Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
Referring to fig. 1, which shows a flowchart of a data processing method provided by an exemplary embodiment of the present disclosure, the method may include the following steps:
101: and acquiring data to be checked, wherein the data to be checked is data which is obtained after a user operates the service module and is related to the service module.
It can be understood that: the service module may be a module with different service types, such as an interface, navigation, and resource, and for any service type, the operation performed by the user on the service module includes, but is not limited to: the modification operation on the service module, the deletion operation on the service module, the addition operation on the service module, and the like are respectively described below by taking the modification operation on the service module, the deletion operation on the service module, and the addition operation on the service module as examples, where the data to be verified obtained by any one of the operations may be different:
for example, the data to be verified acquired after the modification operation is performed on the service module may be: the rest data of the business module or the data modified by the modification operation; the data to be verified obtained after the deletion operation is performed on the service module may be: the rest data of the business module or the data deleted by the deletion operation; the data to be verified obtained after the adding operation is performed on the service module may be: and the data added in the service module or the data combined by the added data and the original data.
102: and verifying the data to be verified based on the preset rule to obtain a verification result of the data to be verified, so as to verify whether the data to be verified meets the requirement of the preset rule or not through the preset rule.
In this embodiment, one obtaining manner of the preset rule is as follows: taking a check rule input by a user as a preset rule; the other acquisition mode is as follows: and selecting a preset rule corresponding to the service type of the service module from the preset rule base, namely setting the preset rule in advance based on the service type of the service module, so that after a certain service module is operated, the corresponding preset rule can be searched from the preset rule base according to the service type of the service module.
Further, the preset rules in the preset rule base correspond to the operation types of the service modules in addition to the service types of the service modules, for example, for deletion operation and addition operation of the same service module, each operation type corresponds to at least one preset rule, so that the corresponding preset rules can be searched from the preset rule base according to the service types of the service modules and the current operation types.
In this embodiment, the preset rule of a service module may include, but is not limited to: the field check rule and/or the service check rule correspondingly checks the data to be checked based on the preset rule, and the process of obtaining the check result of the data to be checked is as follows:
selecting a field check rule matched with the service module from preset check rules according to the service type corresponding to the service module; based on the field verification rule, verifying the data to be verified to obtain a field verification result in the verification result;
and/or
And selecting a service verification rule matched with the service module from preset verification rules according to the service type corresponding to the service module, writing data to be verified into a data structure corresponding to the service module, and verifying the data relationship among all the data in the data structure based on the service verification rule to obtain a service verification result in the verification result.
That is to say, in this embodiment, the data to be checked may be checked based on at least one of a field check rule and a service check rule, where the field check rule is used to check the field content of the data to be checked, for example, for a service module whose service type is a resource type, the corresponding field check rule is used to check: whether the name of the service module is repeated, whether a character string and/or a Uniform Resource Locator (URL) meet a regular expression rule and the like, if the name meets the field verification result obtained by regulation, the fact that the data to be verified meet the requirement of the field verification rule is indicated, and if the name does not meet the requirement of the field verification rule, the fact that the obtained field verification result indicates that the data to be verified do not meet the requirement of the field verification rule is indicated.
The service check rule is to check the service logic of the service module, and the point that the check is different from the field check rule is that: before the service verification rule is carried out, data to be verified need to be written into a data structure of the service module, and then the data relationship between all pieces of data in the data structure is verified based on the service verification rule, namely the data relationship between the data to be verified and original data in the data structure is verified, so that whether all pieces of data in the data structure meet service logic requirements or not is determined. For example, for a service module whose service type is a navigation type, a corresponding service verification rule is used for verifying: whether each piece of data in the data structure can form a tree structure, the hierarchy of the tree structure does not exceed a preset hierarchy (such as three levels), and data corresponding to one sub node in the sub nodes connected with the root node in the tree structure belongs to view data, so that navigation can present an interface.
If the service module is verified through one rule of the field verification rule and the service verification rule, if the verification result corresponding to the adopted rule shows that the adopted rule meets the requirement, the verification result of the data to be verified shows that the data to be verified meets the requirement of a preset rule; if the field check rule and the service check rule are used for checking the service module, if the field check result and the service check result both indicate that the data to be checked meet the requirements, the check result of the data to be checked indicates that the data to be checked meet the requirements of the preset rule, otherwise, the check result of the data to be checked indicates that the data to be checked do not meet the requirements of the preset rule.
