CN111597113B - Method, device, equipment and storage medium for verifying applet - Google Patents

Method, device, equipment and storage medium for verifying applet Download PDF

Info

Publication number
CN111597113B
CN111597113B CN202010419000.0A CN202010419000A CN111597113B CN 111597113 B CN111597113 B CN 111597113B CN 202010419000 A CN202010419000 A CN 202010419000A CN 111597113 B CN111597113 B CN 111597113B
Authority
CN
China
Prior art keywords
page
applet
target applet
content
verification
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010419000.0A
Other languages
Chinese (zh)
Other versions
CN111597113A (en
Inventor
陈都
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Baidu Netcom Science and Technology Co Ltd
Original Assignee
Beijing Baidu Netcom Science and Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Baidu Netcom Science and Technology Co Ltd filed Critical Beijing Baidu Netcom Science and Technology Co Ltd
Priority to CN202010419000.0A priority Critical patent/CN111597113B/en
Publication of CN111597113A publication Critical patent/CN111597113A/en
Application granted granted Critical
Publication of CN111597113B publication Critical patent/CN111597113B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs
    • G06F11/3612Software analysis for verifying properties of programs by runtime analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F8/00Arrangements for software engineering
    • G06F8/20Software design
    • G06F8/22Procedural
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Stored Programmes (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application discloses a verification method, device and equipment for an applet and a storage medium, and relates to the technical field of cloud computing. The specific implementation scheme is as follows: the test terminal acquires page display information of the target applet and sends the page display information to the server, the server performs validity verification on the target applet according to the page snapshot of the target applet, and sends the obtained content verification result to the test terminal so that the test terminal determines whether the target applet passes verification. According to the method, the verification of the applet can be automatically realized through the interaction between the test terminal and the server, the verification efficiency is improved, the page snapshot of the applet is obtained based on the browsing behavior of the real running environment, all pages can be covered, the problem that some content cannot be obtained due to malicious setting of a developer is solved, and the verification accuracy is improved.

Description

Method, device, equipment and storage medium for verifying applet
Technical Field
The embodiment of the application relates to the technical field of cloud computing in the technical field of computers, in particular to a verification method, device and equipment for small programs and a storage medium.
Background
The applet is a pure off-line H5 application, and with the continuous development of applet ecology, more and more App applications have been converted into applet form bearing. In general, a certain applet needs to be validated before or during use to ensure that the content displayed by the applet is legal.
In the prior art, the verification mode of the applet is mainly manual verification, specifically, an auditor opens the applet on a terminal, and a verification result is obtained by checking whether the content displayed by the applet has a violation condition or not.
However, based on the manual verification method, not only is labor-consuming and has low efficiency, but also because the manual checking method cannot fully cover the whole content of the applet when the pages of the applet are more, the verification accuracy is low.
Disclosure of Invention
The embodiment of the application provides a method, a device, equipment and a storage medium for verifying an applet, which are used for solving the problem of low verification accuracy in the existing manual verification method of the content of the applet.
According to a first aspect, there is provided a method of validating an applet, comprising:
acquiring page display information of a target applet page, wherein the page display information comprises: the page storage path and the page content have a mapping relation;
Sending a content auditing request to a server, and receiving a content verification response fed back by the server, wherein the content auditing request comprises: the page presentation information of the target applet page, the content verification response comprising: the content verification result of the target applet page;
and determining whether the target applet passes verification according to the content verification response.
According to a second aspect, there is provided a method of validating an applet, comprising:
receiving a content auditing request sent by a test terminal, wherein the content auditing request comprises: page presentation information of a target applet page, the page presentation information comprising: the page storage path and the page content have a mapping relation;
verifying the validity of the page content of the target applet page according to the page snapshot of the target applet page to obtain a content verification result of the target applet page;
and generating a content verification response according to the content verification result, the page identification and the page storage path of each page, and feeding back the content verification response to the test terminal.
According to a third aspect, there is provided an authentication apparatus of an applet, comprising: the device comprises an acquisition module, a receiving and transmitting module and a determining module;
the acquisition module is used for acquiring page display information of a target applet page, wherein the page display information comprises: the page storage path and the page content have a mapping relation;
the receiving and transmitting module is configured to send a content auditing request to a server, and receive a content verification response fed back by the server, where the content auditing request includes: the page presentation information of the target applet page, the content verification response comprising: the content verification result of the target applet page;
and the determining module is used for determining whether the target applet passes the verification according to the content verification response.
According to a fourth aspect, there is provided an authentication apparatus of an applet, comprising: the device comprises a receiving and transmitting module, a verification module and a generation module;
the receiving and transmitting module is used for receiving a content auditing request sent by the test terminal, and the content auditing request comprises: page presentation information of a target applet page, the page presentation information comprising: the page storage path and the page content have a mapping relation;
The verification module is used for verifying the validity of the page content of the target applet page according to the page snapshot of the target applet page to obtain a content verification result of the target applet page;
the generation module is used for generating a content verification response according to the content verification result, the page identification and the page storage path of each page;
the receiving and transmitting module is further used for feeding back the content verification response to the test terminal.
In a fifth aspect, an embodiment of the present application provides a test terminal, including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of the first aspect.
In a sixth aspect, an embodiment of the present application provides a server, including:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of the second aspect.
In a seventh aspect, embodiments of the present application provide a non-transitory computer-readable storage medium storing computer instructions for causing the computer to perform the method of the first aspect.
In an eighth aspect, embodiments of the present application provide a non-transitory computer-readable storage medium storing computer instructions for causing the computer to perform the method of the second aspect.
In a ninth aspect, an embodiment of the present application provides a method for verifying an applet, including:
acquiring a page snapshot of the target applet;
and carrying out validity verification on the page snapshot of the target applet, and determining whether the target applet passes the verification.
According to a tenth aspect of the present application, there is provided a computer program product comprising: a computer program stored in a readable storage medium, from which at least one processor of a test terminal can read, the at least one processor executing the computer program causing the test terminal to perform the method of the first aspect.
According to an eleventh aspect of the present application, there is provided a computer program product comprising: a computer program stored in a readable storage medium, from which it can be read by at least one processor of a server, the at least one processor executing the computer program causing the server to perform the method of the second aspect.
According to the method, the device, the equipment and the storage medium for verifying the applet, provided by the embodiment of the application, page snapshot, page identification, page storage path and other page display information of a target applet page are obtained through the test terminal and are sent to the server, the server verifies the validity of the page content of the target applet page according to the page snapshot of the target applet page, and then the obtained content verification result of the target applet page is sent to the test terminal so that the test terminal can determine whether the target applet passes verification. According to the method, the verification of the applet can be automatically realized through the interaction between the test terminal and the server, the verification is not needed manually, the verification efficiency is improved, the page snapshot of the applet is obtained based on the browsing behavior of the real running environment, all pages of the target applet can be covered, the problem that some contents cannot be obtained due to the fact that a developer is possibly maliciously arranged can be solved, and the verification accuracy is improved.
It should be understood that the description in this section is not intended to identify key or critical features of the embodiments of the disclosure, nor is it intended to be used to limit the scope of the disclosure. Other features of the present disclosure will become apparent from the following specification.
Drawings
The drawings are included to provide a better understanding of the present application and are not to be construed as limiting the application. Wherein:
FIG. 1 is a schematic view of an application scenario of the method for verifying an applet provided by the present application;
FIG. 2 is an interactive schematic diagram of an applet verification method according to a first embodiment of the application;
FIG. 3 is a flowchart of an authentication method of an applet according to a second embodiment of the present application;
FIG. 4 is a flow chart of a method for verifying an applet according to a third embodiment of the application;
FIG. 5 is a flowchart of an authentication method of an applet according to a fourth embodiment of the application;
FIG. 6 is a flowchart of an applet verification method according to a fifth embodiment of the application;
fig. 7 is a schematic structural diagram of an authentication apparatus for an applet according to a first embodiment of the present application;
fig. 8 is a schematic structural view of an authentication apparatus for an applet according to a second embodiment of the present application;
fig. 9 is a schematic structural view of an authentication apparatus for an applet provided in a third embodiment of the present application;
fig. 10 is a schematic structural view of an authentication apparatus for an applet according to a fourth embodiment of the present application;
fig. 11 is a schematic structural view of an authentication apparatus for an applet provided in a fifth embodiment of the present application;
FIG. 12 is a block diagram of a test terminal for implementing the method of verifying an applet provided by an embodiment of the application;
fig. 13 is a block diagram of a server for implementing the authentication method of the applet provided in the embodiment of the present application.
Detailed Description
Exemplary embodiments of the present application will now be described with reference to the accompanying drawings, in which various details of the embodiments of the present application are included to facilitate understanding, and are to be considered merely exemplary. Accordingly, those of ordinary skill in the art will recognize that various changes and modifications of the embodiments described herein can be made without departing from the scope and spirit of the application. Also, descriptions of well-known functions and constructions are omitted in the following description for clarity and conciseness.
Before introducing the technical scheme of the present application, firstly, the terms and application scenarios involved in the embodiments of the present application are introduced:
with the rapid development of internet technology, application programs are opened and information interaction is performed through application clients installed in electronic equipment, so that convenience requirements of people for obtaining information cannot be met, and more Apps are turned into applet form bearing. The applet is an application program which is carried on other application platforms and can be executed in the corresponding application platform without installation, so that a user can conduct information interaction through the application program more conveniently and quickly.
Specifically, the applet is a pure offline H5 application, which is developed based on a specific programming language, and can be used without downloading and installing the applet, and one of the characteristics is that the applet is convenient to use and does not need to be installed in an operating system of a terminal, but with the vigorous development of the applet service, illegal contents such as fraud, pornography, gambling and the like can be propagated and diffused along with the applet, so that in order to avoid the propagation and diffusion of the illegal contents through the applet, the applet is legally verified before or during the application of the applet, and the applet is one of key factors for ensuring the safe and stable development of the applet service.
Currently, the auditing of the existing applet is usually a manual auditing mode, namely, professional auditors are required to open the applet on a special test terminal, and then whether the content displayed by the applet has illegal conditions or not is checked. However, this manual auditing approach has the following problems: 1. the coverage of the pages is incomplete, namely, one applet usually contains a plurality of pages, and when an auditor browses the pages for inspection, the auditor cannot cover all the pages, so that the aim of comprehensive audit cannot be achieved; 2. the auditing efficiency is low, namely, with the vigorous development of applets, the applets which need to be reviewed are increased continuously, the personnel consumption is relatively high in a manual auditing mode, and the auditing efficiency of auditors is also required to be certain; 3. after the applet is released, the auditor cannot audit the applet, and the problem that the applet on the line cannot be audited exists. In summary, the existing manual auditing method has the problems of low auditing efficiency and low verification accuracy.
In view of the above problems, an embodiment of the present application provides a content verification method for a program, where page snapshot, page identifier, page storage path and other page display information of a target applet page are obtained through a test terminal and sent to a server, and the server performs validity verification on page content of the target applet page according to the page snapshot of the target applet page, and then sends an obtained content verification result of the target applet page to the test terminal, so that the test terminal determines whether the target applet passes verification. According to the method, the verification of the applet can be automatically realized through the interaction between the test terminal and the server, the verification is not needed manually, the verification efficiency is improved, the page snapshot of the applet is obtained based on the browsing behavior of the real running environment, all pages of the target applet can be covered, the problem that a developer can maliciously set to avoid acquiring certain content is solved, and the verification accuracy is improved.
