
In these optional implementations, configuration file renewal request includes at least one of following: Configuration file increase request, configuration file removal request and configuration file modification request.
So, by more new configuration file, the increasing of proof rule can be just readily achieved Plus, delete and change so that the application of the present processes is more extensive.
With further reference to Fig. 5, as the realization to method shown in above-mentioned each figure, the application is provided One embodiment of the legitimate verification device of data object a kind of, the device embodiment and figure Embodiment of the method shown in 2 is corresponding, and the device specifically can apply in various electronic equipments.
As shown in figure 5, the legitimate verification device 500 of the data object described in the present embodiment is wrapped Include:Type judging module 510, rules loader 520, rule parsing device 530 and checking are performed Device 540.
Wherein, type judging module 510 is configurable in response to receiving data pair to be verified As judging the type of data object to be verified.
Rules loader 520 is configurable to loading and the type matching of data object to be verified Verify configuration file.
Rule parsing device 530 is configurable to parsing checking configuration file to generate and number to be verified According to the corresponding rule objects of object.
It is right based on rule corresponding with data object to be verified that checking actuator 540 is configurable to As being verified to data object to be verified, and export the result information.Wherein, rule is right As including at least one rule.
In some optional implementations, data object to be verified passes through the table that is sent to terminal Forms data carries out data binding and generated.
In some optional implementations, the result information includes being proved to be successful information and tested Demonstrate,prove failure information.
In these optional implementations, checking actuator 540 can be further configured to: The attribute information of data object to be verified is obtained, wherein, attribute information includes data pair to be verified The property value and/or key-value pair of elephant;Treated based on rule objects corresponding with data object to be verified The attribute information of checking data object is verified;If whole attributes letter of data object to be verified Breath is matched with rule objects, then output is proved to be successful information, otherwise exports authentication failed information.
In some optional implementations, the legitimate verification device of data object can also be wrapped Include configuration module 550.
Configuration module 550 is configurable to be pre-configured with checking mode of operation.Wherein, work is verified Operation mode can include complete Validation Mode.
In these optional implementations, checking actuator 540, which may further be configured, to be used for: Each attribute information of data object to be verified is matched with rule objects respectively, if in the presence of with The unmatched attribute information of rule objects, then export authentication failed information;Wherein, authentication failed Information includes prompt message, and prompt message includes and the unmatched attribute information of rule objects.
In other optional implementations, checking mode of operation can also include default authentication Pattern.
In these optional implementations, checking actuator 540 can also further configure use In:If any attribute information of data object to be verified is mismatched with rule objects, output is tested Demonstrate,prove failure information.
In some optional implementations, the legitimate verification device of data object can also enter One step includes configuration file update module 560.
Configuration file update module 560 is configurable to please in response to receiving configuration file renewal Ask, configuration file is updated;Wherein, configuration file, which updates request, includes following at least one :Configuration file increase request, configuration file removal request and configuration file modification request.
It will be understood by those skilled in the art that the legitimate verification device 500 of above-mentioned data object Also include some other known features, such as processor, memory, for unnecessarily mould Embodiment of the disclosure is pasted, these known structures are not shown in Figure 5.
Below with reference to Fig. 6, it illustrates suitable for for realizing the terminal device of the embodiment of the present application Or the structural representation of the computer system 600 of server.
As shown in fig. 6, computer system 600 includes CPU (CPU) 601, its Can according to the program being stored in read-only storage (ROM) 602 or from storage part 608 The program that is loaded into random access storage device (RAM) 603 and perform various appropriate actions And processing.In RAM 603, the system that is also stored with 600 operates required various program sums According to.CPU 601, ROM 602 and RAM 603 are connected with each other by bus 604.Input / output (I/O) interface 605 is also connected to bus 604.
I/O interfaces 605 are connected to lower component:Importation 606 including keyboard, mouse etc.; Including cathode-ray tube (CRT), liquid crystal display (LCD) etc. and loudspeaker etc. Output par, c 607;Storage part 608 including hard disk etc.;And including such as LAN card, The communications portion 609 of the NIC of modem etc..Communications portion 609 is via such as The network of internet performs communication process.Driver 610 is also according to needing to be connected to I/O interfaces 605.Detachable media 611, such as disk, CD, magneto-optic disk, semiconductor memory etc., Be arranged on as needed on driver 610, in order to the computer program that reads from it according to Need to be mounted into storage part 608.
Especially, in accordance with an embodiment of the present disclosure, the process described above with reference to flow chart can be with It is implemented as computer software programs.For example, embodiment of the disclosure includes a kind of computer journey Sequence product, it includes being tangibly embodied in the computer program on machine readable media, the meter Calculation machine program bag, which contains, is used for the program code of the method shown in execution flow chart.Implement such In example, the computer program can be downloaded and installed by communications portion 609 from network, And/or be mounted from detachable media 611.
Flow chart and block diagram in accompanying drawing, it is illustrated that according to the system of the various embodiments of the application, Architectural framework in the cards, function and the operation of method and computer program product.This point On, each square frame in flow chart or block diagram can represent a module, program segment or code A part, the part of the module, program segment or code is used for comprising one or more The executable instruction of logic function as defined in realizing.It should also be noted that being used as replacement at some In realization, the function of being marked in square frame can also be with different from the order marked in accompanying drawing hair It is raw.For example, two square frames succeedingly represented can essentially be performed substantially in parallel, they Sometimes it can also perform in the opposite order, this is depending on involved function.It is also noted that It is, each square frame in block diagram and/or flow chart and the square frame in block diagram and/or flow chart Combination, can be realized with the special hardware based system of defined function or operation is performed, Or can be realized with the combination of specialized hardware and computer instruction.
Being described in unit involved in the embodiment of the present application can be real by way of software It is existing, it can also be realized by way of hardware.Described unit can also be arranged on processing In device, for example, can be described as:A kind of processor includes type judging module, rule loading Device, rule parsing device and checking actuator.Wherein, the title of these modules is under certain conditions The restriction in itself to the module is not constituted, for example, type judging module is also described as " in response to receiving data object to be verified, judge the mould of the type of data object to be verified Block ".
As on the other hand, present invention also provides a kind of nonvolatile computer storage media, The nonvolatile computer storage media can be described in above-described embodiment included in device Nonvolatile computer storage media;Can also be individualism, without non-in supplying terminal Volatile computer storage medium.Above-mentioned nonvolatile computer storage media be stored with one or The multiple programs of person, when one or more of programs are performed by an equipment so that described Equipment:In response to receiving data object to be verified, the type of data object to be verified is judged; Loading and the checking configuration file of the type matching of data object to be verified;Parsing checking configuration text Part is to generate rule objects corresponding with data object to be verified;And based on data to be verified The corresponding rule objects of object are verified to data object to be verified, and export the result letter Breath.
Above description is only the preferred embodiment of the application and saying to institute's application technology principle It is bright.It will be appreciated by those skilled in the art that invention scope involved in the application, is not limited In the technical scheme of the particular combination of above-mentioned technical characteristic, do not departed from while should cover yet In the case of the inventive concept, it is combined by above-mentioned technical characteristic or its equivalent feature Formed by other technical schemes.Such as features described above and (but not limited to) disclosed herein Technical characteristic with similar functions carries out technical scheme formed by replacement mutually.

Claims (12)

1. a kind of legality identification method of data object, it is characterised in that including:
In response to receiving data object to be verified, the type of the data object to be verified is judged;
Loading and the checking configuration file of the type matching of the data object to be verified;
The parsing checking configuration file is to generate rule corresponding with the data object to be verified Object;And
Based on rule objects corresponding with the data object to be verified to the data pair to be verified As being verified, and export the result information;
Wherein, the rule objects include at least one rule.
2. according to the method described in claim 1, it is characterised in that:
The data object to be verified data binding is carried out by the form data that is sent to terminal and Generation.
3. according to the method described in claim 1, it is characterised in that the result information Including being proved to be successful information and authentication failed information;
It is described to be based on rule objects corresponding with the data object to be verified to the number to be verified Being verified according to object, and export the result includes:
The attribute information of the data object to be verified is obtained, wherein, the attribute information includes The property value and/or key-value pair of the data object to be verified;
Based on rule objects corresponding with the data object to be verified to the data pair to be verified The attribute information of elephant is verified;
If the whole attribute information of the data object to be verified with the rule objects Match somebody with somebody, then output is proved to be successful information, otherwise exports authentication failed information.
4. method according to claim 3, it is characterised in that also include:
Checking mode of operation is pre-configured with, wherein, the checking mode of operation includes complete checking Pattern;
If the whole attribute information of the data object to be verified is right with the rule As matching, then output is proved to be successful information, otherwise exports authentication failed information and further comprises:
Each attribute information of the data object to be verified is entered with the rule objects respectively Row matching, if in the presence of with the unmatched attribute information of the rule objects, export authentication failed Information;
Wherein, the authentication failed information includes prompt message, and the prompt message includes and institute State the unmatched attribute information of rule objects.
5. method according to claim 4, it is characterised in that the checking mode of operation Also include default authentication pattern;
If the whole attribute information of the data object to be verified is right with the rule As matching, then output is proved to be successful information, otherwise exports authentication failed information and further comprises:
If any attribute information of the data object to be verified and the rule objects are not Match somebody with somebody, then export authentication failed information.
6. the method according to claim 1-5 any one, it is characterised in that also include:
Request is updated in response to receiving configuration file, the configuration file is updated;
Wherein, the configuration file renewal request includes at least one of following:
Configuration file increase request, configuration file removal request and configuration file modification request.
7. a kind of legitimate verification device of data object, it is characterised in that including:
Type judging module, is configured to, in response to receiving data object to be verified, judge institute State the type of data object to be verified;
Rules loader, is configured to loading and the type matching of the data object to be verified Verify configuration file;
Rule parsing device, be configured to parse the checking configuration file with generate with it is described to be tested Demonstrate,prove the corresponding rule objects of data object;And
Actuator is verified, it is right to be configured to be based on rule corresponding with the data object to be verified As being verified to the data object to be verified, and export the result information;
Wherein, the rule objects include at least one rule.
8. device according to claim 7, it is characterised in that:
The data object to be verified data binding is carried out by the form data that is sent to terminal and Generation.
9. device according to claim 8, it is characterised in that the result information Including being proved to be successful information and authentication failed information;
The checking actuator is further configured to:
The attribute information of the data object to be verified is obtained, wherein, the attribute information includes The property value and/or key-value pair of the data object to be verified;
Based on rule objects corresponding with the data object to be verified to the data pair to be verified The attribute information of elephant is verified;
If the whole attribute information of the data object to be verified with the rule objects Match somebody with somebody, then output is proved to be successful information, otherwise exports authentication failed information.
10. device according to claim 9, it is characterised in that also include:
Configuration module, is configured to be pre-configured with checking mode of operation, wherein, the checking work Operation mode includes complete Validation Mode;
The checking actuator is further configured to:
Each attribute information of the data object to be verified is entered with the rule objects respectively Row matching, if in the presence of with the unmatched attribute information of the rule objects, export authentication failed Information;
Wherein, the authentication failed information includes prompt message, and the prompt message includes and institute State the unmatched attribute information of rule objects.
11. device according to claim 10, it is characterised in that the checking Working mould Formula also includes default authentication pattern;
The checking actuator is further configured to:
If any attribute information of the data object to be verified and the rule objects are not Match somebody with somebody, then export authentication failed information.
12. the device according to claim 7-11 any one, it is characterised in that also wrap Include:
Configuration file update module, is configured to update request in response to receiving configuration file, The configuration file is updated;
Wherein, the configuration file renewal request includes at least one of following:
Configuration file increase request, configuration file removal request and configuration file modification request.
CN201610266858.1A 2016-04-26 2016-04-26 The legality identification method and device of data object Pending CN107315958A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610266858.1A CN107315958A (en) 2016-04-26 2016-04-26 The legality identification method and device of data object

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610266858.1A CN107315958A (en) 2016-04-26 2016-04-26 The legality identification method and device of data object

Publications (1)

Publication Number Publication Date
CN107315958A true CN107315958A (en) 2017-11-03

Family

ID=60185272

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610266858.1A Pending CN107315958A (en) 2016-04-26 2016-04-26 The legality identification method and device of data object

Country Status (1)

Country Link
CN (1) CN107315958A (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108959218A (en) * 2018-04-26 2018-12-07 北京五八信息技术有限公司 Form validation method and device, electronic equipment and computer readable storage medium
CN109190396A (en) * 2018-08-27 2019-01-11 杭州安恒信息技术股份有限公司 A kind of data automatic verification method, device and equipment
CN109783751A (en) * 2018-12-14 2019-05-21 平安普惠企业管理有限公司 Form validation method and terminal device
CN109901892A (en) * 2017-12-11 2019-06-18 北京京东尚科信息技术有限公司 A kind of method and apparatus of dynamic attribute verifying
CN110021291A (en) * 2018-12-26 2019-07-16 阿里巴巴集团控股有限公司 A kind of call method and device of speech synthesis file
CN110233842A (en) * 2019-06-10 2019-09-13 腾讯科技(深圳)有限公司 A kind of method of calibration and relevant apparatus of request
CN110427745A (en) * 2019-07-02 2019-11-08 五八有限公司 Identifying code acquisition methods, device, electronic equipment and computer-readable medium
CN111311290A (en) * 2020-04-17 2020-06-19 广州信天翁信息科技有限公司 Method for digitizing and verifying articles and related device
CN111966673A (en) * 2020-08-18 2020-11-20 深圳市维度统计咨询股份有限公司 Big data based data auditing method and device and storage medium
CN112380167A (en) * 2020-11-17 2021-02-19 深圳市和讯华谷信息技术有限公司 Batch data verification method and device, computer equipment and storage medium
CN113282353A (en) * 2021-06-08 2021-08-20 苏州沁游网络科技有限公司 Data verification method, electronic equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101075989A (en) * 2007-03-23 2007-11-21 腾讯科技(深圳)有限公司 Method and system for verifying field validity
CN101576823A (en) * 2009-06-11 2009-11-11 阿里巴巴集团控股有限公司 Method for verifying form control and device
CN101727466A (en) * 2008-10-31 2010-06-09 北大方正集团有限公司 Method and device for verifying service data object
CN102103639A (en) * 2011-01-26 2011-06-22 北京京东世纪贸易有限公司 Data verification method and device
CN102413162A (en) * 2011-07-29 2012-04-11 互动在线(北京)科技有限公司 Website front-end verification method and device
CN104049972A (en) * 2014-06-18 2014-09-17 北京京东尚科信息技术有限公司 Data verification method and system
CN105068812A (en) * 2015-08-19 2015-11-18 深圳联友科技有限公司 Form generation method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101075989A (en) * 2007-03-23 2007-11-21 腾讯科技(深圳)有限公司 Method and system for verifying field validity
CN101727466A (en) * 2008-10-31 2010-06-09 北大方正集团有限公司 Method and device for verifying service data object
CN101576823A (en) * 2009-06-11 2009-11-11 阿里巴巴集团控股有限公司 Method for verifying form control and device
CN102103639A (en) * 2011-01-26 2011-06-22 北京京东世纪贸易有限公司 Data verification method and device
CN102413162A (en) * 2011-07-29 2012-04-11 互动在线(北京)科技有限公司 Website front-end verification method and device
CN104049972A (en) * 2014-06-18 2014-09-17 北京京东尚科信息技术有限公司 Data verification method and system
CN105068812A (en) * 2015-08-19 2015-11-18 深圳联友科技有限公司 Form generation method and device

Cited By (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109901892A (en) * 2017-12-11 2019-06-18 北京京东尚科信息技术有限公司 A kind of method and apparatus of dynamic attribute verifying
CN108959218A (en) * 2018-04-26 2018-12-07 北京五八信息技术有限公司 Form validation method and device, electronic equipment and computer readable storage medium
CN109190396A (en) * 2018-08-27 2019-01-11 杭州安恒信息技术股份有限公司 A kind of data automatic verification method, device and equipment
CN109783751A (en) * 2018-12-14 2019-05-21 平安普惠企业管理有限公司 Form validation method and terminal device
CN110021291A (en) * 2018-12-26 2019-07-16 阿里巴巴集团控股有限公司 A kind of call method and device of speech synthesis file
CN110233842B (en) * 2019-06-10 2021-07-27 腾讯科技(深圳)有限公司 Request verification method and related device
CN110233842A (en) * 2019-06-10 2019-09-13 腾讯科技(深圳)有限公司 A kind of method of calibration and relevant apparatus of request
CN110427745A (en) * 2019-07-02 2019-11-08 五八有限公司 Identifying code acquisition methods, device, electronic equipment and computer-readable medium
CN110427745B (en) * 2019-07-02 2022-03-08 五八有限公司 Verification code obtaining method and device, electronic equipment and computer readable medium
CN111311290A (en) * 2020-04-17 2020-06-19 广州信天翁信息科技有限公司 Method for digitizing and verifying articles and related device
CN111311290B (en) * 2020-04-17 2023-08-08 广州信天翁信息科技有限公司 Article digitizing and verifying method and related device
CN111966673A (en) * 2020-08-18 2020-11-20 深圳市维度统计咨询股份有限公司 Big data based data auditing method and device and storage medium
CN111966673B (en) * 2020-08-18 2021-06-25 深圳市维度数据科技股份有限公司 Big data based data auditing method and device and storage medium
CN112380167A (en) * 2020-11-17 2021-02-19 深圳市和讯华谷信息技术有限公司 Batch data verification method and device, computer equipment and storage medium
CN113282353A (en) * 2021-06-08 2021-08-20 苏州沁游网络科技有限公司 Data verification method, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN107315958A (en) The legality identification method and device of data object
US20240087009A1 (en) Data reconciliation based on computer analysis of data
CN107357914B (en) Information processing method and device
US12021842B2 (en) Headless browser system with virtual API
CN110490721B (en) Financial voucher generating method and related product
CN109828903A (en) Automated testing method, device, computer installation and storage medium
CN105653933B (en) Plug-in loading method and device
CN107295095A (en) The method and apparatus for pushing and showing advertisement
CN106605246A (en) Systems and methods for authenticating a user based on a computing device
CN105474574A (en) Systems and methods for authentication using a device identifier
CN103139761B (en) The method and communication terminal of a kind of information real-time show
CN106874471A (en) Information-pushing method and device
CN105141632B (en) Method and apparatus for checking the page
CN105701198B (en) Page verification method and device
CN110020358A (en) Method and apparatus for generating dynamic page
CN107562548A (en) The method and apparatus for transmitting data
CN107547524A (en) A kind of page detection method, device and equipment
CN107391277A (en) Information processing method and device
US20140157144A1 (en) Network system
CN107341025A (en) Using update method and device
CN106257879A (en) A kind of method and apparatus downloading application
CN106682491A (en) Application downloading method and device
CN103577180A (en) Data processing method and data processing device
CN107426588A (en) One kind obtains configuration information of television method, system and storage device
CN108062423A (en) Information-pushing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20171103