The points to be explained here are: the writing of the data to be verified into the data structure corresponding to the service module is simulated to be written into the data structure corresponding to the service module, but not really stored into the data structure, that is, the writing does not modify the original data in the data structure of the service module, for example, the data relationship between the data content of the original data and the original data is not changed.
103: and if the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified, indicating that the operation corresponding to the data to be verified is completed on the service module.
It can be understood that: if the verification result of the verification data indicates that the data to be verified meets the requirements of the preset rules, it indicates that the service module and the service module associated with the service module can be normally used after the service module is operated, which means that the verification result of the data to be verified indicates that normal operation can still be performed based on the data to be verified, at this time, the service module can be controlled to complete the operation corresponding to the data to be verified, that is, the operation performed on the service module when the data to be verified is obtained, so-called that normal operation can still be performed based on the data to be verified is: after the operation is performed on the service module, the service module and the service module related to the service module can be normally used.
104: and if the verification result of the data to be verified shows that the normal operation cannot be executed based on the data to be verified, the control service module prohibits the execution of the operation corresponding to the data to be verified.
It can be understood that: if the verification result of the verification data indicates that the to-be-verified data does not meet the requirement of the preset rule, the service module and/or the service module associated with the service module cannot be normally used after the service module is operated, so that the verification result of the to-be-verified data indicates that normal operation cannot be performed based on the to-be-verified data, and at the moment, the service module is prohibited from executing the operation corresponding to the to-be-verified data, so that the service module and/or the service module associated with the service module cannot be normally used after the operation is performed.
It can be known from the above technical solutions that, after data to be verified related to a service module obtained after a user operates the service module is obtained, the data to be verified is verified based on a preset rule to obtain a verification result of the data to be verified, if the verification result of the data to be verified indicates that normal operation can still be performed based on the data to be verified, the operation corresponding to the data to be verified is instructed to be completed to the service module, if the verification result of the data to be verified indicates that normal operation cannot be performed based on the data to be verified, the operation corresponding to the data to be verified is controlled to be prohibited from being performed by the service module, so that when a certain operation is performed to the service module, the operation corresponding to the data to be verified is not immediately completed, but when it is verified that normal operation can still be performed based on the data to be verified, the operation corresponding to the service module is instructed to be completed, so that normal operation can still be performed to the service module, thereby preventing the service module from being used normally after certain operations are performed on the service module.
Referring to fig. 2, which shows a flowchart of another data processing method provided by an exemplary embodiment of the present disclosure, the method may include the following steps:
201: and acquiring data to be checked, wherein the data to be checked is data which is obtained after a user operates the service module and is related to the service module.
202: and verifying the data to be verified based on the preset rule to obtain a verification result of the data to be verified, so as to verify whether the data to be verified meets the requirement of the preset rule or not through the preset rule.
203: and if the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified, indicating that the operation corresponding to the data to be verified is completed on the service module.
204: and if the verification result of the data to be verified indicates that normal operation can still be executed based on the data to be verified, modifying original data in the data structure corresponding to the business module based on the data to be verified to obtain a data structure corresponding to the modified business module, so that each piece of data in the data structure corresponding to the business module is data which is required to be possessed after the operation is executed on the business module.
In this embodiment, the method for modifying the original data in the data structure includes: at least one of modifying data content, adding data to be verified to a data structure, modifying data relationships between data, and the like, which needs to be modified depends on operations and which content the data to be verified includes, and the obtained data structure corresponding to the modified service module at least needs to meet the requirements that: the data relationship among the data is required to meet the requirements of the business check rule, and other requirements are not described in this embodiment one by one.
205: and if the verification result of the data to be verified shows that the normal operation cannot be executed based on the data to be verified, the control service module prohibits the execution of the operation corresponding to the data to be verified.
In this embodiment, thesteps 201 to 203 and the step 205: similar to theabove steps 101 to 104, this embodiment will not be described again.
According to the technical scheme, when the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified, original data in the data structure corresponding to the business module are modified based on the data to be verified to obtain the data structure corresponding to the modified business module, so that each piece of data in the data structure corresponding to the business module is data which is required to be possessed after the operation is executed on the business module, and the modified data structure can be called when the business module is used again.
Referring to fig. 3, which shows a flowchart of still another data processing method provided by an exemplary embodiment of the present disclosure, the method may include the following steps:
301: and acquiring data to be checked, wherein the data to be checked is data which is obtained after a user operates the service module and is related to the service module.
302: and verifying the data to be verified based on the preset rule to obtain a verification result of the data to be verified, so as to verify whether the data to be verified meets the requirement of the preset rule or not through the preset rule.
303: and if the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified, indicating that the operation corresponding to the data to be verified is completed on the service module.
304: and if the verification result of the data to be verified indicates that normal operation can still be executed based on the data to be verified, sending a synchronization request to a second server through a communication interface of a first server, wherein the first server is a server for verifying the data to be verified based on a preset rule.
If the verification result of the data to be verified indicates that normal operation can still be performed based on the data to be verified, the data of the service module stored in the other server needs to be modified, and for this purpose, a synchronization request may be sent to the other server (e.g., the second server), so that the data corresponding to the service module in the first server and the second server are consistent.
However, sometimes a user withdraws an operation after performing the operation on a certain service module, and when the operation is withdrawn, data corresponding to the service module in the first server is changed into data before performing the operation, so that it is necessary to determine whether the data to be checked exists when sending a synchronization request to the second server, where one way of determining whether the data to be checked exists is: and determining whether the data state of the data to be verified is a withdrawal state, if so, indicating that the data to be verified does not exist, and if not, indicating that the data to be verified exists.
305: and if the synchronous response sent by the second server is received through the communication interface, synchronizing the data to be verified into the second server so as to verify the data to be verified again through the second server, and storing the data to be verified by the second server when the verification result obtained by the second server shows that the data to be verified can still execute normal operation.
That is to say, when the second server receives the data to be verified, the second server does not directly store the data to be verified, but verifies the data to be verified again, so that the reliability of the data to be verified can be improved. The second server needs to modify original data in the data structure corresponding to the service module based on the data to be verified when storing the data to be verified, and for a specific process, reference is made to relevant descriptions in the above method embodiment, which is not described further in this embodiment.
306: and if the verification result of the data to be verified shows that the normal operation cannot be executed based on the data to be verified, the control service module prohibits the execution of the operation corresponding to the data to be verified.
In this embodiment, thesteps 301 to 303 and the step 306: similar to theabove steps 101 to 104, this embodiment will not be described again.
According to the technical scheme, the data corresponding to the same service module in the multiple servers can be kept consistent in a data synchronization mode, and any second server can check the data to be checked again after receiving the data to be checked so as to check whether the data to be checked can operate normally or not, so that the reliability of the data to be checked is improved.
In addition, for all the above method embodiments, the authority of the user needs to be determined before the data to be verified is verified, and if it is determined that the user has the operation authority for the service module, it indicates that the user can perform the operation on the service module, and at this time, the data to be verified is triggered to be verified based on the preset rule, so as to obtain the verification result of the data to be verified. If it is determined that the user does not have the operation authority for the service module, it indicates that the user cannot perform the operation on the service module, and at this time, the data processing method disclosed in this embodiment controls the service module to prohibit the execution of the operation corresponding to the data to be verified. The setting of the operation authority may be determined according to actual requirements, and this embodiment is not limited.
Corresponding to the above method embodiments, an exemplary embodiment of the present disclosure further provides a data processing apparatus, whose structure is shown in fig. 4, and may include: anacquisition unit 11, averification unit 12 and acontrol unit 13.
The obtainingunit 11 is configured to obtain data to be verified, where the data to be verified is data related to a service module obtained after a user operates the service module, and for the service module, please refer to the above method embodiment for a description of an operation performed on the service module and the data to be verified.
The verifyingunit 12 is configured to verify the data to be verified based on a preset rule, so as to obtain a verification result of the data to be verified. In this embodiment, one obtaining manner of the preset rule is as follows: taking a check rule input by a user as a preset rule; the other acquisition mode is as follows: and selecting a preset rule corresponding to the service type of the service module from the preset rule base, namely setting the preset rule in advance based on the service type of the service module, so that after a certain service module is operated, the corresponding preset rule can be searched from the preset rule base according to the service type of the service module.
Further, the preset rules in the preset rule base correspond to the operation types of the service modules in addition to the service types of the service modules, for example, for deletion operation and addition operation of the same service module, each operation type corresponds to at least one preset rule, so that the corresponding preset rules can be searched from the preset rule base according to the service types of the service modules and the current operation types.
In this embodiment, the preset rule of a service module may include, but is not limited to: the field check rule and/or the service check rule correspondingly checks the data to be checked based on the preset rule, and the process of obtaining the check result of the data to be checked is as follows:
selecting a field check rule matched with the service module from preset check rules according to the service type corresponding to the service module; based on the field verification rule, verifying the data to be verified to obtain a field verification result in the verification result;
and/or
And selecting a service verification rule matched with the service module from preset verification rules according to the service type corresponding to the service module, writing data to be verified into a data structure corresponding to the service module, and verifying the data relationship among all the data in the data structure based on the service verification rule to obtain a service verification result in the verification result.
For the specific description of the field check rule and the service check rule, please refer to the method embodiment, which will not be further described in this embodiment.
Thecontrol unit 13 is configured to instruct the service module to complete an operation corresponding to the data to be verified if the verification result of the data to be verified indicates that the normal operation can still be performed based on the data to be verified, and to control the service module to prohibit the operation corresponding to the data to be verified from being performed if the verification result of the data to be verified indicates that the normal operation cannot be performed based on the data to be verified.
It can be understood that: if the verification result of the verification data indicates that the data to be verified meets the requirements of the preset rules, it indicates that the service module and the service module associated with the service module can be normally used after the service module is operated, which means that the verification result of the data to be verified indicates that normal operation can still be performed based on the data to be verified, at this time, the service module can be controlled to complete the operation corresponding to the data to be verified, that is, the operation performed on the service module when the data to be verified is obtained, so-called that normal operation can still be performed based on the data to be verified is: after the operation is performed on the service module, the service module and the service module related to the service module can be normally used.
If the verification result of the verification data indicates that the to-be-verified data does not meet the requirement of the preset rule, the service module and/or the service module associated with the service module cannot be normally used after the service module is operated, so that the verification result of the to-be-verified data indicates that normal operation cannot be performed based on the to-be-verified data, and at the moment, the service module is prohibited from executing the operation corresponding to the to-be-verified data, so that the service module and/or the service module associated with the service module cannot be normally used after the operation is performed.
It can be known from the above technical solutions that, after data to be verified related to a service module obtained after a user operates the service module is obtained, the data to be verified is verified based on a preset rule to obtain a verification result of the data to be verified, if the verification result of the data to be verified indicates that normal operation can still be performed based on the data to be verified, the operation corresponding to the data to be verified is instructed to be completed to the service module, if the verification result of the data to be verified indicates that normal operation cannot be performed based on the data to be verified, the operation corresponding to the data to be verified is controlled to be prohibited from being performed by the service module, so that when a certain operation is performed to the service module, the operation corresponding to the data to be verified is not immediately completed, but when it is verified that normal operation can still be performed based on the data to be verified, the operation corresponding to the service module is instructed to be completed, so that normal operation can still be performed to the service module, thereby preventing the service module from being used normally after certain operations are performed on the service module.
Referring to fig. 5, which shows a structure of another data processing apparatus provided in an exemplary embodiment of the present disclosure, on the basis of fig. 4, the data processing apparatus may further include: and the modifyingunit 14 is configured to modify, if the verification result of the data to be verified indicates that the normal operation can still be performed based on the data to be verified, original data in the data structure corresponding to the service module based on the data to be verified to obtain a data structure corresponding to the modified service module, so that each piece of data in the data structure corresponding to the service module is data that should be possessed after the operation is performed on the service module.
In this embodiment, the method for modifying the original data in the data structure includes: at least one of modifying data content, adding data to be verified to a data structure, modifying data relationships between data, and the like, which needs to be modified depends on operations and which content the data to be verified includes, and the obtained data structure corresponding to the modified service module at least needs to meet the requirements that: the data relationship among the data is required to meet the requirements of the business check rule, and other requirements are not described in this embodiment one by one.
In addition, the data processing apparatus provided in this embodiment may also be used to implement synchronization of data to be verified, as shown in fig. 6, the data processing apparatus may further include, on the basis of fig. 4: and a sendingunit 15, configured to send a synchronization request to a second server through a communication interface of a first server if a verification result of the data to be verified indicates that normal operation can still be performed based on the data to be verified, where the first server is a server that verifies the data to be verified based on a preset rule.
The sendingunit 15 is further configured to, if a synchronization response sent by the second server is received through the communication interface, synchronize the data to be verified into the second server, so that the data to be verified is verified again by the second server, and store the data to be verified by the second server when a verification result obtained by the second server indicates that the data to be verified can still perform normal operation.
However, sometimes a user withdraws an operation after performing the operation on a certain service module, and when the operation is withdrawn, data corresponding to the service module in the first server is changed into data before performing the operation, so that the sendingunit 15 needs to determine whether the data to be verified exists when sending a synchronization request to the second server, where one way of determining whether the data to be verified exists is: and determining whether the data state of the data to be verified is a withdrawal state, if so, indicating that the data to be verified does not exist, and if not, indicating that the data to be verified exists.
For all the above embodiments of the apparatus, the verifyingunit 12 is configured to, if it is determined that the user has the operation right to the service module, verify the data to be verified based on the preset rule, and obtain a verification result of the data to be verified. Thecontrol unit 13 is further configured to control the service module to prohibit execution of an operation corresponding to the data to be verified if it is determined that the user does not have the operation authority for the service module.
That is to say, the authority of the user needs to be determined before the data to be verified is verified, and if it is determined that the user has the operation authority for the service module, it indicates that the user can perform the operation on the service module, and at this time, theverification unit 12 verifies the data to be verified based on the preset rule, so as to obtain the verification result of the data to be verified. If it is determined that the user does not have the operation authority for the service module, it indicates that the user cannot perform the operation on the service module, and at this time, thecontrol unit 13 controls the service module to prohibit the execution of the operation corresponding to the data to be verified.
The data processing device comprises a processor and a memory, theacquisition unit 11, theverification unit 12, thecontrol unit 13 and the like are stored in the memory as program units, and the processor executes the program units stored in the memory to realize corresponding functions.
The processor comprises a kernel, and the kernel calls the corresponding program unit from the memory. The kernel can be set to be one or more, and the kernel parameters are adjusted to prevent the kernel from being used normally after certain operations are performed on the business module.
The memory may include volatile memory in a computer readable medium, Random Access Memory (RAM) and/or nonvolatile memory such as Read Only Memory (ROM) or flash memory (flash RAM), and the memory includes at least one memory chip.
An embodiment of the present invention provides a storage medium on which a program is stored, the program implementing the data processing method when executed by a processor.
The embodiment of the invention provides a processor, which is used for running a program, wherein the data processing method is executed when the program runs.
The embodiment of the invention provides equipment, which comprises a processor, a memory and a program which is stored on the memory and can run on the processor, wherein the processor executes the program and realizes the following steps:
acquiring data to be verified, wherein the data to be verified is data which is obtained after a user operates a service module and is related to the service module;
verifying the data to be verified based on a preset rule to obtain a verification result of the data to be verified;
if the verification result of the data to be verified indicates that normal operation can still be executed based on the data to be verified, indicating that the operation corresponding to the data to be verified is completed on the service module;
and if the verification result of the data to be verified shows that normal operation cannot be executed based on the data to be verified, controlling the service module to forbid execution of the operation corresponding to the data to be verified.
Preferably, the verifying the data to be verified based on the preset rule, and obtaining a verification result of the data to be verified includes:
selecting a field check rule matched with the service module from preset check rules according to the service type corresponding to the service module;
based on the field verification rule, verifying the data to be verified to obtain a field verification result in the verification result;
and/or
Selecting a service verification rule matched with the service module from preset verification rules according to the service type corresponding to the service module;
and writing the data to be verified into a data structure corresponding to the service module, and verifying the data relationship among all the data in the data structure based on the service verification rule to obtain a service verification result in the verification result.
Preferably, the processor executes the program to further implement the following steps: and if the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified, modifying original data in the data structure corresponding to the business module based on the data to be verified to obtain the modified data structure corresponding to the business module.
Preferably, the processor executes the program to further implement the following steps: if the verification result of the data to be verified indicates that normal operation can still be executed based on the data to be verified, sending a synchronization request to a second server through a communication interface of a first server, wherein the first server is a server for verifying the data to be verified based on a preset rule;
and if the synchronous response sent by the second server is received through the communication interface, synchronizing the data to be verified into the second server so as to verify the data to be verified again through the second server, and storing the data to be verified by the second server when the verification result obtained by the second server shows that the data to be verified can still execute normal operation.
Preferably, if the verification result of the data to be verified indicates that normal operation can still be performed based on the data to be verified, sending the synchronization request to the second server through the communication interface of the first server includes:
and if the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified and the data to be verified still exists, sending a synchronization request to the second server through the communication interface of the first server.
Preferably, the verifying the data to be verified based on the preset rule, and obtaining a verification result of the data to be verified includes:
if the fact that the user has the operation authority on the business module is determined, verifying the data to be verified based on a preset rule to obtain a verification result of the data to be verified;
the processor executes the program and further realizes the following steps: and if the user does not have the operation authority to the service module, controlling the service module to forbid executing the operation corresponding to the data to be verified.
The device herein may be a server, a PC, a PAD, a mobile phone, etc.
The present application further provides a computer program product adapted to perform a program for initializing the following method steps when executed on a data processing device:
acquiring data to be verified, wherein the data to be verified is data which is obtained after a user operates a service module and is related to the service module;
verifying the data to be verified based on a preset rule to obtain a verification result of the data to be verified;
if the verification result of the data to be verified indicates that normal operation can still be executed based on the data to be verified, indicating that the operation corresponding to the data to be verified is completed on the service module;
and if the verification result of the data to be verified shows that normal operation cannot be executed based on the data to be verified, controlling the service module to forbid execution of the operation corresponding to the data to be verified.
Preferably, the verifying the data to be verified based on the preset rule, and obtaining a verification result of the data to be verified includes:
selecting a field check rule matched with the service module from preset check rules according to the service type corresponding to the service module;
based on the field verification rule, verifying the data to be verified to obtain a field verification result in the verification result;
and/or
Selecting a service verification rule matched with the service module from preset verification rules according to the service type corresponding to the service module;
and writing the data to be verified into a data structure corresponding to the service module, and verifying the data relationship among all the data in the data structure based on the service verification rule to obtain a service verification result in the verification result.
Preferably, the program, when executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: and if the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified, modifying original data in the data structure corresponding to the business module based on the data to be verified to obtain the modified data structure corresponding to the business module.
Preferably, the program, when executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: if the verification result of the data to be verified indicates that normal operation can still be executed based on the data to be verified, sending a synchronization request to a second server through a communication interface of a first server, wherein the first server is a server for verifying the data to be verified based on a preset rule;
and if the synchronous response sent by the second server is received through the communication interface, synchronizing the data to be verified into the second server so as to verify the data to be verified again through the second server, and storing the data to be verified by the second server when the verification result obtained by the second server shows that the data to be verified can still execute normal operation.
Preferably, if the verification result of the data to be verified indicates that normal operation can still be performed based on the data to be verified, sending the synchronization request to the second server through the communication interface of the first server includes:
and if the verification result of the data to be verified shows that normal operation can still be executed based on the data to be verified and the data to be verified still exists, sending a synchronization request to the second server through the communication interface of the first server.
Preferably, the verifying the data to be verified based on the preset rule, and obtaining a verification result of the data to be verified includes:
if the fact that the user has the operation authority on the business module is determined, verifying the data to be verified based on a preset rule to obtain a verification result of the data to be verified;
when executed on a data processing device, is further adapted to perform a procedure for initializing the following method steps: and if the user does not have the operation authority to the service module, controlling the service module to forbid executing the operation corresponding to the data to be verified.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present application is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the application. It will be understood that each flow and/or block of the flow diagrams and/or block diagrams, and combinations of flows and/or blocks in the flow diagrams and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
In a typical configuration, a computing device includes one or more processors (CPUs), input/output interfaces, network interfaces, and memory.
The memory may include forms of volatile memory in a computer readable medium, Random Access Memory (RAM) and/or non-volatile memory, such as Read Only Memory (ROM) or flash memory (flash RAM). The memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, phase change memory (PRAM), Static Random Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), Electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium that can be used to store information that can be accessed by a computing device. As defined herein, a computer readable medium does not include a transitory computer readable medium such as a modulated data signal and a carrier wave.
It should also be noted that the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in the process, method, article, or apparatus that comprises the element.
As will be appreciated by one skilled in the art, embodiments of the present application may be provided as a method, system, or computer program product. Accordingly, the present application may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present application may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The above are merely examples of the present application and are not intended to limit the present application. Various modifications and changes may occur to those skilled in the art. Any modification, equivalent replacement, improvement, etc. made within the spirit and principle of the present application should be included in the scope of the claims of the present application.