CN108389104A - A kind of emulation verification method and device of network activity - Google Patents

A kind of emulation verification method and device of network activity Download PDF

Info

Publication number
CN108389104A
CN108389104A CN201810094650.5A CN201810094650A CN108389104A CN 108389104 A CN108389104 A CN 108389104A CN 201810094650 A CN201810094650 A CN 201810094650A CN 108389104 A CN108389104 A CN 108389104A
Authority
CN
China
Prior art keywords
activity
verified
data
movable
artificial
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810094650.5A
Other languages
Chinese (zh)
Other versions
CN108389104B (en
Inventor
兰杰
陈小巧
杨宇
刘泉
王新盟
谢喆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Koubei Shanghai Information Technology Co Ltd
Original Assignee
Koubei Shanghai Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Koubei Shanghai Information Technology Co Ltd filed Critical Koubei Shanghai Information Technology Co Ltd
Priority to CN201810094650.5A priority Critical patent/CN108389104B/en
Publication of CN108389104A publication Critical patent/CN108389104A/en
Application granted granted Critical
Publication of CN108389104B publication Critical patent/CN108389104B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • G06Q30/0609Buyer or seller confidence or verification

Abstract

The invention discloses a kind of emulation verification method of network activity and device, the method includes:It is monitored with the movable relevant monitoring object of verification to preset;According to monitoring result, activity to be verified is determined;By calling operation system query interface, inquiry to obtain the movable activity data to be verified;The movable activity data to be verified is synchronized in simulated environment;In the simulated environment, creates in conjunction with the data that simulated environment provides according to the activity data synchronized and run artificial activity;The artificial activity runs obtained operation result data as the foundation for verifying the network activity.Using this method, it can be achieved that being verified to all movable automation full doses;Can the function of accurate validation authentic activity and the correctness of service logic, to true Above-the-line without invasive;Simulating, verifying process without caused by artificial participate in business risk and additional operation and link up cost, verification covering more comprehensively, verification efficiency higher.

Description

A kind of emulation verification method and device of network activity
Technical field
The present invention relates to movable verification fields, and in particular to a kind of emulation verification method of network activity.The present invention is simultaneously It is related to a kind of simulating, verifying device of network activity and a kind of computer read/write memory medium.
Background technology
O2O is the abbreviation of Online To Offline and Offline To Online, refers to making line using internet Lower commodity or service generate order, the delivery of commodity or service are completed under line with being combined on line on line.
The general process of O2O marketing activities, which is that operation personnel starts to start a period of time before marketing activity starts, recruits Quotient, trade company register successfully just to will produce actual marketing activity.As registration send certificate, with lottery forwarding, online competition, quick-fried money half price, Apply for card deduction and exemption, full one give first-class, its object is to attract user's concern, pull user's contribution, strengthen user cognition.Common work Dynamic type includes:Subsidy, such as public praise net, U.S. group take out the red packet of granting;Topic, such as " the travelling with microblogging " of microblogging; With lottery, such as the sweepstake of mhkc;Game, such as Alipay collection good fortune.
In order to ensure O2O marketing activities normally can be carried out orderly, rule and resource contention are avoided the occurrence of, and ensure phase Close resource can fully support, before carrying out marketing activity, generally require pair operation activity of also informal on-line running into Row function and service logic verification.Current verification method mainly has following two:
Scheme one, before authentic activity starts, one similar activity of human configuration is carried out using another fund pool Active configuration carries out the verification of basic function using true account, to be verified by rear, according to the similar movable data The true activity of configuration.
Scheme two, Above-the-line configure some white list accounts, by the participation activity in advance of white list account, i.e., activity just It before formula starts, is traded by white list account, the sequence of operations such as discount coupon is received, is checked and write off carry out movable verification.
However, above-mentioned activity testing scheme has the following defects:
The similar activity of human configuration, verification is not final authentic activity, and the movable and true activity of test cannot It is completely the same, can not accurate validation true interactive function and service logic correctness.
Marketing activity is exposed the information of discount coupon by configuring white list in advance before movable formal startup on line, but The maintenance of white list can cause marketing activity to be exposed in advance, there are certain business risks once malfunctioning;The inventory of discount coupon carries It is preceding to be used, it is completed, after the formal startup of activity in white list test, physical holding of stock may be inconsistent with the stockpile number of publicity, Practical subsidy fund can be reduced, and need to be covered to inventory and subsidy fund, be operated and link up and is of high cost.
The scene and limited amount being able to verify that can not cover active rule comprehensively, particularly with large-scale living It is dynamic, the shops and businessman that all activities are related to can not be authenticated to.After causing actual activity to start, not authenticated scene may It goes wrong.
Invention content
The present invention provides a kind of verification method of network activity, with solve it is existing can not accurate validation authentic activity work( Can and service logic correctness, there are business risk, operation and link up of high cost and active rule can not be carried out comprehensive Covering problem.The present invention additionally provides a kind of verification device of network activity and a kind of computer read/write memory mediums.
The present invention provides a kind of emulation verification method of network activity, including:
It is monitored with the movable relevant monitoring object of verification to preset;
According to monitoring result, activity to be verified is determined;
By calling operation system query interface, inquiry to obtain the movable activity data to be verified;
The movable activity data to be verified is synchronized in simulated environment;
In the simulated environment, created in conjunction with the data that simulated environment provides according to the activity data synchronized And run artificial activity;The artificial activity runs obtained operation result data as the foundation for verifying the network activity
Optionally, described preset to include with the relevant monitoring object of movable verification:
Activity recognition information, the activity recognition information are deposited offline by offline task fixed time cleaning to activity recognition information It stores up in table.
Optionally, described to be monitored with the movable relevant monitoring object of verification to preset, including:
Timing identifies the activity recognition information offline storage table, in the determination activity recognition information offline storage table With the presence or absence of activity recognition information.
Optionally, described that activity to be verified is determined according to monitoring result, including:
If in the activity recognition information offline storage table, there are activity recognition information, it is determined that the activity recognition information Corresponding activity is activity to be verified, and starts and carry out simulating, verifying to the activity to be verified.
Optionally, described preset to include with the relevant monitoring object of movable verification:Activity creates message;
It is corresponding, it is described to be monitored with the movable relevant monitoring object of verification to preset, including:To the activity wound Message is built to be monitored.
Optionally, described that activity to be verified is determined according to monitoring result, including:If listening to new activity to be created, It then determines that the activity is activity to be verified, and starts and simulating, verifying is carried out to the activity to be verified.
Optionally, described that the activity establishment message is monitored, including:
The business diary of monitoring service system;Or
It monitors DB and changes message.
Optionally, described that the movable activity data to be verified is synchronized in simulated environment, including:
By calling operation system to create interface, the movable activity data to be verified is created in the simulated environment Corresponding artificial activity data.
Optionally, described that the movable activity data to be verified is synchronized in simulated environment, including:
The movable activity data to be verified is compared with pre-set emulation mapping table;
If exist in the emulation mapping table the movable activity data to be verified being mapped as artificial activity number According to mapping relations, then the movable activity data to be verified is mapped as artificial activity data according to the mapping relations;
If there is no the movable activity data to be verified is mapped as artificial activity in the emulation mapping table The mapping relations of data then call the service creation interface of operation system to create corresponding to the movable activity data to be verified Artificial activity data, and the movable activity data to be verified and the mapping relations of the artificial activity data are added to In the emulation mapping table.
Optionally, it creates and transports in conjunction with the data that simulated environment provides according to the activity data synchronized described Before row artificial activity, further include:
The initial time of displacement activity and termination time.
Optionally, the artificial activity run obtained operation result data as the verification network activity according to According to realization method includes:
Pre-set programs read the operation result data of artificial activity by way of uninterruptedly reading, by the artificial activity Operation result data as the foundation for verifying the network activity.
Optionally, the verification network activity, including:
It is checked using the movable business to be verified and is run caused by operational process of the rule to the artificial activity As a result real-time core pair is carried out.
Optionally, the simulated environment includes:
Pressure surveys environment on line.
The present invention also provides a kind of simulating, verifying devices of network activity, including:
Activity verification monitoring unit, for being monitored with the movable relevant monitoring object of verification to preset;
Activity determination unit to be verified, for according to monitoring result, determining activity to be verified;
Activity data obtaining unit, for by calling operation system query interface, inquiry to obtain the activity to be verified Activity data;
Activity data synchronization unit, for the movable activity data to be verified to be synchronized in simulated environment;
Artificial activity establishment, running unit, in the simulated environment, according to the activity data synchronized, In conjunction with the data that simulated environment provides, creates and run artificial activity;The artificial activity runs obtained operation result number According to as the foundation for verifying the network activity.
The present invention also provides a kind of computer read/write memory mediums, are stored thereon with computer program, which is located Reason device realizes following steps when executing:
It is monitored with the movable relevant monitoring object of verification to preset;
According to monitoring result, activity to be verified is determined;
By calling operation system query interface, inquiry to obtain the movable activity data to be verified;
The movable activity data to be verified is synchronized in simulated environment;
In the simulated environment, created in conjunction with the data that simulated environment provides according to the activity data synchronized And run artificial activity;The artificial activity run obtained operation result data as the verification network activity according to According to.
Compared with prior art, the present invention has the following advantages:
The emulation verification method of network activity provided by the present application, by verifying relevant monitoring pair with movable to preset As being monitored, according to monitoring result, determines activity to be verified, start in this way and activity to be verified is verified, nothing Selective actuation is needed to verify, it can be achieved that being verified to all movable automation full doses;Operation system query interface is directly invoked to look into It askes and obtains movable activity data to be verified, and the movable activity data to be verified is synchronized in simulated environment, as Creating the main foundation data of artificial activity data, it is ensured that artificial activity is consistent with the movable composition parameter to be verified, Therefore can guarantee that artificial activity and true movable operational process to be verified are completely the same, can accurate validation authentic activity work( The correctness of energy and service logic, and to true Above-the-line without invasive;Entire simulating, verifying process can be realized really certainly Dynamicization carries out, without caused by because of artificial participate in business risk and additional operation and link up cost, verify cover more comprehensively, Verification efficiency higher.
Description of the drawings
Fig. 1 is the method flow diagram that the application first embodiment provides;
Fig. 2 is the schematic device that the application second embodiment provides.
Specific implementation mode
Many details are elaborated in the following description in order to fully understand the present invention.But the present invention can be with Much implement different from other manner described here, those skilled in the art can be without prejudice to intension of the present invention the case where Under do similar popularization, therefore the present invention is not limited to the specific embodiments disclosed below.
The application provides a kind of emulation verification method of network activity, a kind of simulating, verifying device and one of network activity Kind computer readable storage medium.Embodiment presented below carries out the method, device and computer readable storage medium It is described in detail.
The application first embodiment provides a kind of emulation verification method of network activity, and this method is primarily adapted for use in O2O Marketing activity is verified on the line of platform, is particularly suitable for marketing activity on the line to all new establishments and is carried out full dose verification. It please refers to Fig.1 and understands the embodiment, Fig. 1 is the method flow diagram that the application first embodiment provides.
As shown in Figure 1, described method includes following steps:
S101 is monitored to preset with the movable relevant monitoring object of verification.
This step is used to be monitored with the movable relevant monitoring object of verification to pre-set, to determine whether there is The object that simulating, verifying need to be carried out with movable verification method provided by the present application, hence into this method.
It is described with the relevant monitoring object of movable verification, refer to it is pre-set, can be used as whether to start and live to network The dynamic identification information verified is monitored it, it can be achieved that being changed into monitoring result and is verified to network activity Enabling signal.In the present embodiment, described to verify relevant monitoring object with movable as activity recognition information, the activity recognition is believed Breath is the specified essential information for being used as the movable identification marking, such as activity ID, the activity recognition letter Breath is by offline task fixed time cleaning to activity recognition information offline storage table.The offline task is a kind of existing data Processing function, referring to can be by specified sql logic, business datum storage on required line to specified data table In, the fixed time cleaning is a kind of realization method of the offline task, i.e., setting timed task executes described specified automatically Sql logics.
Described to be monitored with the movable relevant monitoring object of verification to preset, realization process is:The reality of this method Alms giver's body timing identifies the activity recognition information offline storage table, to be in the determination activity recognition information offline storage table It is no that there are activity recognition information.
It should be noted that in addition to above-mentioned activity recognition information, it is described to be also with the movable relevant monitoring object of verification Activity creates message, and the activity, which creates message, to be formed by when new activity is created;It is corresponding, which is created The mode that message is monitored is:Movable establishment message is monitored.The snoop procedure can be realized by two ways, be divided It is not:The business diary of monitoring service system and monitoring DB change message.The business diary and monitoring of the monitoring service system DB changes message, can be realized by the platform for having system log preservation and sending function, specially:The subject of implementation of the application Message is changed by the log information or DB of subscribing to the platform, the platform actively sends business diary or the DB of operation system Subject of implementation of the message to the application is changed, when there is New activity to be created, you can obtain the movable establishment by this method Message.
S102 determines activity to be verified according to monitoring result.
This step determines the net verified for monitoring result caused by the monitoring process according to above-mentioned steps Network activity.
The activity to be verified refers to being configured create after, the activity of function and service logic verification need to be carried out, as usual Marketing activity is movable one kind to be verified on the O2O lines seen, the marketing activity is that the operation activity initiated by platform exists What businessman's application generated after participating in, can be business activity that reality be runed online, need to carrying out function amendment or perfect in shape and function, Or the business activity of the also non-commencement of commercial operation newly created.Activity to be verified in the present embodiment is mainly also non-commencement of commercial operation Business activity, it is verified, the operation data of the business activity can be obtained ahead of time, whether reachable evaluates the business activity To desired effects, the reasonability and sophistication of the movable service logic and each service details are judged, by data above It is analyzed, can the business activity is improved and be adjusted in time, such as adjust active policy, improve activity details etc..
It is described according to monitoring result in the present embodiment, determine that movable mode to be verified is:If the activity recognition information There are activity recognition information in offline storage table, it is determined that and the activity corresponding to the activity recognition information is activity to be verified, And starts and simulating, verifying is carried out to the activity to be verified.Alternatively, being created when listening to new activity, it is determined that the new wound The activity built is activity to be verified, and starts and carry out simulating, verifying to the activity to be verified.
Startup verification is selectively carried out to specified network marketing activity by operation personnel compared to previous, this What application provided is monitored by default with the relevant monitoring object of activity verification, and work to be verified is determined according to monitoring result It moves and starts to the movable verification to be verified, can indistinguishably automatic trigger be verified by all-network activity.
S103, by calling operation system query interface, inquiry to obtain the movable activity data to be verified.
After above-mentioned steps determine activity to be verified, this step is used for the query interface by calling operation system, inquiry The movable activity data to be verified is obtained, using the basic data as the application subsequent process.
The operation system query interface is exclusively used in obtaining movable activity data to be verified in the application to be preset Data-interface can inquire to obtain in operation system being arbitrarily designated movable all composition parameters by the interface.In above-mentioned step It is monitored in rapid by creating message to activity recognition information or activity, work to be verified can determine according to its monitoring result It is dynamic, the movable identification information specific to be verified is specially determined, such as activity ID.Therefore, this step can be according to the knowledge Other information, by calling operation system query interface, inquiry to obtain the movable every other parameter to be verified, all parameters Information collectively constitutes the movable activity data to be verified.
The movable activity data to be verified refer to the various attribute informations that the activity to be verified is included and Incidence relation between various attribute informations, for example, marketing activity included marketing activity information, be related to store information, relate to And merchandise news etc. and the marketing activity information, the store information being related to, the merchandise news that is related between association close System.Described to obtain the movable activity data to be verified, its object is to determine that movable each composition to be verified is wanted Incidence relation between plain and each element, the basic data as follow-up data emulation.For example, by calling the industry Business system queries interface, ID pairs of the marketing activity is inquired according to the marketing activity ID of the activity recognition information offline storage table The marketing activity discount answered, marketing activity initial time and terminate the time, the store information that is related to, the merchandise news being related to etc., And the marketing activities number such as incidence relation between the marketing activity information, the store information being related to, the merchandise news that is related to According to.
The movable activity data to be verified is synchronized in simulated environment by S104.
Above-mentioned steps by call the inquiry of operation system query interface obtain the movable activity data to be verified it Afterwards, this step is for the movable activity data to be verified to be synchronized in simulated environment, with generate with it is to be verified movable The corresponding artificial activity data of activity data, the basic data as the artificial activity in simulated environment.
The simulated environment refers to thering is completely the same simulated environment with environment on line when actual motion, In the simulated environment, the function and effect of environment in all true lines can be realized.In the present embodiment, the simulated environment The virtual environment of environment is surveyed for pressure on artificial line.
It is described that the movable activity data to be verified is synchronized in simulated environment in the present embodiment, realization method Can be:Directly by calling operation system to create interface, the movable activity to be verified is created in the simulated environment The movable activity data to be verified is copied to the simulated environment by the artificial activity data corresponding to data to realize In.It is the pre-set data-interface for being exclusively used in carrying out activity data duplication that the operation system, which creates interface, passes through calling The interface, it can be achieved that all activity datas duplication.
In addition to carrying out data synchronization above by the mode for calling the operation system to create interface, it can also pass through such as lower section Formula realizes that data synchronize:The movable activity data to be verified is compared with pre-set emulation mapping table, If there is the mapping that the movable activity data to be verified is mapped as to artificial activity data in the emulation mapping table The movable activity data to be verified is then mapped as artificial activity data by relationship according to the mapping relations;If described imitative There is no the mapping relations that the movable activity data to be verified is mapped as to artificial activity data in proper mapping relation table, then Call the service creation interface of operation system to replicate in the movable activity data to the simulated environment to be verified, using as Artificial activity data corresponding to the activity data, and by the movable activity data to be verified and the artificial activity number According to mapping relations be added in the emulation mapping table.The emulation mapping table is for activity data to be mapped as Artificial activity data include mainly mapping main body and the corresponding emulation mapping method of the mapping main body, such as marketing activity Each marketing activity data and the institutes such as in corresponding artificial activity mapping table, the mapping main body is store information, merchandise news The emulation marketing activity data such as emulation store information, the emulation merchandise news corresponding to each marketing activity data are stated, it is congener It is mapped by specific mapping method between the corresponding artificial activity data of the marketing activity data, example Such as, store information emulation store information is mapped as to map by specific shop mapping method.Each type is reflected It penetrates the mapping method corresponding to main body and the mapping main body and forms one group of mapping relations, for the activity data to same type Carry out emulation mapping.For example, for the store information of marketing activity, the process being synchronized in simulated environment is:Described The mapping relations for searching the corresponding shop type in mapping table according to the ID of the store information are emulated, if the emulation There are the mapping relations of the shop type in mapping table, then the store information is passed through into the spy in the mapping relations Fixed mapping method is mapped as emulation store information;If reflecting there is no the shop type in the emulation mapping table Relationship is penetrated, then calls the service creation interface of operation system to replicate in the store information to the simulated environment, forms emulation Store information, and the mapping relations of the store information and the emulation store information are added to the emulation mapping table In.
S105, in the simulated environment, according to the activity data synchronized, the number provided in conjunction with simulated environment According to creating and run artificial activity;The artificial activity runs obtained operation result data as the network is verified and lives Dynamic foundation.
The emulation verification method of network activity provided by the present application, total realization method are:It is treated in simulated environment Verification activity carries out data simulation, obtains simulation result, foundation of the simulation result as activity verification.Therefore, above-mentioned Step completes the movable activity data to be verified is synchronized in the simulated environment after, this step is used for according to same The artificial activity data corresponding to the movable activity data to be verified and the simulated environment obtained after step are provided Data, create artificial activity and simultaneously run created artificial activity, the operation result obtained after the artificial activity operation Foundation of the data as the correctness for verifying the movable function to be verified and service logic, to complete this method.
The artificial activity for being created and being run in simulated environment, it is corresponding with true Above-the-line, it can The method of operation for simulating true Above-the-line is run, and consistent with Above-the-line functionally and logically can reach Operation result.For example, common O2O marketing activities may include transaction, discount coupon provided for user, under line barcode scanning payment and The process of barcode scanning neck certificate under line, the then corresponding artificial activity of the marketing activity also include mock trading, are that emulation user's granting is imitative The simulation process such as barcode scanning payment and simulation barcode scanning neck certificate under true discount coupon, artificial line.
Artificial activity data corresponding to the movable activity data to be verified obtained by synchronous mode, It is the main composition data of the dummy activity, such as the letters such as movable shop, lipuid goods, activity description in marketing activity If breath also needs the virtual data provided in conjunction with simulated environment, such as emulate however, want to run the activity in simulated environment The information such as user, emulation trade company.The data in above two source collectively constitute the artificial activity data for creating the artificial activity.
According to the artificial activity data creation and artificial activity is run, the establishment process of the artificial activity is will be described imitative The process that true activity data is assembled as required parameter, the before this procedure starting of also replaceable artificial activity operation Time and termination time.In the present embodiment, the initial time of the artificial activity operation is set as the artificial activity and has created First time after, i.e., once the artificial activity is created and is completed, then runs the artificial activity at once, is realized the with this One time verified the activity to be verified.
The process of operation artificial activity described herein is to simulate to execute movable every simulated core to be verified The process of heart use-case, for example, for O2O marketing activities, core use-case is purchase, is user's granting discount coupon, gets, core The service closed_loops use-case such as pin, reimbursement, then the core use-case of corresponding emulation marketing activity is that emulation is bought, is emulation user Provide emulation discount coupon, emulation gets, emulates and the artificial services closed loop use-case such as check and write off, emulate reimbursement.
The artificial activity runs obtained operation result data as the foundation for verifying the network activity, realizes Mode is:Pre-set programs read the operation result data of artificial activity by way of uninterruptedly reading, specially:By pre- If programe non-interrupted tables of data of the reading for storing simulation result, if reading in the tables of data there are simulation result, Start to execute the verification, if not reading simulation result, repeat the reading process, until existing in the tables of data imitative Start to execute verification after true result.The verification efficiency to the artificial activity can be improved in this kind of mode.
The activity to be verified of each type has the verification of its business regular, described to the simulation result in the present embodiment The mode verified is:It is corresponding with the activity to be verified imitative that rule pair is checked using the movable business to be verified Simulation result caused by very movable operational process carries out real-time core pair, i.e., actively assembling is real to the activity progress to be verified When required request when checking, the integrality of the verification operation is can guarantee using this kind of method.
In the present embodiment, simulation result is tested caused by the operational process through aforesaid way to the artificial activity After card, movable checked result to be verified described in output is also needed, such as each movable verification report to be verified, to show The movable service logic situation for completing verification, it is unsuccessfully the failure of the use-case of which dimension such as to show movable, can fast lock The reason of determining network activity failure.
In the above-described embodiment, a kind of emulation verification method of network activity, corresponding, the application are provided Second embodiment additionally provides a kind of simulating, verifying device of network activity, illustrates below in conjunction with the accompanying drawings.
Since device embodiment is substantially similar to embodiment of the method, so describing fairly simple, relevant part please join The corresponding explanation of the embodiment of the method for above-mentioned offer is provided.Device embodiment described below is only schematical.It please join It examines Fig. 2 and understands the embodiment, Fig. 2 is the unit block diagram of device provided in this embodiment, as shown in Fig. 2, described device includes:
Activity verification monitoring unit 201, for being monitored with the movable relevant monitoring object of verification to preset;
Activity determination unit 202 to be verified, for according to monitoring result, determining activity to be verified;
Activity data obtaining unit 203, for by calling operation system query interface, inquiry to obtain the work to be verified Dynamic activity data;
Activity data synchronization unit 204, for the movable activity data to be verified to be synchronized in simulated environment;
Artificial activity establishment, running unit 205 are used in the simulated environment, according to the movable number synchronized According to, in conjunction with simulated environment provide data, create and run artificial activity;The artificial activity runs obtained operation result Data are as the foundation for verifying the network activity.
Optionally, described preset to include with the relevant monitoring object of movable verification:
Activity recognition information, the activity recognition information are deposited offline by offline task fixed time cleaning to activity recognition information It stores up in table.
Optionally, described to be monitored with the movable relevant monitoring object of verification to preset, including:
Timing identifies the activity recognition information offline storage table, in the determination activity recognition information offline storage table With the presence or absence of activity recognition information.
Optionally, described that activity to be verified is determined according to monitoring result, including:
If in the activity recognition information offline storage table, there are activity recognition information, it is determined that the activity recognition information Corresponding activity is activity to be verified, and starts and carry out simulating, verifying to the activity to be verified.
Optionally, described preset to include with the relevant monitoring object of movable verification:Activity creates message;
It is corresponding, it is described to be monitored with the movable relevant monitoring object of verification to preset, including:To the activity wound Message is built to be monitored.
Optionally, described that activity to be verified is determined according to monitoring result, including:If listening to new activity to be created, It then determines that the activity is activity to be verified, and starts and simulating, verifying is carried out to the activity to be verified.
Optionally, described that the activity establishment message is monitored, including:
The business diary of monitoring service system;Or
It monitors DB and changes message.
Optionally, described that the movable activity data to be verified is synchronized in simulated environment, including:
By calling operation system to create interface, the movable activity data to be verified is created in the simulated environment Corresponding artificial activity data.
Optionally, described that the movable activity data to be verified is synchronized in simulated environment, including:
The movable activity data to be verified is compared with pre-set emulation mapping table;
If exist in the emulation mapping table the movable activity data to be verified being mapped as artificial activity number According to mapping relations, then the movable activity data to be verified is mapped as artificial activity data according to the mapping relations;
If there is no the movable activity data to be verified is mapped as artificial activity in the emulation mapping table The mapping relations of data then call the service creation interface of operation system to create corresponding to the movable activity data to be verified Artificial activity data, and the movable activity data to be verified and the mapping relations of the artificial activity data are added to In the emulation mapping table.
Optionally, it creates and transports in conjunction with the data that simulated environment provides according to the activity data synchronized described Before row artificial activity, further include:
The initial time of displacement activity and termination time.
Optionally, the artificial activity run obtained operation result data as the verification network activity according to According to realization method includes:
Pre-set programs read the operation result data of artificial activity by way of uninterruptedly reading, by the artificial activity Operation result data as the foundation for verifying the network activity.
Optionally, the verification network activity, including:
It is checked using the movable business to be verified and is run caused by operational process of the rule to the artificial activity As a result real-time core pair is carried out.
Optionally, the simulated environment includes:Pressure surveys environment on line.
A kind of computer read/write memory medium embodiment provided by the present application is as follows:
In the above-described embodiment, a kind of emulation verification method of network activity is provided, in addition, present invention also provides A kind of computer read/write memory medium of simulating, verifying for realizing the network activity.The calculating provided by the present application Machine read/write memory medium embodiment describes fairly simple, and relevant portion refers to the corresponding explanation of above method embodiment i.e. It can.Embodiment described below is only schematical.
The application provides a kind of computer read/write memory medium, is stored thereon with computer program, which is handled Device realizes following steps when executing:
It is monitored with the movable relevant monitoring object of verification to preset;
According to monitoring result, activity to be verified is determined;
By calling operation system query interface, inquiry to obtain the movable activity data to be verified;
The movable activity data to be verified is synchronized in simulated environment;
In the simulated environment, created in conjunction with the data that simulated environment provides according to the activity data synchronized And run artificial activity;The artificial activity runs obtained operation result data as the foundation for verifying the network activity
Optionally, described preset to include with the relevant monitoring object of movable verification:
Activity recognition information, the activity recognition information are deposited offline by offline task fixed time cleaning to activity recognition information It stores up in table.
Optionally, described to be monitored with the movable relevant monitoring object of verification to preset, including:
Timing identifies the activity recognition information offline storage table, in the determination activity recognition information offline storage table With the presence or absence of activity recognition information.
Optionally, described that activity to be verified is determined according to monitoring result, including:
If in the activity recognition information offline storage table, there are activity recognition information, it is determined that the activity recognition information Corresponding activity is activity to be verified, and starts and carry out simulating, verifying to the activity to be verified.
Optionally, described preset to include with the relevant monitoring object of movable verification:Activity creates message;
It is corresponding, it is described to be monitored with the movable relevant monitoring object of verification to preset, including:To the activity wound Message is built to be monitored.
Optionally, described that activity to be verified is determined according to monitoring result, including:If listening to new activity to be created, It then determines that the activity is activity to be verified, and starts and simulating, verifying is carried out to the activity to be verified.
Optionally, described that the activity establishment message is monitored, including:
The business diary of monitoring service system;Or
It monitors DB and changes message.
Optionally, described that the movable activity data to be verified is synchronized in simulated environment, including:
By calling operation system to create interface, the movable activity data to be verified is created in the simulated environment Corresponding artificial activity data.
Optionally, described that the movable activity data to be verified is synchronized in simulated environment, including:
The movable activity data to be verified is compared with pre-set emulation mapping table;
If exist in the emulation mapping table the movable activity data to be verified being mapped as artificial activity number According to mapping relations, then the movable activity data to be verified is mapped as artificial activity data according to the mapping relations;
If there is no the movable activity data to be verified is mapped as artificial activity in the emulation mapping table The mapping relations of data then call the service creation interface of operation system to create corresponding to the movable activity data to be verified Artificial activity data, and the movable activity data to be verified and the mapping relations of the artificial activity data are added to In the emulation mapping table.
Optionally, it creates and transports in conjunction with the data that simulated environment provides according to the activity data synchronized described Before row artificial activity, further include:
The initial time of displacement activity and termination time.
Optionally, the artificial activity run obtained operation result data as the verification network activity according to According to realization method includes:
Pre-set programs read the operation result data of artificial activity by way of uninterruptedly reading, by the artificial activity Operation result data as the foundation for verifying the network activity.
Optionally, the verification network activity, including:
It is checked using the movable business to be verified and is run caused by operational process of the rule to the artificial activity As a result real-time core pair is carried out.
Optionally, the simulated environment includes:Pressure surveys environment on line.
Although the present invention is disclosed as above with preferred embodiment, it is not for limiting the present invention, any this field skill Art personnel without departing from the spirit and scope of the present invention, can make possible variation and modification, therefore the guarantor of the present invention Shield range should be subject to the range that the claims in the present invention are defined.
In a typical configuration, computing device includes that one or more processors, input/output interface, network connect Mouth and memory.
Memory may include computer-readable medium in volatile memory, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology realizes information storage.Information can be computer-readable instruction, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase transition internal memory (PRAM), static RAM (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), fast flash memory bank or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storages, magnetic tape cassette, tape magnetic disk storage or other magnetic storage apparatus Or any other non-transmission medium, it can be used for storage and can be accessed by a computing device information.As defined in this article, it calculates Machine readable medium does not include non-temporary computer readable media (transitory media), such as data-signal and carrier wave of modulation.
It will be understood by those skilled in the art that embodiments herein can be provided as method, system or computer program product. Therefore, complete hardware embodiment, complete software embodiment or embodiment combining software and hardware aspects can be used in the application Form.It is deposited moreover, the application can be used to can be used in the computer that one or more wherein includes computer usable program code The shape for the computer program product implemented on storage media (including but not limited to magnetic disk storage, CD-ROM, optical memory etc.) Formula.

Claims (10)

1. a kind of emulation verification method of network activity, which is characterized in that including:
It is monitored with the movable relevant monitoring object of verification to preset;
According to monitoring result, activity to be verified is determined;
By calling operation system query interface, inquiry to obtain the movable activity data to be verified;
The movable activity data to be verified is synchronized in simulated environment;
In the simulated environment, creates and transport in conjunction with the data that simulated environment provides according to the activity data synchronized Row artificial activity;The artificial activity runs obtained operation result data as the foundation for verifying the network activity.
2. the emulation verification method of network activity according to claim 1, which is characterized in that described preset to be tested with movable Demonstrate,proving relevant monitoring object includes:
Activity recognition information, the activity recognition information pass through offline task fixed time cleaning to activity recognition information offline storage table In.
3. the emulation verification method of network activity according to claim 2, which is characterized in that it is described to it is preset with it is movable Relevant monitoring object is verified to be monitored, including:
Timing identify the activity recognition information offline storage table, in the determination activity recognition information offline storage table whether There are activity recognition information.
4. the emulation verification method of network activity according to claim 3, which is characterized in that it is described according to monitoring result, Determine activity to be verified, including:
If in the activity recognition information offline storage table, there are activity recognition information, it is determined that the activity recognition information institute is right The activity answered is activity to be verified, and starts and carry out simulating, verifying to the activity to be verified.
5. the emulation verification method of network activity according to claim 1, which is characterized in that described preset to be tested with movable Demonstrate,proving relevant monitoring object includes:Activity creates message;
It is corresponding, it is described to be monitored with the movable relevant monitoring object of verification to preset, including:The activity is created and is disappeared Breath is monitored.
6. the emulation verification method of network activity according to claim 5, which is characterized in that it is described according to monitoring result, Determine activity to be verified, including:If listening to new activity to be created, it is determined that the activity is activity to be verified, and is opened It is dynamic that simulating, verifying is carried out to the activity to be verified.
7. the emulation verification method of network activity according to claim 1, which is characterized in that described by the work to be verified Dynamic activity data is synchronized in simulated environment, including:
By calling operation system to create interface, it is right that the movable activity data institute to be verified is created in the simulated environment The artificial activity data answered.
8. the emulation verification method of network activity according to claim 1, which is characterized in that the artificial activity runs institute Foundation of the operation result data of acquisition as the verification network activity, realization method include:
Pre-set programs read the operation result data of artificial activity by way of uninterruptedly reading, by the fortune of the artificial activity Row result data is as the foundation for verifying the network activity.
9. a kind of simulating, verifying device of network activity, which is characterized in that including:
Activity verification monitoring unit, for being monitored with the movable relevant monitoring object of verification to preset;
Activity determination unit to be verified, for according to monitoring result, determining activity to be verified;
Activity data obtaining unit, for by calling operation system query interface, inquiry to obtain the movable work to be verified Dynamic data;
Activity data synchronization unit, for the movable activity data to be verified to be synchronized in simulated environment;
Artificial activity establishment, running unit, in the simulated environment, according to the activity data synchronized, in conjunction with The data that simulated environment provides, create and run artificial activity;The artificial activity runs obtained operation result data and makees To verify the foundation of the network activity.
10. a kind of computer read/write memory medium, is stored thereon with computer program, which is characterized in that the program is handled Device realizes following steps when executing:
It is monitored with the movable relevant monitoring object of verification to preset;
According to monitoring result, activity to be verified is determined;
By calling operation system query interface, inquiry to obtain the movable activity data to be verified;
The movable activity data to be verified is synchronized in simulated environment;
In the simulated environment, creates and transport in conjunction with the data that simulated environment provides according to the activity data synchronized Row artificial activity;The artificial activity runs obtained operation result data as the foundation for verifying the network activity.
CN201810094650.5A 2018-01-31 2018-01-31 Simulation verification method and device for network activities Active CN108389104B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810094650.5A CN108389104B (en) 2018-01-31 2018-01-31 Simulation verification method and device for network activities

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810094650.5A CN108389104B (en) 2018-01-31 2018-01-31 Simulation verification method and device for network activities

Publications (2)

Publication Number Publication Date
CN108389104A true CN108389104A (en) 2018-08-10
CN108389104B CN108389104B (en) 2021-06-25

Family

ID=63074887

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810094650.5A Active CN108389104B (en) 2018-01-31 2018-01-31 Simulation verification method and device for network activities

Country Status (1)

Country Link
CN (1) CN108389104B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109787854A (en) * 2018-12-14 2019-05-21 浙江口碑网络技术有限公司 The test method and device of business service, storage medium, electronic device
CN112486830A (en) * 2020-06-24 2021-03-12 支付宝(杭州)信息技术有限公司 Pressure testing method, device and system for block chain network

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006146858A (en) * 2004-11-23 2006-06-08 Hiroki Shima Social simulation system with profiling means applied
CN101266628A (en) * 2008-04-02 2008-09-17 深圳先进技术研究院 Automatic real-time emulation and its paralleling method based on emulated knowledge library
CN102013055A (en) * 2010-12-07 2011-04-13 山东中创软件工程股份有限公司 Method and system for verifying service orchestration process
CN102117464A (en) * 2010-01-06 2011-07-06 埃森哲环球服务有限公司 Marketing investment optimizer with dynamic hierarchies
CN102541830A (en) * 2010-12-21 2012-07-04 深圳市恒扬科技有限公司 Method and device for generating simulation report in simulation platform
CN102567351A (en) * 2010-12-10 2012-07-11 中国移动通信集团北京有限公司 Testing method and testing device for database modification effects
CN103020840A (en) * 2011-10-04 2013-04-03 微软公司 Incentive optimization for social media marketing campaigns
CN103077110A (en) * 2011-10-25 2013-05-01 阿里巴巴集团控股有限公司 Test method and device
CN107133162A (en) * 2016-02-29 2017-09-05 阿里巴巴集团控股有限公司 A kind of method of testing and device
CN107220105A (en) * 2017-06-22 2017-09-29 中国人民解放军国防科学技术大学 Parallel Discrete Event Simulation system auto-initiation implementation method
CN107515922A (en) * 2017-08-23 2017-12-26 北京汽车研究总院有限公司 A kind of data managing method and system
CN107609205A (en) * 2016-07-12 2018-01-19 百度在线网络技术(北京)有限公司 Business simulating system and method

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2006146858A (en) * 2004-11-23 2006-06-08 Hiroki Shima Social simulation system with profiling means applied
CN101266628A (en) * 2008-04-02 2008-09-17 深圳先进技术研究院 Automatic real-time emulation and its paralleling method based on emulated knowledge library
CN102117464A (en) * 2010-01-06 2011-07-06 埃森哲环球服务有限公司 Marketing investment optimizer with dynamic hierarchies
CN102013055A (en) * 2010-12-07 2011-04-13 山东中创软件工程股份有限公司 Method and system for verifying service orchestration process
CN102567351A (en) * 2010-12-10 2012-07-11 中国移动通信集团北京有限公司 Testing method and testing device for database modification effects
CN102541830A (en) * 2010-12-21 2012-07-04 深圳市恒扬科技有限公司 Method and device for generating simulation report in simulation platform
CN103020840A (en) * 2011-10-04 2013-04-03 微软公司 Incentive optimization for social media marketing campaigns
CN103077110A (en) * 2011-10-25 2013-05-01 阿里巴巴集团控股有限公司 Test method and device
CN107133162A (en) * 2016-02-29 2017-09-05 阿里巴巴集团控股有限公司 A kind of method of testing and device
CN107609205A (en) * 2016-07-12 2018-01-19 百度在线网络技术(北京)有限公司 Business simulating system and method
CN107220105A (en) * 2017-06-22 2017-09-29 中国人民解放军国防科学技术大学 Parallel Discrete Event Simulation system auto-initiation implementation method
CN107515922A (en) * 2017-08-23 2017-12-26 北京汽车研究总院有限公司 A kind of data managing method and system

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109787854A (en) * 2018-12-14 2019-05-21 浙江口碑网络技术有限公司 The test method and device of business service, storage medium, electronic device
CN112486830A (en) * 2020-06-24 2021-03-12 支付宝(杭州)信息技术有限公司 Pressure testing method, device and system for block chain network

Also Published As

Publication number Publication date
CN108389104B (en) 2021-06-25

Similar Documents

Publication Publication Date Title
CN109325855A (en) Block chain network, dispositions method and storage medium
CN109191124A (en) Block chain network, dispositions method and storage medium
CN109325854A (en) Block chain network, dispositions method and storage medium
US10290007B2 (en) Method and system for turning virtual world participants into real life leads
CN107730384A (en) Art sales method and server, server end and system based on block chain
CN109102285A (en) Supply chain finance implementation method and its control system based on block chain duplex structure
CN108492183A (en) Account trading method, system and the computer readable storage medium of block chain
CN108614777A (en) A kind of financial transaction test system and test method based on actual services
CN109741181A (en) A kind of transaction match method, system, server and medium based on intelligent contract
CN108427638A (en) Region network of relation marketing activity test method and device
CN108389080A (en) Transaction processing method and platform
CN108090784A (en) Marketing activity emulation verification method and device
CN109189396A (en) intelligent contract engine module, operation method and storage medium
CN108389104A (en) A kind of emulation verification method and device of network activity
CN112330181A (en) Enterprise credit evaluation method and device based on block chain
CN109598550A (en) A kind of Internet advertising put-on method and device
US8661305B2 (en) Method and system for test vector generation
CN112966382A (en) Securities trading simulation method and system
CN104616168B (en) A kind of method and device of marketing tool legitimacy verifies
CN111652670A (en) Game asset transaction method, device and medium based on block chain
Fremont et al. Can blockchain technology solve trust issues in industrial networks?
CN111062764A (en) Block chain-based electronic equity transaction method, equipment and medium
CN110322346A (en) A kind of condition that supporting uxto model can set method of payment and system
CN110348871A (en) A kind of advertisement delivery method based on panorama block chain
CN113935749A (en) Fair credible commodity reputation evaluation method based on Ether house intelligent contract

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant