CN108255672B - Data verification method and device, storage medium and electronic equipment - Google Patents

Data verification method and device, storage medium and electronic equipment Download PDF

Info

Publication number
CN108255672B
CN108255672B CN201711479808.2A CN201711479808A CN108255672B CN 108255672 B CN108255672 B CN 108255672B CN 201711479808 A CN201711479808 A CN 201711479808A CN 108255672 B CN108255672 B CN 108255672B
Authority
CN
China
Prior art keywords
data
browser
monitoring probe
request identifier
probe
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201711479808.2A
Other languages
Chinese (zh)
Other versions
CN108255672A (en
Inventor
李海南
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Neusoft Corp
Original Assignee
Neusoft Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Neusoft Corp filed Critical Neusoft Corp
Priority to CN201711479808.2A priority Critical patent/CN108255672B/en
Publication of CN108255672A publication Critical patent/CN108255672A/en
Application granted granted Critical
Publication of CN108255672B publication Critical patent/CN108255672B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/3006Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system is distributed, e.g. networked systems, clusters, multiprocessor systems

Abstract

The present disclosure relates to a method, an apparatus, a storage medium and an electronic device for data verification, the method comprising: after a server receives a request identifier generated by a browser according to an access request message of a user, receiving first data corresponding to the request identifier sent by the server; and receiving first data corresponding to the request identifier sent by the browser, so as to perform data verification on the first data and the second data according to the request identifier.

Description

Data verification method and device, storage medium and electronic equipment
Technical Field
The present disclosure relates to the field of data processing, and in particular, to a method and an apparatus for data verification, a storage medium, and an electronic device.
Background
With the popularization of the internet, more and more enterprises can provide services to users through application programs, wherein the performance of the application programs can be used for evaluating the service quality of the enterprises, and when the performance of the application programs has problems, the user experience is directly reduced. With the emergence of new technology and new requirements, the number of the application programs owned by an enterprise and the complexity of the application programs are rapidly expanded, so that the application programs can be monitored in order to improve the service quality of the enterprise, and the performance of the application programs is optimized according to a monitoring result.
In the related art, Application Performance Management (Application Performance Management) may include products such as Application dynamic, Dynatrace, newreic, Pinpoint, Zork, SkyWalking, and the like, wherein, after receiving an access request message from a user, a browser may transmit the access request message to a server, so that the products may perform data verification on data generated by the server in response to the access request, and when determining that abnormal data exists in the generated data, may determine that there is a Performance problem of the Application, but since the Performance problem of the Application may be caused by the browser, the products such as pioint, Zork, and SkyWalking cannot monitor JS method and page events of the browser, and Application dynamic, Dynatrace, and newreic are monitoring events on a main page, the monitoring of the level of the JS method is not achieved, so that if only data verification is carried out on page events of the server and the browser, when abnormal data exist in method data corresponding to the JS method in the browser, the performance problem of the application program cannot be accurately identified due to the fact that data verification cannot be carried out on the method data, and therefore the application program cannot be comprehensively monitored at present.
Disclosure of Invention
In order to solve the above problems, the present disclosure provides a method, an apparatus, a storage medium, and an electronic device for data verification.
In order to achieve the above object, in one aspect, the present disclosure provides a data verification method applied to a verification apparatus, including: after a server receives a request identifier generated by a browser according to an access request message of a user, receiving first data corresponding to the request identifier sent by the server;
receiving second data corresponding to the request identification sent by the browser;
and performing data verification on the first data and the second data according to the request identification.
Optionally, a first data monitoring probe is disposed in the server, and the first data monitoring probe is configured to acquire the first data;
the receiving first data corresponding to the request identifier sent by the server includes:
receiving the first data collected by the server through the first data monitoring probe.
Optionally, the first data monitoring probe comprises: javaagent probe.
Optionally, a second data monitoring probe is disposed in the browser, and the second data monitoring probe is configured to acquire the second data;
the receiving second data corresponding to the request identifier sent by the browser comprises:
receiving the second data collected by the browser through the second data monitoring probe.
Optionally, the second data monitoring probe comprises: and (7) a JS probe.
In another aspect, the present disclosure provides another data verification method, applied to a server, including:
the method comprises the steps that after a browser generates a request identifier according to an access request message of a user to a browser page, the request identifier sent by the browser is received;
acquiring first data generated in response to the access request message, and establishing a corresponding relation between the first data and the request identifier;
and sending the first data with the corresponding relation to a checking device so that the checking device can check the first data and second data corresponding to the request identifier sent by the browser according to the request identifier.
Optionally, the server is provided with a first data monitoring probe, and the acquiring first data generated in response to the access request message includes:
acquiring the first data by the first data monitoring probe.
In a third aspect, the present disclosure provides another data verification method, applied to a browser, including:
receiving an access request message of a user to a browser page;
generating a request identifier according to the access request message;
sending the request identifier to a server so that the server can acquire first data generated by responding to the access request message, establish a corresponding relation between the first data and the request identifier, and send the first data with the corresponding relation to a checking device;
and acquiring second data corresponding to the request identifier, and sending the second data to the verification device, so that the verification device performs data verification on the first data and the second data according to the request identifier.
Optionally, the browser is provided with a second data monitoring probe; the collecting second data corresponding to the request identifier includes:
acquiring the second data by the second data monitoring probe.
In a fourth aspect, the present disclosure provides a data checking apparatus, which is applied to a checking apparatus, and includes:
the first receiving module is used for receiving first data corresponding to a request identifier sent by a server after the server receives the request identifier generated by a browser according to an access request message of a user;
a second receiving module, configured to receive second data corresponding to the request identifier sent by the browser;
and the checking module is used for carrying out data checking on the first data and the second data according to the request identifier.
Optionally, a first data monitoring probe is disposed in the server, and the first data monitoring probe is configured to acquire the first data;
the first receiving module is used for receiving the first data acquired by the server through the first data monitoring probe.
Optionally, the first data monitoring probe comprises: javaagent probe.
Optionally, a second data monitoring probe is disposed in the browser, and the second data monitoring probe is configured to acquire the second data;
the second receiving module is configured to receive the second data acquired by the browser through the second data monitoring probe.
Optionally, the second data monitoring probe comprises: and (7) a JS probe.
In a fifth aspect, the present disclosure provides an apparatus for data verification, applied to a server, including:
the third receiving module is used for receiving the request identifier sent by the browser after the browser generates the request identifier according to the access request message of the user to the browser page;
the processing module is used for acquiring first data generated by responding to the access request message and establishing a corresponding relation between the first data and the request identifier;
and the first sending module is used for sending the first data with the corresponding relationship to a checking device so that the checking device can carry out data checking on the first data and second data corresponding to the request identifier sent by the browser according to the request identifier.
Optionally, the server is provided with a first data monitoring probe, and the processing module is configured to acquire the first data through the first data monitoring probe.
In a sixth aspect, the present disclosure provides an apparatus for data verification, applied to a browser, including:
the fourth receiving module is used for receiving an access request message of a user to the browser page;
a generating module, configured to generate a request identifier according to the access request message;
the second sending module is used for sending the request identifier to a server so that the server can acquire first data generated by responding to the access request message, establish a corresponding relation between the first data and the request identifier and send the first data with the corresponding relation to a checking device;
the acquisition module is used for acquiring second data corresponding to the request identifier;
and the third sending module is used for sending the second data to the checking device so that the checking device can carry out data checking on the first data and the second data according to the request identifier.
Optionally, the browser is provided with a second data monitoring probe, and the acquisition module is configured to acquire the second data through the second data monitoring probe.
In a seventh aspect, the present disclosure provides a computer readable storage medium having stored thereon a computer program which, when executed by a processor, performs the steps of the above method.
In an eighth aspect, the present disclosure provides an electronic device comprising: the computer-readable storage medium according to the seventh aspect above; and one or more processors for executing the program in the computer-readable storage medium.
According to the technical scheme, after a server receives a request identifier generated by a browser according to an access request message of a user, a verification device receives first data corresponding to the request identifier sent by the server; receiving second data corresponding to the request identification sent by the browser; and performing data verification on the first data and the second data according to the request identifier, so that the verification device can perform data verification on the first data and the second data, thereby monitoring the server and the browser of the application program together, and avoiding the problem that the application program cannot be monitored comprehensively in the prior art.
Additional features and advantages of the disclosure will be set forth in the detailed description which follows.
Drawings
The accompanying drawings, which are included to provide a further understanding of the disclosure and are incorporated in and constitute a part of this specification, illustrate embodiments of the disclosure and together with the description serve to explain the disclosure without limiting the disclosure. In the drawings:
fig. 1 is a schematic flow chart of a method for verifying data according to an embodiment of the present disclosure;
fig. 2 is a schematic flow chart of another data verification method provided in the embodiment of the present disclosure;
fig. 3 is a schematic flowchart of a third data verification method provided in the embodiment of the present disclosure;
fig. 4 is a schematic flowchart of a fourth data verification method provided in the embodiment of the present disclosure;
FIG. 5 is a block diagram of a first apparatus for data verification provided by an embodiment of the present disclosure;
FIG. 6 is a block diagram of an apparatus for verifying second data provided by an embodiment of the present disclosure;
FIG. 7 is a block diagram of an apparatus for checking third data provided by an embodiment of the present disclosure;
fig. 8 is a block diagram of an electronic device provided by an embodiment of the present disclosure.
Detailed Description
The following detailed description of specific embodiments of the present disclosure is provided in connection with the accompanying drawings. It should be understood that the detailed description and specific examples, while indicating the present disclosure, are given by way of illustration and explanation only, not limitation.
The first data and the second data corresponding to the request identification can be received by the checking device, and data checking can be carried out on the first data and the second data according to the request identification, so that the checking device can carry out data checking on the first data and the second data, a server and a browser of an application program can be jointly monitored, and the situation that the application program cannot be comprehensively monitored in the prior art is avoided.
Fig. 1 is a schematic flowchart of a data verification method provided in an embodiment of the present disclosure, and is applied to a verification apparatus, as shown in fig. 1, the method includes:
s101, after receiving a request identifier generated by a browser according to an access request message of a user, a server receives first data corresponding to the request identifier sent by the server.
The request identifier is a unique identifier randomly generated according to an access request message of a user, for example, the request identifier may be a Transaction ID, the first data may be a name of a background method, a name of a background file to which the background method belongs, an execution time of the background method, an execution sequence of the background method, an HTTP return code, SQL (Structured Query Language), and the like.
S102, receiving second data corresponding to the request identification sent by the browser.
In this step, the second data may be time-consuming domain name resolution, time-consuming redirection, time-consuming server request, and time-consuming rendering, which are obtained by monitoring the page loading event, and data such as a JS method name, a JS file name to which the JS method belongs, a JS method execution time, and a JS method execution sequence, which are described above only by way of example and are not limited in this disclosure.
S103, performing data verification on the first data and the second data according to the request identification.
By adopting the method, the first data and the second data corresponding to the request identification are received by the checking device, and the data checking is carried out on the first data and the second data according to the request identification, so that the checking device can carry out the data checking on the first data and the second data, thereby jointly monitoring the server and the browser of the application program, and avoiding the problem that the application program cannot be comprehensively monitored in the prior art.
Fig. 2 is a schematic flowchart of a method for data verification provided in an embodiment of the present disclosure, which is applied to a server, and the method includes:
s201, after a browser generates a request identifier according to an access request message of a user to a browser page, receiving the request identifier sent by the browser.
In this step, the request identifier is a unique identifier randomly generated according to the access request message of the user, and for example, the request identifier may be a Transaction ID.
S202, first data generated by responding to the access request message is obtained, and the corresponding relation between the first data and the request identifier is established.
The first data may be a name of a background method, a name of a background file to which the background method belongs, an execution time of the background method, an execution sequence of the background method, an HTTP return code, SQL (Structured Query Language), and the like, which are only examples and are not limited in this disclosure.
S203, the first data with the corresponding relation is sent to a checking device, so that the checking device can check the first data and second data corresponding to the request identifier sent by the browser according to the request identifier.
In this disclosure, the second data is data generated by the browser in response to the access request message of the user to the browser page, and for example, the second data may be time-consuming domain name resolution, time-consuming redirection, time-consuming server request, and time-consuming rendering obtained by monitoring the page loading event, and data such as a JS method name, a JS file name to which the JS method belongs, a JS method execution time, and a JS method execution sequence.
By adopting the method, the server acquires the first data according to the request identifier sent by the browser, so that the checking device performs data checking according to the first data and the second data corresponding to the request identifier sent by the browser, and thus, the checking device can perform data checking on the first data and the second data, so that the server and the browser of the application program can be jointly monitored, and the problem that the application program cannot be comprehensively monitored in the prior art is avoided.
Fig. 3 is a schematic flowchart of a method for data verification provided in an embodiment of the present disclosure, and is applied to a browser, as shown in fig. 3, the method includes:
s301, receiving an access request message of a user to a browser page.
The access request message may be a message generated according to a triggering operation (e.g., a clicking operation) of the user in the browser page.
S302, generating a request identifier according to the access request message.
In this step, the request identifier is a unique identifier randomly generated according to the access request message of the user, and for example, the request identifier may be a Transaction ID.
S303, sending the request identifier to a server, so that the server obtains first data generated in response to the access request message, establishes a corresponding relationship between the first data and the request identifier, and sends the first data with the corresponding relationship to a verification device.
The first data may be a name of a background method, a name of a background file to which the background method belongs, an execution time of the background method, an execution sequence of the background method, an HTTP return code, SQL (Structured Query Language), and the like, which are only examples and are not limited in this disclosure.
S304, collecting second data corresponding to the request identifier, and sending the second data to the checking device, so that the checking device performs data checking on the first data and the second data according to the request identifier.
In this disclosure, the second data is data generated by the browser in response to the access request message of the user to the browser page, and for example, the second data may be time-consuming domain name resolution, time-consuming redirection, time-consuming server request, and time-consuming rendering obtained by monitoring the page loading event, and data such as a JS method name, a JS file name to which the JS method belongs, a JS method execution time, and a JS method execution sequence.
By adopting the method, the browser generates the request identifier according to the access request message of the user, so that the server acquires the first data by sending the request identifier to the server, establishes the corresponding relation between the first data and the request identifier, sends the first data with the corresponding relation to the checking device, and sends the second data corresponding to the request identifier to the checking device, so that the checking device performs data checking according to the first data and the second data.
Fig. 4 is a schematic flowchart of a method for data verification according to an embodiment of the present disclosure, and as shown in fig. 4, the method includes:
s401, the browser receives an access request message of a user to a browser page.
The access request message may be a message generated according to a triggering operation (e.g., a clicking operation) of the user in the browser page.
S402, the browser generates a request identifier according to the access request message.
In this step, the request identifier is a unique identifier randomly generated according to the access request message of the user, and for example, the request identifier may be a Transaction ID.
And S403, the browser sends the request identifier to a server.
In the related art, the browser receives an access request message of a user, and sends the access request message to a server, so that the server obtains loading data required by the browser according to the access request message, and transmits the loading data to the browser, so that the browser performs page rendering according to the loading data, in this disclosure, the request identifier may be written into the access request message, so that the browser sends the request identifier to the server includes: the browser sends an access request message containing the request identifier to a server, so that after receiving the access request message, if the server recognizes that the access request message contains the request identifier, the server instructs a first data monitoring probe to collect first data in subsequent steps, obtains loading data required by the browser according to the access request message, and transmits the loading data to the browser.
S404, the server collects first data through the first data monitoring probe and establishes a corresponding relation between the first data and the request identification.
In the present disclosure, the first data is data generated by the server in response to an access request message of a user to a browser page, and for example, the first data may be a name of a background method, a name of a background file to which the background method belongs, an execution time of the background method, an execution sequence of the background method, an HTTP return code, SQL (Structured Query Language), and the like.
The first data monitoring probe is preset in the server, that is, a first probe file corresponding to the first data monitoring probe is set in a start-up file of the server, so that the first data monitoring probe can acquire the first data, for example, the first data monitoring probe may be a javaagent probe.
S405, the server sends the first data with the corresponding relation to the checking device.
After the server has finished responding to the access request message, the first data is sent to the verification device.
S406, the browser acquires second data corresponding to the request identification through the second data monitoring probe.
In this disclosure, the second data is data generated by the browser in response to the access request message of the user to the browser page, and for example, the second data may be data of time consumed for domain name resolution, time consumed for redirection, time consumed for server request, time consumed for rendering, a JS method name, a JS file name to which the JS method belongs, a JS method execution time, a JS method execution sequence, and the like, which are obtained by monitoring the page loading event.
Wherein the second data monitoring probe is pre-installed in the browser, that is, a second probe file of the second data monitoring probe is placed in all pages in the browser, for example, an HTML (HyperText Markup Language) page, a jsp (java server pages), and the like, and a loading level of the second probe file corresponding to the second data monitoring probe is set to be prior to loading levels of other files in the browser page, so that the first data monitoring probe can timely acquire the second data, for example, the second data monitoring probe may be a JS (JS javascript) probe, and the second probe file may be monitor.js, where monitor.js may include monitoring methods such as monitor start method and monitor end method, monitor start method is used for JS acquisition method start time, monitor end method is used for JS acquisition method end time, and JS execution sequence, in this way, the JS method execution time is obtained by subtracting the JS method end time obtained by the monitorEnd method from the JS method start time obtained by the monitorestart method, which is only an example and is not limited by the present disclosure.
And S407, the browser sends the second data to the verification device.
It should be noted that, after rendering of the browser page is completed, the browser sends the second data to the verification device, and in the present disclosure, the verification device may be a data collector.
S408, the verifying device performs data verification on the first data and the second data according to the request identifier.
In this step, data verification can be performed on the first data and the second data according to a preset verification rule, for example, the JS probe can monitor the JS method, so that the JS probe can automatically record the name of the JS method, the name of a JS file to which the JS method belongs, the execution time of the JS method, and the like to obtain the second data, after rendering of a browser page is completed, the second data can be sent to the verification device, so that the verification device determines whether the JS method meets the preset verification rule (if the execution time of the JS method is less than or equal to a), when the execution time of the JS method is determined to be less than or equal to a, the second data is determined to be normal data, and when the execution time of the JS method is determined to be greater than a, the second data is determined to be abnormal data; for another example, the java agent probe obtains an HTTP return code (equivalent to the first data), and after the server finishes responding to the access request message, sends the first data to the verification device, so that the verification device can determine whether the HTTP return code meets a preset verification rule (for example, the HTTP return code is within 200-.
In this way, the data of the first data and the second data corresponding to the same request identifier is checked, so that the page event, the JS method and the background method can be checked, and whether the performance problem exists in the application program is determined more comprehensively.
By adopting the method, the first data and the second data corresponding to the request identification are received by the checking device, and the data checking is carried out on the first data and the second data according to the request identification, so that the checking device can carry out the data checking on the first data and the second data, thereby jointly monitoring the server and the browser of the application program, and avoiding the problem that the application program cannot be comprehensively monitored in the prior art.
Fig. 5 is a block diagram of a data verification apparatus provided according to an embodiment of the present disclosure, which is applied to a verification apparatus, and as shown in fig. 5, includes:
a first receiving module 501, configured to receive, after a server receives a request identifier generated by a browser according to an access request message of a user, first data corresponding to the request identifier sent by the server;
a second receiving module 502, configured to receive second data corresponding to the request identifier sent by the browser;
a checking module 503, configured to perform data checking on the first data and the second data according to the request identifier.
Optionally, a first data monitoring probe is disposed in the server, and the first data monitoring probe is configured to acquire the first data;
the first receiving module 501 is configured to receive the first data collected by the server through the first data monitoring probe.
Optionally, the first data monitoring probe comprises: javaagent probe.
Optionally, a second data monitoring probe is disposed in the browser, and the second data monitoring probe is configured to acquire the second data;
the second receiving module 502 is configured to receive the second data collected by the browser through the second data monitoring probe.
Optionally, the second data monitoring probe comprises: and (7) a JS probe.
By adopting the device, the data verification can be carried out on the first data and the second data, so that the server and the browser of the application program can be monitored together, and the situation that the application program cannot be monitored comprehensively in the prior art is avoided.
Fig. 6 is a device for data verification according to an embodiment of the present disclosure, which is applied to a server, and as shown in fig. 6, includes:
a third receiving module 601, configured to receive a request identifier sent by a browser after the browser generates the request identifier according to an access request message of a user to a browser page;
a processing module 602, configured to obtain first data responding to the access request message, and establish a corresponding relationship between the first data and the request identifier;
the first sending module 603 is configured to send the first data with the corresponding relationship to a verification apparatus, so that the verification apparatus performs data verification on the first data and second data corresponding to the request identifier sent by the browser according to the request identifier.
Optionally, the server is provided with a first data monitoring probe, and the processing module 602 is configured to acquire the first data through the first data monitoring probe.
By adopting the device, the data verification can be carried out on the first data and the second data, so that the server and the browser of the application program can be monitored together, and the situation that the application program cannot be monitored comprehensively in the prior art is avoided.
Fig. 7 is a data verification apparatus provided in accordance with an embodiment of the present disclosure, which is applied to a browser, and as shown in fig. 7, includes:
a fourth receiving module 701, configured to receive an access request message of a user for a browser page;
a generating module 702, configured to generate a request identifier according to the access request message;
a second sending module 703, configured to send the request identifier to a server, so that the server obtains first data generated in response to the access request message, establishes a corresponding relationship between the first data and the request identifier, and sends the first data with the corresponding relationship to a verification apparatus;
an acquiring module 704, configured to acquire second data corresponding to the request identifier;
a third sending module 705, configured to send the second data to the verifying apparatus, so that the verifying apparatus performs data verification on the first data and the second data according to the request identifier.
Optionally, the browser is provided with a second data monitoring probe, and the acquiring module 704 is configured to acquire the second data through the second data monitoring probe.
By adopting the device, the data verification can be carried out on the first data and the second data, so that the server and the browser of the application program can be monitored together, and the situation that the application program cannot be monitored comprehensively in the prior art is avoided.
With regard to the apparatus in the above-described embodiment, the specific manner in which each module performs the operation has been described in detail in the embodiment related to the method, and will not be elaborated here.
Fig. 8 is a block diagram of an electronic device 800, shown in an exemplary embodiment of the present disclosure. As shown in fig. 8, the electronic device 800 may include: a processor 801, a memory 802, a multimedia component 803, an input/output (I/O) interface 804, and a communications component 805.
The processor 801 is configured to control the overall operation of the electronic device 800, so as to complete all or part of the steps in the above-described data verification method. The memory 802 is used to store various types of data to support operation of the electronic device 800, such as instructions for any application or method operating on the electronic device 800 and application-related data. The Memory 802 may be implemented by any type of volatile or non-volatile Memory device or combination thereof, such as Static Random Access Memory (SRAM), Electrically Erasable Programmable Read-Only Memory (EEPROM), Erasable Programmable Read-Only Memory (EPROM), Programmable Read-Only Memory (PROM), Read-Only Memory (ROM), magnetic Memory, flash Memory, magnetic disk or optical disk. The multimedia components 803 may include screen and audio components. Wherein the screen may be, for example, a touch screen and the audio component is used for outputting and/or inputting audio signals. For example, the audio component may include a microphone for receiving external audio signals. The received audio signal may further be stored in the memory 802 or transmitted through the communication component 805. The audio assembly also includes at least one speaker for outputting audio signals. The I/O interface 804 provides an interface between the processor 801 and other interface modules, such as a keyboard, mouse, buttons, etc. These buttons may be virtual buttons or physical buttons. The communication component 805 is used for wired or wireless communication between the electronic device 800 and other devices. Wireless Communication, such as Wi-Fi, bluetooth, Near Field Communication (NFC), 2G, 3G, or 4G, or a combination of one or more of them, so that the corresponding Communication component 805 may include: Wi-Fi module, bluetooth module, NFC module.
In an exemplary embodiment, the electronic Device 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, microcontrollers, microprocessors, or other electronic components for performing the above-described data verification method.
In another exemplary embodiment, a computer readable storage medium comprising program instructions, such as the memory 802 comprising program instructions, executable by the processor 801 of the electronic device 800 to perform the method of data verification described above is also provided.
The preferred embodiments of the present disclosure are described in detail with reference to the accompanying drawings, however, the present disclosure is not limited to the specific details of the above embodiments, and various simple modifications may be made to the technical solution of the present disclosure within the technical idea of the present disclosure, and these simple modifications all belong to the protection scope of the present disclosure.
It should be noted that, in the foregoing embodiments, various features described in the above embodiments may be combined in any suitable manner, and in order to avoid unnecessary repetition, various combinations that are possible in the present disclosure are not described again.
In addition, any combination of various embodiments of the present disclosure may be made, and the same should be considered as the disclosure of the present disclosure, as long as it does not depart from the spirit of the present disclosure.

Claims (14)

1. A method for data verification is applied to a verification device and comprises the following steps:
after a server receives a request identifier generated by a browser according to an access request message of a user, receiving first data corresponding to the request identifier sent by the server;
receiving second data corresponding to the request identifier sent by the browser, wherein the second data comprise JS method execution time;
performing data verification on the first data and the second data according to the request identifier and a preset verification rule, wherein the preset verification rule comprises that when the JS method execution time is determined to be larger than a preset time threshold value, the second data is determined to be abnormal data;
the server is provided with a first data monitoring probe, the first data monitoring probe is used for acquiring the first data, and a first probe file corresponding to the first data monitoring probe is arranged in a starting file of the server;
the browser is provided with a second data monitoring probe, the second data monitoring probe is used for acquiring second data, a second probe file corresponding to the second data monitoring probe is placed in all pages in the browser, and the loading level of the second probe file is prior to the loading level of other files in the browser page.
2. The method of claim 1,
the receiving first data corresponding to the request identifier sent by the server includes:
receiving the first data collected by the server through the first data monitoring probe.
3. The method of claim 2, wherein the first data monitoring probe comprises: javaagent probe.
4. The method of claim 1,
the receiving second data corresponding to the request identifier sent by the browser comprises:
receiving the second data collected by the browser through the second data monitoring probe.
5. The method of claim 4, wherein the second data monitoring probe comprises: and (7) a JS probe.
6. A method for data verification is applied to a server and comprises the following steps:
the method comprises the steps that after a browser generates a request identifier according to an access request message of a user to a browser page, the request identifier sent by the browser is received;
acquiring first data generated in response to the access request message, and establishing a corresponding relation between the first data and the request identifier;
sending the first data with the corresponding relation to a checking device so that the checking device can carry out data checking on the first data and second data corresponding to the request identifier sent by the browser according to the request identifier and a preset checking rule; the second data comprises JS method execution time; the preset checking rule comprises that when the JS method execution time is determined to be larger than a preset time threshold value, the second data are determined to be abnormal data;
the server is provided with a first data monitoring probe, the first data monitoring probe is used for acquiring the first data, and a first probe file corresponding to the first data monitoring probe is arranged in a starting file of the server; the browser is provided with a second data monitoring probe, the second data monitoring probe is used for acquiring second data, a second probe file corresponding to the second data monitoring probe is placed in all pages in the browser, and the loading level of the second probe file is prior to the loading level of other files in the browser page.
7. The method of claim 6, wherein obtaining the first data generated in response to the access request message comprises:
acquiring the first data by the first data monitoring probe.
8. A method for data verification is applied to a browser and comprises the following steps:
receiving an access request message of a user to a browser page;
generating a request identifier according to the access request message;
sending the request identifier to a server so that the server can acquire first data generated by responding to the access request message, establish a corresponding relation between the first data and the request identifier, and send the first data with the corresponding relation to a checking device;
acquiring second data corresponding to the request identifier, and sending the second data to the verification device, so that the verification device performs data verification on the first data and the second data according to the request identifier and a preset verification rule; the second data comprises JS method execution time; the preset checking rule comprises that when the JS method execution time is determined to be larger than a preset time threshold value, the second data are determined to be abnormal data;
the browser is provided with a second data monitoring probe, the second data monitoring probe is used for acquiring second data, a second probe file corresponding to the second data monitoring probe is placed in all pages in the browser, and the loading level of the second probe file is prior to the loading level of other files in the browser page.
9. The method of claim 8, wherein the collecting second data corresponding to the request identifier comprises:
acquiring the second data by the second data monitoring probe.
10. A data checking device is characterized in that the device is applied to a checking device and comprises:
the first receiving module is used for receiving first data corresponding to a request identifier sent by a server after the server receives the request identifier generated by a browser according to an access request message of a user;
the second receiving module is configured to receive second data corresponding to the request identifier sent by the browser, where the second data includes a JS method execution time;
the verification module is used for performing data verification on the first data and the second data according to the request identifier and a preset verification rule; the preset checking rule comprises that when the JS method execution time is determined to be larger than a preset time threshold value, the second data are determined to be abnormal data;
the server is provided with a first data monitoring probe, the first data monitoring probe is used for acquiring the first data, and a first probe file corresponding to the first data monitoring probe is arranged in a starting file of the server;
the browser is provided with a second data monitoring probe, the second data monitoring probe is used for acquiring second data, a second probe file corresponding to the second data monitoring probe is placed in all pages in the browser, and the loading level of the second probe file is prior to the loading level of other files in the browser page.
11. An apparatus for data verification, applied to a server, includes:
the third receiving module is used for receiving the request identifier sent by the browser after the browser generates the request identifier according to the access request message of the user to the browser page;
the processing module is used for acquiring first data generated by responding to the access request message and establishing a corresponding relation between the first data and the request identifier;
the first sending module is used for sending the first data with the corresponding relationship to a checking device so that the checking device can carry out data checking on the first data and second data corresponding to the request identifier and a preset checking rule sent by the browser according to the request identifier; the second data comprises JS method execution time; the preset checking rule comprises that when the JS method execution time is determined to be larger than a preset time threshold value, the second data are determined to be abnormal data;
the server is provided with a first data monitoring probe, the first data monitoring probe is used for acquiring the first data, and a first probe file corresponding to the first data monitoring probe is arranged in a starting file of the server; the browser is provided with a second data monitoring probe, the second data monitoring probe is used for acquiring second data, a second probe file corresponding to the second data monitoring probe is placed in all pages in the browser, and the loading level of the second probe file is prior to the loading level of other files in the browser page.
12. A data verification device is applied to a browser and comprises:
the fourth receiving module is used for receiving an access request message of a user to the browser page;
a generating module, configured to generate a request identifier according to the access request message;
the second sending module is used for sending the request identifier to a server so that the server can acquire first data generated by responding to the access request message, establish a corresponding relation between the first data and the request identifier and send the first data with the corresponding relation to a checking device;
the acquisition module is used for acquiring second data corresponding to the request identifier;
the third sending module is used for sending the second data to the verifying device so that the verifying device can perform data verification on the first data and the second data according to the request identifier and a preset verification rule; the second data comprises JS method execution time; the preset checking rule comprises that when the JS method execution time is determined to be larger than a preset time threshold value, the second data are determined to be abnormal data;
the browser is provided with a second data monitoring probe, the second data monitoring probe is used for acquiring second data, a second probe file corresponding to the second data monitoring probe is placed in all pages in the browser, and the loading level of the second probe file is prior to the loading level of other files in the browser page.
13. A computer-readable storage medium having stored thereon a computer program, characterized in that,
the program when executed by a processor implementing the steps of the method of any one of claims 1 to 5; or the like, or, alternatively,
the program when executed by a processor implementing the steps of the method of claim 6 or 7; or the like, or, alternatively,
which program, when being executed by a processor, is adapted to carry out the steps of the method of claim 8 or 9.
14. An electronic device, comprising:
the computer-readable storage medium recited in claim 13; and
one or more processors for executing the program in the computer-readable storage medium.
CN201711479808.2A 2017-12-29 2017-12-29 Data verification method and device, storage medium and electronic equipment Active CN108255672B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711479808.2A CN108255672B (en) 2017-12-29 2017-12-29 Data verification method and device, storage medium and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711479808.2A CN108255672B (en) 2017-12-29 2017-12-29 Data verification method and device, storage medium and electronic equipment

Publications (2)

Publication Number Publication Date
CN108255672A CN108255672A (en) 2018-07-06
CN108255672B true CN108255672B (en) 2021-08-06

Family

ID=62724500

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711479808.2A Active CN108255672B (en) 2017-12-29 2017-12-29 Data verification method and device, storage medium and electronic equipment

Country Status (1)

Country Link
CN (1) CN108255672B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109542921B (en) * 2018-11-28 2021-03-02 北京字节跳动网络技术有限公司 Data checking method and device, electronic equipment and storage medium
CN110781058B (en) * 2019-11-05 2023-07-18 北京博睿宏远数据科技股份有限公司 Mobile terminal application performance data acquisition method, device, equipment and medium

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635655A (en) * 2008-07-25 2010-01-27 阿里巴巴集团控股有限公司 Method, device and system for page performance test
CN101917286A (en) * 2010-07-30 2010-12-15 上海普元信息技术股份有限公司 Web performance analysis system and method for realizing cross-browser in internet application system
CN106254172A (en) * 2016-07-14 2016-12-21 东软集团股份有限公司 Heterogeneous applications collecting method and device
CN107222331A (en) * 2017-04-26 2017-09-29 东软集团股份有限公司 Monitoring method, device, storage medium and the equipment of distribution application system performance

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105589782B (en) * 2014-10-22 2018-09-04 中国银联股份有限公司 User behavior acquisition method based on browser
US20170149934A1 (en) * 2015-11-24 2017-05-25 Le Holdings (Beijing) Co., Ltd. Method, device and system for data cross-domain request
CN106201827B (en) * 2016-07-13 2018-11-27 东软集团股份有限公司 Monitoring data collection method and system

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101635655A (en) * 2008-07-25 2010-01-27 阿里巴巴集团控股有限公司 Method, device and system for page performance test
CN101917286A (en) * 2010-07-30 2010-12-15 上海普元信息技术股份有限公司 Web performance analysis system and method for realizing cross-browser in internet application system
CN106254172A (en) * 2016-07-14 2016-12-21 东软集团股份有限公司 Heterogeneous applications collecting method and device
CN107222331A (en) * 2017-04-26 2017-09-29 东软集团股份有限公司 Monitoring method, device, storage medium and the equipment of distribution application system performance

Also Published As

Publication number Publication date
CN108255672A (en) 2018-07-06

Similar Documents

Publication Publication Date Title
CN110798380B (en) Data acquisition method, system, device, test equipment and test server
CN110830280B (en) Micro-service gateway device and method and electronic equipment
CN111031110A (en) File uploading method and device, electronic equipment and storage medium
CN108647317B (en) Incremental file generation method and device, storage medium and electronic equipment
CN109344066B (en) Method, system and terminal for testing browser page
CN104536890A (en) Testing system, method and device
CN109218389B (en) Method, device and storage medium for processing service request and electronic equipment
WO2014182914A1 (en) Apps store with integrated test support
CN110928770B (en) Software testing method, device, system, storage medium and electronic equipment
CN111046310A (en) Page processing method, device, server and computer readable storage medium
CN112953791B (en) Network detection method and device, electronic equipment and computer readable storage medium
CN104579830A (en) Service monitoring method and device
CN108255672B (en) Data verification method and device, storage medium and electronic equipment
CN111930709A (en) Data storage method and device, electronic equipment and computer readable medium
CN109522202B (en) Software testing method and device
US20150134752A1 (en) Automatically transitioning a user from a call to action to an enrollment interface
CN105068926A (en) Program test method and device thereof
CN112866062A (en) Distributed pressure test system, method, device, equipment and storage medium
CN110825603A (en) Page first loading time determining method and device, electronic equipment and storage medium
CN111045934A (en) Page analysis method, device, client, storage medium and electronic equipment
KR102354058B1 (en) Method for monitoring server, apparatus and system for executing the method
US8805987B1 (en) Ensuring a cookie-less namespace
CN111338928A (en) Chrome-based browser testing method and device
CN111124627A (en) Method, device, terminal and storage medium for determining application program caller
CN112671615B (en) Method, system and storage medium for collecting front-end user operation behavior data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant