CN111639316B - Information processing method and device for WEB page - Google Patents
Information processing method and device for WEB page Download PDFInfo
- Publication number
- CN111639316B CN111639316B CN202010424496.0A CN202010424496A CN111639316B CN 111639316 B CN111639316 B CN 111639316B CN 202010424496 A CN202010424496 A CN 202010424496A CN 111639316 B CN111639316 B CN 111639316B
- Authority
- CN
- China
- Prior art keywords
- web page
- authentication
- specified
- monitoring
- mouse click
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/083—Network architectures or network communication protocols for network security for authentication of entities using passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- User Interface Of Digital Computer (AREA)
Abstract
The invention discloses an information processing method of a WEB page, which comprises the following steps that after the loading of the WEB page is finished: monitoring a mouse click event on the WEB page; when a mouse click event is monitored and a mouse click element is a designated element on the WEB page, recording an object of the designated element, and suspending the execution of an event queue of the designated element; monitoring the pop-up of an authentication window; when the authentication is monitored to pass and the authentication window is deleted, acquiring the recorded object; and according to the acquired object, restoring the execution of the event queue of the specified element.
Description
Technical Field
The present invention relates to information processing technologies, and in particular, to an information processing method and apparatus for a WEB page.
Background
The existing WEB page login scheme has the following scene: when a user inputs a user name and a password on a login page and clicks a login button, an authentication window is popped up to prompt the user to perform secondary authentication so as to ensure the security of an account. After the second authentication is passed, the authentication window is deleted, and at this time, the user needs to click the login button of the login page again to be able to successfully login, so that the user needs to click the login button twice for one login, which causes poor user experience.
Disclosure of Invention
The invention provides a login method and a login device for a WEB page, which are used for simplifying the login operation of the WEB page and improving the user experience.
The invention provides an information processing method of a WEB page, which comprises the following steps after the loading of the WEB page is finished:
monitoring a mouse click event on the WEB page;
when a mouse click event is monitored and a mouse click element is a designated element on the WEB page, recording an object of the designated element, and suspending the execution of an event queue of the designated element;
monitoring the pop-up of an authentication window;
when the authentication is monitored to pass and the authentication window is deleted, acquiring the recorded object;
and according to the acquired object, restoring the execution of the event queue of the specified element.
Wherein, the WEB page comprises one or more specified elements;
the designated element is a button, a picture, a text box or a link.
If the WEB page includes a plurality of specified elements, when recording the objects of the specified elements, the method further includes:
and if the recorded object exists, deleting the recorded object.
When a mouse click event is monitored and the element clicked by the mouse is not the specified element, the method further comprises the following steps:
and returning to execute the operation of monitoring the mouse click event on the WEB page.
Wherein, when the authentication failure is monitored and the authentication window is deleted, the method further comprises:
and returning the WEB page or jumping to a specified WEB page.
Another aspect of the present invention provides an information processing apparatus for a WEB page, including:
the monitoring module is used for monitoring a mouse click event on the WEB page after the loading of the WEB page is finished;
the recording module is used for recording the object of the specified element and suspending the execution of the event queue of the specified element when the monitoring module monitors a mouse click event and the element clicked by the mouse is the specified element on the WEB page;
the monitoring module is also used for monitoring the popping-up of the authentication window, and monitoring that the authentication is passed and the authentication window is deleted;
the acquisition module is used for acquiring the recorded object when the monitoring module monitors that the authentication is passed and the authentication window is deleted;
and the restoring module restores the execution of the event queue of the specified element according to the acquired object.
Wherein, the WEB page comprises one or more specified elements;
the designated element is a button, a picture, a text box or a link.
If the WEB page includes a plurality of specified elements, the recording module is further configured to delete the recorded object if the recorded object exists when recording the object of the specified element.
The monitoring module is further configured to continue to execute the operation of the monitored mouse click event on the WEB page when the mouse click event is monitored and the element clicked by the mouse is not the designated element.
The restoring module is further configured to return the WEB page or jump to a specified WEB page when the monitoring module monitors that authentication fails and the authentication window is deleted.
According to the scheme, the elements, namely the objects, clicked by the mouse are recorded, so that the elements can be accurately found, and the logic corresponding to the elements is triggered, therefore, under a WEB page login scene containing secondary authentication, login can be realized through one-time login click, user operation is simplified, and user experience is improved; moreover, since the object is recorded, the element can be accurately found regardless of the service system and the configuration, and the corresponding logic is triggered, so that the universality is high.
Drawings
Fig. 1 is a schematic flow chart illustrating an information processing method for a WEB page according to an embodiment of the present invention;
fig. 2 is a schematic flow chart illustrating an information processing method for a WEB page according to a second embodiment of the present invention;
fig. 3 is a schematic flow chart illustrating an information processing method for a WEB page according to a third embodiment of the present invention;
fig. 4 is a schematic flow chart illustrating an information processing method for a WEB page according to a fourth embodiment of the present invention;
fig. 5 is a schematic structural diagram of an information processing apparatus for a WEB page according to an embodiment of the present invention.
Detailed Description
In order to make the objects, features and advantages of the present invention more obvious and understandable, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
At present, when a business system is used in many scenes, the system needs to be logged in after identity authentication, and a login scheme through a WEB page is generally adopted. The scheme generally adopts a mode of inputting a user name and a password on a login page for login, but once the password is leaked, the password is difficult to find, and in order to improve the security of an account, a secondary authentication function is generally added on the basis of the original user name and password authentication.
Generally, products and technologies that are secondarily authenticated by a third party interface with an existing business system. After the docking is finished, the performance of the WEB front end of the service system is as follows: after the user inputs the user name and the password on the login page, the user clicks a login button (page element) to submit a login request. And after the state judgment, the login request is intercepted, and the third-party product is triggered to pull up a secondary authentication page through a logic code injected into a front-end page of the service system, so that the user is prompted to carry out secondary authentication. After the second authentication is passed, the second authentication page disappears, the login page of the original service system is exposed, at this time, the user needs to click the login button of the original login page once again to submit the login request again, and when the login request is submitted again, the login request is not intercepted, but the original logic is executed to complete the login through state judgment.
In this scenario, after the user completes the secondary authentication, the current authentication page disappears, the user needs to click the login button submission button of the original login page again to complete the login, and from the perspective of user experience, one login needs to click the login button twice, which is poor in experience.
To address this problem, there is currently a solution: reading the front end code of the business system, finding the page element (such as a login button) through the ID, NAME and other labels of the page element, and simulating the click event through the ID, NAME and the like after the secondary authentication is passed to complete the login. In fact, there are many page elements without ID, NAME, etc. tags, in this case, the element needs to be found through its index, which requires special configuration personnel to go to the site for implementation, and the cost is very high. Alternatively, there may be a situation where a page element generates a different position in the page each time, and its tag (ID, NAME, etc.) will also be different, so that there is little possibility that the element is obtained through the tag and then the mouse click event is triggered through the element.
Therefore, the invention provides an information processing method of a WEB page, which can simplify login operation and improve user experience, is simple to implement and is suitable for various scenes.
After the WEB page is loaded, a front-end script may be inserted into the current WEB page to implement the process shown in fig. 1. The main functions realized by the script are as follows: monitoring a mouse click event occurring on the current WEB page, and inserting a new event monitoring and processing process in front of an original event queue triggered by a specified element on the current WEB page. This specified element is: when the designated element is clicked, the pop-up of the authentication window can be triggered. Note that the pop-up of the authentication window is not an event in the original event queue of the specified element.
As shown in fig. 1, after the WEB page is loaded, the method includes:
step 101, monitoring a mouse click event on the WEB page.
The WEB page elements of a mouse click event may include: buttons, pictures, text boxes, links, and the like.
Step 102, when a mouse click event is monitored and a mouse click element is a specified element on the WEB page, recording an object of the specified element, and suspending the execution of an event queue of the specified element.
When a user clicks a designated element on a WEB page, the front-end script can monitor the click event and record the WEB page element itself, i.e. an object. An object is a collection of data that uniquely describes a page element. Thus, page elements can be accurately found by the recorded object regardless of any scene, regardless of the change of the tag (ID, Name, etc.) of the element.
Step 103, monitoring that an authentication window pops up.
When the concerned appointed element is clicked, the authentication window can be triggered to pop up.
When other elements are clicked on the WEB page, an authentication window cannot pop up, and when the specified element is clicked, the authentication window can pop up, and the execution of the original event queue of the specified element is suspended. Taking the login scenario as an example: the designated element can be a login button, the login request is submitted after the login button is clicked, the login request is intercepted, an authentication window of a third party is triggered to pop up, and an original event queue (comprising events such as user name verification and password verification) associated with the login button is suspended. The authentication window can be in the form of a full-screen popup window or a small window.
And prompting the user to perform secondary authentication through the authentication window, and closing the authentication window, namely deleting the authentication window after the authentication is passed.
And 104, acquiring the recorded object when the authentication is passed and the authentication window is deleted.
And after monitoring that the authentication window pops up, continuing monitoring. When it is monitored that the authentication is passed and the authentication window is deleted, the object (i.e., the specified element) recorded in step 102 may be acquired.
And 105, restoring the execution of the event queue of the specified element according to the acquired object.
After the object (the designated element) is acquired, the execution of the original event queue associated with the object can be recovered.
In a login scene, an event queue (including events such as user name authentication, password authentication and the like) associated with a login button is continuously triggered, and the login can be completed after the user identity authentication is passed.
It should be noted that a plurality of the above specified elements may exist on a WEB page, and then, in step 102, when recording an object, it is preferable that an already recorded object is deleted (if an already recorded object exists), and only an object corresponding to a current mouse click event is recorded, as shown in step 102 of fig. 2′。
When the element clicked by the monitored mouse click event is not the specified element, the execution step 102 can be returned to, as shown in fig. 3; or return to step 102′As shown in fig. 4.
It should be noted that, in practical applications, there are situations of authentication failure and authentication window deletion; in the case that the authentication is not performed, the authentication window is closed, both cases are scenarios of authentication failure and authentication window deletion, and at this time, as shown in fig. 3 or fig. 4, when the authentication failure is monitored and the authentication window is deleted, step 106 is executed to return to the original WEB page or jump to the specified WEB page.
In the above scheme, the method of finding elements by objects is applicable to various scenarios, because the data set describing one element, i.e. the object, is unique regardless of the service system. When the scheme of the invention is applied to a WEB page login scene, the operation of clicking the login button by the user after secondary authentication can be omitted, the user experience is improved, and the login is completed as long as the secondary authentication is passed for the user. Under the scenes of WEB page audit, transfer and the like, as long as the secondary authentication is passed, the original audit process and the original transfer process can be continuously executed without clicking again by the user. In a word, based on the scheme of the invention, the operation of the user in the secondary authentication scene can be simplified, and the execution of the original service flow before the secondary authentication is ensured. Moreover, the method provided by the invention is simple to implement, the logic code corresponding to the method can be injected into the front end, the scheme has strong universality and no scene division, professional operation and maintenance personnel are not required to maintain a certain scene, and the method has high practicability.
The following describes the scheme of the present invention by taking a WEB page login scenario as an example.
1. And completing the loading of the login page.
2. And monitoring a mouse click A element, recording as a mouse click event 1, and continuing monitoring if the A element is not a specified element.
3. And monitoring the mouse click B element, recording as a mouse click event 2, and continuing monitoring if the B element is not the specified element.
4. Monitoring that a mouse clicks a C element, which is denoted as a mouse click event 3, and the C element is a specified element, recording an object of the C element, namely an object C (if there is an object of the specified element already recorded, the recorded object may be deleted), and at the same time, suspending execution of an original event queue of the element C. Clicking the element C by a mouse to trigger the popup of an authentication window (namely clicking a login button after a user inputs a user name and a password, submitting a login request, intercepting the login request and triggering a third-party product to popup the authentication window), acquiring the object C after monitoring that the authentication is successful and the authentication window is closed, and triggering the execution of an original event queue corresponding to the object C to finish the login; if the authentication is not successfully monitored and the authentication window is deleted, returning to the original login page or jumping to a specified page (such as a home page of a service system).
In order to implement the foregoing method, an embodiment of the present invention further provides an information processing apparatus for a WEB page, as shown in fig. 5, including:
the monitoring module 10 is configured to monitor a mouse click event on a WEB page after the WEB page is loaded;
the recording module 20 is configured to record an object of a specified element and suspend execution of an event queue of the specified element when the monitoring module monitors a mouse click event and the mouse click element is the specified element on the WEB page;
the monitoring module 10 is further configured to monitor the pop-up of the authentication window, and monitor that the authentication passes and the authentication window is deleted;
an obtaining module 30, configured to obtain the recorded object when the monitoring module monitors that the authentication is passed and the authentication window is deleted;
and the restoring module 40 restores the execution of the event queue of the specified element according to the acquired object.
The WEB page comprises one or more specified elements;
the designated element is a button, a picture, a text box or a link.
If the WEB page includes a plurality of specified elements, the recording module 20 is further configured to delete a recorded object if the recorded object exists when recording an object of the specified element.
The monitoring module 10 is further configured to continue to execute the operation of the monitored mouse click event on the WEB page when the mouse click event is monitored and the element clicked by the mouse is not the specified element.
The restoring module 40 is further configured to return to the WEB page or jump to a specified WEB page when the monitoring module monitors that the authentication fails and the authentication window is deleted.
In the description herein, references to the description of the term "one embodiment," "some embodiments," "an example," "a specific example," or "some examples," etc., mean that a particular feature, structure, material, or characteristic described in connection with the embodiment or example is included in at least one embodiment or example of the invention. Furthermore, the particular features, structures, materials, or characteristics described may be combined in any suitable manner in any one or more embodiments or examples. Furthermore, various embodiments or examples and features of different embodiments or examples described in this specification can be combined and combined by one skilled in the art without contradiction.
Furthermore, the terms "first", "second" and "first" are used for descriptive purposes only and are not to be construed as indicating or implying relative importance or implicitly indicating the number of technical features indicated. Thus, a feature defined as "first" or "second" may explicitly or implicitly include at least one such feature. In the description of the present invention, "a plurality" means two or more unless specifically defined otherwise.
The above description is only for the specific embodiments of the present invention, but the scope of the present invention is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present invention, and all the changes or substitutions should be covered within the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the appended claims.
Claims (10)
1. A method for processing information of a WEB page is characterized in that after the loading of the WEB page is completed, the method comprises the following steps:
monitoring a mouse click event on the WEB page;
when a mouse click event is monitored and a mouse click element is a designated element on the WEB page, recording an object of the designated element, and suspending the execution of an event queue of the designated element;
monitoring the pop-up of an authentication window;
when the authentication is monitored to pass and the authentication window is deleted, acquiring the recorded object;
and according to the acquired object, restoring the execution of the event queue of the specified element.
2. The information processing method for a WEB page according to claim 1, wherein the WEB page includes one or more specified elements;
the designated element is a button, a picture, a text box or a link.
3. The method for processing information on a WEB page according to claim 2, wherein if the WEB page includes a plurality of specified elements, and when the object of the specified element is recorded, the method further comprises:
and if the recorded object exists, deleting the recorded object.
4. The information processing method for the WEB page according to claim 2 or 3, wherein when a mouse click event is monitored and the mouse clicked element is not the specified element, the method further comprises:
and returning to execute the operation of monitoring the mouse click event on the WEB page.
5. The method for processing information on a WEB page according to claim 4, wherein when it is monitored that the authentication fails and the authentication window is deleted, the method further comprises:
and returning the WEB page or jumping to a specified WEB page.
6. An information processing apparatus for a WEB page, comprising:
the monitoring module is used for monitoring a mouse click event on the WEB page after the loading of the WEB page is finished;
the recording module is used for recording the object of the specified element and suspending the execution of the event queue of the specified element when the monitoring module monitors a mouse click event and the element clicked by the mouse is the specified element on the WEB page;
the monitoring module is also used for monitoring the popping-up of the authentication window, and monitoring that the authentication is passed and the authentication window is deleted;
the acquisition module is used for acquiring the recorded object when the monitoring module monitors that the authentication is passed and the authentication window is deleted;
and the restoring module restores the execution of the event queue of the specified element according to the acquired object.
7. The information processing apparatus for a WEB page according to claim 6,
the WEB page comprises one or more specified elements;
the designated element is a button, a picture, a text box or a link.
8. The information processing apparatus for a WEB page according to claim 7,
if the WEB page includes a plurality of specified elements, the recording module is further configured to delete the recorded object if the recorded object exists when recording the object of the specified element.
9. The information processing apparatus for a WEB page according to claim 7 or 8,
and the monitoring module is also used for continuously executing the operation of the mouse click event on the monitored WEB page when the mouse click event is monitored and the element clicked by the mouse is not the specified element.
10. The information processing apparatus for a WEB page according to claim 9,
and the restoration module is further used for returning to the WEB page or jumping to a specified WEB page when the monitoring module monitors that the authentication fails and the authentication window is deleted.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010424496.0A CN111639316B (en) | 2020-05-19 | 2020-05-19 | Information processing method and device for WEB page |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202010424496.0A CN111639316B (en) | 2020-05-19 | 2020-05-19 | Information processing method and device for WEB page |
Publications (2)
Publication Number | Publication Date |
---|---|
CN111639316A CN111639316A (en) | 2020-09-08 |
CN111639316B true CN111639316B (en) | 2021-04-06 |
Family
ID=72329638
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202010424496.0A Active CN111639316B (en) | 2020-05-19 | 2020-05-19 | Information processing method and device for WEB page |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN111639316B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112069476B (en) * | 2020-09-16 | 2022-07-12 | 杭州安恒信息技术股份有限公司 | Login state detection method, device, equipment and readable storage medium |
CN114153530A (en) * | 2022-02-08 | 2022-03-08 | 广州庚亿信息科技有限公司 | Element data information capturing method and device, storage medium and intelligent terminal |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102065063A (en) * | 2009-11-13 | 2011-05-18 | 富士通株式会社 | WEB authentication device, system and method |
CN108111486A (en) * | 2017-12-05 | 2018-06-01 | 北京天融信网络安全技术有限公司 | A kind of method and device for exempting from repeat logon |
CN108900561A (en) * | 2018-09-28 | 2018-11-27 | 北京芯盾时代科技有限公司 | The method, apparatus and system of single-sign-on |
Family Cites Families (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
EP2017766B1 (en) * | 2007-07-17 | 2014-01-22 | Sap Ag | Authentication enforcement at resource level |
CN103139204A (en) * | 2012-12-19 | 2013-06-05 | 姚爱军 | Network identifying code method and system |
US9628459B2 (en) * | 2014-03-18 | 2017-04-18 | Ca, Inc. | Secure data transmission using multi-channel communication |
CN108197445A (en) * | 2016-10-11 | 2018-06-22 | 新疆信息产业有限责任公司 | Computer user's identity recognition device and application method |
CN107528858B (en) * | 2017-09-29 | 2021-04-06 | 广州视睿电子科技有限公司 | Login method, device and equipment based on webpage and storage medium |
CN108733559B (en) * | 2018-04-09 | 2023-03-28 | 平安普惠企业管理有限公司 | Page event triggering method, terminal equipment and medium |
-
2020
- 2020-05-19 CN CN202010424496.0A patent/CN111639316B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102065063A (en) * | 2009-11-13 | 2011-05-18 | 富士通株式会社 | WEB authentication device, system and method |
CN108111486A (en) * | 2017-12-05 | 2018-06-01 | 北京天融信网络安全技术有限公司 | A kind of method and device for exempting from repeat logon |
CN108900561A (en) * | 2018-09-28 | 2018-11-27 | 北京芯盾时代科技有限公司 | The method, apparatus and system of single-sign-on |
Also Published As
Publication number | Publication date |
---|---|
CN111639316A (en) | 2020-09-08 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9608881B2 (en) | Service compliance enforcement using user activity monitoring and work request verification | |
JP5753350B2 (en) | Method and computer program for enhancing screen capture function for form manipulation | |
US9703624B2 (en) | Event correlation and calculation engine | |
US20070277061A1 (en) | System, Method, Computer Program Product And Article Of Manufacture For Remote Fault Diagnosis And Correction In A Computer System | |
CN111552633A (en) | Interface abnormal call testing method and device, computer equipment and storage medium | |
CN111639316B (en) | Information processing method and device for WEB page | |
US20080134214A1 (en) | Method for tracking an event through multiple module-specific files | |
US11803355B2 (en) | Bot factory environment | |
CN105354498A (en) | Operation method of registry, related device and equipment | |
CN109284331B (en) | Certificate making information acquisition method based on service data resources, terminal equipment and medium | |
CN113254320A (en) | Method and device for recording user webpage operation behaviors | |
US10360089B2 (en) | System for monitoring a plurality of distributed devices | |
US11188449B2 (en) | Automated exception resolution during a software development session based on previous exception encounters | |
CN113326539B (en) | Method, device and system for private data leakage detection aiming at applet | |
Vaz et al. | MIRES: Intrusion recovery for applications based on backend-as-a-service | |
CN113051095B (en) | Method and device for reproducing operation errors of client, electronic equipment and storage medium | |
CN106897063B (en) | Method and system for permanently adding OS boot entry to BIOS based on EFI | |
CN109376553A (en) | The verification method and system of website background picture resource integrity | |
CN111786991B (en) | Block chain-based platform authentication login method and related device | |
CN115809390A (en) | User feedback method and device, equipment and medium thereof | |
Kalaki et al. | Anomaly detection on OpenStack logs based on an improved robust principal component analysis model and its projection onto column space | |
CN115774581A (en) | Method and related apparatus for executing robot feet | |
CN110221952B (en) | Service data processing method and device and service data processing system | |
CN113467941A (en) | Method and device for sharing information | |
WO2020047736A1 (en) | Method and system for verifying integrity of website backend picture resource |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |