Home Backend Development PHP Tutorial How to implement data verification after PHP form submission

How to implement data verification after PHP form submission

Aug 10, 2023 pm 03:09 PM
php validate form data

How to implement data verification after PHP form submission

How to implement data validation after PHP form submission

When developing web applications, forms are one of the most common ways to interact with users. However, the data submitted by users is often unreliable, so we need to verify the data submitted by the form to ensure the security and integrity of the data. This article will introduce how to use PHP to implement data validation after form submission.

  1. Form submission
    First, we need to create a form in the HTML page and set the action attribute of the form to the path of a PHP file to handle form submission The data. For example:
<form action="handle_form.php" method="post">
  <input type="text" name="username" placeholder="用户名">
  <input type="password" name="password" placeholder="密码">
  <input type="submit" value="提交">
</form>
Copy after login
  1. Data validation
    In the PHP file that handles form submission, we can use the $_POST global variable to obtain the form submission data. Then, we can perform corresponding verification for different form fields.

For example, we can use the empty() function to check if a required field is empty, and the filter_var() function to verify email addresses and URLs and other specific formats.

<?php
$username = $_POST['username'];
$password = $_POST['password'];

// 验证用户名
if (empty($username)) {
  echo "用户名不能为空";
}

// 验证密码
if (empty($password)) {
  echo "密码不能为空";
}

// 验证邮箱
$email = $_POST['email'];
if (!filter_var($email, FILTER_VALIDATE_EMAIL)) {
  echo "邮箱格式不正确";
}

// 验证URL
$url = $_POST['url'];
if (!filter_var($url, FILTER_VALIDATE_URL)) {
  echo "URL格式不正确";
}
?>
Copy after login

In the above example, we first use the empty() function to check whether the user name and password are empty. If they are empty, the corresponding prompt information will be output. Then, we use the filter_var() function to verify whether the email and URL match the corresponding format. If they do not match, the corresponding prompt information is output.

  1. Error handling
    You can consider storing the error information in an array to output error prompts uniformly.
<?php
$errors = [];

// 验证用户名
if (empty($username)) {
  $errors['username'] = "用户名不能为空";
}

// 验证密码
if (empty($password)) {
  $errors['password'] = "密码不能为空";
}

// 验证邮箱
$email = $_POST['email'];
if (!filter_var($email, FILTER_VALIDATE_EMAIL)) {
  $errors['email'] = "邮箱格式不正确";
}

// 验证URL
$url = $_POST['url'];
if (!filter_var($url, FILTER_VALIDATE_URL)) {
  $errors['url'] = "URL格式不正确";
}

if (!empty($errors)) {
  foreach ($errors as $error) {
    echo $error;
  }
}
?>
Copy after login

By storing error information in the $errors array, and traversing and outputting error information after submission, unified error handling and prompts can be achieved.

  1. Security considerations
    In addition to data integrity verification, we should also consider data security. Therefore, we should securely filter and escape data submitted from forms to prevent common attacks such as SQL injection.
<?php
$username = $_POST['username'];
$username = mysqli_real_escape_string($conn, $username);
// ...
?>
Copy after login

In the above example, we use the mysqli_real_escape_string() function to safely escape the user name, which can prevent users from maliciously submitting data containing special characters.

Summary
Through the above steps, we can verify the data after the form is submitted, thereby improving the security of the application. In actual applications, more flexible verification can be performed based on specific needs, and front-end JavaScript can be combined for real-time verification to improve user experience.

The above is the detailed content of How to implement data verification after PHP form submission. For more information, please follow other related articles on the PHP Chinese website!

Statement of this Website
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

Video Face Swap

Video Face Swap

Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Tools

Notepad++7.3.1

Notepad++7.3.1

Easy-to-use and free code editor

SublimeText3 Chinese version

SublimeText3 Chinese version

Chinese version, very easy to use

Zend Studio 13.0.1

Zend Studio 13.0.1

Powerful PHP integrated development environment

Dreamweaver CS6

Dreamweaver CS6

Visual web development tools

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)

Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Explain JSON Web Tokens (JWT) and their use case in PHP APIs. Apr 05, 2025 am 12:04 AM

JWT is an open standard based on JSON, used to securely transmit information between parties, mainly for identity authentication and information exchange. 1. JWT consists of three parts: Header, Payload and Signature. 2. The working principle of JWT includes three steps: generating JWT, verifying JWT and parsing Payload. 3. When using JWT for authentication in PHP, JWT can be generated and verified, and user role and permission information can be included in advanced usage. 4. Common errors include signature verification failure, token expiration, and payload oversized. Debugging skills include using debugging tools and logging. 5. Performance optimization and best practices include using appropriate signature algorithms, setting validity periods reasonably,

Describe the SOLID principles and how they apply to PHP development. Describe the SOLID principles and how they apply to PHP development. Apr 03, 2025 am 12:04 AM

The application of SOLID principle in PHP development includes: 1. Single responsibility principle (SRP): Each class is responsible for only one function. 2. Open and close principle (OCP): Changes are achieved through extension rather than modification. 3. Lisch's Substitution Principle (LSP): Subclasses can replace base classes without affecting program accuracy. 4. Interface isolation principle (ISP): Use fine-grained interfaces to avoid dependencies and unused methods. 5. Dependency inversion principle (DIP): High and low-level modules rely on abstraction and are implemented through dependency injection.

How to automatically set permissions of unixsocket after system restart? How to automatically set permissions of unixsocket after system restart? Mar 31, 2025 pm 11:54 PM

How to automatically set the permissions of unixsocket after the system restarts. Every time the system restarts, we need to execute the following command to modify the permissions of unixsocket: sudo...

How to debug CLI mode in PHPStorm? How to debug CLI mode in PHPStorm? Apr 01, 2025 pm 02:57 PM

How to debug CLI mode in PHPStorm? When developing with PHPStorm, sometimes we need to debug PHP in command line interface (CLI) mode...

Explain the concept of late static binding in PHP. Explain the concept of late static binding in PHP. Mar 21, 2025 pm 01:33 PM

Article discusses late static binding (LSB) in PHP, introduced in PHP 5.3, allowing runtime resolution of static method calls for more flexible inheritance.Main issue: LSB vs. traditional polymorphism; LSB's practical applications and potential perfo

How to send a POST request containing JSON data using PHP's cURL library? How to send a POST request containing JSON data using PHP's cURL library? Apr 01, 2025 pm 03:12 PM

Sending JSON data using PHP's cURL library In PHP development, it is often necessary to interact with external APIs. One of the common ways is to use cURL library to send POST�...

Explain late static binding in PHP (static::). Explain late static binding in PHP (static::). Apr 03, 2025 am 12:04 AM

Static binding (static::) implements late static binding (LSB) in PHP, allowing calling classes to be referenced in static contexts rather than defining classes. 1) The parsing process is performed at runtime, 2) Look up the call class in the inheritance relationship, 3) It may bring performance overhead.

See all articles