CN115525578A - Form generation method and device, electronic equipment and storage medium - Google Patents

Form generation method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115525578A
CN115525578A CN202211472639.0A CN202211472639A CN115525578A CN 115525578 A CN115525578 A CN 115525578A CN 202211472639 A CN202211472639 A CN 202211472639A CN 115525578 A CN115525578 A CN 115525578A
Authority
CN
China
Prior art keywords
encryption
type
parameter
parameters
decryption
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211472639.0A
Other languages
Chinese (zh)
Inventor
周俊君
李静连
周辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Guangzhou Qianjun Network Technology Co ltd
Original Assignee
Guangzhou Qianjun Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Guangzhou Qianjun Network Technology Co ltd filed Critical Guangzhou Qianjun Network Technology Co ltd
Priority to CN202211472639.0A priority Critical patent/CN115525578A/en
Publication of CN115525578A publication Critical patent/CN115525578A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/362Software debugging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0481Interaction techniques based on graphical user interfaces [GUI] based on specific properties of the displayed interaction object or a metaphor-based environment, e.g. interaction with desktop elements like windows or icons, or assisted by a cursor's changing behaviour or appearance
    • G06F3/0482Interaction with lists of selectable items, e.g. menus
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/01Input arrangements or combined input and output arrangements for interaction between user and computer
    • G06F3/048Interaction techniques based on graphical user interfaces [GUI]
    • G06F3/0484Interaction techniques based on graphical user interfaces [GUI] for the control of specific functions or operations, e.g. selecting or manipulating an object, an image or a displayed text element, setting a parameter value or selecting a range

Abstract

The embodiment of the application discloses a form generation method and device, electronic equipment and a storage medium, wherein a plurality of input first-type parameters and values of the first-type parameters are received through an interactive interface; splicing a plurality of first-type parameters and values of the first-type parameters into an initial character string according to a preset rule, and displaying the initial character string at a first position of an interactive interface; responding to a calling instruction of an encryption/decryption interface corresponding to the first position, and displaying a pre-edited encryption/decryption rule list which can be called; responding to a selection instruction aiming at a first encryption/decryption rule in the encryption/decryption rule list, encrypting the initial character string through the first encryption/decryption rule, obtaining a first encryption result, and displaying the first encryption result at a second position of the interactive interface; and obtaining the form under the condition that the second type of parameters corresponding to the input initial character string are received through the interactive interface. Based on this application, form structure efficiency has been improved, and then improves interface debugging efficiency.

Description

Form generation method and device, electronic equipment and storage medium
Technical Field
The present application relates to the field of debugging technologies, and in particular, to a form generation method and apparatus, an electronic device, and a storage medium.
Background
In the process of interface development, the interfaces need to be debugged, and the debugging of some interfaces needs to construct a form containing data and encryption information to request a target interface so as to trigger the target interface to execute program logic, thereby realizing one-time debugging of the target interface.
However, the existing form tool for debugging the interface does not support encryption/decryption of form data, and only a programmer can manually write an additional applet to generate encrypted information and copy the encrypted information into a constructed form, which results in low form construction efficiency and low interface modulation efficiency.
Disclosure of Invention
The application provides a form generation method and device, an electronic device and a storage medium, and the method comprises the following technical scheme:
a method of form generation, the method comprising:
receiving a plurality of input first-type parameters and values of the first-type parameters through an interactive interface;
splicing the plurality of first type parameters and the values of the first type parameters into an initial character string according to a preset rule, and displaying the initial character string at a first position of the interactive interface;
responding to a calling instruction of an encryption/decryption interface corresponding to the first position, and displaying a pre-edited encryption/decryption rule list which can be called;
responding to a selection instruction aiming at a first encryption/decryption rule in the encryption/decryption rule list, encrypting the initial character string through the first encryption/decryption rule, obtaining a first encryption result, and displaying the first encryption result at a second position of the interactive interface;
and obtaining a form under the condition that the input second type of parameters corresponding to the initial character string are received through the interactive interface.
The above method, preferably, further comprises:
in response to a sending instruction, splicing the initial character string, the first encryption result and the second type of parameters according to a specified rule to obtain a target character string;
submitting the target string to a target interface to trigger the target interface to execute program logic based on the target string.
In the method, preferably, each first type parameter and its value are displayed at one position of the interactive interface, and different first type parameters and their values are displayed at different positions of the interactive interface; the method further comprises the following steps:
for the ith first type parameter in the plurality of first type parameters, if a calling instruction of an encryption/decryption interface corresponding to the position of the ith first type parameter is obtained, displaying a pre-edited list of encryption/decryption rules which can be called;
and in response to a selection instruction for a second encryption/decryption rule in the encryption/decryption rule list, encrypting the value of the ith first-class parameter through the second encryption/decryption rule to obtain a second encryption result as a new value of the ith first-class parameter.
Preferably, in the above method, if the ith first-type parameter is replaced with a new first-type parameter before responding to the selection instruction for the first encryption/decryption rule in the encryption/decryption rule list, and/or the value of the ith first-type parameter is replaced with a new value, the ith first-type parameter in the initial string is updated to the new first-type parameter, and/or the value of the ith first-type parameter is updated to the new value of the ith first-type parameter.
Preferably, in the above method, if after responding to the selection instruction for the first encryption/decryption rule in the encryption/decryption rule list, the ith first-class parameter is replaced with a new first-class parameter, and/or the value of the ith first-class parameter is replaced with a new value, the ith first-class parameter in the initial string is updated to the new first-class parameter, and/or the ith first-class parameter value is updated to the new value of the ith first-class parameter; and encrypting the updated initial character string through the first encryption/decryption rule to obtain an updated first encryption result.
In the above method, preferably, the interactive interface includes a plurality of data editing areas, and different data editing areas are used for editing parameters of different functions of the target interface; wherein the content of the first and second substances,
each data editing area comprises: a first type parameter and a value input area thereof, an input area of the second type parameter, a display area of the initial character string and the first encryption result;
the method comprises the following steps of receiving a plurality of input first-class parameters through an interactive interface, wherein the values of the first-class parameters comprise:
and receiving a plurality of input first-type parameters and the value of each first-type parameter through any data editing area in the interactive interface.
Preferably, the interactive interface includes three data editing areas, which are:
the system comprises an interface head parameter editing area, an interface get parameter editing area and an interface post parameter editing area.
A form generation apparatus comprising:
the receiving module is used for receiving a plurality of input first-class parameters and values of the first-class parameters through the interactive interface;
the splicing module is used for splicing the plurality of first-class parameters and the values of the first-class parameters into an initial character string according to a preset rule and displaying the initial character string at a first position of the interactive interface;
the calling module is used for responding to a calling instruction of the encryption/decryption interface corresponding to the first position and displaying a pre-edited encryption/decryption rule list which can be called;
the encryption module is used for responding to a selection instruction of a first encryption/decryption rule in the encryption/decryption rule list, encrypting the initial character string through the first encryption/decryption rule to obtain a first encryption result, and displaying the first encryption result at a second position of the interactive interface;
and the determining module is used for obtaining the form under the condition that the input second type parameters corresponding to the initial character strings are received through the interactive interface.
An electronic device, comprising:
a memory for storing a program;
and the processor is used for calling and executing the program in the memory, and realizing the steps of the form generation method according to any one of the above items by executing the program.
A readable storage medium having stored thereon a computer program which, when executed by a processor, carries out the steps of the form generation method of any of the above.
According to the scheme, the form generation method, the form generation device, the electronic equipment and the storage medium receive a plurality of input first-type parameters and values of the first-type parameters through the interactive interface; splicing a plurality of first-type parameters and values of the first-type parameters into an initial character string according to a preset rule, and displaying the initial character string at a first position of an interactive interface; responding to a calling instruction of an encryption/decryption interface corresponding to the first position, and displaying a pre-edited encryption/decryption rule list which can be called; responding to a selection instruction aiming at a first encryption/decryption rule in the encryption/decryption rule list, encrypting the initial character string through the first encryption/decryption rule, obtaining a first encryption result, and displaying the first encryption result at a second position of the interactive interface; and obtaining the form under the condition of receiving the second type of parameters corresponding to the input initial character string through the interactive interface. Based on the application, a user only needs to input the first type of parameters, values of the first type of parameters and the second type of parameters, a pre-edited called encryption/decryption rule list is displayed by calling the encryption/decryption interface, the first encryption/decryption rule is directly selected from the encryption/decryption rule list to encrypt the initial character string, and a programmer does not need to manually write an additional applet on site, so that the form construction efficiency is improved, and the interface debugging efficiency is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on the drawings without creative efforts.
FIG. 1 is a diagram illustrating an example of a form generated by a form tool commonly used at present according to an embodiment of the present disclosure;
FIG. 2 is a flowchart of an implementation of a form generation method according to an embodiment of the present disclosure;
FIG. 3a is a partial illustration of an interactive interface provided by an embodiment of the present application;
FIG. 3b is an exemplary diagram of a list of encryption/decryption rules provided by an embodiment of the present application;
FIG. 3c is another schematic partial view of an interactive interface provided by an embodiment of the present application;
FIG. 4 is a diagram of yet another partial example of an interactive interface provided by an embodiment of the present application;
FIG. 5 is a diagram of a fourth partial example of an interactive interface provided by an embodiment of the present application;
fig. 6 is a schematic structural diagram of a form generation apparatus according to an embodiment of the present application;
fig. 7 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
The terms "first," "second," "third," "fourth," and the like in the description and in the claims, as well as in the drawings described above, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in other sequences than described or illustrated herein.
Detailed Description
The technical solutions in the embodiments of the present application will be described clearly and completely with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only some embodiments of the present application, and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without inventive step, are within the scope of the present disclosure.
As illustrated in fig. 1, an exemplary diagram of forms is generated for the present general form tool provided in the present application. The current form tool only supports simple editing and filling of key-value key value pairs (such as a, B and B in fig. 1), while the value of the signature parameter in fig. 1 (i.e. BPhiZ45UB + + vmaex bozjygb5QseR/uphlqO0LXgCP8 =) requires a programmer to manually write an applet additionally, and the processing of the key value pairs (a-a and B-B) by the applet generates the value of the signature parameter and copies the value to the position shown in fig. 1, so that the form construction efficiency is low.
The application is provided for improving the efficiency of form construction.
As shown in fig. 2, a flowchart for implementing the form generation method provided in the embodiment of the present application may include:
step S201: and receiving a plurality of input first-type parameters and values of the first-type parameters through the interactive interface.
Optionally, a first type parameter input area and a value input area of the first type parameter may be set on the interactive interface, and the user may input the first type parameter in the first type parameter input area and input a value corresponding to the first type parameter in the value input area of the first type parameter.
Different first type parameters have different input areas, and correspondingly, values of the different first type parameters have different input areas.
Fig. 3a is a partial diagram of an interactive interface provided in an embodiment of the present application. In the example diagram, two first-type parameters, namely a and B, are input through an interactive interface, wherein the value of the first-type parameter a is a, and the value of the first-type parameter B is B.
Optionally, the "+ Value" key may be clicked once, a first type parameter input area and a Value input area of the first type parameter are added to the interactive interface, for example, the "+ Value" key is clicked once, and a first parameter input area and a Value input area of the first parameter may be displayed on the same line of the interactive interface; clicking the "+ Value" key once again can display another first parameter input area and another Value input area of the first parameter on another row of the interactive interface. Clicking the + Query button once can add a second-type parameter input area and a second-type parameter value display area on the interactive interface, for example, clicking the + Query button once can display a second-type parameter input area and a second-type parameter value display area on the same line of the interactive interface.
Optionally, in addition to the input areas for the first type of parameters and the values thereof, the input areas for the first type of parameters and the values thereof may also be deleted, for example, an "x" key of a row where a certain first type of parameters is located may be clicked to delete a certain first type of parameters and the input areas for the values thereof.
Step S202: and splicing the received multiple first-type parameters and the values of the first-type parameters into an initial character string according to a preset rule, and displaying the initial character string at a first position of the interactive interface.
The first position may be an area for displaying a value corresponding to the second type of parameter.
In the example shown in fig. 3a, the initial character string is a = a & B = B, and the position where the initial character string is displayed is the first position.
Step S203: and displaying a pre-edited encryption/decryption rule list which can be called in response to a calling instruction of the encryption/decryption interface corresponding to the first position.
In the application, an encryption/decryption interface is arranged in an interactive interface corresponding to a first position, a user can operate the encryption/decryption interface (for example, click operation, double click operation or the like) to trigger generation of a call instruction for the encryption/decryption interface, and an encryption/decryption rule list is displayed in response to the call instruction, wherein the encryption/decryption rule list comprises at least one encryption/decryption rule, and any one encryption/decryption rule can be self-contained when the form generation device provided by the application is issued, namely, is edited by a developer before issuing, or can be user-defined, namely, is obtained by manual editing by the user after issuing as required.
In the example shown in fig. 3a, the first location corresponds to an encryption/decryption interface of "a = a&B = B "displayed in the row"
Figure 152630DEST_PATH_IMAGE001
"Interactive interface.
The user is in alignment with "
Figure 509925DEST_PATH_IMAGE001
After the interactive interface is operated, the encryption/decryption rule list is displayed. Fig. 3b is a diagram illustrating an example of a list of encryption/decryption rules provided in an embodiment of the present application. In this example, three encryption/decryption rules are shown in the encryption/decryption rule list, which are: md5 encryption/decryption algorithm, hmacBase64 encryption/decryption algorithm, base64_ Decode _ Aes _ Decode encryption/decryption algorithm. Wherein the user selects the HmacBase64 encryption/decryption algorithm (the user may first select the circle in front of HmacBase64 and then click "OK" to confirm selection of HmacBase64 encryption/decryption algorithm).
Step S204: and responding to a selection instruction aiming at a first encryption/decryption rule in the encryption/decryption rule list, encrypting the initial character string through the first encryption/decryption rule, obtaining a first encryption result, and displaying the first encryption result at a second position of the interactive interface.
The first encryption/decryption rule may be any one of a list of encryption/decryption rules. The second position may be a position adjacent to the aforementioned first position where the initial character string is displayed, for example, may be below the first position, or may be to the right of the first position, and so on.
Fig. 3c is another partial schematic view of an interactive interface provided in the embodiment of the present application. In this example, the initial string "a = a & B = B" is encrypted by using the HmacBase64 encryption/decryption algorithm, and the first encryption result, that is, BPhiZ45UB + + vmaxexbozjygb 5QseR/uphlqO0LXgCP8=, is obtained.
Step S205: and obtaining the form under the condition of receiving the input second-class parameters corresponding to the initial character strings through the interactive interface.
A second type parameter input area can be arranged in the interactive interface, and a user can input a second type parameter in the second type parameter input area. In the example shown in fig. 3c, the second type of parameter is signature.
Optionally, the second type of parameter may be input before the encryption/decryption interface corresponding to the first position is called, or the second type of parameter may be input after the encryption/decryption interface corresponding to the first position is called, and the application does not limit the time for inputting the second type of parameter.
The form generation method provided by the embodiment of the application receives a plurality of input first-type parameters and values of the first-type parameters through an interactive interface; splicing a plurality of first-type parameters and the values of the first-type parameters into an initial character string according to a preset rule, and displaying the initial character string at a first position of an interactive interface; responding to a calling instruction of an encryption/decryption interface corresponding to the first position, and displaying a pre-edited encryption/decryption rule list which can be called; responding to a selection instruction aiming at a first encryption/decryption rule in the encryption/decryption rule list, encrypting the initial character string through the first encryption/decryption rule, obtaining a first encryption result, and displaying the first encryption result at a second position of the interactive interface; and obtaining the form under the condition of receiving the second type of parameters corresponding to the input initial character string through the interactive interface. Based on the application, a user only needs to input the first type of parameters, values of the first type of parameters and the second type of parameters, a pre-edited called encryption/decryption rule list is displayed by calling the encryption/decryption interface, the first encryption/decryption rule is directly selected from the encryption/decryption rule list to encrypt the initial character string, a programmer does not need to manually write additional applets on site, and the encryption result does not need to be copied, so that the form construction efficiency is improved, and the interface debugging efficiency is further improved.
Further, the form generation method provided by the application may further include:
obtaining a sending instruction;
and responding to the sending instruction, splicing the initial character string, the first encryption result and the second type of parameters according to a specified rule to obtain a target character string.
For example, the target string may be: a = a & B = B & signature = BPhiZ45UB + + VMAEXqBOzjYGB5QseR/uphlqO0LXgCP8=.
And submitting the target character string to a target interface to trigger the target interface to execute program logic based on the target character string, so that one-time debugging of the target interface is realized.
In an optional embodiment, each first-type parameter and its value are displayed at one position of the interactive interface, and different first-type parameters and their values are displayed at different positions of the interactive interface. For example, each first-type parameter and its value are displayed in the same row, and different first-type parameters and their values are displayed in different rows, as shown in fig. 3a and 3c as examples. The form generation method provided by the application can further comprise the following steps:
and for the ith first-class parameter in the plurality of first-class parameters, if a calling instruction of the encryption/decryption interface corresponding to the position of the ith first-class parameter is obtained, displaying a pre-edited list of the encryption/decryption rules which can be called.
As shown in FIGS. 3a and 3c, each parameter of the first type and the row where the value is located are provided "
Figure 237709DEST_PATH_IMAGE001
"Interactive interface, user's line of action by operating ith parameter of first kind"
Figure 929722DEST_PATH_IMAGE001
", an interactive interface can be triggered for the row in which the ith parameter of the first class is located"
Figure 588105DEST_PATH_IMAGE001
"may display, in response to the call instruction, an encryption/decryption rule list, which may be the same as or different from the encryption/decryption rule list displayed in response to the call instruction for the encryption/decryption interface corresponding to the first location.
And responding to a selection instruction aiming at a second encryption/decryption rule in the encryption/decryption rule list, encrypting the value of the ith first-class parameter through the second encryption/decryption rule, and obtaining a second encryption result as a new value of the ith first-class parameter.
As shown in fig. 4, a still another partial example diagram of an interactive interface provided in the embodiment of the present application is shown, in this example, the first type parameter is passport, and a value of the first type parameter is 12345678, that is, passport =
12345678. User interaction interface to line where first type parameter passport is located "
Figure 580332DEST_PATH_IMAGE001
"after the encryption/decryption rule list is displayed by operation, the selected encryption/decryption rule is the encryption/decryption algorithm Aes _ Base64, and the value 12345678 of the first parameter passport is encrypted by the encryption/decryption algorithm Aes _ Base64 to obtain a second encryption result, that is: WH6EuTqFill8l8/lcEvP2w = = =.
That is to say, the method and the device support not only the whole encryption of the first type parameters and the values thereof, but also the independent encryption of the values of each first type parameter.
In an optional embodiment, if the ith first-type parameter is replaced with the new first-type parameter before responding to the selection instruction for the first encryption/decryption rule in the encryption/decryption rule list, and/or the value of the ith first-type parameter is replaced with the new value, the ith first-type parameter in the initial string is updated to the new first-type parameter, and/or the value of the ith first-type parameter is updated to the new value of the ith first-type parameter.
In the application, whether the first type of parameters and the values thereof are updated or not is monitored in real time.
And if the ith first-type parameter is replaced by the new first-type parameter, updating the ith first-type parameter in the initial character string to the new first-type parameter.
And/or the presence of a gas in the gas,
and if the situation that the value of the ith first-type parameter is replaced by a new value is monitored, updating the value of the ith first-type parameter in the initial character string to the new value of the ith first-type parameter.
That is, if the user updates at least one of the ith first-type parameter and the value thereof before determining to select the first encryption/decryption rule, since the first encryption result is not generated, it is only necessary to update the initial string.
In an optional embodiment, if after responding to a selection instruction for a first encryption/decryption rule in the encryption/decryption rule list, the ith first-class parameter is replaced by a new first-class parameter, and/or the value of the ith first-class parameter is replaced by a new value, the ith first-class parameter in the initial string is updated to be the new first-class parameter, and/or the ith first-class parameter value is updated to be the new value of the ith first-class parameter; and encrypting the updated initial character string through a first encryption/decryption rule to obtain an updated first encryption result.
In the application, whether the first type of parameters and the values thereof are updated or not is monitored in real time.
And if the ith first-type parameter is monitored to be replaced by the new first-type parameter, updating the ith first-type parameter in the initial character string to the new first-type parameter.
And/or the presence of a gas in the gas,
and if the situation that the value of the ith first-type parameter is replaced by a new value is monitored, updating the value of the ith first-type parameter in the initial character string to the new value of the ith first-type parameter.
Further, if the user updates at least one of the ith first type parameter and the value thereof after determining to select the first encryption/decryption rule, since the first encryption result is generated at this time, the first encryption result needs to be updated in addition to the updating of the initial string, and at this time, the first encryption/decryption rule may be directly invoked to encrypt the updated initial string without the user operating the encryption/decryption interface corresponding to the first location again. Of course, optionally, it may also be waited for the user to operate the encryption/decryption interface corresponding to the first location again, and trigger the encryption/decryption interface corresponding to the first location "
Figure 744597DEST_PATH_IMAGE001
"in response to the call instruction, displaying an encryption/decryption rule list, and in response to encrypting the updated initial character string for a first encryption/decryption rule in the encryption/decryption rule list.
In an optional embodiment, when the target interface has multiple parameters to be tested, the interactive interface may include multiple data editing areas, where different data editing areas are used to edit parameters of different functions of the target interface; wherein, the first and the second end of the pipe are connected with each other,
each data editing area comprises: the encryption method comprises the following steps that a first type parameter and value input area thereof, a second type parameter input area, an initial character string and a first encryption result display area are included;
one implementation manner of receiving the input multiple first-type parameters through the interactive interface and obtaining the value of each first-type parameter may be as follows:
and receiving a plurality of input first-type parameters and values of the first-type parameters through any data editing area in the interactive interface.
Optionally, the interactive interface includes three data editing areas, which are:
the system comprises an interface head parameter editing area, an interface get parameter editing area and an interface post parameter editing area. As shown in fig. 5, the fourth partial example diagram of the interactive interface provided in the embodiment of the present application is shown, in which an area where "Header" is located represents an interface Header parameter editing area, an area where "Get arms" is located represents a Get parameter editing area, and an area where "Post arms" is located represents a Post parameter editing area. Each area can be folded or unfolded, when a certain area needs to be edited, the area can be unfolded, and if the area does not need to be edited, the page can be folded. As shown in FIG. 5, only the "Get Args" area is in the deployed state, and both the "Header" area and the "Post Args" area are in the stowed state.
Corresponding to the method embodiment, the present application further provides a form generating apparatus, and a schematic structural diagram of the form generating apparatus provided in the embodiment of the present application is shown in fig. 6, and may include:
a receiving module 601, a splicing module 602, a calling module 603, an encrypting module 604 and a determining module 605; wherein, the first and the second end of the pipe are connected with each other,
the receiving module 601 is configured to receive, through an interactive interface, a plurality of input first-type parameters and values of the first-type parameters;
the splicing module 602 is configured to splice the plurality of first-type parameters and the values of the first-type parameters into an initial character string according to a preset rule, and display the initial character string at a first position of the interactive interface;
the calling module 603 is configured to respond to a calling instruction for the encryption/decryption interface corresponding to the first location, and display a pre-edited list of callable encryption/decryption rules;
the encryption module 604 is configured to encrypt the initial string according to a first encryption/decryption rule in the encryption/decryption rule list in response to a selection instruction for the first encryption/decryption rule, obtain a first encryption result, and display the first encryption result at a second position of the interactive interface;
the determining module 605 is configured to obtain the form under the condition that the input second type parameter corresponding to the initial character string is received through the interactive interface.
The form generation device provided by the embodiment of the application receives a plurality of input first-type parameters and values of the first-type parameters through an interactive interface; splicing a plurality of first-type parameters and the values of the first-type parameters into an initial character string according to a preset rule, and displaying the initial character string at a first position of an interactive interface; responding to a calling instruction of an encryption/decryption interface corresponding to the first position, and displaying a pre-edited encryption/decryption rule list which can be called; responding to a selection instruction aiming at a first encryption/decryption rule in the encryption/decryption rule list, encrypting the initial character string through the first encryption/decryption rule, obtaining a first encryption result, and displaying the first encryption result at a second position of the interactive interface; and obtaining the form under the condition of receiving the second type of parameters corresponding to the input initial character string through the interactive interface. Based on the application, a user only needs to input the first type of parameters, values of the first type of parameters and the second type of parameters, a pre-edited called encryption/decryption rule list is displayed by calling the encryption/decryption interface, the first encryption/decryption rule is directly selected from the encryption/decryption rule list to encrypt the initial character string, and a programmer does not need to manually write an additional applet on site, so that the form construction efficiency is improved, and the interface debugging efficiency is improved.
In an optional embodiment, the form generating apparatus may further include:
the sending module is used for responding to a sending instruction, and splicing the initial character string, the first encryption result and the second type of parameters according to a specified rule to obtain a target character string; submitting the target string to a target interface to trigger the target interface to execute program logic based on the target string.
In an optional embodiment, each first type parameter and a value thereof are displayed at one position of the interactive interface, and different first type parameters and values thereof are displayed at different positions of the interactive interface; the calling module 603 is further configured to:
for the ith first-class parameter in the plurality of first-class parameters, if a calling instruction of an encryption/decryption interface corresponding to the position of the ith first-class parameter is obtained, displaying a pre-edited encryption/decryption rule list which can be called;
and in response to a selection instruction for a second encryption/decryption rule in the encryption/decryption rule list, encrypting the value of the ith first-class parameter through the second encryption/decryption rule to obtain a second encryption result as a new value of the ith first-class parameter.
In an optional embodiment, the form generating apparatus may further include an updating module, configured to:
if the ith first-type parameter is replaced by a new first-type parameter before a selection instruction for a first encryption/decryption rule in the encryption/decryption rule list is responded, and/or the value of the ith first-type parameter is replaced by a new value, the ith first-type parameter in the initial character string is updated to be the new first-type parameter, and/or the value of the ith first-type parameter is updated to be the new value of the ith first-type parameter.
In an optional embodiment, the form generating apparatus may further include an updating module, configured to:
if after responding to a selection instruction for a first encryption/decryption rule in the encryption/decryption rule list, replacing the ith first-class parameter with a new first-class parameter, and/or replacing the value of the ith first-class parameter with a new value, updating the ith first-class parameter in the initial character string to the new first-class parameter, and/or updating the value of the ith first-class parameter to the new value of the ith first-class parameter; and encrypting the updated initial character string through the first encryption/decryption rule to obtain an updated first encryption result.
In an optional embodiment, the interactive interface includes a plurality of data editing areas, and different data editing areas are used for editing parameters of different functions of the target interface; wherein the content of the first and second substances,
each data editing area comprises: a first type parameter and a value input area thereof, an input area of the second type parameter, a display area of the initial character string and the first encryption result;
the receiving module 601 is configured to: and receiving a plurality of input first-type parameters and the value of each first-type parameter through any data editing area in the interactive interface.
In an optional embodiment, the interactive interface includes three data editing areas, which are respectively:
the system comprises an interface header parameter editing area, an interface get parameter editing area and an interface post parameter editing area.
Corresponding to the method embodiment, the present application further provides an electronic device, a schematic structural diagram of which is shown in fig. 7, and the electronic device may include: at least one processor 1, at least one communication interface 2, at least one memory 3 and at least one communication bus 4.
In the embodiment of the present application, the number of the processor 1, the communication interface 2, the memory 3, and the communication bus 4 is at least one, and the processor 1, the communication interface 2, and the memory 3 complete mutual communication through the communication bus 4.
The processor 1 may be a central processing unit CPU, or an Application Specific Integrated Circuit ASIC (Application Specific Integrated Circuit), or one or more Integrated circuits configured to implement embodiments of the present Application, etc.
The memory 3 may comprise a high-speed RAM memory, and may further comprise a non-volatile memory (non-volatile memory) or the like, such as at least one disk memory.
Wherein the memory 3 stores a program, and the processor 1 may call the program stored in the memory 3, the program being configured to:
receiving a plurality of input first-type parameters and values of the first-type parameters through an interactive interface;
splicing the plurality of first type parameters and the values of the first type parameters into an initial character string according to a preset rule, and displaying the initial character string at a first position of the interactive interface;
responding to a calling instruction of an encryption/decryption interface corresponding to the first position, and displaying a pre-edited encryption/decryption rule list which can be called;
responding to a selection instruction aiming at a first encryption/decryption rule in the encryption/decryption rule list, encrypting the initial character string through the first encryption/decryption rule, obtaining a first encryption result, and displaying the first encryption result at a second position of the interactive interface;
and obtaining a form under the condition that the input second type of parameters corresponding to the initial character string are received through the interactive interface.
Alternatively, the detailed function and the extended function of the program may refer to the above description.
Embodiments of the present application further provide a storage medium, where a program suitable for execution by a processor may be stored, where the program is configured to:
receiving a plurality of input first-type parameters and values of the first-type parameters through an interactive interface;
splicing the plurality of first type parameters and the values of the first type parameters into an initial character string according to a preset rule, and displaying the initial character string at a first position of the interactive interface;
responding to a calling instruction of an encryption/decryption interface corresponding to the first position, and displaying a pre-edited encryption/decryption rule list which can be called;
responding to a selection instruction aiming at a first encryption/decryption rule in the encryption/decryption rule list, encrypting the initial character string through the first encryption/decryption rule, obtaining a first encryption result, and displaying the first encryption result at a second position of the interactive interface;
and obtaining a form under the condition that the input second type of parameters corresponding to the initial character string are received through the interactive interface.
Alternatively, the detailed function and the extended function of the program may be as described above.
Those of ordinary skill in the art will appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the technical solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one position, or may be distributed on multiple network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit.
It should be understood that in the embodiments of the present application, the technical problems described above can be solved by combining and combining the features of the embodiments and the embodiments.
The functions may be stored in a computer-readable storage medium if they are implemented in the form of software functional units and sold or used as separate products. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (10)

1. A method for form generation, the method comprising:
receiving a plurality of input first-type parameters and values of the first-type parameters through an interactive interface;
splicing the plurality of first type parameters and the values of the first type parameters into an initial character string according to a preset rule, and displaying the initial character string at a first position of the interactive interface;
responding to a calling instruction of an encryption/decryption interface corresponding to the first position, and displaying a pre-edited list of encryption/decryption rules which can be called;
responding to a selection instruction aiming at a first encryption/decryption rule in the encryption/decryption rule list, encrypting the initial character string through the first encryption/decryption rule, obtaining a first encryption result, and displaying the first encryption result at a second position of the interactive interface;
and obtaining a form under the condition that the input second type of parameters corresponding to the initial character string are received through the interactive interface.
2. The method of claim 1, further comprising:
in response to a sending instruction, splicing the initial character string, the first encryption result and the second type of parameters according to a specified rule to obtain a target character string;
submitting the target string to a target interface to trigger the target interface to execute program logic based on the target string.
3. The method of claim 1, wherein each first type parameter and its value are displayed at one location of the interactive interface, and different first type parameters and their values are displayed at different locations of the interactive interface; the method further comprises the following steps:
for the ith first-class parameter in the plurality of first-class parameters, if a calling instruction of an encryption/decryption interface corresponding to the position of the ith first-class parameter is obtained, displaying a pre-edited encryption/decryption rule list which can be called;
and in response to a selection instruction for a second encryption/decryption rule in the encryption/decryption rule list, encrypting the value of the ith first-class parameter through the second encryption/decryption rule to obtain a second encryption result as a new value of the ith first-class parameter.
4. The method according to claim 3, wherein if the ith first type parameter is replaced with a new first type parameter and/or the value of the ith first type parameter is replaced with a new value before responding to the selection instruction for the first encryption/decryption rule in the encryption/decryption rule list, the ith first type parameter in the initial string is updated to the new first type parameter and/or the value of the ith first type parameter is updated to the new value of the ith first type parameter.
5. The method according to claim 3, wherein if, after responding to a selection instruction for a first encryption/decryption rule in the encryption/decryption rule list, the ith first type parameter is replaced with a new first type parameter, and/or the value of the ith first type parameter is replaced with a new value, the ith first type parameter in the initial string is updated to the new first type parameter, and/or the ith first type parameter value is updated to the new value of the ith first type parameter; and encrypting the updated initial character string through the first encryption/decryption rule to obtain an updated first encryption result.
6. The method according to any one of claims 1 to 5, wherein the interactive interface comprises a plurality of data editing areas, and different data editing areas are used for editing parameters of different functions of the target interface; wherein the content of the first and second substances,
each data editing area comprises: a first type parameter and a value input area thereof, an input area of the second type parameter, a display area of the initial character string and the first encryption result;
the method comprises the following steps of receiving a plurality of input first-class parameters through an interactive interface, wherein the values of the first-class parameters comprise:
and receiving a plurality of input first-type parameters and the value of each first-type parameter through any data editing area in the interactive interface.
7. The method of claim 6, wherein the interactive interface comprises three data editing areas, respectively:
the system comprises an interface header parameter editing area, an interface get parameter editing area and an interface post parameter editing area.
8. A form generation apparatus, comprising:
the receiving module is used for receiving a plurality of input first-class parameters and values of the first-class parameters through the interactive interface;
the splicing module is used for splicing the plurality of first-class parameters and the values of the first-class parameters into an initial character string according to a preset rule and displaying the initial character string at a first position of the interactive interface;
the calling module is used for responding to a calling instruction of the encryption/decryption interface corresponding to the first position and displaying a pre-edited encryption/decryption rule list which can be called;
the encryption module is used for responding to a selection instruction of a first encryption/decryption rule in the encryption/decryption rule list, encrypting the initial character string through the first encryption/decryption rule to obtain a first encryption result, and displaying the first encryption result at a second position of the interactive interface;
and the determining module is used for obtaining the form under the condition that the input second type parameters corresponding to the initial character strings are received through the interactive interface.
9. An electronic device, comprising:
a memory for storing a program;
a processor for calling and executing the program in the memory, the steps of the form generation method of any of claims 1-7 being implemented by executing the program.
10. A readable storage medium, having stored thereon a computer program which, when executed by a processor, carries out the steps of the form generation method of any of claims 1-7.
CN202211472639.0A 2022-11-23 2022-11-23 Form generation method and device, electronic equipment and storage medium Pending CN115525578A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211472639.0A CN115525578A (en) 2022-11-23 2022-11-23 Form generation method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211472639.0A CN115525578A (en) 2022-11-23 2022-11-23 Form generation method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN115525578A true CN115525578A (en) 2022-12-27

Family

ID=84704643

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211472639.0A Pending CN115525578A (en) 2022-11-23 2022-11-23 Form generation method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115525578A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115757191A (en) * 2023-01-05 2023-03-07 广州市千钧网络科技有限公司 Data processing method and device

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109710533A (en) * 2018-12-29 2019-05-03 亚信科技(中国)有限公司 A kind of interface test method, device and server
CN109828908A (en) * 2018-12-15 2019-05-31 中国平安人寿保险股份有限公司 Interface testing parameter encryption method, device, electronic equipment and storage medium
CN111182025A (en) * 2019-11-26 2020-05-19 腾讯科技(深圳)有限公司 Message processing method, device, server and storage medium
CN111694733A (en) * 2020-05-22 2020-09-22 五八有限公司 API (application programming interface) testing method and device for software development kit SDK (software development kit)
CN113886216A (en) * 2020-07-03 2022-01-04 腾讯科技(深圳)有限公司 Interface test and tool configuration method, device, electronic equipment and storage medium
CN114185808A (en) * 2021-12-27 2022-03-15 未来电视有限公司 Automatic testing method and device, electronic equipment and computer readable storage medium
CN114553532A (en) * 2022-02-22 2022-05-27 深圳壹账通智能科技有限公司 Data secure transmission method and device, electronic equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109828908A (en) * 2018-12-15 2019-05-31 中国平安人寿保险股份有限公司 Interface testing parameter encryption method, device, electronic equipment and storage medium
CN109710533A (en) * 2018-12-29 2019-05-03 亚信科技(中国)有限公司 A kind of interface test method, device and server
CN111182025A (en) * 2019-11-26 2020-05-19 腾讯科技(深圳)有限公司 Message processing method, device, server and storage medium
CN111694733A (en) * 2020-05-22 2020-09-22 五八有限公司 API (application programming interface) testing method and device for software development kit SDK (software development kit)
CN113886216A (en) * 2020-07-03 2022-01-04 腾讯科技(深圳)有限公司 Interface test and tool configuration method, device, electronic equipment and storage medium
CN114185808A (en) * 2021-12-27 2022-03-15 未来电视有限公司 Automatic testing method and device, electronic equipment and computer readable storage medium
CN114553532A (en) * 2022-02-22 2022-05-27 深圳壹账通智能科技有限公司 Data secure transmission method and device, electronic equipment and storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115757191A (en) * 2023-01-05 2023-03-07 广州市千钧网络科技有限公司 Data processing method and device

Similar Documents

Publication Publication Date Title
US10592694B2 (en) Anonymizing machine data events
US10802951B2 (en) Systems and methods of integrated testing and deployment in a continuous integration continuous deployment (CICD) system
CA3051287C (en) Visual blockchain browser
US7702959B2 (en) Error management system and method of using the same
JP5489391B2 (en) Method, system and program for comparing topologies (topology comparison)
JP5084314B2 (en) Information processing apparatus, information processing method, information processing program, and recording medium for recording information processing program
US10223076B1 (en) Generating code based on user interactions with a user interface element in a code editor
JP6937703B2 (en) Configuration change management device, configuration change management method, and program
US11593074B2 (en) System, method, and apparatus for data-centric networked application development services
CN110221899B (en) User interface adjusting method, device and system
JP4474390B2 (en) Personal information masking system and method
JP2019533223A (en) Information input method and apparatus
CN115525578A (en) Form generation method and device, electronic equipment and storage medium
CN106897153A (en) Call the method and system of API
US20190004877A1 (en) Transforming plug-in application recipe variables
CN111984248B (en) Page editing method and device, storage medium and electronic device
CN111949655A (en) Form display method and device, electronic equipment and medium
CN108694186A (en) Data transmission method for uplink and server application, computing device and computer-readable medium
US7472355B2 (en) Computer-implemented method for managing commands for a terminal session
EP4113307A1 (en) Onboarding of monitoring tools
US6760842B1 (en) Finite state automata security system
Pecuch Password managers: a survey
CN113961292B (en) Security product generation method and device, electronic equipment and storage medium
CN111143227B (en) Data operation method, device, terminal and storage medium
Karzyński Webmin Administrator's Cookbook

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20221227

RJ01 Rejection of invention patent application after publication