CN106202319B - Abnormal URL (Uniform resource locator) verification method and system - Google Patents

Abnormal URL (Uniform resource locator) verification method and system Download PDF

Info

Publication number
CN106202319B
CN106202319B CN201610514093.9A CN201610514093A CN106202319B CN 106202319 B CN106202319 B CN 106202319B CN 201610514093 A CN201610514093 A CN 201610514093A CN 106202319 B CN106202319 B CN 106202319B
Authority
CN
China
Prior art keywords
information
browser
url
abnormal
verified
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201610514093.9A
Other languages
Chinese (zh)
Other versions
CN106202319A (en
Inventor
王康
李雪
张黎
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201610514093.9A priority Critical patent/CN106202319B/en
Publication of CN106202319A publication Critical patent/CN106202319A/en
Application granted granted Critical
Publication of CN106202319B publication Critical patent/CN106202319B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9566URL specific, e.g. using aliases, detecting broken or misspelled links

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Transfer Between Computers (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses an abnormal URL (Uniform resource locator) verification method, which comprises the following steps: receiving abnormal data fed back by terminal equipment, wherein the terminal equipment is provided with a browser, and the abnormal data is related to the browser; analyzing abnormal data to obtain an abnormal URL information list, wherein the abnormal URL information list comprises a URL to be verified and operation environment information representing the operation environment of the browser in the terminal equipment; determining an operating environment based on the operating environment information; and sending the abnormal URL information list to a virtual machine corresponding to the running environment so that the virtual machine verifies the URL to be verified. The invention solves the technical problems that the abnormal URL verification method in the prior art cannot simulate the actual operation environment of the browser, so that the final verification result is inaccurate and incomplete, and the utilization value is low. Meanwhile, the invention also discloses an abnormal URL verification system.

Description

Abnormal URL (Uniform resource locator) verification method and system
Technical Field
The invention relates to the technical field of internet, in particular to an abnormal URL verification method and system.
Background
A browser refers to a software that can display the content of HTML (Hypertext markup language) files of a web server or a file system and allow a user to interact with the files.
In the using process of the browser, due to a design defect (bug), an abnormal URL (uniform resource Locator) or an abnormal HTML page may be encountered, so that the corresponding page cannot be opened or cannot be normally displayed.
At present, when the abnormal URL is verified, the abnormal URL is mainly tested before the new version browser is released. For example, when performing the stability test, the user may be simulated to access different URLs by operating the browser, and check whether the page can be normally opened, so as to verify the abnormal URL. When the compatibility test is carried out, some websites with higher access amount can be selected, the URLs of the websites are respectively accessed by using a browser, whether the page can be normally opened is checked, and therefore the abnormal URLs are verified.
However, in the actual use process of the browser, the actual operating environments of the browser are very different (for example, different system environments, different IE versions, and the like), and the existing abnormal URL verification method cannot simulate the actual operating environment of the browser, so that the final verification result is inaccurate and incomplete, and the use value is low.
Disclosure of Invention
In view of the above, the present invention has been made to provide an abnormal URL verification method and system that overcomes or at least partially solves the above-mentioned problems.
In a first aspect, the present invention provides an abnormal URL verification method, applied to a first server, including:
receiving abnormal data fed back by terminal equipment, wherein the terminal equipment is provided with a browser, and the abnormal data is related to the browser;
analyzing the abnormal data to obtain an abnormal URL information list, wherein the abnormal URL information list comprises a URL to be verified and operation environment information representing the operation environment of the browser in the terminal equipment;
determining the operating environment based on the operating environment information;
and sending the abnormal URL information list to a virtual machine corresponding to the running environment so that the virtual machine can verify the URL to be verified, wherein the virtual machine is positioned in a second server.
Optionally, the operating environment information includes one or more of the following information:
version information of the browser;
system information of the terminal device;
kernel information of a kernel used by the browser when the browser is abnormal;
third party application information of a third party application called by the browser when the browser is abnormal;
and when the browser is abnormal, the browser calls the third-party plug-in information of the third-party plug-in.
Optionally, the determining the operating environment of the browser based on the operating environment information includes:
determining the operating environment based on the system information; and/or
And when the core information is IE core information, determining the operating environment based on the IE version represented by the IE core information.
Optionally, the sending the abnormal URL information list to the virtual machine corresponding to the operating environment includes:
packing the abnormal URL information list into a work package;
and sending the work package to the virtual machine.
Optionally, after the sending the abnormal URL information list to the virtual machine corresponding to the operating environment, the method further includes:
receiving a verification result fed back by the virtual machine;
and when the verification result shows that the URL to be verified is an abnormal URL, creating a defect corresponding to the abnormal URL in a defect tracking system based on the operating environment information.
Optionally, after the sending the abnormal URL information list to the virtual machine corresponding to the operating environment, the method further includes:
and sending the verification result to a preset electronic mailbox.
Based on the same inventive concept, in a second aspect, the present invention provides an abnormal URL verification method, applied to a second server, including:
receiving an abnormal URL information list;
extracting a URL to be verified and operation environment information representing the operation environment of the browser in the terminal equipment from the abnormal URL information list;
constructing the operating environment based on the operating environment information;
and under the constructed operating environment, verifying the URL to be verified.
Optionally, the receiving an abnormal URL information list includes:
receiving a work package;
and analyzing the work package to obtain the abnormal URL information list.
Optionally, the abnormal URL information list further includes version information of the browser, and before constructing the execution environment based on the execution environment information, the method further includes:
extracting the version information from the abnormal URL information list;
and installing a browser corresponding to the version information based on the version information.
Optionally, the operating environment information includes third-party application information of a third-party application called by the browser when the browser is abnormal, and the constructing the operating environment based on the operating environment information includes:
extracting the third party application information from the abnormal URL information list;
and installing the third-party application corresponding to the third-party application information.
Optionally, the operating environment information includes third-party plugin-applying information of a third-party plugin called by the browser when the browser is abnormal, and the constructing the operating environment based on the operating environment information includes:
extracting the third-party plug-in information from the abnormal URL information list;
and installing a third-party plug-in corresponding to the third-party plug-in information.
Optionally, the operating environment information includes kernel information of a kernel used by the browser when the browser is abnormal, and constructing the operating environment based on the operating environment information includes:
extracting the kernel information from the abnormal URL information list;
and switching the browser to the kernel corresponding to the kernel information for running.
Optionally, the verifying the URL to be verified in the constructed operating environment includes:
operating the browser under the constructed operating environment;
opening a page corresponding to the URL to be verified;
judging whether the page is opened abnormally or not;
if the page is opened abnormally, determining the URL to be verified as an abnormal URL;
and if the page is opened normally, determining the URL to be verified as a normal URL.
Optionally, the determining whether the page is opened abnormally includes:
if the window or the process of the browser cannot be found, determining that the page is opened abnormally; or
If a prompt window representing the browser crash pops up, determining that the page is opened abnormally; or
Sending a control instruction to a window of the browser, and if the browser cannot respond, determining that the page is opened abnormally; or
Judging whether the URL to be verified is a preset URL or not, and if yes, determining that the page is opened abnormally; or
After a preset time period, selecting a plurality of test points on the page, and if the test points are all white, determining that the page is opened abnormally.
Optionally, after verifying the URL to be verified in the constructed operating environment, the method further includes:
and feeding back a verification result to the first server.
Based on the same inventive concept, in a third aspect, the present invention provides a first server, including:
the terminal equipment comprises a first receiving unit, a second receiving unit and a control unit, wherein the first receiving unit is used for receiving abnormal data fed back by the terminal equipment, a browser is installed in the terminal equipment, and the abnormal data is related to the browser;
the analysis unit is used for analyzing the abnormal data to obtain an abnormal URL information list, and the abnormal URL information list comprises a URL to be verified and operation environment information representing the operation environment of the browser in the terminal equipment;
a determination unit configured to determine the operating environment based on the operating environment information;
and the first sending unit is used for sending the abnormal URL information list to a virtual machine corresponding to the running environment so that the virtual machine can verify the URL to be verified, and the virtual machine is positioned in a second server.
Optionally, the operating environment information includes one or more of the following information:
version information of the browser;
system information of the terminal device;
kernel information of a kernel used by the browser when the browser is abnormal;
third party application information of a third party application called by the browser when the browser is abnormal;
and when the browser is abnormal, the browser calls the third-party plug-in information of the third-party plug-in.
Optionally, the determining unit is specifically configured to:
determining the operating environment based on the system information; and/or when the core information is IE core information, determining the operating environment based on the IE version represented by the IE core information.
Optionally, the first sending unit is specifically configured to:
packing the abnormal URL information list into a work package; and sending the work package to the virtual machine.
Optionally, the first server further includes:
a second receiving unit, configured to receive a verification result fed back by the virtual machine after the abnormal URL information list is sent to the virtual machine corresponding to the operating environment;
and the creating unit is used for creating the defect corresponding to the abnormal URL in a defect tracking system based on the operating environment information when the verification result shows that the URL to be verified is the abnormal URL.
Optionally, the first server further includes:
and the second sending unit is used for sending the verification result to a preset electronic mailbox after the abnormal URL information list is sent to the virtual machine corresponding to the running environment.
Based on the same inventive concept, in a fourth aspect, the present invention provides a second server, comprising:
a third receiving unit, configured to receive an abnormal URL information list;
an extracting unit, configured to extract a URL to be verified and operating environment information indicating an operating environment of the browser in the terminal device from the abnormal URL information list;
a construction unit configured to construct the operation environment based on the operation environment information;
and the verification unit is used for verifying the URL to be verified under the constructed operating environment.
Optionally, the third receiving unit is specifically configured to:
receiving a work package; and analyzing the work package to obtain the abnormal URL information list.
Optionally, the abnormal URL information list further includes version information of the browser, and the constructing unit is specifically configured to:
extracting the version information from the abnormal URL information list; and installing a browser corresponding to the version information based on the version information.
Optionally, the operating environment information includes third-party application information of a third-party application called by the browser when the browser is abnormal, and the constructing unit is specifically configured to:
extracting the third party application information from the abnormal URL information list; and installing the third-party application corresponding to the third-party application information.
Optionally, the operating environment information includes third-party plugin-applying information of a third-party plugin called by the browser when the browser is abnormal, and the constructing unit is specifically configured to:
extracting the third-party plug-in information from the abnormal URL information list; and installing a third-party plug-in corresponding to the third-party plug-in information.
Optionally, the operating environment information includes kernel information of a kernel used by the browser when the browser is abnormal, and the constructing unit is specifically configured to:
extracting the kernel information from the abnormal URL information list; and switching the browser to the kernel corresponding to the kernel information for running.
Optionally, the verification unit is specifically configured to:
operating the browser under the constructed operating environment; opening a page corresponding to the URL to be verified; judging whether the page is opened abnormally or not; if the page is opened abnormally, determining the URL to be verified as an abnormal URL; and if the page is opened normally, determining the URL to be verified as a normal URL.
Optionally, the verification unit is specifically configured to:
if the window or the process of the browser cannot be found, determining that the page is opened abnormally; or if a prompt window representing the browser crash pops up, determining that the page is opened abnormally; or sending a control instruction to a window of the browser, and if the browser cannot respond, determining that the page is abnormally opened; or judging whether the URL to be verified is a preset URL or not, and if so, determining that the page is opened abnormally; or after a preset time period, selecting a plurality of test points on the page, and if the test points are all white, determining that the page is opened abnormally.
Optionally, the second server further includes:
and the feedback unit is used for feeding back a verification result to the first server after the URL to be verified is verified under the constructed operating environment.
Based on the same inventive concept, in a fifth aspect, the present invention provides an abnormal URL verification system, including:
the first server; and
and the second server.
The technical scheme provided by the embodiment of the invention at least has the following technical effects or advantages:
in the embodiment of the invention, the invention discloses an abnormal URL verification method which is applied to a first server and comprises the following steps: receiving abnormal data fed back by terminal equipment, wherein the terminal equipment is provided with a browser, and the abnormal data is related to the browser; analyzing abnormal data to obtain an abnormal URL information list, wherein the abnormal URL information list comprises a URL to be verified and operation environment information representing the operation environment of the browser in the terminal equipment; determining an operating environment based on the operating environment information; and sending the abnormal URL information list to a virtual machine corresponding to the running environment so that the virtual machine verifies the URL to be verified, wherein the virtual machine is positioned in the second server. The virtual machine corresponding to the running environment of the browser is adopted to simulate the actual running environment of the browser to verify the URL to be verified, so that the technical effects of improving the accuracy, comprehensiveness and utilization value of the verification result are achieved. Therefore, the technical problems that the final verification result is inaccurate and incomplete and the utilization value is low due to the fact that the actual operation environment of the browser cannot be simulated in the abnormal URL verification method in the prior art are effectively solved.
The foregoing description is only an overview of the technical solutions of the present invention, and the embodiments of the present invention are described below in order to make the technical means of the present invention more clearly understood and to make the above and other objects, features, and advantages of the present invention more clearly understandable.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to refer to like parts throughout the drawings. In the drawings:
FIG. 1 illustrates an architecture diagram of an anomalous URL verification system in accordance with one embodiment of the present invention;
FIG. 2 shows a flow diagram of an anomalous URL validation method (interactive side of a first server and a second server) in accordance with one embodiment of the present invention;
FIG. 3 shows a flow diagram of an anomalous URL validation method (first server side) in accordance with one embodiment of the present invention;
FIG. 4 shows a flow diagram of an anomalous URL validation method (second server side) in accordance with one embodiment of the present invention;
FIG. 5 is a schematic diagram of a first server according to an embodiment of the invention;
fig. 6 shows a schematic structural diagram of a second server according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the disclosure to those skilled in the art.
The embodiment of the invention provides an abnormal URL (uniform resource locator) verification method and system, which are used for solving the technical problems that the final verification result is inaccurate and incomplete and the utilization value is low due to the fact that the actual operation environment of a browser cannot be simulated in the abnormal URL verification method in the prior art.
Example one
Standing on the interaction side of the first server and the second server, the embodiment provides an abnormal URL verification method, which is applied to an abnormal URL verification system shown in fig. 1, where the abnormal URL verification system includes the first server and the second server (or a second server cluster).
As shown in fig. 2, the method for verifying an abnormal URL includes:
step S101: the first server receives abnormal data fed back by the terminal equipment, wherein the terminal equipment is provided with a browser, and the abnormal data is related to the browser.
In a specific implementation process, steps S101 to S102 may be performed by a "core control module" installed on the first server.
In a specific implementation process, the terminal device may be: desktop computers, or notebook computers, or all-in-one computers, etc.
In the specific implementation process, a browser is installed on the terminal device, and when a user browses a certain webpage by using the browser, if an abnormality is encountered (for example, the browser is crashed and flashed back, or the webpage cannot be opened, or the webpage is displayed abnormally, or the like), the user can describe the encountered abnormality on an "opinion feedback" interface of the browser, and click an "opinion submission" button to submit the abnormality description information to the first server. Or, a third server may be added to the abnormal URL verification system to collect opinions submitted by the user, and the first server then periodically obtains opinions of the user from the third server.
In the implementation process, when the user submits the opinion, the browser creates an abnormal URL information list, which includes the abnormal description information, the URL to be verified (i.e. the URL of the abnormal web page), the operating environment information of the operating environment of the browser in the terminal device, and the like.
As an alternative embodiment, the operating environment information includes: the system information of the terminal equipment, the kernel information of a kernel used by the browser when the browser is abnormal, the third-party application information of the third-party application called by the browser when the browser is abnormal, and the third-party plug-in information of the third-party plug-in called by the browser when the browser is abnormal.
In the implementation, the (operating) systems used by different terminal devices may be different, for example, the OS X system, or the Linux system, or the Windows 2000 system, or the Windows xp system, or the Windows 7 system, or the Windows 8 system, or the Windows 10 system, and so on. However, the systems of the terminal devices are different, the operating environments of the browsers are naturally different, and the reason why the browser is abnormal may be related to the systems, so when the browser submits the opinion of the user, the system information of the terminal device may be added to the abnormal URL information list and sent to the first server (or the third server).
In a specific implementation process, the browser may have multiple kernels, for example, there may be an IE kernel and a Chrome kernel, and when the IE kernel is an IE kernel, the browser is further divided into multiple versions of IE kernels (for example, IE6, or IE7, or IE8, or IE9, or IE10, or IE11), while the kernels used by the browser are different, the operating environment of the browser is naturally different, and the cause of the browser exception may be related to the kernels used by the browser, so that when the browser submits a user opinion, the browser may add kernel information to the list of the exception URL information and send the list to the first server (or the third server).
In a specific implementation process, multiple third-party applications may be installed on a terminal device, a user may call one of the third-party applications when browsing a webpage by using a browser (for example, a secure payment application of a bank may be called when online banking payment is performed, and an input method application may be called when text input is performed), and the third-party applications called by the browser are different, and the operating environment of the browser is naturally different, and if the browser is abnormal, the browser may be related to the third-party application called by the browser, so when submitting a user opinion, the browser may add information of the third-party application to an abnormal URL information list and send the information to a first server (or a third server).
In a specific implementation process, a plurality of third-party plug-ins (for example, a translation plug-in, a train ticket rush-buying plug-in, a game plug-in, a price-comparison shopping plug-in, a screenshot plug-in, an advertisement blocking plug-in, and the like) may be installed on a browser in an expanded manner, when a user browses a webpage by using the browser, a certain third-party plug-in may be called, and the third-party plug-ins called by the browser are different, and the operating environment of the browser is naturally different, and if the browser is abnormal, the third-party plug-in may be related to the third-party plug-in called by the browser, so that when the browser submits the user opinion, the information of the third-party plug-in may be added to an abnormal URL information list and sent to a.
In a specific implementation process, the browser on the terminal device sends the abnormal data (i.e., the Json data) carrying the abnormal URL information list to the first server (or the third server). The first server can be started regularly to collect abnormal data fed back by each terminal device. For example, the first server may be started at zero point of each day to collect abnormal data fed back by each terminal device on the previous day, so as to ensure that the browser-related technician can view the abnormal data when working on the next day.
Step S102: and the first server analyzes the abnormal data to obtain an abnormal URL information list.
Wherein, in the abnormal URL information list, the following are included: exception description information, a URL to be verified, and operating environment information, among others.
In a specific implementation process, the abnormal data received by the first server is original Json data, so that further analysis is needed, and an abnormal URL information list is extracted from the abnormal data.
Step S103: the first server determines the execution environment based on the execution environment information.
In a specific implementation process, steps S103 to S104 may be performed by a "virtual machine scheduling module" installed on the first server.
As an alternative implementation, step S103 includes:
the first server determines an operating environment based on the system information; and/or
And when the core information is IE core information, the first server determines the operating environment based on the IE version represented by the IE core information.
In the specific implementation process, the operating environment can be preliminarily classified through the system information and/or the IE kernel information in the abnormal URL information list, and the operating environment of the browser in the terminal device is preliminarily determined.
For example, if the system information indicates that the system of the terminal device is an OS X system, it is determined that the operating environment is an "OSX" environment; and if the system information indicates that the system of the terminal equipment is a Linux system, determining that the running environment is a Linux environment.
For example, when the kernel information is IE kernel information, if the kernel information indicates the version of IE6, it is determined that the operating environment is an "IE 6" environment; if the kernel information indicates the IE9 version, the operating environment is determined to be the "IE 9" environment.
For example, if the system information indicates that the system of the terminal device is a Windows xp system and the kernel information indicates the IE6 version, it is determined that the operating environment is a "Windows xp, IE 6" environment; if the system information indicates that the system of the terminal equipment is a Windows xp system and the kernel information indicates the IE7 version, determining that the running environment is a 'Windows xp, IE 7' environment; and if the system information indicates that the system of the terminal equipment is a Windows 7 system and the kernel information indicates the IE9 version, determining that the running environment is a 'Windows 7 and IE 9' environment.
Step S104: and the first server sends the abnormal URL information list to a virtual machine corresponding to the running environment so that the virtual machine can verify the URL to be verified, and the virtual machine is positioned in the second server.
In a specific implementation process, the virtual machine can provide the same or similar running environment of the browser on the terminal equipment.
In a specific implementation process, the operating environments may be preliminarily classified through system information and/or IE kernel information in the abnormal URL information list, and for each class of operating environment, a virtual machine having the same operating environment is installed on a second server (or a second server cluster), where one or more virtual machines may be installed on the second server.
For example, a virtual machine having an "OS X" environment may be installed on the second server, that is, the system of the virtual machine is an OS X system; or installing a virtual machine with a Linux environment on the second server, wherein the system of the virtual machine is a Linux system; or installing a virtual machine with a 'Windows xp, IE 6' environment on the second server, namely, the system of the virtual machine is a Windows xp system, and the IE version is IE 6; or installing a virtual machine with a 'Windows xp, IE 7' environment on the second server, namely, the system of the virtual machine is a Windows xp system, and the IE version is IE 7; or installing a virtual machine with a 'Windows 7, IE 9' environment on the second server, namely the system of the virtual machine is a Windows 7 system, and the IE version is IE 9; and so on.
In a specific implementation process, the first server needs to forward the abnormal URL information to a virtual machine corresponding to the browser operating environment, and in the forwarding process, the first server can pack the abnormal URL information list into a work package (i.e., a jobpackage) and send the work package to the corresponding virtual machine.
Step S105: the second server receives the list of anomalous URL information.
In the specific implementation process, steps S105 to S109 may be performed by a virtual machine installed on the second server and corresponding to the browser operating environment, and in a specific point, may be performed by a "virtual machine execution module" installed on the virtual machine.
In the specific implementation process, the virtual machine execution module receives the work package sent by the first server, analyzes the work package, and obtains the abnormal URL information list.
Step S106: the second server extracts a URL to be verified and operating environment information representing the operating environment of the browser in the terminal device from the abnormal URL information list.
In the specific implementation process, the operation environment information obtained here includes: the version information of the browser, the kernel information of the kernel used by the browser when the browser is abnormal, the third-party application information of the third-party application called by the browser when the browser is abnormal, the third-party plug-in information of the third-party plug-in called by the browser when the browser is abnormal, and the like.
Step S107: the second server constructs an execution environment based on the execution environment information.
In a specific implementation process, step S107 includes:
(1) the second server extracts the version information from the abnormal URL information list and installs a browser corresponding to the version information based on the version information.
For example, if the version information indicates that the browser version is "8.2 beta version", the browser installation package of the version is downloaded, and the browser of the version is installed on the corresponding virtual machine on the second server.
(2) And the second server extracts the third party application information from the abnormal URL information list and installs the third party application corresponding to the third party application information.
For example, if the third-party application information indicates that the third-party application is a secure payment application of a certain bank, downloading an installation package of the secure payment application, and installing the secure payment application on a corresponding virtual machine on the second server; or, if the third-party application is a certain input method application, downloading the installation package of the input method application, and installing the input method application on the corresponding virtual machine on the second server.
(3) And the second server extracts the third-party plug-in information from the abnormal URL information list and installs the third-party plug-in corresponding to the third-party plug-in information.
For example, if the third-party plug-in represents that the third-party plug-in is a translation plug-in, installing the translation plug-in on the browser (on the corresponding virtual machine on the second server); or if the third-party plug-in is the screenshot plug-in, installing the screenshot plug-in on the browser (on the corresponding virtual machine on the second server).
(4) And the second server extracts kernel information from the abnormal URL information list and switches the browser to run under a kernel corresponding to the kernel information.
For example, if the kernel information indicates a Chrome kernel, the browser is switched to the Chrome kernel to run; and if the kernel information is represented as an IE kernel, switching the browser to run under the IE kernel.
Here, through step S107, an operating environment that is the same as or similar to the terminal device where the abnormal browser is located may be constructed on the virtual machine, so as to simulate a scene of the browser in an actual operating environment, and when verifying the URL to be verified, it is beneficial to improve accuracy and comprehensiveness of the verification result, thereby improving a utilization value of the verification result.
Step S108: and the second server verifies the URL to be verified under the constructed operating environment.
As an optional implementation manner, step S108 includes:
under the constructed operating environment, operating a browser and opening a page corresponding to the URL to be verified; judging whether the page is opened abnormally; if the page is opened abnormally, determining the URL to be verified as an abnormal URL; and if the page is opened normally, determining the URL to be verified as a normal URL.
As an optional implementation manner, the manner of determining whether the page is opened abnormally is as follows:
(a) if the window or the process of the browser cannot be found, determining that the page is opened abnormally, and further determining that the type of the abnormality occurring in the browser is 'browser crash';
(b) if a prompt window representing browser crash pops up, determining that the page is opened abnormally, and further determining that the type of the abnormality appearing in the browser is browser crash;
(c) sending a control instruction to a window of the browser, if the browser cannot respond, determining that a page is opened abnormally, and further determining that the type of the abnormality of the browser is 'browser jamming';
(d) judging whether the URL to be verified is a preset URL (namely se:// crash /), if so, determining that the page is opened abnormally, and further determining that the type of the abnormality of the browser is page crash;
(e) after a preset time period (for example, after a page corresponding to a URL to be verified is opened for 5-10 seconds), a plurality of test points are selected from the page, if the test points are all white, the page is determined to be opened abnormally, and the type of the abnormality appearing in the browser is further determined to be a 'blank page'.
In addition, if the operating environment information contains third-party application information and/or third-party plug-in information, when the URL to be verified is verified, the corresponding third-party application and/or third-party plug-in should be called, and whether the page is abnormally opened or not is judged, so that the accuracy and comprehensiveness of the verification result are improved.
In the specific implementation process, a white list can be set, if the URL to be verified is recorded in the white list, verification is not performed, and if the URL to be verified is not recorded in the white list, verification is performed.
In the specific implementation process, if repeated URLs to be verified are found (that is, the URLs to be verified are the same and the corresponding operating environment information is also the same), only one of the URLs to be verified is verified, and repeated verification is not performed.
In a specific implementation process, the browser may be a third-party browser (e.g., a 360-security browser), and if the browser is abnormal when opening the URL to be verified by using the IE kernel, the browser tries to open the URL to be verified by using the IE browser to check whether the URL is normal, if the IE browser is normally opened, it indicates that the browser has a defect, otherwise, it indicates that the URL to be verified is abnormal when being opened under the IE kernel.
If the URL to be verified is opened under the IE kernel, the URL to be verified can be tried to be opened by using other kernels (such as a Chrome kernel), and if the URL to be verified can be opened normally, the URL to be verified is opened by default by using other kernels; if the URL can not be normally opened, the URL to be verified is really an abnormal URL and can not be normally opened under any kernel.
Step S109: and the second server feeds back the verification result to the first server.
In a specific implementation process, the verification result includes: the method comprises the steps of verifying whether the URL to be verified is abnormal URL information, running environment information of the browser, type information of the abnormality of the browser, abnormality description information and the like.
In the specific implementation process, after the virtual machine execution module verifies one URL to be verified, the verification result can be fed back to the core control module for storage, so that the situation that all the previous verification results are lost due to task abnormal interruption is avoided. Thus, even if the task is interrupted due to an exception, the verification result of the previous operation is also saved. If the URL to be verified needs to be verified continuously, the virtual machine is restarted, and the virtual machine scheduling module issues the work package which is not verified successfully to the virtual machine execution module.
Step S110: and the first server receives the verification result fed back by the virtual machine.
In a specific implementation process, steps S110 to S112 may be performed by a "core control module" installed on the first server.
Step S111: and when the verification result shows that the URL to be verified is the abnormal URL, the first server creates a defect (namely, bug) corresponding to the abnormal URL in a defect tracking system (namely, Bugzilla) based on the operating environment information.
In a specific implementation process, when the verification result shows that the URL to be verified is an abnormal URL, the core control module can directly create the bug on the Bugzilla according to the preset template through the Bugzilla interface, so that the bug is tracked through the Bugzilla, and the bug can be repaired as soon as possible.
Step S112: and the first server sends the verification result to a preset electronic mailbox.
In a specific implementation, the core control module may send the verification result (or the link of the page containing the verification result) to an email box of the relevant technical person. And the related technical personnel can find out the defects of the browser according to the verification result and improve the browser.
In addition, the core control module can also count the running environment information corresponding to each abnormal URL, count the running environment with the most abnormal URLs (namely the running environment with the most abnormal URLs), and send the statistical result (or the link of the page containing the statistical result) to the electronic mailbox of the related technical staff. Technical personnel can know the abnormal URL easily appearing in the browser under any type of operating environment according to the statistical result, which is beneficial for relevant technical personnel to find out the defects existing in the browser and improve the browser.
The technical scheme provided by the embodiment of the invention at least has the following technical effects or advantages:
in the embodiment of the invention, the virtual machine corresponding to the running environment of the browser is adopted to simulate the actual running environment of the browser to verify the URL to be verified, so that the accuracy, comprehensiveness and utilization value of the verification result are improved. Therefore, the technical problems that the final verification result is inaccurate and incomplete and the utilization value is low due to the fact that the actual operation environment of the browser cannot be simulated in the abnormal URL verification method in the prior art are effectively solved.
Example two
Based on the same inventive concept, standing on the first server side, the present embodiment provides an abnormal URL verification method, as shown in fig. 3, including:
step S201: and receiving abnormal data fed back by the terminal equipment, wherein the terminal equipment is provided with a browser, and the abnormal data is related to the browser.
Step S202: and analyzing the abnormal data to obtain an abnormal URL information list, wherein the abnormal URL information list comprises a URL to be verified and operation environment information representing the operation environment of the browser in the terminal equipment.
As an optional implementation, the operating environment information includes one or more of the following information:
system information of the terminal device;
kernel information of a kernel used by the browser when the browser is abnormal;
version information of the browser;
third party application information of a third party application called by the browser when the browser is abnormal;
and the third-party plug-in information of the third-party plug-in called by the browser when the browser is abnormal.
Step S203: based on the operating environment information, an operating environment is determined.
As an optional implementation manner, step S203 includes:
determining an operating environment based on the system information; and/or
And when the core information is IE core information, determining the operating environment based on the IE version represented by the IE core information.
Step S204: and sending the abnormal URL information list to a virtual machine corresponding to the running environment so that the virtual machine verifies the URL to be verified, wherein the virtual machine is positioned in the second server.
As an alternative implementation, step S204 includes:
packing the abnormal URL information list into a work package;
and sending the work package to the virtual machine.
As an optional implementation manner, after step S204, the method further includes:
and receiving a verification result fed back by the virtual machine.
As an optional implementation manner, after step S204, the method further includes:
and when the verification result shows that the URL to be verified is the abnormal URL, creating a defect corresponding to the abnormal URL in the defect tracking system based on the operating environment information.
As an optional implementation manner, after step S204, the method further includes:
and sending the verification result to a preset electronic mailbox.
The technical scheme provided by the embodiment of the invention at least has the following technical effects or advantages:
in the embodiment of the invention, the invention discloses an abnormal URL verification method which is applied to a first server and comprises the following steps: receiving abnormal data fed back by terminal equipment, wherein the terminal equipment is provided with a browser, and the abnormal data is related to the browser; analyzing abnormal data to obtain an abnormal URL information list, wherein the abnormal URL information list comprises a URL to be verified and operation environment information representing the operation environment of the browser in the terminal equipment; determining an operating environment based on the operating environment information; and sending the abnormal URL information list to a virtual machine corresponding to the running environment so that the virtual machine verifies the URL to be verified, wherein the virtual machine is positioned in the second server. The virtual machine corresponding to the running environment of the browser is adopted to simulate the actual running environment of the browser to verify the URL to be verified, so that the technical effects of improving the accuracy, comprehensiveness and utilization value of the verification result are achieved. Therefore, the technical problems that the final verification result is inaccurate and incomplete and the utilization value is low due to the fact that the actual operation environment of the browser cannot be simulated in the abnormal URL verification method in the prior art are effectively solved.
EXAMPLE III
Based on the same inventive concept, standing on the second server side, the present embodiment provides an abnormal URL verification method, as shown in fig. 4, including:
step S301: an exception URL information list is received.
As an optional implementation manner, step S301 includes:
receiving a work package;
and analyzing the work package to obtain an abnormal URL information list.
Step S302: and extracting a URL to be verified and operation environment information representing the operation environment of the browser in the terminal equipment from the abnormal URL information list.
Step S303: and constructing the operating environment based on the operating environment information.
As an alternative embodiment, the operation environment information includes version information of the browser, and step S303 includes:
extracting version information from the abnormal URL information list;
and installing the browser corresponding to the version information based on the version information.
As an optional implementation manner, the running environment information includes third-party application information of a third-party application invoked by the browser when the browser is abnormal, and step S303 includes:
extracting third-party application information from the abnormal URL information list;
and installing the third-party application corresponding to the third-party application information.
As an optional implementation manner, the runtime environment information includes third-party plugin application information of a third-party plugin invoked by the browser when the browser is abnormal, and step S303 includes:
extracting third-party plug-in information from the abnormal URL information list;
and installing a third-party plug-in corresponding to the third-party plug-in information.
As an optional implementation manner, the running environment information includes kernel information of a kernel used by the browser when the browser is abnormal, and step S303 includes:
extracting kernel information from the abnormal URL information list;
and switching the browser to the kernel corresponding to the kernel information for running.
Step S304: and under the constructed operating environment, verifying the URL to be verified.
As an optional implementation manner, step S304 includes:
running the browser under the constructed running environment;
opening a page corresponding to the URL to be verified;
judging whether the page is opened abnormally;
if the page is opened abnormally, determining the URL to be verified as an abnormal URL;
and if the page is opened normally, determining the URL to be verified as a normal URL.
As an optional implementation manner, the determining whether the page is opened abnormally includes:
if the window or the process of the browser cannot be found, determining that the page is opened abnormally; or
If a prompt window representing browser crash pops up, determining that the page is opened abnormally; or
Sending a control instruction to a window of the browser, and if the browser cannot respond, determining that the page is opened abnormally; or
Judging whether the URL to be verified is a preset URL or not, and if so, determining that the page is opened abnormally; or
After a preset time period, selecting a plurality of test points on the page, and if the test points are all white, determining that the page is opened abnormally.
Step S305: and feeding back a verification result to the first server.
The technical scheme provided by the embodiment of the invention at least has the following technical effects or advantages:
in the embodiment of the invention, the invention discloses an abnormal URL verification method which is applied to a second server and comprises the following steps: receiving an abnormal URL information list; extracting a URL to be verified and operation environment information representing the operation environment of the browser in the terminal equipment from the abnormal URL information list; constructing the operating environment based on the operating environment information; and under the constructed operating environment, verifying the URL to be verified. Because the operating environment is constructed based on the operating environment information, and the URL to be verified is verified under the constructed operating environment, the technical problems that the final verification result is inaccurate and incomplete and the utilization value is low due to the fact that the actual operating environment of the browser cannot be simulated in the abnormal URL verification method in the prior art are effectively solved. The technical effects of improving the accuracy, comprehensiveness and utilization value of the verification result are achieved.
Example four
Based on the same inventive concept, the present embodiment provides a first server, as shown in fig. 5, including:
a first receiving unit 401, configured to receive abnormal data fed back by a terminal device, where a browser is installed in the terminal device, and the abnormal data is related to the browser;
an analyzing unit 402, configured to analyze the abnormal data to obtain an abnormal URL information list, where the abnormal URL information list includes a URL to be verified and operation environment information indicating an operation environment of the browser in the terminal device;
a determining unit 403, configured to determine an operating environment based on the operating environment information;
a first sending unit 404, configured to send the abnormal URL information list to a virtual machine corresponding to the operating environment, so that the virtual machine verifies the URL to be verified, where the virtual machine is located in the second server.
As an optional implementation, the operating environment information includes one or more of the following information:
version information of the browser;
system information of the terminal device;
kernel information of a kernel used by the browser when the browser is abnormal;
third party application information of a third party application called by the browser when the browser is abnormal;
and the third-party plug-in information of the third-party plug-in called by the browser when the browser is abnormal.
As an optional implementation manner, the determining unit 403 is specifically configured to:
determining an operating environment based on the system information; and/or when the core information is IE core information, determining the operating environment based on the IE version represented by the IE core information.
As an optional implementation manner, the first sending unit 404 is specifically configured to:
packing the abnormal URL information list into a work package; and sending the work package to the virtual machine.
As an optional implementation manner, the first server further includes:
the second receiving unit is used for receiving a verification result fed back by the virtual machine after the abnormal URL information list is sent to the virtual machine corresponding to the running environment;
and the creating unit is used for creating the defect corresponding to the abnormal URL in the defect tracking system based on the operating environment information when the verification result shows that the URL to be verified is the abnormal URL.
As an optional implementation manner, the first server further includes:
and the second sending unit is used for sending the abnormal URL information list to the virtual machine corresponding to the running environment and then sending the verification result to the preset electronic mailbox.
The technical scheme provided by the embodiment of the invention at least has the following technical effects or advantages:
in an embodiment of the present invention, a first server is disclosed, including: the first receiving unit is used for receiving abnormal data fed back by the terminal equipment, wherein the terminal equipment is provided with a browser, and the abnormal data is related to the browser; the analysis unit is used for analyzing the abnormal data to obtain an abnormal URL information list, and the abnormal URL information list comprises a URL to be verified and operation environment information representing the operation environment of the browser in the terminal equipment; a determination unit configured to determine an operating environment based on the operating environment information; and the first sending unit is used for sending the abnormal URL information list to a virtual machine corresponding to the running environment so that the virtual machine can verify the URL to be verified, and the virtual machine is positioned in the second server. The virtual machine corresponding to the running environment of the browser is adopted to simulate the actual running environment of the browser to verify the URL to be verified, so that the technical effects of improving the accuracy, comprehensiveness and utilization value of the verification result are achieved. Therefore, the technical problems that the final verification result is inaccurate and incomplete and the utilization value is low due to the fact that the actual operation environment of the browser cannot be simulated in the abnormal URL verification method in the prior art are effectively solved.
EXAMPLE five
Based on the same inventive concept, the present embodiment provides a second server, as shown in fig. 6, including:
a third receiving unit 501, configured to receive an abnormal URL information list;
an extracting unit 502, configured to extract a URL to be verified and operating environment information indicating an operating environment of the browser in the terminal device from the abnormal URL information list;
a constructing unit 503 configured to construct an execution environment based on the execution environment information;
the verification unit 504 is configured to verify the URL to be verified in the constructed operating environment.
As an optional implementation manner, the third receiving unit 501 is specifically configured to:
receiving a work package; and analyzing the work package to obtain an abnormal URL information list.
As an optional implementation manner, the abnormal URL information list further includes version information of the browser, and the constructing unit 503 is specifically configured to:
extracting version information from the abnormal URL information list; and installing the browser corresponding to the version information based on the version information.
As an optional implementation manner, the running environment information includes third-party application information of a third-party application called by the browser when the browser is abnormal, and the constructing unit 503 is specifically configured to:
extracting third-party application information from the abnormal URL information list; and installing the third-party application corresponding to the third-party application information.
As an optional implementation manner, the runtime environment information includes third-party plugin application information of a third-party plugin called by the browser when the browser is abnormal, and the constructing unit 503 is specifically configured to:
extracting third-party plug-in information from the abnormal URL information list; and installing a third-party plug-in corresponding to the third-party plug-in information.
As an optional implementation manner, the running environment information includes kernel information of a kernel used by the browser when the browser is abnormal, and the constructing unit 503 is specifically configured to:
extracting kernel information from the abnormal URL information list; and switching the browser to the kernel corresponding to the kernel information for running.
As an optional implementation manner, the verification unit 504 is specifically configured to:
running the browser under the constructed running environment; opening a page corresponding to the URL to be verified; judging whether the page is opened abnormally; if the page is opened abnormally, determining the URL to be verified as an abnormal URL; and if the page is opened normally, determining the URL to be verified as a normal URL.
As an optional implementation manner, the verification unit 504 is specifically configured to:
if the window or the process of the browser cannot be found, determining that the page is opened abnormally; or if a prompt window representing browser crash pops up, determining that the page is abnormally opened; or sending a control instruction to a window of the browser, and if the browser cannot respond, determining that the page is opened abnormally; or judging whether the URL to be verified is a preset URL or not, and if so, determining that the page is opened abnormally; or after a preset time period, selecting a plurality of test points on the page, and if the plurality of test points are all white, determining that the page is opened abnormally.
As an optional implementation manner, the second server further includes:
and the feedback unit is used for feeding back a verification result to the first server after the URL to be verified is verified under the constructed operating environment.
The technical scheme provided by the embodiment of the invention at least has the following technical effects or advantages:
in an embodiment of the present invention, a second server is disclosed, including: a third receiving unit, configured to receive an abnormal URL information list; an extracting unit, configured to extract a URL to be verified and operation environment information indicating an operation environment of the browser in the terminal device from the abnormal URL information list; a construction unit for constructing an operating environment based on the operating environment information; and the verification unit is used for verifying the URL to be verified under the constructed operating environment. Because the operating environment is constructed based on the operating environment information, and the URL to be verified is verified under the constructed operating environment, the technical problems that the final verification result is inaccurate and incomplete and the utilization value is low due to the fact that the actual operating environment of the browser cannot be simulated in the abnormal URL verification method in the prior art are effectively solved. The technical effects of improving the accuracy, comprehensiveness and utilization value of the verification result are achieved.
EXAMPLE six
Based on the same inventive concept, the present embodiment provides an abnormal URL verification system, as shown in fig. 1, including:
a first server and a second server.
In a specific implementation process, as shown in fig. 5, the first server includes:
a first receiving unit 401, configured to receive abnormal data fed back by a terminal device, where a browser is installed in the terminal device, and the abnormal data is related to the browser;
an analyzing unit 402, configured to analyze the abnormal data to obtain an abnormal URL information list, where the abnormal URL information list includes a URL to be verified and operation environment information indicating an operation environment of the browser in the terminal device;
a determining unit 403, configured to determine an operating environment based on the operating environment information;
a first sending unit 404, configured to send the abnormal URL information list to a virtual machine corresponding to the operating environment, so that the virtual machine verifies the URL to be verified, where the virtual machine is located in the second server.
In a specific implementation process, as shown in fig. 6, the second server includes:
a third receiving unit 501, configured to receive an abnormal URL information list;
an extracting unit 502, configured to extract a URL to be verified and operating environment information indicating an operating environment of the browser in the terminal device from the abnormal URL information list;
a constructing unit 503 configured to construct an execution environment based on the execution environment information;
the verification unit 504 is configured to verify the URL to be verified in the constructed operating environment.
The technical scheme provided by the embodiment of the invention at least has the following technical effects or advantages:
in the embodiment of the invention, the virtual machine corresponding to the running environment of the browser is adopted to simulate the actual running environment of the browser to verify the URL to be verified, so that the accuracy, comprehensiveness and utilization value of the verification result are improved. Therefore, the technical problems that the final verification result is inaccurate and incomplete and the utilization value is low due to the fact that the actual operation environment of the browser cannot be simulated in the abnormal URL verification method in the prior art are effectively solved.
The algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose systems may also be used with the teachings herein. The required structure for constructing such a system will be apparent from the description above. Moreover, the present invention is not directed to any particular programming language. It is appreciated that a variety of programming languages may be used to implement the teachings of the present invention as described herein, and any descriptions of specific languages are provided above to disclose the best mode of the invention.
In the description provided herein, numerous specific details are set forth. It is understood, however, that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the foregoing description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be interpreted as reflecting an intention that: that the invention as claimed requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the device in an embodiment may be adaptively changed and disposed in one or more devices different from the embodiment. The modules or units or components of the embodiments may be combined into one module or unit or component, and furthermore they may be divided into a plurality of sub-modules or sub-units or sub-components. All of the features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or elements of any method or apparatus so disclosed, may be combined in any combination, except combinations where at least some of such features and/or processes or elements are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments herein include some features included in other embodiments, rather than other features, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments may be used in any combination.
The various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that a microprocessor or Digital Signal Processor (DSP) may be used in practice to implement some or all of the functions of some or all of the components of the first server, the second server, the exception URL validation system according to embodiments of the present invention. The present invention may also be embodied as apparatus or device programs (e.g., computer programs and computer program products) for performing a portion or all of the methods described herein. Such programs implementing the present invention may be stored on computer-readable media or may be in the form of one or more signals. Such a signal may be downloaded from an internet website or provided on a carrier signal or in any other form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The usage of the words first, second and third, etcetera do not indicate any ordering. These words may be interpreted as names.
The invention discloses a1 abnormal URL verification method, which is applied to a first server and is characterized by comprising the following steps:
receiving abnormal data fed back by terminal equipment, wherein the terminal equipment is provided with a browser, and the abnormal data is related to the browser;
analyzing the abnormal data to obtain an abnormal URL information list, wherein the abnormal URL information list comprises a URL to be verified and operation environment information representing the operation environment of the browser in the terminal equipment;
determining the operating environment based on the operating environment information;
and sending the abnormal URL information list to a virtual machine corresponding to the running environment so that the virtual machine can verify the URL to be verified, wherein the virtual machine is positioned in a second server.
A2, the method according to A1, wherein the operation environment information comprises one or more of the following information:
version information of the browser;
system information of the terminal device;
kernel information of a kernel used by the browser when the browser is abnormal;
third party application information of a third party application called by the browser when the browser is abnormal;
and when the browser is abnormal, the browser calls the third-party plug-in information of the third-party plug-in.
A3, the method as claimed in A1, wherein the determining the browser's execution environment based on the execution environment information comprises:
determining the operating environment based on the system information; and/or
And when the core information is IE core information, determining the operating environment based on the IE version represented by the IE core information.
A4, the method as claimed in A1, wherein the sending the abnormal URL information list to a virtual machine corresponding to the runtime environment includes:
packing the abnormal URL information list into a work package;
and sending the work package to the virtual machine.
A5, the method according to any one of a1 to a4, wherein, after the sending the abnormal URL information list to the virtual machine corresponding to the execution environment, the method further includes:
receiving a verification result fed back by the virtual machine;
and when the verification result shows that the URL to be verified is an abnormal URL, creating a defect corresponding to the abnormal URL in a defect tracking system based on the operating environment information.
A6, the method according to any one of a1 to a4, wherein, after the sending the abnormal URL information list to the virtual machine corresponding to the execution environment, the method further includes:
and sending the verification result to a preset electronic mailbox.
B7, a method for verifying an abnormal URL, applied to a second server, comprising:
receiving an abnormal URL information list;
extracting a URL to be verified and operation environment information representing the operation environment of the browser in the terminal equipment from the abnormal URL information list;
constructing the operating environment based on the operating environment information;
and under the constructed operating environment, verifying the URL to be verified.
B8, the method according to B7, wherein the receiving an abnormal URL information list comprises:
receiving a work package;
and analyzing the work package to obtain the abnormal URL information list.
B9, the method as claimed in B7, wherein the abnormal URL information list further includes version information of the browser, and before constructing the runtime environment based on the runtime environment information, the method further includes:
extracting the version information from the abnormal URL information list;
and installing a browser corresponding to the version information based on the version information.
The method of B10, as set forth in B7, wherein the runtime environment information includes third-party application information of a third-party application called by the browser when the browser is abnormal, and the constructing the runtime environment based on the runtime environment information includes:
extracting the third party application information from the abnormal URL information list;
and installing the third-party application corresponding to the third-party application information.
The method of B11, as stated in B7, wherein the runtime environment information includes third party plugin information of a third party plugin called by the browser when the browser is abnormal, and the constructing the runtime environment based on the runtime environment information includes:
extracting the third-party plug-in information from the abnormal URL information list;
and installing a third-party plug-in corresponding to the third-party plug-in information.
B12, the method according to B7, wherein the running environment information includes kernel information of a kernel used by the browser when the browser is abnormal, and the constructing the running environment based on the running environment information includes:
extracting the kernel information from the abnormal URL information list;
and switching the browser to the kernel corresponding to the kernel information for running.
B13, the method according to any one of B7 to B12, wherein the verifying the URL to be verified under the constructed operating environment comprises:
operating the browser under the constructed operating environment;
opening a page corresponding to the URL to be verified;
judging whether the page is opened abnormally or not;
if the page is opened abnormally, determining the URL to be verified as an abnormal URL;
and if the page is opened normally, determining the URL to be verified as a normal URL.
B14, the method according to B13, wherein the judging whether the page is opened abnormally comprises:
if the window or the process of the browser cannot be found, determining that the page is opened abnormally; or
If a prompt window representing the browser crash pops up, determining that the page is opened abnormally; or
Sending a control instruction to a window of the browser, and if the browser cannot respond, determining that the page is opened abnormally; or
Judging whether the URL to be verified is a preset URL or not, and if yes, determining that the page is opened abnormally; or
After a preset time period, selecting a plurality of test points on the page, and if the test points are all white, determining that the page is opened abnormally.
B15, the method according to B7, wherein after verifying the URL to be verified under the constructed operating environment, the method further comprises:
and feeding back a verification result to the first server.
C16, a first server, comprising:
the terminal equipment comprises a first receiving unit, a second receiving unit and a control unit, wherein the first receiving unit is used for receiving abnormal data fed back by the terminal equipment, a browser is installed in the terminal equipment, and the abnormal data is related to the browser;
the analysis unit is used for analyzing the abnormal data to obtain an abnormal URL information list, and the abnormal URL information list comprises a URL to be verified and operation environment information representing the operation environment of the browser in the terminal equipment;
a determination unit configured to determine the operating environment based on the operating environment information;
and the first sending unit is used for sending the abnormal URL information list to a virtual machine corresponding to the running environment so that the virtual machine can verify the URL to be verified, and the virtual machine is positioned in a second server.
C17, the first server as claimed in C16, wherein the operation environment information comprises one or more of the following information:
version information of the browser;
system information of the terminal device;
kernel information of a kernel used by the browser when the browser is abnormal;
third party application information of a third party application called by the browser when the browser is abnormal;
and when the browser is abnormal, the browser calls the third-party plug-in information of the third-party plug-in.
C18, the first server as recited in C16, wherein the determining unit is specifically configured to:
determining the operating environment based on the system information; and/or when the core information is IE core information, determining the operating environment based on the IE version represented by the IE core information.
C19, the first server according to C16, wherein the first sending unit is specifically configured to:
packing the abnormal URL information list into a work package; and sending the work package to the virtual machine.
C20, the first server of any one of C16-C19, further comprising:
a second receiving unit, configured to receive a verification result fed back by the virtual machine after the abnormal URL information list is sent to the virtual machine corresponding to the operating environment;
and the creating unit is used for creating the defect corresponding to the abnormal URL in a defect tracking system based on the operating environment information when the verification result shows that the URL to be verified is the abnormal URL.
C21, the first server as C16 ~ 1C9, further comprising:
and the second sending unit is used for sending the verification result to a preset electronic mailbox after the abnormal URL information list is sent to the virtual machine corresponding to the running environment.
D22, a second server, comprising:
a third receiving unit, configured to receive an abnormal URL information list;
an extracting unit, configured to extract a URL to be verified and operating environment information indicating an operating environment of the browser in the terminal device from the abnormal URL information list;
a construction unit configured to construct the operation environment based on the operation environment information;
and the verification unit is used for verifying the URL to be verified under the constructed operating environment.
D23, the second server according to D22, wherein the third receiving unit is specifically configured to:
receiving a work package; and analyzing the work package to obtain the abnormal URL information list.
D24, the second server according to D22, wherein the abnormal URL information list further includes version information of the browser, and the constructing unit is specifically configured to:
extracting the version information from the abnormal URL information list; and installing a browser corresponding to the version information based on the version information.
D25, the second server according to D22, wherein the operating environment information includes third-party application information of a third-party application called by the browser when the browser is abnormal, and the constructing unit is specifically configured to:
extracting the third party application information from the abnormal URL information list; and installing the third-party application corresponding to the third-party application information.
D26, the second server according to D22, wherein the runtime environment information includes third-party plugin information of a third-party plugin called by the browser when the browser is abnormal, and the constructing unit is specifically configured to:
extracting the third-party plug-in information from the abnormal URL information list; and installing a third-party plug-in corresponding to the third-party plug-in information.
D27, the second server according to D22, wherein the runtime environment information includes kernel information of a kernel used by the browser when the browser is abnormal, and the constructing unit is specifically configured to:
extracting the kernel information from the abnormal URL information list; and switching the browser to the kernel corresponding to the kernel information for running.
D28, the second server according to any one of D22 to D27, wherein the verification unit is specifically configured to:
operating the browser under the constructed operating environment; opening a page corresponding to the URL to be verified; judging whether the page is opened abnormally or not; if the page is opened abnormally, determining the URL to be verified as an abnormal URL; and if the page is opened normally, determining the URL to be verified as a normal URL.
D29, the second server as claimed in D28, wherein the verification unit is specifically configured to:
if the window or the process of the browser cannot be found, determining that the page is opened abnormally; or if a prompt window representing the browser crash pops up, determining that the page is opened abnormally; or sending a control instruction to a window of the browser, and if the browser cannot respond, determining that the page is abnormally opened; or judging whether the URL to be verified is a preset URL or not, and if so, determining that the page is opened abnormally; or after a preset time period, selecting a plurality of test points on the page, and if the test points are all white, determining that the page is opened abnormally.
D30, the second server as set forth in D22, further comprising:
and the feedback unit is used for feeding back a verification result to the first server after the URL to be verified is verified under the constructed operating environment.
E31, an abnormal URL verification system, comprising:
the first server as recited in any one of D16-D21; and
the second server according to any one of E22 to E30.

Claims (29)

1. An abnormal URL verification method is applied to a first server, and is characterized by comprising the following steps:
receiving abnormal data fed back by terminal equipment, wherein the terminal equipment is provided with a browser, and the abnormal data is related to the browser;
analyzing the abnormal data to obtain an abnormal URL information list, wherein the abnormal URL information list comprises a URL to be verified and operation environment information representing the operation environment of the browser in the terminal equipment; the URL to be verified is a URL corresponding to a webpage that cannot be opened or normally displayed and is fed back by a user, and the operating environment information includes: the version information of the browser, the system information of the terminal equipment, the kernel information of a kernel used by the browser when the browser is abnormal, the third-party application information of a third-party application called by the browser when the browser is abnormal, and the third-party plug-in information of a third-party plug-in called by the browser when the browser is abnormal;
determining the operating environment based on the operating environment information;
and sending the abnormal URL information list to a virtual machine corresponding to the running environment so that the virtual machine can verify the URL to be verified, wherein the virtual machine is positioned in a second server.
2. The method of claim 1, wherein the determining the operating environment based on the operating environment information comprises:
determining the operating environment based on the system information; and/or
And when the core information is IE core information, determining the operating environment based on the IE version represented by the IE core information.
3. The method of claim 1, wherein said sending the exception URL information list to a virtual machine corresponding to the runtime environment comprises:
packing the abnormal URL information list into a work package;
and sending the work package to the virtual machine.
4. The method according to any one of claims 1 to 3, wherein after sending the abnormal URL information list to the virtual machine corresponding to the runtime environment, the method further comprises:
receiving a verification result fed back by the virtual machine;
and when the verification result shows that the URL to be verified is an abnormal URL, creating a defect corresponding to the abnormal URL in a defect tracking system based on the operating environment information.
5. The method of claim 4, wherein after sending the list of anomalous URL information to a virtual machine corresponding to the runtime environment, further comprising:
and sending the verification result to a preset electronic mailbox.
6. An abnormal URL verification method is applied to a second server, and is characterized by comprising the following steps:
receiving an abnormal URL information list;
extracting a URL to be verified and operation environment information representing the operation environment of the browser in the terminal equipment from the abnormal URL information list; the URL to be verified is a URL corresponding to a webpage that cannot be opened or normally displayed and is fed back by a user, and the operating environment information includes: the version information of the browser, the system information of the terminal equipment, the kernel information of a kernel used by the browser when the browser is abnormal, the third-party application information of a third-party application called by the browser when the browser is abnormal, and the third-party plug-in information of a third-party plug-in called by the browser when the browser is abnormal;
constructing the operating environment based on the operating environment information;
and under the constructed operating environment, verifying the URL to be verified.
7. The method of claim 6, wherein receiving the list of anomalous URL information comprises:
receiving a work package;
and analyzing the work package to obtain the abnormal URL information list.
8. The method of claim 6, wherein the abnormal URL information list further includes version information of the browser, and before constructing the runtime environment based on the runtime environment information, further comprising:
extracting the version information from the abnormal URL information list;
and installing a browser corresponding to the version information based on the version information.
9. The method of claim 6, wherein the runtime environment information includes third-party application information of a third-party application invoked by the browser when the browser is abnormal, and wherein constructing the runtime environment based on the runtime environment information includes:
extracting the third party application information from the abnormal URL information list;
and installing the third-party application corresponding to the third-party application information.
10. The method of claim 6, wherein the runtime environment information includes third party plugin information for a third party plugin called by the browser when the browser is abnormal, and wherein constructing the runtime environment based on the runtime environment information includes:
extracting the third-party plug-in information from the abnormal URL information list;
and installing a third-party plug-in corresponding to the third-party plug-in information.
11. The method of claim 6, wherein the runtime environment information includes kernel information of a kernel used by the browser when the browser is abnormal, and wherein constructing the runtime environment based on the runtime environment information includes:
extracting the kernel information from the abnormal URL information list;
and switching the browser to the kernel corresponding to the kernel information for running.
12. The method according to any one of claims 6 to 11, wherein the verifying the URL to be verified under the constructed operating environment comprises:
operating the browser under the constructed operating environment;
opening a page corresponding to the URL to be verified;
judging whether the page is opened abnormally or not;
if the page is opened abnormally, determining the URL to be verified as an abnormal URL;
and if the page is opened normally, determining the URL to be verified as a normal URL.
13. The method of claim 12, wherein said determining whether the page is open anomalous comprises:
if the window or the process of the browser cannot be found, determining that the page is opened abnormally; or
If a prompt window representing the browser crash pops up, determining that the page is opened abnormally; or
Sending a control instruction to a window of the browser, and if the browser cannot respond, determining that the page is opened abnormally; or
Judging whether the URL to be verified is a preset URL or not, and if yes, determining that the page is opened abnormally; or
After a preset time period, selecting a plurality of test points on the page, and if the test points are all white, determining that the page is opened abnormally.
14. The method of claim 6, wherein after verifying the URL to be verified in the constructed runtime environment, further comprising:
and feeding back a verification result to the first server.
15. A first server, comprising:
the terminal equipment comprises a first receiving unit, a second receiving unit and a control unit, wherein the first receiving unit is used for receiving abnormal data fed back by the terminal equipment, a browser is installed in the terminal equipment, and the abnormal data is related to the browser;
the analysis unit is used for analyzing the abnormal data to obtain an abnormal URL information list, and the abnormal URL information list comprises a URL to be verified and operation environment information representing the operation environment of the browser in the terminal equipment; the URL to be verified is a URL corresponding to a webpage that cannot be opened or normally displayed and is fed back by a user, and the operating environment information includes: the version information of the browser, the system information of the terminal equipment, the kernel information of a kernel used by the browser when the browser is abnormal, the third-party application information of a third-party application called by the browser when the browser is abnormal, and the third-party plug-in information of a third-party plug-in called by the browser when the browser is abnormal;
a determination unit configured to determine the operating environment based on the operating environment information;
and the first sending unit is used for sending the abnormal URL information list to a virtual machine corresponding to the running environment so that the virtual machine can verify the URL to be verified, and the virtual machine is positioned in a second server.
16. The first server of claim 15, wherein the determining unit is specifically configured to:
determining the operating environment based on the system information; and/or when the core information is IE core information, determining the operating environment based on the IE version represented by the IE core information.
17. The first server of claim 15, wherein the first sending unit is specifically configured to:
packing the abnormal URL information list into a work package; and sending the work package to the virtual machine.
18. The first server according to any one of claims 15 to 17, further comprising:
a second receiving unit, configured to receive a verification result fed back by the virtual machine after the abnormal URL information list is sent to the virtual machine corresponding to the operating environment;
and the creating unit is used for creating the defect corresponding to the abnormal URL in a defect tracking system based on the operating environment information when the verification result shows that the URL to be verified is the abnormal URL.
19. The first server of claim 18, further comprising:
and the second sending unit is used for sending the verification result to a preset electronic mailbox after the abnormal URL information list is sent to the virtual machine corresponding to the running environment.
20. A second server, comprising:
a third receiving unit, configured to receive an abnormal URL information list;
an extracting unit, configured to extract a URL to be verified and operating environment information indicating an operating environment of a browser in a terminal device from the abnormal URL information list; the URL to be verified is a URL corresponding to a webpage that cannot be opened or normally displayed and is fed back by a user, and the operating environment information includes: the version information of the browser, the system information of the terminal equipment, the kernel information of a kernel used by the browser when the browser is abnormal, the third-party application information of a third-party application called by the browser when the browser is abnormal, and the third-party plug-in information of a third-party plug-in called by the browser when the browser is abnormal;
a construction unit configured to construct the operation environment based on the operation environment information;
and the verification unit is used for verifying the URL to be verified under the constructed operating environment.
21. The second server according to claim 20, wherein the third receiving unit is specifically configured to:
receiving a work package; and analyzing the work package to obtain the abnormal URL information list.
22. The second server according to claim 20, wherein the abnormal URL information list further includes version information of the browser, and the constructing unit is specifically configured to:
extracting the version information from the abnormal URL information list; and installing a browser corresponding to the version information based on the version information.
23. The second server according to claim 20, wherein the runtime environment information includes third-party application information of a third-party application invoked by the browser when the browser is abnormal, and the constructing unit is specifically configured to:
extracting the third party application information from the abnormal URL information list; and installing the third-party application corresponding to the third-party application information.
24. The second server according to claim 20, wherein the runtime environment information includes third-party plugin-aware information of a third-party plugin called by the browser when the browser is abnormal, and the constructing unit is specifically configured to:
extracting the third-party plug-in information from the abnormal URL information list; and installing a third-party plug-in corresponding to the third-party plug-in information.
25. The second server according to claim 20, wherein the runtime environment information includes kernel information of a kernel used by the browser when the browser is abnormal, and the constructing unit is specifically configured to:
extracting the kernel information from the abnormal URL information list; and switching the browser to the kernel corresponding to the kernel information for running.
26. The second server according to any of claims 20 to 25, wherein the verification unit is specifically configured to:
operating the browser under the constructed operating environment; opening a page corresponding to the URL to be verified; judging whether the page is opened abnormally or not; if the page is opened abnormally, determining the URL to be verified as an abnormal URL; and if the page is opened normally, determining the URL to be verified as a normal URL.
27. The second server according to claim 26, wherein the authentication unit is specifically configured to:
if the window or the process of the browser cannot be found, determining that the page is opened abnormally; or if a prompt window representing the browser crash pops up, determining that the page is opened abnormally; or sending a control instruction to a window of the browser, and if the browser cannot respond, determining that the page is abnormally opened; or judging whether the URL to be verified is a preset URL or not, and if so, determining that the page is opened abnormally; or after a preset time period, selecting a plurality of test points on the page, and if the test points are all white, determining that the page is opened abnormally.
28. The second server of claim 20, further comprising:
and the feedback unit is used for feeding back a verification result to the first server after the URL to be verified is verified under the constructed operating environment.
29. An anomalous URL validation system comprising:
a first server as claimed in any one of claims 15 to 19; and
a second server as claimed in any one of claims 20 to 28.
CN201610514093.9A 2016-06-30 2016-06-30 Abnormal URL (Uniform resource locator) verification method and system Active CN106202319B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610514093.9A CN106202319B (en) 2016-06-30 2016-06-30 Abnormal URL (Uniform resource locator) verification method and system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610514093.9A CN106202319B (en) 2016-06-30 2016-06-30 Abnormal URL (Uniform resource locator) verification method and system

Publications (2)

Publication Number Publication Date
CN106202319A CN106202319A (en) 2016-12-07
CN106202319B true CN106202319B (en) 2020-03-10

Family

ID=57464231

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610514093.9A Active CN106202319B (en) 2016-06-30 2016-06-30 Abnormal URL (Uniform resource locator) verification method and system

Country Status (1)

Country Link
CN (1) CN106202319B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109240874A (en) * 2017-07-05 2019-01-18 北京国双科技有限公司 Website page method for detecting abnormality, apparatus and system

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101692267A (en) * 2009-09-15 2010-04-07 北京大学 Method and system for detecting large-scale malicious web pages
CN103092751A (en) * 2012-12-13 2013-05-08 华中科技大学 Web application performance test system based on customer behavior model in cloud environment
CN103886015A (en) * 2014-02-20 2014-06-25 新浪网技术(中国)有限公司 Web server and page error feedback method based on webpage application
CN104766014A (en) * 2015-04-30 2015-07-08 安一恒通(北京)科技有限公司 Method and system used for detecting malicious website
GB2530507A (en) * 2014-09-24 2016-03-30 Ibm Checking links

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101692267A (en) * 2009-09-15 2010-04-07 北京大学 Method and system for detecting large-scale malicious web pages
CN103092751A (en) * 2012-12-13 2013-05-08 华中科技大学 Web application performance test system based on customer behavior model in cloud environment
CN103886015A (en) * 2014-02-20 2014-06-25 新浪网技术(中国)有限公司 Web server and page error feedback method based on webpage application
GB2530507A (en) * 2014-09-24 2016-03-30 Ibm Checking links
CN104766014A (en) * 2015-04-30 2015-07-08 安一恒通(北京)科技有限公司 Method and system used for detecting malicious website

Also Published As

Publication number Publication date
CN106202319A (en) 2016-12-07

Similar Documents

Publication Publication Date Title
CA3018196C (en) Visual regresssion testing tool
US10108535B2 (en) Web application test script generation to test software functionality
CN111414172B (en) Automatic deployment and release system and method for application software
US9122804B2 (en) Logic validation and deployment
US9229844B2 (en) System and method for monitoring web service
US8621613B1 (en) Detecting malware in content items
CN110704304B (en) Application program testing method and device, storage medium and server
CN109446075B (en) Interface testing method and device
US20210392144A1 (en) Automated and adaptive validation of a user interface
CN106598991A (en) Web crawler system capable of realizing website interaction and automatic form extraction by conversational mode
CN107729249A (en) Browser compatibility method of testing, device, system and electronic equipment
US20160261623A1 (en) Detecting Malware In Content Items
US20180210819A1 (en) System and method of controlling a web browser plug-in for testing analytics
CN107957939B (en) Webpage interaction interface testing method and system
WO2016122508A1 (en) Test generation for browser-based user interface
US20210019253A1 (en) Methods Circuits Devices Systems and Functionally Associated Machine Executable Code For Enhanced Automated Software Code Testing
CN103581321B (en) A kind of creation method of refer chains, device and safety detection method and client
CN106202319B (en) Abnormal URL (Uniform resource locator) verification method and system
CN110990264A (en) Element identification method, device and equipment for UI automation test and storage medium
Watanabe et al. Fona: Quantitative metric to measure focus navigation on rich internet applications
CN108885574B (en) System for monitoring and reporting performance and correctness issues at design, compilation, and runtime
Losada et al. Efficient execution of web navigation sequences
CN104407979A (en) Script detection method and device
CN114185742A (en) Webpage monitoring method, device, equipment and storage medium
CN112559278B (en) Method and device for acquiring operation data

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240115

Address after: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee after: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Address before: 100088 room 112, block D, 28 new street, new street, Xicheng District, Beijing (Desheng Park)

Patentee before: BEIJING QIHOO TECHNOLOGY Co.,Ltd.

Patentee before: Qizhi software (Beijing) Co.,Ltd.

TR01 Transfer of patent right