The technical conception of the application is as follows: according to the scheme, page display information of page snapshots, page identifiers, page storage paths and the like of all pages when the applet is displayed in a real running environment is acquired through a test terminal, and the page display information is sent to a server, so that the server effectively identifies illegal contents displayed on dynamic pages in the applet based on the page snapshots of target applet pages, on one hand, all page contents of the applet to be issued can be covered on the whole surface during auditing, and on the other hand, the problem that content identification cannot be carried out due to the fact that the webpage is not deliberately configured with the robots protocols or deliberately prevented from being grabbed in the process of capturing the webpage possibly existing in the process of obtaining the webpage can be solved, and on the other hand, the problem that the online identification of the webpage by a user can not be carried out can be solved accurately and accurately.
Alternatively, in an embodiment of the present application, the verification of the applet may include: verification of an off-line applet to be published and verification of an on-line applet that has been published. Optionally, the verification of the online applet may trigger the page display event of the applet by running the script of the applet, so as to obtain the page display information of the applet, and the verification of the online applet may directly obtain the page display information of the applet based on the page browsing behavior of the user. The embodiment of the application does not limit the acquisition modes of the online applet and the offline applet, and can be determined according to actual scenes, and will not be described herein.
Fig. 1 is a schematic view of an application scenario of an applet verification method provided by the present application. As shown in fig. 1, the application scenario may include: at least one applet development platform 11, at least one test terminal 12, a network 13 and a server 14. Wherein a developer may develop a plurality of applets on each applet development platform 11, each applet development platform 11 may correspond to at least one test terminal 12, and the test terminals 12 and the server 14 may communicate over the network 13.
In the application scenario shown in fig. 1, the test terminal 12 may obtain an audit request for the target applet sent by the applet development platform 11, and obtain page display information such as a page snapshot, a page identifier, a page storage path, and the like of the target applet page, where the page storage path has a mapping relationship with the page content, and then, the test terminal 12 may send a content verification request to the server 14 through the network 13, so that the server 14 may perform validity verification on the page content of the target applet page according to the page snapshot of the target applet page, obtain a content verification result of the target applet page, and feed back the content verification result to the test terminal 12 through a content verification response, so that the test terminal 12 determines whether the target applet passes verification according to the content verification result.
In one embodiment of the present application, when the verification of the target applet is determined to pass based on the content verification result fed back by the server 14, in a possible design, the content verification result may also be displayed by the test terminal 12, so that the auditor 15 corresponding to the test terminal 12 performs a secondary audit on the content verification result, thereby further improving the verification accuracy of the target applet.
In another embodiment of the present application, if the verification accuracy determined according to the content verification result fed back by the server 14 after the practice verification has met the preset requirement, the test terminal 12 may directly push the audit response that the target applet verification passes to the corresponding applet development platform 11, and issue the permission of the applet to run.
In yet another embodiment of the present application, when the test terminal 12 determines that the target applet is not verified, the test terminal 12 needs to determine that the operating rights of the target applet are in a closed state. Optionally, for the offline applet to be published, the operation authority of the offline applet is limited so that the offline applet is in a closed state. And closing the running authority of the issued online applet, and controlling the online applet to forcedly offline so as to prevent illegal contents of the online applet from being propagated or diffused.
From the above analysis, in the embodiment of the present application, the expression form of the target applet may be any of the following: offline applet to be published, online applet published. The online applet to be published may include an applet that has been modified, and the modified applet may be obtained after modification of an applet that has not passed verification, or may be obtained after update of some legal applets. It will be appreciated that the source applet corresponding to the modified applet may be an offline applet to be published, or may be a published online applet, which is not limited herein.
It should be noted that fig. 1 is only a schematic diagram of an application scenario provided by an embodiment of the present application, and fig. 1 is illustrated by an applet development platform, a test terminal and an auditor. The embodiment of the present application is not limited to the number of devices and the types of devices included in the application scenario shown in fig. 1, which may be set according to actual requirements, and will not be described herein.
In the embodiment of the present application, the applet development platform 11 may be an applet development platform operated independently by the operator of the APP on which the applet is installed, or may be a third party applet development platform having a cooperative relationship with the operator of the APP on which the applet is installed. Alternatively, the applet development platform 11 is also referred to as an applet developer tool, which is a tool for producing applets, i.e. for generating applet packages. The application is not limited to the specific embodiment of the applet development platform 11.
In practice, the server 14 may be a cloud server, and may provide computing or application services to other clients (e.g., PCs, smartphones, applet development platforms, etc.) in a network. The embodiment of the application does not limit the specific implementation and the functions of the server, and can be determined according to actual requirements, and is not repeated here.
The technical scheme of the application is described in detail through specific embodiments. It should be noted that the following embodiments may be combined with each other, and the same or similar concepts or processes may not be described in detail in some embodiments.
Fig. 2 is an interactive schematic diagram of an authentication method of an applet according to a first embodiment of the present application. The embodiment of the application is explained by the information interaction between the test terminal and the server. As shown in fig. 2, the method may include the steps of:
s201, the test terminal acquires page display information of a target applet page.
The page display information comprises: the system comprises a page snapshot, a page identification and a page storage path, wherein the page storage path and page content have a mapping relation.
In the embodiment of the application, the test terminal is the test equipment which is butted by the applet development platform, when the applet needs to be audited, the test terminal can firstly determine the target applet to be audited, and further based on the target applet, the page content, the page identification, the page storage path and the like of the target applet page can be obtained in the display process of the applet page, and further the information such as the page snapshot of each page can be obtained according to the page content.
The page content is displayed on the page when the target applet is accessed, and is actually an HTML language corresponding to the page content, which is an identified language, and includes a series of labels, through which the document formats on the network can be unified, so that the distributed Internet resources are connected into a logic whole. The page identity is used to identify a unique page, the page storage path is used to represent the storage location of each page, based on which the page storage path can be linked to, and the page snapshot is a page cache that identifies the original content of the page, on which the content cannot be tampered with.
It can be understood that the page display information of the target applet page refers to information presented when the applet is displayed in an actual running environment, is determined based on actual browsing behavior of the applet page, is consistent with the running scene of the applet after being published, and can cover the content which the applet will display after being formally published, so that illegal content presented on a dynamic page in the target applet can be effectively identified during subsequent verification.
In one embodiment of the application, the page can refer to all pages of the target applet, so that the terminal equipment can send page display information of all pages of the target applet to the server for verification, thereby improving the accuracy of applet content verification.
In this embodiment, the specific implementation principle of acquiring the page presentation information of the target applet page may be described in the embodiment shown in fig. 3 or fig. 4, which is not described herein.
S202, the test terminal sends a content auditing request to the server, wherein the content auditing request comprises: page presentation information for the target applet page.
In the embodiment of the application, after the test terminal obtains the page display information of the target applet page, in order to realize automatic auditing of the content, the page display information of the target applet page can be packaged into a content auditing request and sent to the server, so that the server executes the content verifying process.
And S203, the server performs validity verification on the page content of the target applet page according to the page snapshot of the target applet page, and a content verification result of the target applet page is obtained.
In this embodiment, the server may detect whether the page content of the target applet page is legal based on a preset rule, and specifically, since the page snapshot of each page and the page content are in one-to-one correspondence, the content verification result of each page of the target applet may be determined by performing content verification on the page snapshot of each page.
Alternatively, the content verification result of the target applet page may also be referred to as a page content verification result of the target applet, which may represent the same meaning, and the present application is not limited to the specific expression.
It will be appreciated that in the embodiment of the present application, the server verifies whether the target applet is legal, mainly to determine whether the target applet carries illegal contents such as yellow, reaction, fraud, gambling, etc., and whether the Banner advertisement (Banner Ad.) with a large spread on the page of the target applet covers the display of normal contents, etc. The form of the illegal contents can be determined according to the actual situation, and will not be described herein.
Therefore, in this embodiment, if the content of the page of the target applet carries any illegal content, or there is a problem of large spread of banner advertisement covering the page of the target applet, it can be determined that illegal content exists on the page.
S204, the server generates a content verification response according to the content verification result, the page identification and the page storage path of each page.
In the embodiment of the application, in order to accurately represent the content verification result of each page, after the server obtains the content verification result of each page, a content verification response can be generated according to the content verification result of each page, the page identifier and the page storage path, so that the purpose of associating the content verification result of each page with the page is realized, namely, other page display information can be determined according to the page identifier or the content verification result of the page or the page storage path.
S205, the server feeds back the content verification response to the test terminal.
S206, the test terminal determines whether the target applet passes the verification according to the content verification response.
In the embodiment of the application, after the server obtains the content verification response, the content verification response can be fed back to the test terminal, namely, the test terminal can obtain the content verification result of the target applet page according to the received content verification response, and then determine whether the target applet passes the verification or not based on the content verification result of the target applet page.
Alternatively, the content verification result may include a determination result of whether the page content of the target applet page is legal, which is determined based on the page snapshot. Thus, in this embodiment, if the page content of the target applet page is legal, the target applet may be considered legal, and it is determined that the target applet passes the verification; correspondingly, if the target applet has illegal page content, determining that the target applet is not verified.
In one possible design, the server may be configured to generate a content verification response that may carry the content verification result and the page identifier for each page if the applet passes the verification, and may carry the content verification result, the page identifier, and the page storage path and/or the page content for each page if the applet fails the verification. Therefore, after receiving the content verification response, the test terminal can consider that the applet is verified if the content verification response only comprises the content verification result and the page identifier of each page, and can consider that the applet is not verified if the content verification response comprises not only the content verification result and the page identifier but also the storage path and/or the page content of the failed page.
According to the verification method for the applet, provided by the embodiment of the application, the test terminal acquires page snapshot, page identification, page storage path and other page display information of the target applet page, and sends the information to the server, the server verifies the validity of the page content of the target applet page according to the page snapshot of the target applet page, and then sends the obtained content verification result of the target applet page to the test terminal so that the test terminal can determine whether the target applet passes verification. According to the method, the verification of the applet can be automatically realized through the interaction between the test terminal and the server, the verification is not needed manually, the verification efficiency is improved, the page snapshot of the applet is obtained based on the browsing behavior of the real running environment, all pages can be covered, the problem that a developer can maliciously set to avoid acquisition of certain content can be solved, and the verification accuracy is improved.
Further, in an embodiment of the present application, the method may further include the following steps before S201:
the test terminal receives an audit request for the applet, the audit request comprising: identification of the target applet and/or data package of the target applet.
Specifically, the test terminal is test equipment which is in butt joint with the applet development platform, and when the applet needs to be audited, the applet developer can send an audit request to the test terminal through the applet development platform.
Optionally, in an embodiment of the present application, in order to enable the test terminal to perform targeted verification on the data of the target applet, the audit request needs to include at least one of the following information, namely, an identifier of the target applet and a data packet of the target applet. In a specific application, the data packet of the target applet is a string of code for implementing the target applet, which is uncompiled code.
In practical applications, the terminal device may obtain an executable file (exe file) by running a data packet of the target applet, that is, by compiling a code for implementing the target applet, so that the target applet may be displayed on the terminal.
As an example, in practical application, when a developer develops a new applet through the applet development platform based on its own business requirement, a data packet of the applet may be sent to the docked test terminal through the applet development platform, so that the test terminal verifies the applet according to the received data packet.
In this example, the developer may package, upload and submit the developed applet data package to the test terminal for review. The process of packaging the developed applet data packet specifically refers to a process of packaging the execution code of the developed applet into an executable program.
As another example, after the applet is released, in order to ensure that the applet being operated is legal, real-time inspection needs to be performed on the online applet, at this time, the test terminal may receive an audit request sent by an auditor to instruct the test terminal to audit the applet being released and operated online, so as to ensure that the applet operated online does not carry illegal contents as much as possible.
In this example, since the online applet runs on the server, the audit request may include the identification of the target applet, so that the test terminal may locate the target applet based on the identification of the target applet, and further perform the process of content audit.
It will be appreciated that in embodiments of the present application, the number of target applets may be one or more. The number of the target applets is not limited, and the target applets can be determined according to actual conditions and are not described herein.
Further, in this embodiment, the step S203 may be implemented by:
the server inputs the page snapshot of each page of the target applet into the verification model, and outputs the content verification result of each page. Wherein the verification model is based on a pre-trained model for verifying whether the applet content is legitimate.
In the embodiment of the application, the verification model can be run on the server, and after the server acquires the page snapshot of each page of the target applet from the test terminal, the page snapshot can be input into the verification model, and the validity verification is carried out on the page content of the target applet page by utilizing the verification model carried by the server, so that the content verification result is obtained. The validity of the target applet is verified through the verification model, so that the verification efficiency can be improved.
Alternatively, the verification model may be obtained by means of machine learning, for example, by training the model training samples by a trainer using a deep convolutional neural network structure. The model training sample may be a marked page snapshot of an applet carrying illegal content. Alternatively, the trainer may be a component integrated on the server, or may be another device independent of the server. The embodiment of the application is not limited to the specific relation between the trainer and the server, and can be determined according to actual requirements.
Illustratively, in the embodiment of the present application, the target applet may be an applet to be published, or may be a applet that is already published and runs on line. The manner in which page presentation information for the applet pages is obtained is different for different types of applets, and is described below with respect to the embodiments shown in fig. 3 and 4, respectively.
On the basis of the above embodiment, fig. 3 is a schematic flow chart of a verification method of an applet according to a second embodiment of the present application. The implementation scheme provided by the embodiment of the application is that the test terminal explains the S201 under the scene that the target applet is the applet to be issued. As shown in fig. 3, in this embodiment, S201 may be implemented by the following steps:
s301, acquiring a script of the target applet.
In practical application, when developing applets, a developer has a corresponding Script (Script) for each applet, which is an extension of a batch file and is a plain text saved program. Thus, in this embodiment, the script of the object applet is a combination of the determined series of control object applet demonstration operation actions.
In the embodiment of the application, if the applet is required to be triggered to perform page display, after the target applet is determined, the script of the target applet can be acquired first.
S302, triggering a page display event of the target applet by running the script, wherein the page display event is used for representing that the page of the target applet is displayed.
In the embodiment of the application, the actual clicking operation of the user can be simulated by running the script corresponding to the target applet, and each page of the target applet is triggered to be displayed on the display interface of the test terminal in sequence. In this embodiment, the event in which the page of the target applet is exposed is referred to as an applet page exposure event.
S303, acquiring page display information of the target applet according to the page display event.
For example, for the applet to be issued, the test terminal may trigger each page of the target applet to be displayed in sequence by running the script of the target applet, so that page display information of the target applet may be obtained in the display process of each page.
The specific content of the page presentation information may be referred to the description in the embodiment shown in fig. 2, and will not be described herein.
According to the verification method of the applet, the script of the object applet is obtained, and the page display event of the object applet can be triggered by running the script, wherein the page display event is used for representing that the page of the object applet is displayed, and further page display information of the object applet is obtained according to the page display event. In the embodiment of the application, as the number of the applets to be issued is small, the method can be operated and realized by running the script, and the steps of acquiring the script and allowing the script can be automatically executed through setting, the productivity limit of the manual checking link under the line can be liberated, the problem of insufficient coverage of the manual checking page can be avoided, the realization condition is provided for the legal verification of the follow-up execution of the applets, and the foundation is laid for obtaining the verification result with higher accuracy.
On the basis of the above embodiment, fig. 4 is a schematic flow chart of a verification method of an applet according to a third embodiment of the present application. The implementation scheme provided by the embodiment of the application is that the test terminal explains the S201 under the scene that the target applet is the online running applet. As shown in fig. 4, in this embodiment, S201 may be implemented by the following steps:
s401, acquiring user operation behaviors of the target applet, wherein the user operation behaviors comprise browsing behaviors of the target applet.
In practical application, if the target applet is a published applet running on the line, after determining the target applet, capturing the operation executed by the user on the target applet, and determining the user operation behavior of the target applet. The user operation behavior comprises browsing behavior of the target applet, since the user can click on the target applet and browse pages included in the target applet.
S402, determining a page display event of the target applet according to the user operation behavior, wherein the page display event is used for representing that the page of the target applet is displayed.
In this embodiment, after the test terminal obtains the user operation behavior for the target applet, it may be determined whether the page of the target applet is displayed according to the user operation behavior. If the page is displayed, the page display event is determined, because only the displayed page is likely to be browsed by a user, and then the information such as the page identification, the page content, the page storage path and the like of the displayed page of the target applet can be obtained.
S403, acquiring page display information of the target applet according to the page display event.
For example, for an online running applet, the test terminal may obtain, during the presentation of each page, page presentation information of the target applet based on a page presentation event of the target applet.
According to the verification method of the applet, for the online target applet, firstly, the user operation behavior of the target applet is obtained, the user operation behavior comprises the browsing behavior of the target applet, secondly, the page display event of the displayed page of the target applet is determined according to the user operation behavior, and finally, the page display information of the target applet is obtained according to the page display event. The scheme realizes the grabbing of page display information of the online running applet based on the actual browsing behavior of the user, and lays a foundation for the subsequent analysis of whether the target applet is legal.
Further, in the embodiment of the present application, S303 in the embodiment shown in fig. 3 and S403 in the embodiment shown in fig. 4 may be implemented by the following steps:
a1, acquiring a page storage path and page contents of each page during display according to the page display event;
A2, determining a mapping relation between a page storage path and page contents of each page;
and A3, carrying out snapshot processing on page contents corresponding to each page to obtain page snapshots corresponding to each page of the target applet.
In the embodiment of the application, the test terminal acquires the page storage path of each page and the content (page content) on the page based on the page display event in the page display process of the target applet, and records the mapping relation between the page content of each page and the page storage path, so that the corresponding page content can be determined according to the page storage path.
By way of example, by performing snapshot processing on the page content of each page, a page snapshot may be generated, where the page snapshot is actually a backup of the web page, is a cache form of the page content, has an association relationship with a page storage path, and according to the page storage path corresponding to the page snapshot, the page content of the page corresponding to the page snapshot may be obtained.
In the embodiment, according to the page display event of the applet, the page storage path and page content corresponding to the target applet during display are determined first, and then the page snapshot of each page can be obtained by carrying out snapshot processing on the page content, so that the real running environment of the applet can be reflected, and the problem of inaccurate verification results of the applet caused by disguising processing of some content of the applet is avoided.
Further, in the embodiment of the application, after the server obtains the verification result for the target applet, the server feeds back the verification result to the test terminal through the content verification response, so that the test terminal can obtain the content verification result obtained by the server, and further determine whether the target applet passes the verification based on the content verification result.
Optionally, in the embodiment of the present application, when the test terminal determines that the verification of the target applet passes, the second audit may be performed by an auditor corresponding to the target applet. Specifically, S206 may be implemented by the following embodiment shown in fig. 5.
Fig. 5 is a flowchart of a verification method of an applet according to a fourth embodiment of the application. The embodiment of the application is a further explanation of the verification of the applet by the test equipment. As shown in fig. 5, in this embodiment, S206 may be implemented by the steps of:
s501, displaying a content verification result of the target applet page.
Optionally, in the embodiment of the present application, the test terminal has a man-machine interaction interface, and the content verification result obtained by the server (through the verification model running thereon) may have an inaccurate condition, so when the test terminal receives the content verification result for the target applet page from the server and/or determines that the target applet passes verification, the content verification result of the target applet page may be displayed through the man-machine interaction interface, so that an auditor can finally determine whether the target applet passes verification.
S502, receiving an auditing result sent by an auditing person according to the content verification result of each page.
In the embodiment of the application, after the auditor checks the content verification result displayed on the man-machine interaction interface, the auditor can send out the audit result aiming at the target applet through the man-machine interaction interface, for example, the audit is passed or the audit is not passed. Therefore, the test terminal can acquire the auditing result sent by the auditing personnel after the secondary auditing is carried out.
S503, determining whether the target applet passes verification according to the auditing result.
In the embodiment of the application, after the test terminal obtains the auditing result sent by the auditing personnel, whether the target applet passes the verification can be finally determined according to the auditing result. The final verification result of the target applet is subjected to secondary verification by a checker, so that the verification accuracy can be further improved.
Alternatively, the auditing result may be that the target applet is verified, or that the target applet is not verified. When the verification of the target applet is passed, the applet to be issued can be issued online, and the applet running online is not interfered. When the target applet fails verification, the applet to be issued needs to be fed back to the applet development platform so as to modify the applet to be issued, and the applet running on line needs to be intervened, for example, the applet is forced to be offline and fed back to the applet development platform so as to modify the applet.
Specifically, as shown in fig. 5, after S206 or S503, the method may further include the following steps:
and S504, when the target applet fails to pass the verification, determining that the operation authority of the target applet is in a closed state, and pushing the content verification response to the applet development platform.
Optionally, the applet development platform is a device in which the target applet is developed and modified.
In the embodiment of the application, when the target applet fails verification, on one hand, the running authority of the target applet can be determined to be in a closed state, so that the problems of illegal online and the like can be avoided; on the other hand, the verification result can be pushed to the applet development platform, so that the applet development platform can timely carry out page rectification on the applet which does not pass verification.
Specifically, the test terminal may take corresponding measures for the applet to be issued and the applet to be run on line, respectively. For example, for the applet to be published, the test terminal can intercept the publishing process and directly terminate the publishing process, so that the problem of illegal content propagation and diffusion caused by that some illegal applets are published on line can be avoided, and the use experience of a user is improved. For the applet running on the line, the test terminal can directly close the running authority so as to force the applet to be off-line, and avoid the continuous propagation of illegal contents.
According to the verification method for the applet, after the test terminal obtains the content verification response, the verification result of the target applet page is displayed, the verification result sent by the auditor according to the content verification result of each page is received, and whether the target applet passes verification is further determined according to the verification result. The auditing accuracy of the small program is improved through the secondary auditing of the auditing personnel. When the target applet fails to pass the verification, the running authority of the target applet can be determined to be in a closed state, and the verification result is pushed to the applet development platform, so that corresponding developers can timely carry out page modification on the target applet on the applet development platform, the validity of the issued applet is ensured, and the use experience of a user is improved.
Based on the above embodiments, the following explains the overall process of the applet verification from the content before and after release by means of a specific embodiment. Fig. 6 is a flowchart of an authentication method of an applet according to a fifth embodiment of the application. As shown in fig. 6, the scheme may be divided into two parts, namely an offline machine automatic auditing part and an online inspection part, where the offline machine automatic auditing part may include the following steps one to three, and the online inspection part may include the steps four to six, specifically as follows:
Step one, a test terminal acquires page display information of all pages of an applet to be issued and sends the page display information to a server;
specifically, the test terminal obtains page display information of all pages of the applet to be published through running the script of the applet.
Secondly, the server performs validity verification on page contents of all pages according to page snapshots of all pages of the target applet to obtain a content verification result, and feeds back a content verification response to the test terminal;
thirdly, the test terminal examines the content verification result included in the content verification response to determine whether the applet to be issued passes the verification.
Step four, the test terminal obtains an online applet page snapshot based on the browsing behavior of the user and sends the online applet page snapshot to the server;
step five, the server performs validity verification on the online applet page snapshot to obtain a content verification result and feeds the content verification result back to the test terminal;
step six, the test terminal intervenes the small program which does not pass verification according to the page storage path and the page identification;
step seven, after the developer performs page rectification on the applet which does not pass the verification, the developer submits the applet, and the process goes to step one to continue execution.
In summary, the method for verifying the applet provided by the embodiment of the application is based on the content verification of the page display information acquired by the applet in the real running environment, can solve the problem that the content of the applet page cannot be acquired due to the fact that a developer does not configure robots protocol or is deliberately prevented from crawling, can be divided into two parts of automatic auditing and online inspection of an offline machine, and can be operated together in the online auditing stage and the online inspection stage, so that the problem that a dead angle cannot be recognized in time due to the fact that a dead angle is set for page recognition by a developer who is not considered is solved, the accuracy and efficiency of online auditing of the applet are improved, and for the applet after online, if a user accesses an illegal page, the applet can be discovered and intervened offline in time, and the experience of the user is practically ensured.
The foregoing describes a specific implementation of the method for verifying the applet mentioned in the embodiment of the present application, and the following is an embodiment of the apparatus of the present application, which may be used to execute the method embodiment of the present application. For details not disclosed in the embodiments of the apparatus of the present application, please refer to the embodiments of the method of the present application.
Fig. 7 is a schematic structural diagram of an authentication device for an applet according to a first embodiment of the present application. The device can be integrated in the test terminal or realized by the test terminal. As shown in fig. 7, in the present embodiment, the authentication device 70 of the applet may include: an acquisition module 701, a transceiver module 702 and a determination module 703.
The acquiring module 701 is configured to acquire page display information of the target applet page, where the page display information includes: the page storage path and the page content have a mapping relation;
the transceiver module 702 is configured to send a content audit request to a server, and receive a content verification response fed back by the server, where the content audit request includes: the page presentation information of the target applet page, the content verification response comprising: the content verification result of the target applet page;
the determining module 703 is configured to determine, according to the content verification response, whether the target applet passes verification.
Fig. 8 is a schematic structural diagram of an applet verifying apparatus according to a second embodiment of the present application based on the embodiment shown in fig. 7. As shown in fig. 8, the acquiring module 701 may include: an acquisition unit 801 and a trigger unit 802.
Wherein, the acquiring unit 801 is configured to acquire a script of a target applet;
a triggering unit 802, configured to trigger, by running the script, a page presentation event of the target applet, where the page presentation event is used to characterize that a page of the target applet is presented;
The obtaining unit 801 is further configured to obtain page display information of the target applet according to the page display event.
In an embodiment of the present application, the target applet is an applet to be published.
Fig. 9 is a schematic structural view of an authentication device for an applet according to a third embodiment of the present application based on the embodiment shown in fig. 7. As shown in fig. 9, the acquiring module 701 may include: an acquisition unit 901 and a determination unit 902.
The acquiring unit 901 is configured to acquire user operation behaviors of a target applet, where the user operation behaviors include browsing behaviors of the target applet;
a determining unit 902, configured to determine, according to the user operation behavior, a page showing event of the target applet, where the page showing event is used to characterize that a page of the target applet is shown;
the obtaining unit 901 is further configured to obtain page display information of the target applet according to the page display event.
In an embodiment of the present application, the target applet is an online running applet.
In the embodiment shown in fig. 8 and/or fig. 9, the obtaining unit is configured to obtain, according to the page presentation event, page presentation information of the target applet, specifically:
The acquisition unit is specifically configured to acquire a page storage path and page content of each page when the page is displayed according to the page display event, determine a mapping relationship between the page storage path and the page content of each page, and perform snapshot processing on the page content corresponding to each page, so as to obtain a page snapshot corresponding to each page of the target applet.
On the basis of any of the above embodiments, fig. 10 is a schematic structural diagram of an authentication apparatus for an applet according to a fourth embodiment of the present application. As shown in fig. 10, the determining module 703 includes: a display unit 1001, a receiving unit 1002, and a determining unit 1003.
The display unit 1001 is configured to display a content verification result of the target applet page;
the receiving unit 1002 is configured to receive an audit result sent by an auditor according to a content verification result of each page;
the determining unit 1003 is configured to determine whether the target applet passes the verification according to the auditing result.
Further, on the basis of any one of the above embodiments, the determining module 703 is further configured to determine that the running authority of the target applet is in a closed state;
The transceiver module 702 is further configured to push the content verification response to an applet development platform, where the applet development platform is a device in which the target applet is developed and modified.
The device provided in each of the above embodiments of the present application may be used to execute the scheme of the test terminal in any of the foregoing method embodiments, and its implementation principle and technical effects are similar, and will not be described herein again.
Fig. 11 is a schematic structural view of an authentication apparatus for an applet according to a fifth embodiment of the present application. The device can be integrated in a server or can be realized by the server. As shown in fig. 11, in the present embodiment, the authentication apparatus 110 of the applet may include: a transceiver module 1101, a verification module 1102, and a generation module 1103.
The transceiver module 1101 is configured to receive a content audit request sent by a test terminal, where the content audit request includes: page presentation information of a target applet page, the page presentation information comprising: the page storage path and the page content have a mapping relation;
the verification module 1102 is configured to perform validity verification on page content of the target applet page according to a page snapshot of the target applet page, to obtain a content verification result of the target applet page;
A generating module 1103, configured to generate a content verification response according to the content verification result, the page identifier, and the page storage path of each page;
the transceiver module 1101 is further configured to feed back the content verification response to the test terminal.
Optionally, in an embodiment of the present application, the verification module 1102 is configured to input a page snapshot of each page of the target applet into a verification model, and output a content verification result of each page, where the verification model is based on a pre-trained model for verifying whether the applet content is legal.
The device provided in each of the above embodiments of the present application may be used to implement the solution of the server in any of the foregoing method embodiments, and its implementation principle and technical effects are similar, and are not described herein again.
It should be noted that, it should be understood that the division of the modules of the above apparatus is merely a division of a logic function, and may be fully or partially integrated into a physical entity or may be physically separated. And these modules may all be implemented in software in the form of calls by the processing element; or can be realized in hardware; the method can also be realized in a form of calling software by a processing element, and the method can be realized in a form of hardware by a part of modules. For example, the processing module may be a processing element that is set up separately, may be implemented in a chip of the above-mentioned apparatus, or may be stored in a memory of the above-mentioned apparatus in the form of program codes, and the functions of the above-mentioned processing module may be called and executed by a processing element of the above-mentioned apparatus. The implementation of the other modules is similar. In addition, all or part of the modules can be integrated together or can be independently implemented. The processing element described herein may be an integrated circuit having signal processing capabilities. In implementation, each step of the above method or each module above may be implemented by an integrated logic circuit of hardware in a processor element or an instruction in a software form.
Further, according to an embodiment of the present application, the present application also provides an electronic device and a computer-readable storage medium.
Fig. 12 is a block diagram of a test terminal for implementing the verification method of the applet provided in the embodiment of the present application. The test terminal is intended to represent various forms of digital computers, such as laptops, desktops, workstations, personal digital assistants, and other appropriate computers. The test terminal may also represent various forms of mobile devices, such as personal digital processing, cellular telephones, smartphones, wearable devices, and other similar computing devices. The components shown herein, their connections and relationships, and their functions, are meant to be exemplary only, and are not meant to limit implementations of the applications described and/or claimed herein.
For example, as shown in fig. 12, the test terminal may include: at least one processor 1201, a memory 1202 communicatively coupled to the at least one processor; the memory 1202 stores instructions executable by the at least one processor 1201, which are executed by the at least one processor 1201, to enable the at least one processor 1201 to execute the solution of testing a terminal in the embodiments shown in fig. 2 to 6 described above.
Optionally, in an embodiment of the present application, the test terminal may further include: an input device 1203 and an output device 1204. The processor 1201, the memory 1202, the input device 1203, and the output device 1204 may be connected by a bus or otherwise, for example in fig. 12.
Further, in an embodiment of the present application, the test terminal further includes a display 1205, where the display 1205 is configured to display the content verification result received from the server, and receive the audit result sent by the audit personnel.
Fig. 13 is a block diagram of a server for implementing the authentication method of the applet provided in the embodiment of the present application. In embodiments of the present application, a server is intended to represent various forms of workstations, blade servers, mainframes, and other suitable computers, etc.
For example, as shown in fig. 13, the server may include: at least one processor 1301, a memory 1302 communicatively coupled to the at least one processor; the memory 1302 stores instructions executable by the at least one processor 1301, where the instructions are executed by the at least one processor 1301 to enable the at least one processor 1301 to execute the server arrangements in the embodiments shown in fig. 2-6 described above.
Optionally, in an embodiment of the present application, the server may further include: an input device 1303 and an output device 1304. The processor 1301, memory 1302, input device 1303, and output device 1304 may be connected by a bus or other means, for example in fig. 13.
It will be understood that the components shown in fig. 12 and 13, their connections and relationships, and their functions, described above are merely examples, and are not meant to limit implementations of the application described and/or claimed herein.
In the schematic diagrams shown in fig. 12 and 13 described above, the test terminal and the server may each include an interface for connecting the respective components, including a high-speed interface and a low-speed interface. The various components are interconnected using different buses and may be mounted on a common motherboard or in other manners as desired. The processor may process instructions executing within the test terminal and server, including instructions stored in or on memory to display graphical information of the GUI on an external input/output device, such as a display device coupled to the interface. In other embodiments, multiple processors and/or multiple buses may be used, if desired, along with multiple memories and multiple memories. Also, multiple electronic devices may be connected, each providing a portion of the necessary operations (e.g., as a server array, a set of blade servers, or a multiprocessor system).
The memory is a non-transitory computer readable storage medium provided by the present application, as shown in the schematic diagrams of fig. 12 and 13. Wherein the memory stores instructions executable by the at least one processor to cause the at least one processor to perform the method of validating the applet provided by the present application. The non-transitory computer readable storage medium of the present application stores computer instructions for causing a computer to execute the authentication method of the applet provided by the present application.
The memory is used as a non-transitory computer readable storage medium for storing non-transitory software programs, non-transitory computer executable programs, and modules, such as program instructions/modules corresponding to the method of verifying the applet in the embodiments of the application. The processor executes various functional applications of the server and data processing by running non-transitory software programs, instructions, and modules stored in the memory, i.e., implements the method of verifying the applet in the method embodiments described above.
The memory may include a memory program area and a memory data area, wherein the memory program area may store an operating system, at least one application program required for a function; the storage data area may store data created from the use of the authenticated electronic device of the applet, and the like. In addition, the memory may include high-speed random access memory, and may also include non-transitory memory, such as at least one magnetic disk storage device, flash memory device, or other non-transitory solid-state storage device. In some embodiments, the memory optionally includes memory remotely located with respect to the processor, which may be connected to the applet's verified test terminal and/or server via a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The input device may receive entered numeric or character information and generate key signal inputs related to user settings and function control of the electronic device for verification of the applet, such as a touch screen, keypad, mouse, trackpad, touchpad, pointer stick, one or more mouse buttons, trackball, joystick, and like input devices. The output means may include a display device, auxiliary lighting means (e.g., LEDs), tactile feedback means (e.g., vibration motors), and the like. The display device may include, but is not limited to, a Liquid Crystal Display (LCD), a Light Emitting Diode (LED) display, and a plasma display. In some implementations, the display device may be a touch screen.
Various implementations of the systems and techniques described here can be realized in digital electronic circuitry, integrated circuitry, application specific ASIC (application specific integrated circuit), computer hardware, firmware, software, and/or combinations thereof. These various embodiments may include: implemented in one or more computer programs, the one or more computer programs may be executed and/or interpreted on a programmable system including at least one programmable processor, which may be a special purpose or general-purpose programmable processor, that may receive data and instructions from, and transmit data and instructions to, a storage system, at least one input device, and at least one output device.
These computing programs (also referred to as programs, software applications, or code) include machine instructions for a programmable processor, and may be implemented in a high-level procedural and/or object-oriented programming language, and/or in assembly/machine language. As used herein, the terms "machine-readable medium" and "computer-readable medium" refer to any computer program product, apparatus, and/or device (e.g., magnetic discs, optical disks, memory, programmable Logic Devices (PLDs)) used to provide machine instructions and/or data to a programmable processor, including a machine-readable medium that receives machine instructions as a machine-readable signal. The term "machine-readable signal" refers to any signal used to provide machine instructions and/or data to a programmable processor.
To provide for interaction with a user, the systems and techniques described here can be implemented on a computer having: a display device (e.g., a CRT (cathode ray tube) or LCD (liquid crystal display) monitor) for displaying information to a user; and a keyboard and pointing device (e.g., a mouse or trackball) by which a user can provide input to the computer. Other kinds of devices may also be used to provide for interaction with a user; for example, feedback provided to the user may be any form of sensory feedback (e.g., visual feedback, auditory feedback, or tactile feedback); and input from the user may be received in any form, including acoustic input, speech input, or tactile input.
The systems and techniques described here can be implemented in a computing system that includes a background component (e.g., as a data server), or that includes a middleware component (e.g., an application server), or that includes a front-end component (e.g., a user computer having a graphical user interface or a web browser through which a user can interact with an implementation of the systems and techniques described here), or any combination of such background, middleware, or front-end components. The components of the system can be interconnected by any form or medium of digital data communication (e.g., a communication network). Examples of communication networks include: local Area Networks (LANs), wide Area Networks (WANs), and the internet.
The computer system may include clients (terminals) and servers. The client and server are typically remote from each other and typically interact through a communication network. The relationship of client and server arises by virtue of computer programs running on the respective computers and having a client-server relationship to each other.
Further, an embodiment of the present application further provides an applet verification method, including:
Acquiring a page snapshot of the target applet;
and carrying out validity verification on the page snapshot of the target applet, and determining whether the target applet passes the verification.
Alternatively, the execution body of the method may be an electronic device, and the electronic device integrates the functions of the test terminal and the server, so that the technical scheme may be executed. According to the technical scheme of the embodiment of the application, the validity of the page snapshot of the target applet is verified by acquiring the page snapshot of the target applet, so that whether the target applet passes the verification can be determined. According to the method, verification is not needed manually, verification efficiency is improved, and the page snapshot is obtained based on the real running environment of the applet, so that all pages can be covered, and verification accuracy is improved.
According to an embodiment of the present application, there is also provided a computer program product comprising: a computer program stored in a readable storage medium, from which the computer program can be read by at least one processor of the test terminal, the at least one processor executing the computer program causing the test terminal to execute the solution of the test terminal in any of the method embodiments described above.
According to an embodiment of the present application, there is also provided a computer program product comprising: computer program stored in a readable storage medium, from which the computer program can be read by at least one processor of a server, the at least one processor executing the computer program causing the server to perform the solution of the server in any of the method embodiments described above.
It should be appreciated that various forms of the flows shown above may be used to reorder, add, or delete steps. For example, the steps described in the present application may be performed in parallel, sequentially, or in a different order, so long as the desired results of the technical solution disclosed in the present application can be achieved, and are not limited herein.
The above embodiments do not limit the scope of the present application. It will be apparent to those skilled in the art that various modifications, combinations, sub-combinations and alternatives are possible, depending on design requirements and other factors. Any modifications, equivalent substitutions and improvements made within the spirit and principles of the present application should be included in the scope of the present application.

Claims (21)

1. An applet verification method, characterized in that it is applied to a test terminal, comprising:
Acquiring page display information of a target applet page, wherein the page display information comprises: the system comprises a page snapshot, a page identifier and a page storage path, wherein the page storage path has a mapping relation with page contents of a target applet page, and the page snapshot covers all pages of the target applet;
sending a content auditing request to a server, and receiving a content verification response fed back by the server, wherein the content auditing request comprises: the page presentation information of the target applet page, the content verification response comprising: the page snapshot is used for verifying the validity of the page content through a verification model to obtain the content verification result, the page identifier and the page storage path are used for generating the content verification response, and the verification model is a model which is trained in advance and is used for verifying whether the applet content is legal or not;
determining whether the target applet passes verification according to the content verification response;
the obtaining page display information of the target applet page comprises the following steps:
acquiring user operation behaviors of a target applet, wherein the user operation behaviors comprise browsing behaviors of the target applet;
Determining a page display event of the target applet according to the user operation behavior, wherein the page display event is used for representing that the page of the target applet is displayed;
and acquiring page display information of the target applet according to the page display event.
2. The method of claim 1, wherein the obtaining page presentation information of the target applet page comprises:
acquiring a script of a target applet;
triggering a page display event of the target applet by running the script, wherein the page display event is used for representing that the page of the target applet is displayed;
and acquiring page display information of the target applet according to the page display event.
3. The method of claim 2, wherein the target applet is an applet to be published.
4. The method of claim 1, wherein the target applet is an online running applet.
5. The method according to any one of claims 2-4, wherein the obtaining the page presentation information of the target applet according to the page presentation event comprises:
Acquiring a page storage path and page contents of each page when the page is displayed according to the page display event;
determining the mapping relation between the page storage path and the page content of each page;
and carrying out snapshot processing on page contents corresponding to each page to obtain page snapshots corresponding to each page of the target applet.
6. The method of any of claims 1-4, wherein said determining whether the target applet is authenticated based on the content authentication response comprises:
displaying the content verification result of the target applet page;
receiving an auditing result sent by an auditing person according to the content verification result of each page;
and determining whether the target applet passes verification according to the auditing result.
7. The method according to any one of claims 1-4, further comprising:
if the target applet fails verification, determining that the operation authority of the target applet is in a closed state, and pushing the content verification response to an applet development platform, wherein the applet development platform is equipment for developing and modifying the target applet.
8. An applet authentication method, applied to a server, comprising:
receiving a content auditing request sent by a test terminal, wherein the content auditing request comprises: page presentation information of a target applet page, the page presentation information comprising: the system comprises a page snapshot, a page identifier and a page storage path, wherein the page storage path has a mapping relation with page contents of a target applet page, the page snapshot covers all pages of the target applet, page display information of the target applet page is acquired according to page display events of the target applet, the page display events of the target applet are determined according to acquired user operation behaviors of the target applet, the page display events are used for representing that the page of the target applet is displayed, and the user operation behaviors comprise browsing behaviors of the target applet;
verifying the validity of the page content of the target applet page according to the page snapshot of the target applet page to obtain a content verification result of the target applet page;
generating a content verification response according to the content verification result, the page identification and the page storage path of each page, and feeding back the content verification response to the test terminal, wherein the content verification response is used for determining whether the target applet passes verification;
The verifying the validity of the page snapshot of the target applet page according to the page snapshot of the target applet page to obtain a content verification result of the target applet page comprises the following steps:
and inputting the page snapshot of each page of the target applet into a verification model, and outputting the content verification result of each page, wherein the verification model is based on a pre-trained model for verifying whether the applet content is legal or not.
9. An applet verification apparatus, comprising: the device comprises an acquisition module, a receiving and transmitting module and a determining module;
the acquisition module is used for acquiring page display information of a target applet page, wherein the page display information comprises: the system comprises a page snapshot, a page identifier and a page storage path, wherein the page storage path has a mapping relation with page contents of a target applet page, and the page snapshot covers all pages of the target applet;
the receiving and transmitting module is configured to send a content auditing request to a server, and receive a content verification response fed back by the server, where the content auditing request includes: the page presentation information of the target applet page, the content verification response comprising: the page snapshot is used for verifying the validity of the page content through a verification model to obtain the content verification result, the page identifier and the page storage path are used for generating the content verification response, and the verification model is a model which is trained in advance and is used for verifying whether the applet content is legal or not;
The determining module is used for determining whether the target applet passes verification according to the content verification response;
the acquisition module comprises: an acquisition unit and a determination unit;
the acquisition unit is used for acquiring user operation behaviors of the target applet, wherein the user operation behaviors comprise browsing behaviors of the target applet;
the determining unit is used for determining a page display event of the target applet according to the user operation behavior, wherein the page display event is used for representing that the page of the target applet is displayed;
the acquisition unit is further used for acquiring the page display information of the target applet according to the page display event.
10. The apparatus of claim 9, wherein the acquisition module comprises: an acquisition unit and a trigger unit;
the acquisition unit is used for acquiring the script of the target applet;
the triggering unit is used for triggering a page showing event of the target applet by running the script, wherein the page showing event is used for representing that the page of the target applet is shown;
the acquisition unit is further used for acquiring the page display information of the target applet according to the page display event.
11. The apparatus of claim 10, wherein the target applet is an applet to be published.
12. The apparatus of claim 9, wherein the target applet is an online running applet.
13. The apparatus according to any one of claims 10-12, wherein the obtaining unit is configured to obtain, according to the page presentation event, page presentation information of the target applet, specifically:
the acquiring unit is specifically configured to acquire a page storage path and page content of each page when the page is displayed according to the page display event, determine a mapping relationship between the page storage path and the page content of each page, and perform snapshot processing on the page content corresponding to each page, so as to obtain a page snapshot corresponding to each page of the target applet.
14. The apparatus according to any one of claims 9-12, wherein the determining module comprises: the display unit, the receiving unit and the determining unit;
the display unit is used for displaying the content verification result of the target applet page;
the receiving unit is used for receiving auditing results sent by auditing personnel according to the content verification results of each page;
And the determining unit is used for determining whether the target applet passes verification according to the auditing result.
15. The apparatus according to any one of claims 9-12, wherein the determining module is further configured to determine that the running authority of the target applet is in a closed state;
the receiving and transmitting module is further used for pushing the content verification response to an applet development platform, wherein the applet development platform is equipment for developing and modifying the target applet.
16. An applet verification apparatus, comprising: the device comprises a receiving and transmitting module, a verification module and a generation module;
the receiving and transmitting module is used for receiving a content auditing request sent by the test terminal, and the content auditing request comprises: page presentation information of a target applet page, the page presentation information comprising: the system comprises a page snapshot, a page identifier and a page storage path, wherein the page storage path has a mapping relation with page contents of a target applet page, the page snapshot covers all pages of the target applet, page display information of the target applet page is acquired according to page display events of the target applet, the page display events of the target applet are determined according to acquired user operation behaviors of the target applet, the page display events are used for representing that the page of the target applet is displayed, and the user operation behaviors comprise browsing behaviors of the target applet;
The verification module is used for verifying the validity of the page content of the target applet page according to the page snapshot of the target applet page to obtain a content verification result of the target applet page;
the generation module is used for generating a content verification response according to the content verification result, the page identification and the page storage path of each page;
the receiving and transmitting module is further used for feeding back the content verification response to the test terminal, wherein the content verification response is used for determining whether the target applet passes verification;
the verification module is specifically configured to input a page snapshot of each page of the target applet into a verification model, and output a content verification result of each page, where the verification model is based on a model trained in advance and used to verify whether the applet content is legal.
17. A test terminal, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of any one of claims 1-7.
18. A server, comprising:
at least one processor; and
a memory communicatively coupled to the at least one processor; wherein,,
the memory stores instructions executable by the at least one processor to enable the at least one processor to perform the method of claim 8.
19. A non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the method of any one of claims 1-7.
20. A non-transitory computer readable storage medium storing computer instructions for causing the computer to perform the method of claim 8.
21. A method of validating an applet, comprising:
the method comprises the steps that a test terminal obtains page display information of a target applet page, wherein the page display information comprises the following steps: the system comprises a page snapshot, a page identifier and a page storage path, wherein the page storage path has a mapping relation with page contents of a target applet page, and the page snapshot covers all pages of the target applet;
The test terminal sends a content auditing request to a server, wherein the content auditing request comprises: page presentation information of the target applet page;
the server receives a content auditing request sent by the test terminal, the server inputs a page snapshot of each page of the target applet into a verification model, and outputs a content verification result of each page, wherein the verification model is a model which is trained in advance and is used for verifying whether the applet content is legal or not; generating a content verification response according to the content verification result, the page identification and the page storage path of each page, and feeding back the content verification response to the test terminal, wherein the content verification response comprises: the content verification result of the target applet page;
and the test terminal receives the content verification response fed back by the server and determines whether the target applet passes verification according to the content verification response.
CN202010419000.0A 2020-05-18 2020-05-18 Method, device, equipment and storage medium for verifying applet Active CN111597113B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010419000.0A CN111597113B (en) 2020-05-18 2020-05-18 Method, device, equipment and storage medium for verifying applet

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010419000.0A CN111597113B (en) 2020-05-18 2020-05-18 Method, device, equipment and storage medium for verifying applet

Publications (2)

Publication Number Publication Date
CN111597113A CN111597113A (en) 2020-08-28
CN111597113B true CN111597113B (en) 2023-08-15

Family

ID=72187328

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010419000.0A Active CN111597113B (en) 2020-05-18 2020-05-18 Method, device, equipment and storage medium for verifying applet

Country Status (1)

Country Link
CN (1) CN111597113B (en)

Families Citing this family (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112333239B (en) * 2020-10-10 2023-07-18 百度(中国)有限公司 Business audit notification method, gateway, electronic equipment and readable medium
EP4009611A4 (en) * 2020-10-10 2022-09-14 Baidu (China) Co., Ltd. Service auditing notification method, gateway, electronic device, and readable medium
CN112860566B (en) * 2021-03-02 2024-04-30 百度在线网络技术(北京)有限公司 Applet detection method, device, electronic equipment and readable medium
CN113326506B (en) * 2021-05-28 2024-05-28 深圳前海微众银行股份有限公司 Applet monitoring method and device
CN113760762B (en) * 2021-09-08 2024-03-08 贝壳找房(北京)科技有限公司 Method for simulating operating environment of applet, electronic device and storage medium
CN113836494A (en) * 2021-09-13 2021-12-24 支付宝(杭州)信息技术有限公司 Method, device, equipment and medium for auditing small program
CN113885967B (en) * 2021-10-22 2024-02-13 北京字跳网络技术有限公司 Method, device, equipment and medium for starting applet
CN114020992B (en) * 2021-11-09 2022-10-14 北京百度网讯科技有限公司 Page blocking method, device, system, client and storage medium
CN114003412A (en) * 2021-12-27 2022-02-01 支付宝(杭州)信息技术有限公司 Method and device for communicating small program and host program
CN117278514A (en) * 2022-06-15 2023-12-22 华为技术有限公司 Communication method, device and system
CN115203748B (en) * 2022-09-14 2022-12-13 北京锘崴信息科技有限公司 Financial privacy information auditing method and device based on information credibility verification

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103544213A (en) * 2013-09-16 2014-01-29 青岛英网资讯股份有限公司 Network content upgrading detection assessment method and system
CN106919821A (en) * 2015-12-25 2017-07-04 阿里巴巴集团控股有限公司 User authentication method and device
CN107977293A (en) * 2016-10-21 2018-05-01 英业达科技有限公司 Monitoring programme generation system and its production method
CN108932279A (en) * 2018-04-28 2018-12-04 华为技术有限公司 A kind of application page processing method and processing device
CN108959068A (en) * 2018-06-04 2018-12-07 广州视源电子科技股份有限公司 Software interface testing method, device and storage medium
CN110390198A (en) * 2019-07-31 2019-10-29 阿里巴巴集团控股有限公司 Risk method for inspecting, device and the electronic equipment of a kind of pair of small routine
CN110674025A (en) * 2018-07-03 2020-01-10 百度在线网络技术(北京)有限公司 Interactive behavior monitoring method and device and computer equipment

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US10740221B2 (en) * 2018-10-15 2020-08-11 Sap Se Scalable AI framework for test automation

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103544213A (en) * 2013-09-16 2014-01-29 青岛英网资讯股份有限公司 Network content upgrading detection assessment method and system
CN106919821A (en) * 2015-12-25 2017-07-04 阿里巴巴集团控股有限公司 User authentication method and device
CN107977293A (en) * 2016-10-21 2018-05-01 英业达科技有限公司 Monitoring programme generation system and its production method
CN108932279A (en) * 2018-04-28 2018-12-04 华为技术有限公司 A kind of application page processing method and processing device
CN108959068A (en) * 2018-06-04 2018-12-07 广州视源电子科技股份有限公司 Software interface testing method, device and storage medium
CN110674025A (en) * 2018-07-03 2020-01-10 百度在线网络技术(北京)有限公司 Interactive behavior monitoring method and device and computer equipment
CN110390198A (en) * 2019-07-31 2019-10-29 阿里巴巴集团控股有限公司 Risk method for inspecting, device and the electronic equipment of a kind of pair of small routine

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
"Criminal motivation on the dark web: A categorisation model for law enforcement";Janis Dalins;《Digital Investigation》;第24卷;第62-71页 *

Also Published As

Publication number Publication date
CN111597113A (en) 2020-08-28

Similar Documents

Publication Publication Date Title
CN111597113B (en) Method, device, equipment and storage medium for verifying applet
CN111597114B (en) Method, device, equipment and storage medium for verifying applet
EP3647981B1 (en) Security scanning method and apparatus for mini program, and electronic device
US9977904B2 (en) Systems and methods for automated detection of application vulnerabilities
US9720799B1 (en) Validating applications using object level hierarchy analysis
JP2018139106A (en) Cloud connected automatic testing
CN108228228B (en) Application software publishing method and device
US11824900B2 (en) Artificial intelligence security configuration engine
US11237948B2 (en) Rendering engine component abstraction system
CN112527252A (en) Applet management method and device, applet platform, electronic device and medium
CN111654495B (en) Method, apparatus, device and storage medium for determining traffic generation source
GB2511329A (en) Web service black box testing
CN112035282A (en) API management method, device, equipment and storage medium applied to cloud platform
Jiang et al. Pandora: A cyber range environment for the safe testing and deployment of autonomous cyber attack tools
US12015502B2 (en) Artificial intelligence integration of third-party software into large-scale digital platforms
CN112346947A (en) Performance detection method and device, electronic equipment and computer readable medium
CN111488580A (en) Potential safety hazard detection method and device, electronic equipment and computer readable medium
CN114697079B (en) Method and system for detecting illegal user of application client
CN111427770B (en) Resource testing method and related equipment
Wu et al. Crafting intents to detect icc vulnerabilities of android apps
Rughani Detecting blacklisted ip access from android phone
Nanayakkara et al. Software for IT project quality management
CN116861418B (en) Penetration test method, device, equipment and storage medium for 32-bit Windows sandbox
KR102326608B1 (en) Apparaus and method for checking mobile application based on robotic process automation
US20240330454A1 (en) File analysis engines for identifying security-related threats

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant