CN112084440B - Data verification method, device, electronic equipment and computer readable medium - Google Patents

Data verification method, device, electronic equipment and computer readable medium Download PDF

Info

Publication number
CN112084440B
CN112084440B CN202010955352.8A CN202010955352A CN112084440B CN 112084440 B CN112084440 B CN 112084440B CN 202010955352 A CN202010955352 A CN 202010955352A CN 112084440 B CN112084440 B CN 112084440B
Authority
CN
China
Prior art keywords
uniform resource
resource locator
target
initial
matching
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010955352.8A
Other languages
Chinese (zh)
Other versions
CN112084440A (en
Inventor
巩秋铭
张婕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Youzhuju Network Technology Co Ltd
Original Assignee
Beijing Youzhuju Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Youzhuju Network Technology Co Ltd filed Critical Beijing Youzhuju Network Technology Co Ltd
Priority to CN202010955352.8A priority Critical patent/CN112084440B/en
Publication of CN112084440A publication Critical patent/CN112084440A/en
Application granted granted Critical
Publication of CN112084440B publication Critical patent/CN112084440B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Databases & Information Systems (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Quality & Reliability (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Artificial Intelligence (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Computer Vision & Pattern Recognition (AREA)
  • Evolutionary Biology (AREA)
  • Evolutionary Computation (AREA)
  • Debugging And Monitoring (AREA)

Abstract

Embodiments of the present disclosure disclose a data verification method, apparatus, electronic device, and computer readable medium. One embodiment of the method comprises the following steps: acquiring an operation log; selecting at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data; acquiring at least one item mark uniform resource locator corresponding to the operation event; by this step, the result of the above-mentioned target data after transmission can be determined. And matching the at least one initial uniform resource locator with the at least one target uniform resource locator, and generating verification information according to a matching result. The verification information can be used for determining whether the information of the target data is lost in the transmission process, so that the accuracy and the effectiveness of data transmission are improved.

Description

Data verification method, device, electronic equipment and computer readable medium
Technical Field
Embodiments of the present disclosure relate to the field of computer technology, and in particular, to a data verification method, a data verification device, an electronic device, and a computer readable medium.
Background
With the development of computer networks and the popularity of big data in people's lives, more and more interactive data and streaming information are to be processed by computer servers. In the process of data interaction and streaming information processing, data cannot be monitored well, and the problems that data is lost in the data transmission process are difficult to find, so that the accuracy and the effectiveness of data transmission are low.
Disclosure of Invention
The disclosure is in part intended to introduce concepts in a simplified form that are further described below in the detailed description. The disclosure is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Some embodiments of the present disclosure propose a data verification method, apparatus, electronic device, and computer readable medium to solve the technical problems mentioned in the background section above.
In a first aspect, some embodiments of the present disclosure provide a data verification method, the method comprising: acquiring an operation log, wherein the operation log comprises operation events corresponding to target data on a client; selecting at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data, wherein the initial uniform resource locator corresponds to an operation event in the operation log; acquiring at least one item of target uniform resource locator corresponding to the operation event, wherein the target uniform resource locator is a uniform resource locator which is received by a server and corresponds to the operation event; and matching the at least one initial uniform resource locator with the at least one target uniform resource locator, and generating verification information according to a matching result.
In a second aspect, some embodiments of the present disclosure provide a data verification apparatus, the apparatus comprising: a first obtaining unit configured to obtain an operation log, where the operation log includes an operation event corresponding to target data on a client; a selecting unit configured to select at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data, the initial uniform resource locator corresponding to an operation event in the operation log; a second obtaining unit configured to obtain at least one target uniform resource locator corresponding to the operation event, where the target uniform resource locator is a uniform resource locator received by the server and corresponding to the operation event; and the matching unit is configured to match the at least one initial uniform resource locator with the at least one item identifier uniform resource locator and generate verification information according to a matching result.
In a third aspect, some embodiments of the present disclosure provide an electronic device comprising: one or more processors; a storage device having one or more programs stored thereon, which when executed by one or more processors, cause the one or more processors to implement the method as in any of the first aspects.
In a fourth aspect, some embodiments of the present disclosure provide a computer readable medium having a computer program stored thereon, wherein the program when executed by a processor implements a method as in any of the first aspects.
One of the above embodiments of the present disclosure has the following advantageous effects: acquiring an operation log, wherein the operation log comprises operation events corresponding to target data on a client; selecting at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data, wherein the initial uniform resource locator corresponds to an operation event in the operation log; acquiring at least one item of target uniform resource locator corresponding to the operation event, wherein the target uniform resource locator is a uniform resource locator which is received by a server and corresponds to the operation event; by this step, the result of the above-mentioned target data after transmission can be determined. And matching the at least one initial uniform resource locator with the at least one target uniform resource locator, and generating verification information according to a matching result. The verification information can be used for determining whether the information of the target data is lost in the transmission process, so that the accuracy and the effectiveness of data transmission are improved.
Drawings
The above and other features, advantages, and aspects of embodiments of the present disclosure will become more apparent by reference to the following detailed description when taken in conjunction with the accompanying drawings. The same or similar reference numbers will be used throughout the drawings to refer to the same or like elements. It should be understood that the figures are schematic and that elements and components are not necessarily drawn to scale.
FIG. 1 is a schematic illustration of one application scenario of a data verification method according to some embodiments of the present disclosure;
FIG. 2 is a flow chart of some embodiments of a data verification method according to the present disclosure;
FIG. 3 is a flow chart of other embodiments of a data verification method according to the present disclosure;
FIG. 4 is a schematic diagram of the structure of some embodiments of a data verification device according to the present disclosure;
fig. 5 is a schematic structural diagram of an electronic device suitable for use in implementing some embodiments of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it should be understood that the present disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete. It should be understood that the drawings and embodiments of the present disclosure are for illustration purposes only and are not intended to limit the scope of the present disclosure.
It should be noted that, for convenience of description, only the portions related to the present invention are shown in the drawings. Embodiments of the present disclosure and features of embodiments may be combined with each other without conflict.
It should be noted that the terms "first," "second," and the like in this disclosure are merely used to distinguish between different devices, modules, or units and are not used to define an order or interdependence of functions performed by the devices, modules, or units.
It should be noted that references to "one", "a plurality" and "a plurality" in this disclosure are intended to be illustrative rather than limiting, and those of ordinary skill in the art will appreciate that "one or more" is intended to be understood as "one or more" unless the context clearly indicates otherwise.
The names of messages or information interacted between the various devices in the embodiments of the present disclosure are for illustrative purposes only and are not intended to limit the scope of such messages or information.
The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 is a schematic diagram of an application scenario of a data verification method according to some embodiments of the present disclosure.
As shown in fig. 1, an electronic device 101 may obtain an operation log 102 on a client that presents short videos. The operation log 102 may include praise, comment, collection, forwarding, and downloading operation events corresponding to the short video. The electronic device 101 may select, from the short video reference url set 103, a reference url corresponding to the foregoing operations such as praise, comment, collection, forwarding, and downloading, to obtain at least one initial url 104. The electronic device 101 may obtain at least one entry mark uniform resource locator 105 corresponding to the aforementioned praise, comment, collection, forwarding, and downloading operation events from a server corresponding to the short video. The at least one initial url 104 and the at least one target url 105 are matched, and verification information 106 is generated according to the matching result.
The electronic device 101 may be hardware or software. When the electronic device 101 is hardware, it may be implemented as a distributed cluster formed by a plurality of servers or terminal devices, or may be implemented as a single server or a single terminal device. When the electronic device 101 is embodied as software, it may be installed in the above-listed hardware devices. It may be implemented as a plurality of software or software modules, for example, for providing distributed services, or as a single software or software module. The present invention is not particularly limited herein.
It should be understood that the number of computing devices in fig. 1 is merely illustrative. There may be any number of computing devices, as desired for an implementation.
With continued reference to fig. 2, a flow 200 of some embodiments of a data verification method according to the present disclosure is shown. The data verification method comprises the following steps:
in step 201, an operation log is obtained.
In some embodiments, the execution subject of the data verification method (e.g., the electronic device 101 shown in fig. 1) may acquire the operation log through a wired connection or a wireless connection. The operation log may include an operation event on the client for the target data. The operation log may be a log file corresponding to any operation event, and the client may be a series of devices with a display function, such as a mobile phone and a computer. The target data may be short video, news, or the like data presented on the client. The operation event of the target data may be an operation event such as praise, comment, collection, etc. of the target data.
As an example, the execution subject of the method may obtain, through a network transmission manner, a log file corresponding to an operation event such as praise, comment, collection, etc. of a short video.
Step 202, selecting at least one initial uniform resource locator corresponding to the operation log from the reference uniform resource locator set corresponding to the target data.
In some embodiments, the execution body of the method may select at least one initial url corresponding to the operation log from a set of reference urls corresponding to the target data, where the initial url corresponds to an operation event in the operation log. The reference url of the target data may be a url corresponding to each operation event of the target data. The execution subject of the method may select at least one initial url corresponding to the operation log from the set of reference urls of the target data in various manners. The reference url may be stored in a database set in advance. The at least one initial uniform resource locator may comprise at least one initial macro parameter.
As an example, the execution subject of the method may select at least one initial url corresponding to the operation log from the reference url set of the certain short video by means of a search traversal. The reference uniform resource locator set of the short video can comprise reference uniform resource locators corresponding to operation events such as praise, comment, collection, downloading, display and the like. And selecting the reference uniform resource location corresponding to the praise, comment and download from the reference uniform resource locations corresponding to the operation events including praise, comment, collection, download and display according to the operation events (such as praise, comment and download events), thereby obtaining at least one initial uniform resource locator.
Step 203, obtaining at least one entry identifier corresponding to the operation event.
In some embodiments, the execution body of the data verification method obtains the at least one entry identifier uniform resource locator of the operation event in various ways. The target uniform resource locator is a uniform resource locator of the operation event received by the server. The server may be a third party platform for monitoring target data, may be a cluster control system, or may be various devices such as a computer.
As an example, the reference url corresponding to the three events may be obtained by online transmission, and then the at least one target url of the at least one initial url operation event may be obtained.
Step 204, matching the at least one initial uniform resource locator with the at least one target uniform resource locator, and generating verification information according to the matching result.
In some embodiments, the executing entity of the method may match the at least one initial uniform resource locator with the at least one target uniform resource locator by means of statistical analysis or by means of comparison, and generate the verification information according to the matching result. The verification information may be information about whether the number of the at least one initial url matches the number of the at least one target url, information about whether the target url contains illegal characters based on the number of the at least one initial url matches the number of the at least one target url, and information about whether the target url contains specific macro parameters based on the number of the at least one initial url matches the number of the at least one target url.
As an example, the execution subject of the method may match, by comparing, at least one initial uniform resource locator corresponding to a short video with the at least one target uniform resource locator.
In some optional implementations of some embodiments, in response to the completion of the obtaining of the at least one target uniform resource locator for the operation event, the at least one initial uniform resource locator and the at least one target uniform resource locator are matched based on an automated verification tool, and verification information is generated according to a result of the matching.
One of the above embodiments of the present disclosure has the following advantageous effects: acquiring an operation log, wherein the operation log comprises operation events corresponding to target data on a client; selecting at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data, wherein the initial uniform resource locator corresponds to an operation event in the operation log; acquiring at least one item of target uniform resource locator corresponding to the operation event, wherein the target uniform resource locator is a uniform resource locator which is received by a server and corresponds to the operation event; by this step, the result of the above-mentioned target data after transmission can be determined. And matching the at least one initial uniform resource locator with the at least one target uniform resource locator, and generating verification information according to a matching result. The verification information can be used for determining whether the information of the target data is lost in the transmission process, so that the accuracy and the effectiveness of data transmission are improved.
With further reference to FIG. 3, a flow 300 of further embodiments of a data verification method is shown. The flow 300 of the data verification method includes the steps of:
in step 301, an operation log is obtained.
Step 302, selecting at least one initial uniform resource locator corresponding to the operation log from the reference uniform resource locator set corresponding to the target data.
Step 303, obtaining at least one entry identifier corresponding to the operation event.
In some embodiments, the specific implementation and the technical effects of steps 301 to 303 may refer to steps 201 to 203 in those embodiments corresponding to fig. 2, which are not described herein.
Step 304, determining a difference between the number of the at least one initial uniform resource locator and the number of the at least one target uniform resource locator.
In some embodiments, the executing entity of the method may determine the difference between the number of the at least one initial url and the number of the at least one target url by comparing or performing statistical analysis.
In step 305, macro parameter matching information between each of the at least one initial url and the target url corresponding to the initial url is generated in response to the difference being 0.
In some embodiments, in response to the difference between the number of the at least one initial url and the number of the at least one target url being 0, that is, the number of the at least one initial url and the number of the at least one target url are identical, the execution entity of the method generates macro-parameter matching information between each of the at least one initial url and the target url corresponding to the initial url by means of statistical analysis or comparison. The matching information may be information about whether or not the number of macro parameters between each of the at least one initial url and the target url corresponding to the initial url is identical.
In response to the difference being not 0, the execution body of the method may return a first check message, where the first check message may be: the number of the at least one initial uniform resource locator is inconsistent with the number of the at least one target uniform resource locator. In some optional implementations of some embodiments, for each of the at least one initial url, the executing entity of the method may query, by way of traversal comparison, a first number of macro parameters included in the corresponding initial url and a second number of macro parameters included in the target url corresponding to the initial url; and determining macro parameter matching information according to the difference value of the first macro parameter number and the second macro parameter number.
And step 306, in response to the macro parameter matching information being 0, performing a secondary verification through at least one target macro parameter contained in the target uniform resource locator corresponding to at least one initial macro parameter contained in each initial uniform resource locator, thereby obtaining a secondary verification result.
In some embodiments, in response to the condition that the number of macro parameters between each initial url and the target url corresponding to the initial url is identical, the execution entity of the method may perform a secondary verification on at least one target macro parameter included in the target url corresponding to at least one initial macro parameter included in each initial url, to obtain a secondary verification result. The secondary verification result can be used for representing whether illegal characters exist in the target macro parameters.
In response to the difference being other than 0, the execution body of the method may return a second check message. The second verification information may be: and on the basis that the number of the at least one initial uniform resource locators is consistent with the number of the at least one target uniform resource locators, the number of macro parameters between each initial uniform resource locator in the at least one initial uniform resource locator and the target uniform resource locator corresponding to the initial uniform resource locator is inconsistent.
Step 307, in response to the secondary verification result meeting the first preset condition, performing secondary additional verification on each target macro parameter included in each target uniform resource locator to obtain a secondary additional verification result.
In some embodiments, in response to the secondary verification result satisfying a first preset condition, performing a secondary additional verification on each target macro parameter included in each target macro locator to obtain a secondary additional verification result, where the secondary additional verification result is used to characterize whether the target macro parameter included in each target macro locator includes the same target information as the corresponding initial macro parameter. The first preset condition is that the target macro parameters contained in the uniform resource locator of each target do not have illegal characters.
In response to the secondary verification result not meeting the first preset condition, the execution body of the method may return a secondary verification message, where the secondary verification message may be: and on the basis that the number of macro parameters between each initial uniform resource locator in the at least one initial uniform resource locator and the target uniform resource locator corresponding to the initial uniform resource locator is consistent, the target macro parameters contained in each target uniform resource locator have illegal characters.
And step 308, in response to the secondary additional verification result meeting a second preset condition, performing three-time verification on the target macro parameter to obtain a three-time verification result.
In some embodiments, in response to the secondary additional verification result meeting a second preset condition, performing three verifications on the target macro parameter to obtain a three verification result. The third verification result is used for representing whether the target macro parameters comprise specific macro parameters or not. The second preset result is that each target macro parameter contained in the per-target uniform resource locator can represent target information.
In response to the secondary additional verification result not meeting the second preset condition, the execution body of the method may return a secondary additional verification message, where the secondary additional verification message may be: and on the basis that illegal characters do not exist in the target macro parameters contained in the uniform resource locator of each item, each target macro parameter contained in the uniform resource locator of each item cannot represent target information.
The above-mentioned plurality of verification information may also be embodied in other forms such as a table, and will not be described in detail herein.
As can be seen in fig. 3, in comparison with the description of some embodiments corresponding to fig. 2, the process 300 of the data verification method in some embodiments corresponding to fig. 3 embodies a process of refining the step of matching the at least one initial url and the at least one target url. The specific implementation and the technical effects thereof may refer to the technical effects corresponding to fig. 2, and are not described herein.
With further reference to fig. 4, as an implementation of the method shown in the above figures, the present disclosure provides some embodiments of a data verification apparatus, which correspond to those method embodiments shown in fig. 2, and which are particularly applicable in various electronic devices.
As shown in fig. 4, the data verification apparatus 400 of some embodiments includes: a first acquisition unit 401, a selection unit 402, a second acquisition unit 403, and a matching unit 404. Wherein the first obtaining unit 401 is configured to obtain an operation log, where the operation log includes operation events corresponding to target data on the client; the selecting unit 402 is configured to select at least one initial url corresponding to the operation log from a set of reference urls corresponding to the target data, where the initial url corresponds to an operation event in the operation log; the second obtaining unit 403 is configured to obtain at least one target url corresponding to the operation event, where the target url is a url received by the server and corresponding to the operation event; the matching unit 404 is configured to match the at least one initial url with the at least one target url, and generate the verification information according to the matching result.
In an alternative implementation of some embodiments, the matching unit 404 of the data verification apparatus 400 further comprises a determining unit configured to determine a difference between the number of the at least one initial uniform resource locator and the number of the at least one target uniform resource locator.
In an alternative implementation manner of some embodiments, the matching unit 404 of the data verification apparatus 400 further includes a generating unit configured to generate macro parameter matching information between each of the at least one initial uniform resource locator and the target uniform resource locator corresponding to the initial uniform resource locator in response to the difference being 0.
In an alternative implementation manner of some embodiments, the generating unit of the data checking apparatus 400 is further configured to query, for each of the at least one initial url, a first number of macro parameters included in the initial url and a second number of macro parameters included in the target url corresponding to the initial url; and determining macro parameter matching information according to the difference value of the first macro parameter number and the second macro parameter number.
In an alternative implementation manner of some embodiments, the matching unit 404 of the data verification apparatus 400 further includes a secondary verification unit, where the secondary verification unit is configured to perform, in response to the macro parameter matching information being 0, secondary verification through at least one target macro parameter included in the target uniform resource locator corresponding to at least one initial macro parameter included in each initial uniform resource locator, to obtain a secondary verification result, where the secondary verification result is used to characterize whether an illegal character exists in the target macro parameter.
In an alternative implementation manner of some embodiments, the matching unit 404 of the data verification apparatus 400 further includes a secondary additional verification unit, where the secondary additional verification unit is configured to perform a secondary additional verification on each target macro parameter included in each target uniform resource locator to obtain a secondary additional verification result in response to the secondary verification result meeting a first preset condition, where the first preset condition is that each target macro parameter included in each target uniform resource locator does not have illegal characters.
In an alternative implementation manner of some embodiments, the matching unit 404 of the data verification apparatus 400 further includes a third verification unit, where the third verification unit is configured to perform three verifications on the target macro parameters in response to the second additional verification result meeting a second preset condition, to obtain a third verification result, where the third verification result is used to indicate whether the per-target uniform resource locator includes at least one target macro parameter and whether the per-target uniform resource locator includes a specific macro parameter, and the second preset result is that each target macro parameter included in the per-target uniform resource locator can represent target information.
In an alternative implementation of some embodiments, the data verification apparatus 400 is further configured to, in response to completion of the at least one item of target uniform resource locator of the operation event, match the at least one initial uniform resource locator with the at least one item of target uniform resource locator based on an automated verification tool, and generate verification information according to a result of the matching.
It will be appreciated that the elements described in the apparatus 400 correspond to the various steps in the method described with reference to fig. 2. Thus, the operations, features and resulting benefits described above with respect to the method are equally applicable to the apparatus 400 and the units contained therein, and are not described in detail herein.
Referring now to FIG. 5, a schematic diagram of an electronic device (e.g., the computing device of FIG. 1) 500 suitable for use in implementing some embodiments of the present disclosure is shown. The electronic devices in some embodiments of the present disclosure may include, but are not limited to, mobile terminals such as mobile phones, notebook computers, digital broadcast receivers, PDAs (personal digital assistants), PADs (tablet computers), PMPs (portable multimedia players), car terminals (e.g., car navigation terminals), and the like, as well as stationary terminals such as digital TVs, desktop computers, and the like. The electronic device shown in fig. 5 is merely an example and should not impose any limitations on the functionality and scope of use of embodiments of the present disclosure.
As shown in fig. 5, the electronic device 500 may include a processing means (e.g., a central processing unit, a graphics processor, etc.) 501, which may perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 502 or a program loaded from a storage means 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data required for the operation of the electronic apparatus 500 are also stored. The processing device 501, the ROM 502, and the RAM 503 are connected to each other via a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
In general, the following devices may be connected to the I/O interface 505: input devices 506 including, for example, a touch screen, touchpad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; an output device 507 including, for example, a Liquid Crystal Display (LCD), a speaker, a vibrator, and the like; storage 508 including, for example, magnetic tape, hard disk, etc.; and communication means 509. The communication means 509 may allow the electronic device 500 to communicate with other devices wirelessly or by wire to exchange data. While fig. 5 shows an electronic device 500 having various means, it is to be understood that not all of the illustrated means are required to be implemented or provided. More or fewer devices may be implemented or provided instead. Each block shown in fig. 5 may represent one device or a plurality of devices as needed.
In particular, according to some embodiments of the present disclosure, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, some embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flow chart. In such embodiments, the computer program may be downloaded and installed from a network via the communications device 509, or from the storage device 508, or from the ROM 502. The above-described functions defined in the methods of some embodiments of the present disclosure are performed when the computer program is executed by the processing device 501.
It should be noted that, in some embodiments of the present disclosure, the computer readable medium may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In some embodiments of the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present disclosure, however, the computer-readable signal medium may comprise a data signal propagated in baseband or as part of a carrier wave, with the computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, fiber optic cables, RF (radio frequency), and the like, or any suitable combination of the foregoing.
In some implementations, the clients, servers may communicate using any currently known or future developed network protocol, such as HTTP (HyperText Transfer Protocol ), and may be interconnected with any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the internet (e.g., the internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed networks.
The computer readable medium may be embodied in the computing device; or may exist alone without being incorporated into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: acquiring an operation log, wherein the operation log comprises operation events corresponding to target data on a client; selecting at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data, wherein the initial uniform resource locator corresponds to an operation event in the operation log; acquiring at least one item of target uniform resource locator corresponding to the operation event, wherein the target uniform resource locator is a uniform resource locator which is received by a server and corresponds to the operation event; and matching the at least one initial uniform resource locator with the at least one target uniform resource locator, and generating verification information according to a matching result.
Computer program code for carrying out operations for some embodiments of the present disclosure may be written in one or more programming languages, including an object oriented programming language such as Java, smalltalk, C ++ and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in some embodiments of the present disclosure may be implemented by means of software, or may be implemented by means of hardware. The described units may also be provided in a processor, for example, described as: a processor includes a first acquisition unit, a selection unit, a second acquisition unit, and a matching unit. The names of these units do not constitute a limitation on the unit itself in some cases, and for example, the first acquisition unit may also be described as "a unit that acquires an operation log".
The functions described above herein may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: a Field Programmable Gate Array (FPGA), an Application Specific Integrated Circuit (ASIC), an Application Specific Standard Product (ASSP), a system on a chip (SOC), a Complex Programmable Logic Device (CPLD), and the like.
According to one or more embodiments of the present disclosure, there is provided a data verification method including: acquiring an operation log, wherein the operation log comprises operation events corresponding to target data on a client; selecting at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data, wherein the initial uniform resource locator corresponds to an operation event in the operation log; acquiring at least one item of target uniform resource locator corresponding to the operation event, wherein the target uniform resource locator is a uniform resource locator which is received by a server and corresponds to the operation event; and matching the at least one initial uniform resource locator with the at least one target uniform resource locator, and generating verification information according to a matching result.
In accordance with one or more embodiments of the present disclosure, a difference between the number of the at least one initial uniform resource locator and the number of the at least one target uniform resource locator is determined.
According to one or more embodiments of the present disclosure, macro-parameter matching information between each of the at least one initial uniform resource locator and a target uniform resource locator corresponding to the initial uniform resource locator is generated in response to the difference being 0.
According to one or more embodiments of the present disclosure, for each of the at least one initial url, a first number of macro parameters included in the initial url and a second number of macro parameters included in a target url corresponding to the initial url are queried; and determining macro parameter matching information according to the difference value of the first macro parameter number and the second macro parameter number.
According to one or more embodiments of the present disclosure, in response to the macro parameter matching information being 0, performing a secondary verification through at least one target macro parameter included in a target uniform resource locator corresponding to at least one initial macro parameter included in each initial uniform resource locator, to obtain a secondary verification result, where the secondary verification result is used to characterize whether an illegal character exists in the target macro parameter.
According to one or more embodiments of the present disclosure, in response to the secondary verification result satisfying a first preset condition, performing a secondary additional verification on each target macro parameter included in each target macro resource locator to obtain a secondary additional verification result, where the secondary additional verification result is used to characterize whether each target macro parameter included in each target macro resource locator includes target information identical to corresponding initial macro parameters, and the first preset condition is that there is no illegal character in each target macro parameter included in each target macro resource locator.
According to one or more embodiments of the present disclosure, in response to the secondary additional verification result satisfying a second preset condition, performing three-time verification on the target macro parameters to obtain three-time verification results, where the three-time verification results are used to characterize whether the target macro parameters included in each target uniform resource locator include at least one target macro parameter, and the second preset result is that each target macro parameter included in each target uniform resource locator can represent target information.
According to one or more embodiments of the present disclosure, in response to completion of acquisition of at least one item of target uniform resource locator of the operation event, the at least one initial uniform resource locator and the at least one item of target uniform resource locator are matched based on an automated verification tool, and verification information is generated according to a result of the matching.
According to one or more embodiments of the present disclosure, there is provided a data verification apparatus including: a first obtaining unit configured to obtain an operation log, where the operation log includes an operation event corresponding to target data on a client; a selecting unit configured to select at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data, the initial uniform resource locator corresponding to an operation event in the operation log; a second obtaining unit configured to obtain at least one target uniform resource locator corresponding to the operation event, where the target uniform resource locator is a uniform resource locator received by the server and corresponding to the operation event; and the matching unit is configured to match the at least one initial uniform resource locator with the at least one item identifier uniform resource locator and generate verification information according to a matching result.
According to one or more embodiments of the present disclosure, the matching unit of the data verification device further comprises a determining unit configured to determine a difference between the number of the at least one initial uniform resource locator and the number of the at least one target uniform resource locator.
According to one or more embodiments of the present disclosure, the matching unit of the data verification apparatus further includes a generating unit configured to generate macro parameter matching information between each of the at least one initial uniform resource locator and a target uniform resource locator corresponding to the initial uniform resource locator in response to the difference value being 0.
According to one or more embodiments of the present disclosure, the generating unit of the data checking device is further configured to, for each of the at least one initial url, query a first number of macro parameters included in the initial url and a second number of macro parameters included in the target url corresponding to the initial url; and determining macro parameter matching information according to the difference value of the first macro parameter number and the second macro parameter number.
According to one or more embodiments of the present disclosure, the matching unit of the data verification device further includes a secondary verification unit, where the secondary verification unit is configured to perform secondary verification through at least one target macro parameter included in a target uniform resource locator corresponding to at least one initial macro parameter included in each initial uniform resource locator in response to the macro parameter matching information being 0, to obtain a secondary verification result, where the secondary verification result is used to characterize whether an illegal character exists in the target macro parameter.
According to one or more embodiments of the present disclosure, the matching unit of the data verification device further includes a secondary additional verification unit, where the secondary additional verification unit is configured to perform a secondary additional verification on each target macro parameter included in each target uniform resource locator in response to the secondary verification result meeting a first preset condition, to obtain a secondary additional verification result, where the secondary additional verification result is used to characterize whether each target macro parameter included in each target uniform resource locator includes the same target information as the corresponding initial macro parameter, and the first preset condition is that each target macro parameter included in each target uniform resource locator does not have illegal characters.
According to one or more embodiments of the present disclosure, the matching unit of the data verification device further includes a third verification unit configured to perform three verifications on the target macro parameters in response to the second additional verification result satisfying a second preset condition, to obtain a third verification result, where the third verification result is used to indicate whether the per-item target macro parameter includes at least one target macro parameter and whether the per-item target macro parameter includes a specific macro parameter, and the second preset result is that each target macro parameter included in the per-item target macro parameter is capable of representing target information.
According to one or more embodiments of the present disclosure, the data verification device is further configured to, in response to completion of the acquisition of the at least one item of target uniform resource locator of the operation event, match the at least one initial uniform resource locator with the at least one item of target uniform resource locator based on an automated verification tool, and generate verification information according to a result of the matching.
In accordance with one or more embodiments of the present disclosure, some embodiments of the present disclosure provide an electronic device comprising: one or more processors; a storage device having one or more programs stored thereon, which when executed by one or more processors, cause the one or more processors to implement the method as in any of the first aspects.
Some embodiments of the present disclosure provide a computer readable medium having a computer program stored thereon, wherein the program when executed by a processor implements a method as in any of the first aspects.
The foregoing description is only of the preferred embodiments of the present disclosure and description of the principles of the technology being employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above technical features, but encompasses other technical features formed by any combination of the above technical features or their equivalents without departing from the spirit of the invention. Such as the above-described features, are mutually substituted with (but not limited to) the features having similar functions disclosed in the embodiments of the present disclosure.

Claims (11)

1. A data verification method, comprising:
acquiring an operation log, wherein the operation log comprises operation events for target data on a client;
selecting at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data, wherein the initial uniform resource locator corresponds to an operation event in the operation log; the reference uniform resource locator set is the reference uniform resource location corresponding to the operation event;
acquiring at least one item of target uniform resource locator corresponding to the operation event, wherein the target uniform resource locator is a uniform resource locator which is received by a server and corresponds to the operation event;
matching the at least one initial uniform resource locator with the at least one target uniform resource locator, and generating verification information according to a matching result;
the matching the at least one initial uniform resource locator and the at least one target uniform resource locator, generating verification information according to a matching result, including:
generating macro parameter matching information between each initial uniform resource locator of the at least one initial uniform resource locator and a target uniform resource locator corresponding to the initial uniform resource locator in response to the difference value being 0; the difference is a difference between the number of the at least one initial uniform resource locator and the number of the at least one target uniform resource locator.
2. The method of claim 1, wherein the matching the at least one initial uniform resource locator and the at least one target uniform resource locator, and generating the verification information based on the matching result comprises:
a difference between the number of the at least one initial uniform resource locator and the number of the at least one target uniform resource locator is determined.
3. The method of claim 2, wherein each initial uniform resource locator of the at least one initial uniform resource locator comprises at least one initial macro parameter, and each target uniform resource locator of the at least one target uniform resource locator comprises at least one target macro parameter.
4. The method of claim 1, wherein the generating macro-parameter matching information between each of the at least one initial url and a target url corresponding to the initial url comprises:
for each initial uniform resource locator in the at least one initial uniform resource locator, inquiring the first macro parameter quantity contained in the initial uniform resource locator and the second macro parameter quantity contained in the target uniform resource locator corresponding to the initial uniform resource locator;
And determining macro parameter matching information according to the difference value of the first macro parameter number and the second macro parameter number.
5. The method according to one of claims 1 or 4, wherein said matching the at least one initial uniform resource locator and the at least one target uniform resource locator, generating verification information according to the matching result comprises:
and responding to the macro parameter matching information being 0, and performing secondary verification through at least one target macro parameter contained in the target uniform resource locator corresponding to at least one initial macro parameter contained in each initial uniform resource locator to obtain a secondary verification result, wherein the secondary verification result is used for representing whether illegal characters exist in the target macro parameters or not.
6. The method of claim 5, wherein said matching the at least one initial uniform resource locator and the at least one target uniform resource locator, generating verification information based on the matching result comprises:
and responding to the secondary verification result to meet a first preset condition, carrying out secondary additional verification on each target macro parameter contained in each target uniform resource locator to obtain a secondary additional verification result, wherein the secondary additional verification result is used for representing whether the target macro parameter contained in each target uniform resource locator contains target information identical to the corresponding initial macro parameter or not, and the first preset condition is that illegal characters do not exist in each target macro parameter contained in each target uniform resource locator.
7. The method of claim 6, wherein the matching the at least one initial uniform resource locator and the at least one target uniform resource locator, generating the verification information based on the matching result comprises:
and responding to the secondary additional verification result to meet a second preset condition, and performing three-time verification on the target macro parameters to obtain three-time verification results, wherein the three-time verification results are used for representing whether each target macro parameter comprises at least one target macro parameter or not.
8. The method of claim 1, wherein the matching the at least one initial uniform resource locator and the at least one target uniform resource locator, and generating the verification information based on the matching result comprises:
and matching the at least one initial uniform resource locator with the at least one item target uniform resource locator based on an automatic verification tool after the at least one item target uniform resource locator of the operation event is acquired, and generating verification information according to a matching result.
9. A data verification apparatus, comprising:
the first acquisition unit is configured to acquire an operation log, wherein the operation log comprises operation events corresponding to target data on a client;
A selecting unit configured to select at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data, the initial uniform resource locator corresponding to an operation event in the operation log; the reference uniform resource locator set is the reference uniform resource location corresponding to the operation event;
the second acquisition unit is configured to acquire at least one item of target uniform resource locator corresponding to the operation event, wherein the target uniform resource locator is a uniform resource locator which is received by a server and corresponds to the operation event;
the matching unit is configured to match the at least one initial uniform resource locator with the at least one target uniform resource locator, and generate verification information according to a matching result;
the matching unit is further configured to:
generating macro parameter matching information between each initial uniform resource locator of the at least one initial uniform resource locator and a target uniform resource locator corresponding to the initial uniform resource locator in response to the difference value being 0; the difference is a difference between the number of the at least one initial uniform resource locator and the number of the at least one target uniform resource locator.
10. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon,
when executed by the one or more processors, causes the one or more processors to implement the method of any of claims 1-8.
11. A computer readable medium having stored thereon a computer program, wherein the program when executed by a processor implements the method of any of claims 1-8.
CN202010955352.8A 2020-09-11 2020-09-11 Data verification method, device, electronic equipment and computer readable medium Active CN112084440B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010955352.8A CN112084440B (en) 2020-09-11 2020-09-11 Data verification method, device, electronic equipment and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010955352.8A CN112084440B (en) 2020-09-11 2020-09-11 Data verification method, device, electronic equipment and computer readable medium

Publications (2)

Publication Number Publication Date
CN112084440A CN112084440A (en) 2020-12-15
CN112084440B true CN112084440B (en) 2023-08-08

Family

ID=73737637

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010955352.8A Active CN112084440B (en) 2020-09-11 2020-09-11 Data verification method, device, electronic equipment and computer readable medium

Country Status (1)

Country Link
CN (1) CN112084440B (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104301806A (en) * 2014-09-11 2015-01-21 华为技术有限公司 Video recognition method, device and system
CN104820667A (en) * 2014-09-15 2015-08-05 腾讯科技(北京)有限公司 Method, device and system for reporting webpage click rate
CN109145194A (en) * 2017-06-27 2019-01-04 北京国双科技有限公司 The acquisition method and device of user behavior data
CN111193613A (en) * 2019-12-10 2020-05-22 北京你财富计算机科技有限公司 Method, device and system for collecting dotting information at client application

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9542545B2 (en) * 2011-03-21 2017-01-10 Webcetera, L.P. System, method and computer program product for access authentication
CN111124658B (en) * 2018-10-31 2023-09-29 伊姆西Ip控股有限责任公司 Method, apparatus and computer program product for processing target data

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104301806A (en) * 2014-09-11 2015-01-21 华为技术有限公司 Video recognition method, device and system
CN104820667A (en) * 2014-09-15 2015-08-05 腾讯科技(北京)有限公司 Method, device and system for reporting webpage click rate
CN109145194A (en) * 2017-06-27 2019-01-04 北京国双科技有限公司 The acquisition method and device of user behavior data
CN111193613A (en) * 2019-12-10 2020-05-22 北京你财富计算机科技有限公司 Method, device and system for collecting dotting information at client application

Also Published As

Publication number Publication date
CN112084440A (en) 2020-12-15

Similar Documents

Publication Publication Date Title
CN111581291A (en) Data processing method and device, electronic equipment and readable medium
CN111800513B (en) Method and device for pushing information and computer readable medium of electronic equipment
CN111163324B (en) Information processing method and device and electronic equipment
CN111694757B (en) Application program testing method and device, electronic equipment and computer readable storage medium
CN110781373A (en) List updating method and device, readable medium and electronic equipment
CN111209306A (en) Business logic judgment method and device, electronic equipment and storage medium
CN115640285B (en) Power abnormality information transmission method, device, electronic equipment and medium
CN112995712A (en) Method, device and equipment for determining stuck factors and storage medium
CN111930709A (en) Data storage method and device, electronic equipment and computer readable medium
CN111628938B (en) Branch merging method, device, electronic equipment and computer storage medium
CN112558933A (en) Component rendering method and device, readable medium and electronic equipment
CN113590985B (en) Page jump configuration method and device, electronic equipment and computer readable medium
CN112084440B (en) Data verification method, device, electronic equipment and computer readable medium
CN112084441A (en) Information retrieval method and device and electronic equipment
CN111460020B (en) Method, device, electronic equipment and medium for resolving message
CN111625745B (en) Recommendation method, recommendation device, electronic equipment and computer readable medium
CN111382365B (en) Method and device for outputting information
CN111367592B (en) Information processing method and device
CN111897620A (en) Interaction method and device and electronic equipment
CN111782549A (en) Test method and device and electronic equipment
CN112162682A (en) Content display method and device, electronic equipment and computer readable storage medium
CN110991312A (en) Method, apparatus, electronic device, and medium for generating detection information
CN111581305B (en) Feature processing method, device, electronic equipment and medium
CN111404890B (en) Flow data detection method, system, storage medium and electronic device
CN111400322B (en) Method, apparatus, electronic device and medium for storing data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant