CN107436836A - The processing method and relevant device of a kind of journal file - Google Patents

The processing method and relevant device of a kind of journal file Download PDF

Info

Publication number
CN107436836A
CN107436836A CN201710483339.5A CN201710483339A CN107436836A CN 107436836 A CN107436836 A CN 107436836A CN 201710483339 A CN201710483339 A CN 201710483339A CN 107436836 A CN107436836 A CN 107436836A
Authority
CN
China
Prior art keywords
bug
information
journal file
classification
sample
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN201710483339.5A
Other languages
Chinese (zh)
Inventor
丁金清
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Jinli Communication Equipment Co Ltd
Original Assignee
Shenzhen Jinli Communication Equipment Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Jinli Communication Equipment Co Ltd filed Critical Shenzhen Jinli Communication Equipment Co Ltd
Priority to CN201710483339.5A priority Critical patent/CN107436836A/en
Publication of CN107436836A publication Critical patent/CN107436836A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3452Performance evaluation by statistical analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/34Recording or statistical evaluation of computer activity, e.g. of down time, of input/output operation ; Recording or statistical evaluation of user activity, e.g. usability assessment
    • G06F11/3466Performance evaluation by tracing or monitoring
    • G06F11/3476Data logging
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2201/00Indexing scheme relating to error detection, to error correction, and to monitoring
    • G06F2201/865Monitoring of software

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • Quality & Reliability (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Mathematical Physics (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Bioinformatics & Cheminformatics (AREA)
  • Bioinformatics & Computational Biology (AREA)
  • Evolutionary Biology (AREA)
  • Probability & Statistics with Applications (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the invention discloses a kind of processing method of journal file and terminal, wherein method includes:Server obtains a sample journal file, and a sample journal file is respectively the journal file that b terminal device uploads;C leak bug information is extracted from a sample journal file;Using each bug information in the c bug information as the input of hash algorithm, c cryptographic Hash is calculated;Identical cryptographic Hash in the c cryptographic Hash is counted, obtains the bug quantity of each bug classification in d bug classification and d bug classification, wherein a, b, c, d are positive integer, and d is less than or equal to c.Using the embodiment of the present invention, the bug classification that statistics obtains and the bug quantity that bug classifies can be utilized to determine using existing common defects, to help research staff to solve a fairly large number of bug information of bug occur.

Description

The processing method and relevant device of a kind of journal file
Technical field
The present invention relates to the processing method and relevant device of field of terminal technology, more particularly to a kind of journal file.
Background technology
Fast development and people's living standards continue to improve with internet, increasing electronics applications exist In people's daily life, particularly mobile phone.To meet the growing material requisite of people, research staff also have developed respectively simultaneously The application program of kind various kinds, to enrich the application and amusement of people.
In practice, it has been found that many users use, the duration of mobile phone is longer, frequency of use is higher, and mobile phone is in the process of running Substantial amounts of journal file can be produced.At present, do not have also and how to arrange journal file, obtain associated valid data to help to seek Look for the scheme of the common defects of application program.
The content of the invention
The embodiment of the present invention provides a kind of processing method of journal file, can be sought according to the bug of the statistics bug quantity classified Common existing bug defects are found, more quickly to search and solve common existing bug information.
In a first aspect, the embodiments of the invention provide a kind of processing method of journal file, this method includes:
A sample journal file is obtained, a sample journal file is respectively the daily record text that b terminal device uploads Part;
C leak bug information is extracted from a sample journal file;
Using each bug information in the c bug information as the input of hash algorithm, c Hash is calculated Value;
Identical cryptographic Hash in the c cryptographic Hash is counted, obtains d bug classification and d bug classification In each bug classification bug quantity, wherein a, b, c, d are positive integer, and d is less than or equal to c.
It is described that c leak bug information is extracted from a sample journal file in some possible embodiments, Including:Redundancy in each sample journal file in a sample journal file is deleted, obtains c bug letter Breath;Wherein, the redundancy is the information in addition to the bug information.
In some possible embodiments, the redundancy includes any one of following or multinomial:Temporal information, line Journey information, category information, positional information.
In some possible embodiments, the hash algorithm may include any one of following:Message digest algorithm Two editions MD2, message digest algorithm fourth edition MD4, message digest algorithm the 5th edition MD5, Secure Hash Algorithm SHA.
In some possible embodiments, methods described also includes:If the bug quantity of target bug classification exceedes present count Amount, then bug announcement informations are sent to the contact person that prestores, solve bug information corresponding to the target bug classification with notice, it is described Target bug is categorized as the bug classification in the d bug classification.
In some possible embodiments, methods described also includes:If the bug quantity of target bug classification exceedes default bug Quantity, then the bug information of the corresponding bug quantity of target bug classification is deleted, to retain the target bug classification pair The bug information answered, the target bug are categorized as the bug classification in the d bug classification.
Second aspect, the embodiments of the invention provide a kind of server, the server includes:
Acquiring unit, for obtaining a sample journal file, a sample journal file is respectively b terminal device The journal file of upload;
Extraction unit, for extracting c leak bug information from a sample journal file;
Computing unit, for the input using each bug information in the c bug information as hash algorithm, meter Calculation obtains c cryptographic Hash;
Statistic unit, for identical cryptographic Hash in the c cryptographic Hash to be counted, obtain d bug classification and institute The bug quantity of each bug classification in d bug classification is stated, wherein a, b, c, d are positive integer, and d is less than or equal to c.
In some possible embodiments, the list for performing any one of aforementioned first aspect methods described may also include Member, repeat no more here.
The third aspect, the embodiments of the invention provide another server, the server includes:Memory, processor with And the computer program that can be run in the memory and on the processor is stored in, calculating described in the computing device The as above method described in first aspect is realized during machine program.
Fourth aspect, the embodiments of the invention provide a kind of computer-readable recording medium, the computer-readable storage Media storage has computer program, and the as above method described in first aspect is realized when the computer program is executed by processor.
The embodiment of the present invention obtains a sample journal file by server, and a sample journal file is respectively b The journal file that individual terminal device uploads, then extracts c leak bug information, then from a sample journal file Using each bug information in the c bug information as the input of hash algorithm, c cryptographic Hash is calculated, finally Identical cryptographic Hash in the c cryptographic Hash is counted, obtains each bug in d bug classification and d bug classification The bug quantity of classification, wherein a, b, c, d are positive integer, and d is less than or equal to c;It can so count common in b terminal device The bug defects of appearance, it is faster, efficiently help people solve corresponding to bug information.
Brief description of the drawings
Technical scheme in order to illustrate the embodiments of the present invention more clearly, it is required in being described below to embodiment to use Accompanying drawing is briefly described, it should be apparent that, drawings in the following description are some embodiments of the present invention, general for this area For logical technical staff, on the premise of not paying creative work, other accompanying drawings can also be obtained according to these accompanying drawings.
Fig. 1 is a kind of schematic flow diagram of the processing method of journal file provided in an embodiment of the present invention;
Fig. 2 is a kind of schematic diagram of journal file comprising redundancy provided in an embodiment of the present invention;
Fig. 3 is a kind of schematic diagram of bug information provided in an embodiment of the present invention;
Fig. 4 is a kind of schematic flow diagram of the processing method for journal file that another embodiment of the present invention provides;
Fig. 5 is a kind of schematic block diagram of server provided in an embodiment of the present invention;
Fig. 6 is a kind of schematic block diagram for server that another embodiment of the present invention provides;
Fig. 7 is a kind of schematic block diagram for server that another embodiment of the present invention provides.
Embodiment
Below in conjunction with the accompanying drawing in the embodiment of the present invention, the technical scheme in the embodiment of the present invention is carried out clear, complete Site preparation describes, it is clear that described embodiment is part of the embodiment of the present invention, rather than whole embodiments.Based on this hair Embodiment in bright, the every other implementation that those of ordinary skill in the art are obtained under the premise of creative work is not made Example, belongs to the scope of protection of the invention.
It should be appreciated that ought be in this specification and in the appended claims in use, term " comprising " and "comprising" instruction Described feature, entirety, step, operation, the presence of element and/or component, but it is not precluded from one or more of the other feature, whole Body, step, operation, element, component and/or its presence or addition for gathering.
It is also understood that the term used in this description of the invention is merely for the sake of the mesh for describing specific embodiment And be not intended to limit the present invention.As used in description of the invention and appended claims, unless on Other situations are hereafter clearly indicated, otherwise " one " of singulative, "one" and "the" are intended to include plural form.
It will be further appreciated that the term "and/or" used in description of the invention and appended claims is Refer to any combinations of one or more of the associated item listed and be possible to combine, and including these combinations.
As used in this specification and in the appended claims, term " if " can be according to context quilt Be construed to " when ... " or " once " or " in response to determining " or " in response to detecting ".Similarly, phrase " if it is determined that " or " if detecting [described condition or event] " can be interpreted to mean according to context " once it is determined that " or " in response to true It is fixed " or " once detecting [described condition or event] " or " in response to detecting [described condition or event] ".
In the specific implementation, the terminal described in the embodiment of the present invention is including but not limited to such as with touch sensitive surface The mobile phone, laptop computer or tablet PC of (for example, touch-screen display and/or touch pad) etc it is other just Portable device.It is to be further understood that in certain embodiments, the equipment is not portable communication device, but with tactile Touch the desktop computer of sensing surface (for example, touch-screen display and/or touch pad).
In discussion below, the terminal including display and touch sensitive surface is described.It is, however, to be understood that It is that terminal can include one or more of the other physical user-interface device of such as physical keyboard, mouse and/or control-rod.
Terminal supports various application programs, such as one or more of following:Drawing application program, demonstration application journey Sequence, word-processing application, website create application program, disk imprinting application program, spreadsheet applications, game application Program, telephony application, videoconference application, email application, instant messaging applications, exercise Support application program, photo management application program, digital camera application program, digital camera application program, web-browsing application Program, digital music player application and/or video frequency player application program.
The various application programs that can be performed in terminal can use at least one public of such as touch sensitive surface Physical user-interface device.It can adjust and/or change among applications and/or in corresponding application programs and touch sensitive table The corresponding information shown in the one or more functions and terminal in face.So, the public physical structure of terminal is (for example, touch Sensing surface) the various application programs with user interface directly perceived and transparent for a user can be supported.
It is that the embodiment of the present invention provides a kind of schematic flow diagram of the processing method of journal file, as shown in the figure referring to Fig. 1 Method may include:
Step S101, server obtains a sample journal file, and a sample journal file is respectively that b terminal is set The standby journal file uploaded.
In the embodiment of the present invention, when the application APP installed on terminal device is occurring abnormal, via terminal user Agree to and confirm journal file corresponding to the abnormal generation of terminal appearance can be uploaded onto the server by network.Or terminal Equipment can directly according to corresponding to the operation conditions of application program (may include allow abnormal) generation journal file.Alternatively, may be used The journal file of generation can be sent to by server by network.
Correspondingly, server can receive the journal file of these terminals transmission.Specifically, server can receive b terminal The a sample journal file that equipment sends over, wherein a and b are positive integer, and a is not less than b.I.e. a terminal device can Generation/transmission one or more sample journal file.
Transfer resource is usually saved, the sample journal file that terminal device is sent is the sample daily record text after compression Part.I.e. server can calculate a sample journal file after the compression that b terminal device sends over, and can further pass through Decompression obtains a sample journal file.
The terminal device includes but is not limited to user equipment, smart mobile phone (such as Android phone, IOS mobile phones), individual People's computer, tablet personal computer, palm PC, mobile internet device (MID, Mobile Internet Devices) or wearable The internet devices such as smart machine, the embodiment of the present invention are not construed as limiting.
Step S102, described server extracts c leak bug information from a sample journal file.
In certain embodiments, leaky bug information is may include in sample journal file, normal operation information, is such as started shooting Information, shutdown information, transaction operation information etc., temporal information, log storage path information (i.e. positional information), thread information (thread i.e. belonging to current operation, can be numeral), category information (classification i.e. belonging to current code row), may also include it His information, the present invention do not limit.
In a step S102 embodiment, the server is by each sample in a sample journal file Redundancy in journal file is deleted, and obtains c bug information;Wherein, the redundancy is except the bug information Outside information.
Specifically, server can be deleted the redundancy in each sample journal file in a sample journal file Remove, c bug information in therefrom extracting.Alternatively, a journal file is it is possible that multiple bug information that report an error.One or more In individual journal file it is possible that multiple identicals report an error bug information.To avoid repeating recording, server can will influence duplicate removal Factor information, such as redundancy of temporal information, thread information in addition to bug information is purged.Referring specifically to such as Fig. 2 A kind of schematic diagram of the journal file comprising redundancy is shown, the information that wherein black wire frame is included is deletable superfluous Remaining information.
Further, server can according to keyword (as " and FATAL EXCEPTION ") to remove redundancy after day Will file is split, and obtains c bug information, and the textual form that each bug information can set form is presented, such as will be every Individual bug information saves as TXT texts, that is, the text of each setting form after splitting includes a bug information.It can specifically join See that Fig. 3 shows a kind of schematic diagram of bug information, the bug information is preserved with txt textual forms and presented.
In certain embodiments, a and c is positive integer, and a can be more than c, might be less that equal to c, the embodiment of the present invention Do not limit.The redundancy can refer to the information in addition to bug information, it may include temporal information, thread information, classification Information, positional information etc., the embodiment of the present invention does not limit.
Step S103, described server is using each bug information in the c bug information as hash algorithm Input, is calculated c cryptographic Hash.
Specifically, server can be counted to each bug information in the c bug information respectively using hash algorithm Calculate, c cryptographic Hash is obtained so as to corresponding.That is the corresponding cryptographic Hash of a bug information.Cryptographic Hash is unique, that is to say phase With the cryptographic Hash that is calculated of bug information it is also identical, the cryptographic Hash that different bug information is calculated also differs.
For example, bug information as shown in Figure 3 is quoted, as hash algorithm (such as the 5th edition MD5 of message digest algorithm) Input, the cryptographic Hash being calculated using MD5 algorithms can be " fab6750e0a5c743f5b9a426e7e636a8e ".
In certain embodiments, the hash algorithm may include message digest algorithm MD, Secure Hash Algorithm SHA, such as Conventional algorithm MD2, MD4, MD5, SHA-1 etc., the embodiment of the present invention does not limit.
In certain embodiments, server can will be calculated bug information corresponding to identical cryptographic Hash and be deleted, and protect Stay a bug information.It that is to say that server retains bug information corresponding to portion for each cryptographic Hash, to save space internal memory.
Step S104, described server is counted identical cryptographic Hash in the c cryptographic Hash, obtains d bug points The bug quantity of each bug classification in class and d bug classification, wherein a, b, c, d are positive integer, and d is less than or equal to c.
Specifically, server can count to c cryptographic Hash, search whether to there are in the database to prestore on The record of each cryptographic Hash in c cryptographic Hash, if there is the record on some cryptographic Hash, then directly it can remember in the cryptographic Hash Increase in record and correspondingly record quantity;If the not record on certain cryptographic Hash, the cryptographic Hash is recorded in the database. It that is to say, server can will have identical cryptographic Hash to be classified as one according to c cryptographic Hash and each self-corresponding bug information Bug classifies, and counts the number occurred with identical cryptographic Hash, using the bug quantity classified as the bug;Will be not identical Cryptographic Hash be individually classified as another bug classification, then another bug classification bug quantity be 1.
As an example it is assumed that server extracts 10 bug information, wherein it is identical bug to have preceding 5 bug information Information 1, rear 3 bug information are bug information 2, and the 6th and the 7th bug information are respectively bug information 3 and bug information 4. Correspondingly, 10 cryptographic Hash that above-mentioned 10 bug information is calculated successively for server by utilizing MD5 algorithms, it is respectively: hash1、hash1、hash1、hash1、hash1、hash3、hash4、hash2、hash2、hash2.Server can count accordingly Go out:There are 4 class bug in terminal device, that is, obtains 4 bug classification, respectively bug information 1, bug information 2, the and of bug information 3 Bug information 4.And also can obtain every class bug bug quantity, i.e. the bug quantity of each bug classification in 4 bug classification, respectively To there is having 5 times for bug information 1, bug information 2 occur has 3 times, and bug information 3 and bug information 4 occur has 1 time respectively.
In certain embodiments, in addition to:If the bug quantity of target bug classification exceedes default bug quantity, by described in The bug information of the corresponding bug quantity of target bug classification is deleted, to retain a bug letter corresponding to the target bug classification Breath.It is that, to save memory source, server can retain the bug information with identical cryptographic Hash storage portion, will be unnecessary Bug information deleted, with duplicate removal, save space internal memory.
In certain embodiments, in addition to:If the bug quantity of target bug classification exceedes predetermined threshold value, to the contact that prestores People sends bug announcement informations, solves bug information corresponding to the target bug classification with notice, the target bug is categorized as institute State the bug classification in d bug classification.
Specifically, when there are bug quantity more than target bug classification corresponding to predetermined threshold value, to the contact person that prestores Bug announcement informations are sent, bug information corresponding to any solution target bug classification is accordingly researched and developed with notice.Prestoring here Contact person can include any one of following or multinomial:Prestore mailbox, the telephone number that prestores, the QQ contact persons that prestore, prestore it is micro- Believe contact person etc., the present invention does not limit.
The embodiment of the present invention obtains a sample journal file by server, and a sample journal file is respectively b The journal file that individual terminal device uploads, then extracts c leak bug information, then from a sample journal file Using each bug information in the c bug information as the input of hash algorithm, c cryptographic Hash is calculated, finally Identical cryptographic Hash in the c cryptographic Hash is counted, obtains each bug in d bug classification and d bug classification The bug quantity of classification, wherein a, b, c, d are positive integer, and d is less than or equal to c;It can so count common in b terminal device The bug defects of appearance, it is faster, efficiently help people solve corresponding to bug information.
Fig. 4 is referred to, is a kind of schematic flow diagram of the processing method for journal file that another embodiment of the present invention provides, Methods described includes step is implemented as follows:
Step S201, server obtains a sample journal file, and a sample journal file is respectively that b terminal is set The standby journal file uploaded.
Step S202, described server believes the redundancy in each sample journal file in a sample journal file Breath is deleted, and obtains c bug information;Wherein, the redundancy is the information in addition to the bug information.
In certain embodiments, the redundancy includes any one of following or multinomial:Temporal information, thread letter Breath, category information, positional information.
Step S203, described server is using each bug information in the c bug information as hash algorithm Input, is calculated c cryptographic Hash.
In certain embodiments, the hash algorithm may include any one of following:The message digest algorithm second edition MD2, message digest algorithm fourth edition MD4, message digest algorithm the 5th edition MD5, Secure Hash Algorithm SHA.
Step S204, described server is counted identical cryptographic Hash in the c cryptographic Hash, obtains d bug points The bug quantity of each bug classification in class and d bug classification, wherein a, b, c, d are positive integer, and d is less than or equal to c.
If step S205, the bug quantity of target bug classification exceedes predetermined threshold value, bug notices are sent to the contact person that prestores Information, solves bug information corresponding to the target bug classification with notice, the target bug is categorized as in the d bug classification Bug classification.
It should be noted that the contents that do not describe of Fig. 4 can be referring specifically to the associated description in Fig. 1 embodiments, here no longer Repeat.
It is a kind of schematic block diagram of server provided in an embodiment of the present invention referring to Fig. 5, the server 50 may include to obtain Take unit 501, extraction unit 502, computing unit 503, statistic unit 504;Wherein,
The acquiring unit 501, for obtaining a sample journal file, a sample journal file is respectively b The journal file that terminal device uploads;
The extraction unit 502, for extracting c leak bug information from a sample journal file;
The computing unit 503, for using each bug information in the c bug information as hash algorithm Input, is calculated c cryptographic Hash;
The meter unit 504, for identical cryptographic Hash in the c cryptographic Hash to be counted, obtains d bug points The bug quantity of each bug classification in class and d bug classification, wherein a, b, c, d are positive integer, and d is less than or equal to c.
It is a kind of schematic block diagram for server that another embodiment of the present invention provides referring to Fig. 6 in the lump, the server 50 may include acquiring unit 501 in Fig. 5, extraction unit 502, computing unit 503, statistic unit 504;Wherein,
The extraction unit 502, specifically for will be superfluous in each sample journal file in a sample journal file Remaining information is deleted, and obtains c bug information;Wherein, the redundancy is the information in addition to the bug information.
In some possible embodiments, in addition to notification unit 505, wherein:
The notification unit 505, if the bug quantity for target bug classification exceedes predetermined number, to the contact person that prestores Bug announcement informations are sent, solve bug information corresponding to the target bug classification with notice, the target bug is categorized as the d Bug classification in individual bug classification.
It should be noted that the content that Fig. 5 or Fig. 6 are not described can be related in embodiment described in Fig. 4 referring specifically to Fig. 1 Description, is repeated no more here.
It is a kind of schematic block diagram for server that another embodiment of the present invention provides referring to Fig. 7.This implementation as depicted Server 50 in example can include:One or more processors 801;One or more input equipments 802, it is one or more defeated Go out equipment 803 and memory 804.Above-mentioned processor 801, input equipment 802, output equipment 803 and memory 804 pass through bus 805 connections.Memory 802 is used for store instruction, and processor 801 is used for the instruction for performing the storage of memory 802.Wherein, handle Device 801 is used for:
A sample journal file is obtained, a sample journal file is respectively the daily record text that b terminal device uploads Part;
C leak bug information is extracted from a sample journal file;
Using each bug information in the c bug information as the input of hash algorithm, c Hash is calculated Value;
Identical cryptographic Hash in the c cryptographic Hash is counted, obtains d bug classification and d bug classification In each bug classification bug quantity, wherein a, b, c, d are positive integer, and d is less than or equal to c.
In some possible embodiments, c leak bug information is extracted from a sample journal file, is wrapped Include:Redundancy in each sample journal file in a sample journal file is deleted, obtains c bug letter Breath;Wherein, the redundancy is the information in addition to the bug information.
In some possible embodiments, the redundancy includes any one of following or multinomial:Temporal information, line Journey information, category information, positional information.
In some possible embodiments, the hash algorithm may include any one of following:Message digest algorithm Two editions MD2, message digest algorithm fourth edition MD4, message digest algorithm the 5th edition MD5, Secure Hash Algorithm SHA.
In some possible embodiments, the processor 801 is additionally operable to:If the bug quantity of target bug classification exceedes pre- If quantity, then bug announcement informations are sent to the contact person that prestores, solve bug information corresponding to the target bug classification with notice, The target bug is categorized as the bug classification in the d bug classification.
In some possible embodiments, the processor 801 is additionally operable to:If the bug quantity of target bug classification exceedes pre- If bug quantity, then the bug information of the corresponding bug quantity of target bug classification is deleted, to retain the target bug points A bug information corresponding to class, the target bug are categorized as the bug classification in the d bug classification.
It should be appreciated that in embodiments of the present invention, alleged processor 801 can be CPU (Central Processing Unit, CPU), the processor can also be other general processors, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field-Programmable Gate Array, FPGA) or other FPGAs Device, discrete gate or transistor logic, discrete hardware components etc..General processor can be microprocessor or this at It can also be any conventional processor etc. to manage device.
Input equipment 802 can include Trackpad, fingerprint adopt sensor (finger print information that is used to gathering user and fingerprint Directional information), microphone etc., output equipment 803 can include display (LCD etc.), loudspeaker etc..
The memory 804 can include read-only storage and random access memory, and to processor 801 provide instruction and Data.The a part of of memory 804 can also include nonvolatile RAM.For example, memory 804 can also be deposited Store up the information of device type.
In the specific implementation, processor 801, input equipment 802, the output equipment 803 described in the embodiment of the present invention can Perform the reality described in the first embodiment and second embodiment of the processing method of journal file provided in an embodiment of the present invention Existing mode, the implementation of the terminal described by the embodiment of the present invention is also can perform, will not be repeated here.
A kind of computer-readable recording medium, the computer-readable storage medium are provided in another embodiment of the invention Matter is stored with computer program, and the computer program is realized any in embodiment of the method as described above when being executed by processor Step.
The computer-readable recording medium can be the internal storage unit of the terminal described in foregoing any embodiment, example Such as the hard disk or internal memory of terminal.The computer-readable recording medium can also be the External memory equipment of the terminal, such as The plug-in type hard disk being equipped with the terminal, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card) etc..Further, the computer-readable recording medium can also be wrapped both Including the internal storage unit of the terminal also includes External memory equipment.The computer-readable recording medium is described for storing Other programs and data needed for computer program and the terminal.The computer-readable recording medium can be also used for temporarily When store the data that has exported or will export.
Those of ordinary skill in the art are it is to be appreciated that the list of each example described with reference to the embodiments described herein Member and algorithm steps, it can be realized with electronic hardware, computer software or the combination of the two, in order to clearly demonstrate hardware With the interchangeability of software, the composition and step of each example are generally described according to function in the above description.This A little functions are performed with hardware or software mode actually, application-specific and design constraint depending on technical scheme.Specially Industry technical staff can realize described function using distinct methods to each specific application, but this realization is not It is considered as beyond the scope of this invention.
It is apparent to those skilled in the art that for convenience of description and succinctly, the end of foregoing description End and the specific work process of unit, may be referred to the corresponding process in preceding method embodiment, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed terminal and method, it can be passed through Its mode is realized.For example, device embodiment described above is only schematical, for example, the division of the unit, only Only a kind of division of logic function, there can be other dividing mode when actually realizing, such as multiple units or component can be tied Another system is closed or is desirably integrated into, or some features can be ignored, or do not perform.In addition, shown or discussed phase Coupling or direct-coupling or communication connection between mutually can be INDIRECT COUPLING or the communication by some interfaces, device or unit Connection or electricity, the connection of mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize scheme of the embodiment of the present invention according to the actual needs Purpose.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also It is that unit is individually physically present or two or more units are integrated in a unit.It is above-mentioned integrated Unit can both be realized in the form of hardware, can also be realized in the form of SFU software functional unit.
If the integrated unit is realized in the form of SFU software functional unit and is used as independent production marketing or use When, it can be stored in a computer read/write memory medium.Based on such understanding, technical scheme is substantially The part to be contributed in other words to prior art, or all or part of the technical scheme can be in the form of software product Embody, the computer software product is stored in a storage medium, including some instructions are causing a computer Equipment (can be personal computer, server, or network equipment etc.) performs the complete of each embodiment methods described of the present invention Portion or part steps.And foregoing storage medium includes:USB flash disk, mobile hard disk, read-only storage (ROM, Read-Only Memory), random access memory (RAM, Random Access Memory), magnetic disc or CD etc. are various can store journey The medium of sequence code.
The foregoing is only a specific embodiment of the invention, but protection scope of the present invention is not limited thereto, any Those familiar with the art the invention discloses technical scope in, various equivalent modifications can be readily occurred in or replaced Change, these modifications or substitutions should be all included within the scope of the present invention.Therefore, protection scope of the present invention should be with right It is required that protection domain be defined.

Claims (10)

1. a kind of processing method of journal file, it is characterised in that methods described includes:
A sample journal file is obtained, a sample journal file is respectively the journal file that b terminal device uploads;
C leak bug information is extracted from a sample journal file;
Using each bug information in the c bug information as the input of hash algorithm, c cryptographic Hash is calculated;
Identical cryptographic Hash in the c cryptographic Hash is counted, obtained every in d bug classification and d bug classification The bug quantity of individual bug classification, wherein a, b, c, d are positive integer, and d is less than or equal to c.
2. according to the method for claim 1, it is characterised in that described that c are extracted from a sample journal file Leak bug information, including:
Redundancy in each sample journal file in a sample journal file is deleted, obtains c bug letter Breath;Wherein, the redundancy is the information in addition to the bug information.
3. according to the method for claim 1, it is characterised in that the redundancy includes any one of following or more :Temporal information, thread information, category information, positional information.
4. according to the method for claim 1, it is characterised in that the hash algorithm may include any one of following:Letter Cease digest algorithm second edition MD2, message digest algorithm fourth edition MD4, message digest algorithm the 5th edition MD5, Secure Hash Algorithm SHA。
5. according to the method described in any one of claim 1-4 claim, it is characterised in that methods described also includes:
If the bug quantity of target bug classification exceedes predetermined threshold value, to prestoring, contact person sends bug announcement informations, to notify to solve Bug information corresponding to certainly described target bug classification, the target bug are categorized as the bug classification in the d bug classification.
A kind of 6. server, it is characterised in that including:
Acquiring unit, for obtaining a sample journal file, a sample journal file is respectively that b terminal device uploads Journal file;
Extraction unit, for extracting c leak bug information from a sample journal file;
Computing unit, for using each bug information in the c bug information as the input of hash algorithm, calculating To c cryptographic Hash;
Statistic unit, for identical cryptographic Hash in the c cryptographic Hash to be counted, obtain d bug classification and the d The bug quantity of each bug classification in individual bug classification, wherein a, b, c, d are positive integer, and d is less than or equal to c.
7. server according to claim 6, it is characterised in that
The extraction unit, specifically for by the redundancy in each sample journal file in a sample journal file Deleted, obtain c bug information;Wherein, the redundancy is the information in addition to the bug information.
8. the server according to claim 6 or 7, it is characterised in that also include:
Notification unit, if the bug quantity for target bug classification exceedes predetermined number, bug notices are sent to the contact person that prestores Information, solves bug information corresponding to the target bug classification with notice, the target bug is categorized as in the d bug classification Bug classification.
9. a kind of server, it is characterised in that including memory, processor and be stored in the memory and can be described The computer program run on processor, realized described in the computing device during computer program as claim 1 to 5 is any Item methods described.
10. a kind of computer-readable recording medium, the computer-readable recording medium storage has computer program, and its feature exists In realization such as any one of claim 1 to 5 methods described when the computer program is executed by processor.
CN201710483339.5A 2017-06-22 2017-06-22 The processing method and relevant device of a kind of journal file Withdrawn CN107436836A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710483339.5A CN107436836A (en) 2017-06-22 2017-06-22 The processing method and relevant device of a kind of journal file

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710483339.5A CN107436836A (en) 2017-06-22 2017-06-22 The processing method and relevant device of a kind of journal file

Publications (1)

Publication Number Publication Date
CN107436836A true CN107436836A (en) 2017-12-05

Family

ID=60458644

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710483339.5A Withdrawn CN107436836A (en) 2017-06-22 2017-06-22 The processing method and relevant device of a kind of journal file

Country Status (1)

Country Link
CN (1) CN107436836A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111400185A (en) * 2020-03-18 2020-07-10 北京字节跳动网络技术有限公司 Memory leak processing method and device, readable medium and electronic equipment
CN111899097A (en) * 2018-12-28 2020-11-06 创新先进技术有限公司 Method and system for accepting block link deposit certificate transaction
CN113254329A (en) * 2021-04-30 2021-08-13 展讯通信(天津)有限公司 Bug processing method, system, equipment and storage medium based on machine learning

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111899097A (en) * 2018-12-28 2020-11-06 创新先进技术有限公司 Method and system for accepting block link deposit certificate transaction
CN111899097B (en) * 2018-12-28 2023-10-27 创新先进技术有限公司 Method and system for accepting blockchain certification transaction
CN111400185A (en) * 2020-03-18 2020-07-10 北京字节跳动网络技术有限公司 Memory leak processing method and device, readable medium and electronic equipment
CN113254329A (en) * 2021-04-30 2021-08-13 展讯通信(天津)有限公司 Bug processing method, system, equipment and storage medium based on machine learning

Similar Documents

Publication Publication Date Title
CN107733984A (en) A kind of method, terminal and computer-readable recording medium for pushing screen locking information
CN110059273B (en) Method for displaying rich media on mobile terminal and mobile terminal
CN106681587B (en) A kind of the footmark processing method and terminal of application icon
CN107147724A (en) A kind of information push method, server and computer-readable recording medium
CN107357718A (en) One kind structure method of testing and device
CN107193598A (en) One kind application startup method, mobile terminal and computer-readable recording medium
CN106569585A (en) Method and terminal of managing application program process
CN107704613A (en) A kind of approaches to IM, terminal and computer-readable recording medium
CN108073346A (en) A kind of record screen method, terminal and computer readable storage medium
US9607088B2 (en) Method and apparatus for detecting multimedia content change, and resource propagation system
CN108629727A (en) Method, terminal and the medium of watermark are generated according to color
CN107480001A (en) System recovery method and device
CN108563929A (en) It is a kind of only in the method for concerning security matters Area generation watermark, system, device and medium
CN107358114A (en) A kind of method and terminal for preventing user data loss
CN107436836A (en) The processing method and relevant device of a kind of journal file
CN107491300A (en) The reminding method and its terminal of a kind of intelligent function
CN107292141A (en) A kind of authentication means, terminal and method
CN107479806A (en) The method and terminal of a kind of changing interface
CN115408696B (en) Application identification method and electronic equipment
CN107547748A (en) A kind of picture management method, terminal and computer-readable recording medium
CN107608719A (en) A kind of interface operation method, terminal and computer-readable recording medium
CN107861855A (en) A kind of method, terminal, system and computer-readable recording medium for reducing abnormal power consumption
CN107515666A (en) A kind of data managing method and terminal
CN107729306A (en) A kind of text handling method, terminal and computer-readable medium
CN108092795A (en) A kind of reminding method, terminal device and computer-readable medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20171205

WW01 Invention patent application withdrawn after publication