CN111767481A - Access processing method, device, equipment and storage medium - Google Patents

Access processing method, device, equipment and storage medium Download PDF

Info

Publication number
CN111767481A
CN111767481A CN201911060622.2A CN201911060622A CN111767481A CN 111767481 A CN111767481 A CN 111767481A CN 201911060622 A CN201911060622 A CN 201911060622A CN 111767481 A CN111767481 A CN 111767481A
Authority
CN
China
Prior art keywords
link
accessed
access
target
target short
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911060622.2A
Other languages
Chinese (zh)
Other versions
CN111767481B (en
Inventor
曾文杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Original Assignee
Beijing Jingdong Century Trading Co Ltd
Beijing Jingdong Shangke Information Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Jingdong Century Trading Co Ltd, Beijing Jingdong Shangke Information Technology Co Ltd filed Critical Beijing Jingdong Century Trading Co Ltd
Priority to CN201911060622.2A priority Critical patent/CN111767481B/en
Publication of CN111767481A publication Critical patent/CN111767481A/en
Application granted granted Critical
Publication of CN111767481B publication Critical patent/CN111767481B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9558Details of hyperlinks; Management of linked annotations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K17/00Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations
    • G06K17/0022Methods or arrangements for effecting co-operative working between equipments covered by two or more of main groups G06K1/00 - G06K15/00, e.g. automatic card files incorporating conveying and reading operations arrangements or provisious for transferring data to distant stations, e.g. from a sensing device

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Data Mining & Analysis (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
  • Information Transfer Between Computers (AREA)

Abstract

The embodiment of the invention provides an access processing method, an access processing device, access processing equipment and a storage medium, wherein the method comprises the following steps: responding to an access request of a target short link, and determining an item identifier corresponding to the target short link; and determining a target access link corresponding to the target short link from a plurality of links to be accessed corresponding to the item identification. According to the technical scheme of the embodiment of the invention, when the current link to be accessed corresponding to the target short link fails, the link to be accessed next can be automatically switched to, so that the page pointed by the target short link can be automatically updated.

Description

Access processing method, device, equipment and storage medium
Technical Field
The present invention relates to the field of computer technologies, and in particular, to an access processing method, apparatus, device, and storage medium.
Background
With the development of internet technology, more and more enterprises or merchants conduct marketing activities through the internet, and how to conveniently market goods or services through the internet becomes a focus of attention.
In one solution, goods or services are promoted by links, such as text links or two-dimensional code links, to pages of the goods or services, such as by sharing links to pages of the target goods across various websites, forums, or applications.
However, in this solution, since a fixed link is used, when the link is to be pointed to another page, only the shared link can be updated manually, which makes it difficult to automatically update the page pointed to by the link.
Disclosure of Invention
Embodiments of the present invention provide an access processing method, an access processing apparatus, a device, and a storage medium, which are used to solve the problem that it is difficult to automatically update a page pointed by a link due to a fixed link.
A first aspect of an embodiment of the present invention provides an access processing method, including: in response to an access request for a target short link, determining an item identifier corresponding to the target short link; and determining a target access link corresponding to the target short link from a plurality of links to be accessed corresponding to the item identification.
In some embodiments of the present invention, based on the above scheme, the determining, from among a plurality of links to be accessed corresponding to the item identifier, a target access link corresponding to the target short link includes: sequentially acquiring each link to be accessed, and judging whether the access frequency of the acquired current link to be accessed is greater than or equal to a preset access frequency; if the access times of the current link to be accessed are larger than or equal to the preset access times, marking the link state of the current link to be accessed as a failure state; and if the access times of the current link to be accessed are less than the preset access times, taking the current link to be accessed as the target access link corresponding to the target short link.
In some embodiments of the present invention, based on the above scheme, the determining, from among a plurality of links to be accessed corresponding to the item identifier, a target access link corresponding to the target short link includes: sequentially acquiring each link to be accessed, and judging whether the survival time of the acquired current link to be accessed is greater than or equal to a corresponding preset survival threshold, wherein each link to be accessed in the plurality of links to be accessed is provided with the preset survival threshold; if the survival time of the link to be accessed currently is greater than or equal to the corresponding preset survival threshold, marking the link state of the link to be accessed currently as a failure state; and if the survival time of the current link to be accessed is less than the corresponding preset survival threshold, taking the current link to be accessed as the target access link corresponding to the target short link.
In some embodiments of the present invention, based on the above scheme, the method further includes: determining a target link table corresponding to the target short link based on the item identifier, wherein a plurality of links corresponding to the target short link are stored in the target link table; and determining the plurality of links to be accessed based on the link states of the links in the target link table, wherein the link states comprise effective states and ineffective states.
In some embodiments of the present invention, based on the above scheme, the method further includes: and recording the address of the source page for accessing the target short link and the corresponding network address of the source in an access log table.
In some embodiments of the present invention, based on the above scheme, the method further includes: acquiring the access log table corresponding to the item identifier in a preset time period; determining a total access amount to the target short link based on the number of log records in the access log table; and determining the independent passenger volume of the target short link based on each source network address in the access log table.
In some embodiments of the present invention, based on the above scheme, the method further includes: acquiring the access log table corresponding to the item identifier in a preset time period; counting the access times from each source page address based on the access log table; and determining the access amount of each source page address to the target short link based on the statistical result.
In some embodiments of the present invention, based on the above scheme, the method further includes: acquiring the creation time of the link to be accessed; determining whether the survival time of the link to be accessed is greater than a preset survival threshold value according to the creation time; and if the current value is greater than the preset survival threshold value, sending alarm information.
In some embodiments of the present invention, based on the above scheme, the method further includes: acquiring the item identifier of a target item, domain name information of a target domain name and a short link interface corresponding to the target short link; and binding the item identifier, the domain name information and the short link interface to generate the target short link.
In some embodiments of the present invention, based on the above scheme, the target short link is a uniform resource locator and the link to be accessed is a two-dimensional code to be accessed, or the target short link is a short link two-dimensional code and the link to be accessed is a uniform resource locator.
According to a second aspect of the embodiments of the present invention, there is provided an access processing apparatus including: the identification determining module is used for responding to an access request of a target short link and determining an item identification corresponding to the target short link; and the link determining module is used for determining a target access link corresponding to the target short link from a plurality of links to be accessed corresponding to the item identification.
In some embodiments of the present invention, based on the above scheme, the link determining module includes: the first judgment unit is used for sequentially acquiring each link to be accessed and judging whether the access frequency of the acquired current link to be accessed is greater than or equal to a preset access frequency; the first marking unit is used for marking the link state of the current link to be accessed as a failure state if the access frequency of the current link to be accessed is greater than or equal to the preset access frequency; and the first determining unit is used for taking the current link to be accessed as the target access link corresponding to the target short link if the access frequency of the current link to be accessed is less than the preset access frequency.
In some embodiments of the present invention, based on the above scheme, the link determining module includes: a second determining unit, configured to sequentially obtain each link to be accessed, and determine whether a survival time of the obtained current link to be accessed is greater than or equal to a corresponding predetermined survival threshold, where each link to be accessed in the multiple links to be accessed is provided with its own predetermined survival threshold; a second marking unit, configured to mark the link state of the current link to be accessed as a failure state if the survival time of the current link to be accessed is greater than or equal to the corresponding predetermined survival threshold; and a second determining unit, configured to, if the survival time of the current link to be accessed is less than the corresponding predetermined survival threshold, use the current link to be accessed as the target access link corresponding to the target short link.
In some embodiments of the present invention, based on the above scheme, the apparatus further includes: a link table determining module, configured to determine, based on the item identifier, a target link table corresponding to the target short link, where the target link table stores multiple links corresponding to the target short link; and the link to be accessed determining module is used for determining the plurality of links to be accessed based on the link states of all the links in the target link table, wherein the link states comprise effective states and invalid states.
In some embodiments of the present invention, based on the above scheme, the apparatus further includes: and the log recording module is used for recording the source page address and the corresponding source network address of the target short link in an access log table.
In some embodiments of the present invention, based on the above scheme, the apparatus further includes: the first log list acquisition module is used for acquiring the access log list corresponding to the item identifier in a preset time period; a total access amount determining module, configured to determine a total access amount to the target short link based on the number of log records in the access log table; and the independent visitor volume determining module is used for determining the independent visitor volume of the target short link based on each source network address in the access log table.
In some embodiments of the present invention, based on the above scheme, the apparatus further includes: the second log table acquisition module is used for acquiring the access log table corresponding to the item identifier in a preset time period; the access times counting module is used for counting the access times from the source page addresses based on the access log table; and the visit quantity determining module is used for determining the visit quantity of each source page address to the target short link based on the statistical result.
In some embodiments of the present invention, based on the above scheme, the apparatus further includes: the creation time acquisition module is used for acquiring the creation time of the link to be accessed; the time judgment module is used for determining whether the survival time of the link to be accessed is greater than a preset survival threshold value according to the creation time; and the alarm module is used for sending alarm information if the preset survival threshold value is larger than the preset survival threshold value.
In some embodiments of the present invention, based on the above scheme, the apparatus further includes: the data acquisition module is used for acquiring the item identifier of the target item, the domain name information of the target domain name and a short link interface corresponding to the target short link; and the target short link generation module is used for binding the item identifier, the domain name information and the short link interface to generate the target short link.
In some embodiments of the present invention, based on the above scheme, the target short link is a uniform resource locator and the link to be accessed is a two-dimensional code to be accessed, or the target short link is a short link two-dimensional code and the link to be accessed is a uniform resource locator.
A third aspect of an embodiment of the present invention provides an access processing apparatus, including: a receiver, a processor, a memory, and a transmitter; the memory is used for storing computer programs and data, and the processor calls the computer programs stored in the memory to execute the access processing method provided by any embodiment of the first aspect.
A fourth aspect of the present invention provides a computer-readable storage medium including a computer program, which, when executed by a processor, is configured to perform the access processing method provided in any one of the embodiments of the first aspect.
According to the access processing method, the access processing device, the access processing equipment and the storage medium, the corresponding item identification is obtained from the access request of the target short link, and the target access link corresponding to the target short link is determined from the multiple links to be accessed corresponding to the item identification. On one hand, by setting corresponding item identifiers in the target short links, the target short links can be associated with a plurality of links to be accessed through the item identifiers; on the other hand, the target access link corresponding to the target short link is determined from the multiple links to be accessed corresponding to the project identification, and the link to be accessed can be automatically switched to the next link to be accessed when the current link to be accessed is invalid, so that the page pointed by the target short link can be automatically updated.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
Fig. 1 is a schematic diagram of an application scenario of an access processing method provided in accordance with some embodiments of the present invention;
FIG. 2 is a schematic flow diagram of an access processing method provided in accordance with some embodiments of the invention;
FIG. 3 is a flow chart illustrating statistics of access sources of target short links according to some embodiments of the invention;
FIG. 4 is a flow diagram illustrating a method for access processing according to further embodiments of the present invention;
FIG. 5 is a schematic block diagram of an access processing apparatus provided in accordance with some embodiments of the present invention;
FIG. 6 is a schematic block diagram of a link determination module provided in accordance with some embodiments of the present invention;
fig. 7 is a schematic block diagram of embodiments of an access processing device provided in accordance with some embodiments of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are some, but not all, embodiments of the present invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
The following explains terms and the like referred to in this document:
linking: also called a hyperlink, refers to a connection relationship that points from an object to an object, which may be text, a picture, a web page, etc.
Short chaining: the long website is converted into a short website character string by compression or encryption operation and the like.
URL (Uniform Resource Locator): is a string of characters on the network that is used to describe the information resource.
Short-chain two-dimensional code: and generating the two-dimensional code through short links.
Total access pv (page view): i.e., page views or clicks, are used to measure the total visits of a website or web page.
Independent passenger capacity uv (unique viewer): refers to the number of people visiting a site or clicking on a different IP address of a web page.
Fig. 1 is a schematic diagram of an application scenario of an access processing method according to some embodiments of the present invention. Referring to fig. 1, the application scenario includes at least one client 110 and a server 120. The client terminal 110 and the server terminal 120 communicate with each other through a network 130. After the user clicks the target short link displayed on the website, forum or application page on the client 110, the client 110 sends an access request for the target short link to the server 120, where the access request includes the item identifier of the target marketing item. After receiving the access request, the server 120 extracts the item identifier from the access request, and determines a target access link corresponding to the target short link from a plurality of links to be accessed corresponding to the item identifier.
The client 110 may be a mobile phone, a tablet computer, a desktop computer, a portable notebook computer, or a vehicle-mounted computer. The server 120 may be a physical server comprising independent hosts, or a virtual server hosted by a cluster of hosts, or a cloud server. The Network 130 may be a wired Network or a wireless Network, for example, the Network 130 may be a Public Switched Telephone Network (PSTN) or the internet.
An access processing method according to an exemplary embodiment of the present invention is described below with reference to the accompanying drawings in conjunction with the application scenario of fig. 1. It should be noted that the above application scenarios are merely illustrative for the convenience of understanding the spirit and principles of the present invention, and the embodiments of the present invention are not limited in this respect. Rather, embodiments of the present invention may be applied to any scenario where applicable.
Fig. 2 is a flow diagram of an access processing method according to some embodiments of the invention. The access processing method includes steps S210 and S220, and may be applied to the server 120 shown in fig. 1. The access processing method is described in detail below with reference to the accompanying drawings by taking the application of the access processing method to the server 120 as an example.
Referring to fig. 2, in step S210, in response to an access request for a target short link, an item identifier corresponding to the target short link is determined.
In an example embodiment, the target short link is a short link for accessing a marketing page or a promotion page of the target item, for example, if the promotion page of the target item is a target goods page or a target service page, the target short link may be a short link corresponding to the target goods page or the target service page. Further, the target short link includes an item identifier of the target item.
In some embodiments, the target short link is a URL of the target page or interface, the URL has a mapping relationship or a corresponding relationship with the two-dimensional code pictures set at the server side 120, and the target short link includes an item identifier of the target promotion item. When the user clicks the target short link on the client terminal 110, the client terminal 110 sends an access request for the target short link to the server terminal 120.
In other embodiments, the target short link is a short link two-dimensional code, the short link two-dimensional code has a mapping relationship or a corresponding relationship with a plurality of links set at the server 120, and the target short link includes an item identifier of the target promotion item. When the user scans the short link two-dimensional code through the client 110, the client 110 sends an access request for the target short link to the server 120.
Further, after receiving the access request of the client 110 for the target short link, the server 120, in response to the access request, extracts the item identifier corresponding to the target short link from the access request, for example, may extract the item identifier corresponding to the target short link from the access request through a regular expression.
In step S220, a target access link corresponding to the target short link is determined from the plurality of links to be accessed corresponding to the item identifier.
In an example embodiment, a plurality of links to be accessed corresponding to the item identifier are set at the server side 120, a corresponding predetermined number of accesses or a predetermined survival threshold value are set for the plurality of links to be accessed, and a target access link corresponding to the target short link is determined from the plurality of links to be accessed according to the number of accesses or the survival time of each link to be accessed.
For example, in some embodiments, the links to be accessed are sequentially obtained, for example, according to an ID (Identity) of each link to be accessed, and it is determined whether the number of access times of the obtained current link to be accessed is greater than or equal to a predetermined number of access times; if the access times of the current link to be accessed are more than or equal to the preset access times, marking the link state of the current link to be accessed as a failure state; and if the access times of the current link to be accessed are less than the preset access times, taking the current link to be accessed as a target access link corresponding to the target short link.
In other embodiments, the links to be accessed are sequentially acquired according to the ID sequence of each link to be accessed, and whether the survival time of the acquired current link to be accessed is greater than or equal to the corresponding predetermined survival threshold is determined, where each link to be accessed in the plurality of links to be accessed is provided with its respective predetermined survival threshold, for example, the corresponding predetermined survival threshold is set according to the promotion cost or promotion object of each link to be accessed; if the survival time of the link to be accessed currently is greater than or equal to the corresponding preset survival threshold, marking the link state of the link to be accessed currently as a failure state; and if the survival time of the current link to be accessed is less than the corresponding preset survival threshold, taking the current link to be accessed as a target access link corresponding to the target short link.
According to the access processing method in the example embodiment of fig. 2, on one hand, by setting a corresponding item identifier in the target short link, the target short link can be associated with a plurality of links to be accessed through the item identifier; on the other hand, the target access link corresponding to the target short link is determined from the multiple links to be accessed corresponding to the project identification, and the link to be accessed can be automatically switched to the next link to be accessed when the current link to be accessed is invalid, so that the page pointed by the target short link can be automatically updated.
In addition, in an example embodiment, a target link table is set in the database of the server 120, the target link table stores a plurality of links corresponding to the target short links, the target link table includes an item identification field, the target link table corresponding to the item identification may be determined by querying the item identification field, and the plurality of links in the determined target link table are used as a plurality of links to be accessed corresponding to the item identification.
Further, in some embodiments, the target link table further stores link states of the respective links, where the link states include an active state and a failure state, and the links in the active state in the plurality of links are used as the plurality of links to be accessed corresponding to the target item identifier. The following table 1 shows a target link table in an example embodiment, in the example embodiment of table 1, a link to be accessed is a two-dimensional code picture, where a Project _ id field identifies a target item, that is, a short link item, to which the target link table belongs, a Filepath field indicates a storage path of a standby two-dimensional code picture, and a finish _ flag field indicates whether the two-dimensional code picture has failed.
TABLE 1 target Link Table
Figure BDA0002257836420000081
Figure BDA0002257836420000091
Further, in an example embodiment, when a target item, i.e., a short link item, is created, item information of the target item is stored in a short link item table, and an item ID of the target item is obtained to be, for example, $ ID. Table 2 below shows a Short link entry table in an example embodiment, in the example embodiment of table 2, the link to be accessed is a two-dimensional code, where the Short _ link field is a target Short link, the Change _ number field is a predetermined access number, and the alarm _ time field is a predetermined survival threshold, where, for example, if the two-dimensional code is restricted to be failed after being accessed 100 times, the Change _ number is configured to be a number of 98 or less, so that a user is prevented from entering access during the calculation process, and thus the failed two-dimensional code is accessed.
TABLE 2 short Link Entries Table
Figure BDA0002257836420000092
Figure BDA0002257836420000101
Further, to prevent the target short link from being masked or sealed, the short link is bound to the target domain name. Therefore, in an example embodiment, an item identifier of a target item, domain name information of a target domain name, and a short link interface corresponding to a target short link are obtained; and binding the item identification, the domain name information and the short link interface to generate the target short link. For example, let us say that a domain name, e.g., x.com, of an enterprise or a merchant promoting the target item, where the short link interface is shortcode. And generating a target short link, such as http:// x.com/abcefg, based on the bound link, and updating the target short link field to a short link item table.
Fig. 3 is a flow chart illustrating statistics on access sources of target short links according to some embodiments of the present invention.
In step S310, an access log table corresponding to the item identification of the target item for a predetermined period of time is acquired.
In an exemplary embodiment, an access log table corresponding to each target item is set in the database of the server 120, and a source page address of the access target short link and a corresponding source network address are recorded in the access log table, for example, the source network address is an IP (Internet Protocol) address of the client 110. When the access sources of the target short links corresponding to the target items need to be counted, an access log table corresponding to the item identifiers of the target items is acquired within a preset time period, for example, 1 day. Further, each time the user accesses the target short link through the client 110, an access log record is generated in the access log table, and each access log record includes a source page address of the access target short link and a corresponding source network address. Table 3 below shows an access log table in an exemplary embodiment, where a From _ refer field indicates a source page address of an access request, a From _ IP field indicates a source IP address of the access request, a Pic _ ID field indicates an ID of a spare two-dimensional code picture, and a Project _ ID field indicates an item ID of a short link item to which the access log table belongs.
TABLE 3 Access Log Table
Figure BDA0002257836420000102
Figure BDA0002257836420000111
In step S320, a total access amount to the target short link is determined based on the number of log records in the access log table.
In an example embodiment, a summation operation is performed on the number of log records in the acquired access log table, and the total access amount PV (Page View) of the target short link in the predetermined time period is determined. For example, all log records in the access log table in the predetermined time period are obtained, the obtained log records are represented by an array variable ListArr, that is, each item in the array represents one log record, and the array variable ListArr is traversed, for example, by making PV equal to count (ListArr), and a count function is used to count the number of data in the array variable, so that the total access amount PV of the predetermined time period to the target short link can be obtained.
In step S330, an independent visitor volume to the target short link is determined based on each source network address in the access log table.
In an example embodiment, a summation operation is performed on the number of the source network addresses, i.e., the IP addresses, in the acquired access log table, and an independent Visitor volume, i.e., UV (independent Visitor volume), of the target short link in the predetermined time period is determined. For example, all log records in the access log table in the predetermined period of time are acquired, the acquired log records are represented by an array variable ListArr, that is, each item in the array represents one log record, the array variable ListArr is traversed, a source network address, that is, From _ IP, in the currently traversed log record is extracted From the array variable by a regular expression, the number of total source network addresses is counted by a source statistics array userrar, for example, the number of source network addresses [ From _ IP ] is 1, that is, the same IP is counted only once, after the traversal is completed, the number of source network addresses stored in the userrar variable is used as an independent passenger access volume for the target short link, for example, the number of UV may be set to count (userrar), and then the independent passenger volume for the target short link in the predetermined period of time can be obtained.
Further, in order to facilitate evaluation of the delivery effect of the target short links delivered to each channel, in an example embodiment, an access log table corresponding to the item identifier is acquired for a predetermined time period; counting the access times of the addresses from all source pages based on the access log table; and determining the access amount of each source page address to the target short link based on the statistical result. The delivery effect of each source page can be evaluated through the visit volume of each source page, for example, the greater the visit volume of a certain source page is, the better the delivery effect of the source page is represented.
For example, in an example embodiment, the source page address, that is, From _ refer, in the currently traversed log record is extracted From the array variable ListArr through a regular expression, the source page address is stored in a variable host, the number of each source page address is counted through a source statistics array refarr, for example, let refarr [ host ] +1, that is, the same source page be counted multiple times, and after the traversal is completed, the number of each source page address stored in the refarr variable is used as the access amount of each source page address to the target short link.
Further, in order to more intuitively express the statistical result of the access amount of each source page, the obtained access amount of each source page address is displayed by a pie chart, and for example, if the access amount of the source address aa.com is 2, the access amount of the source address bb.com is 4, and the access amount of the source is 5, the access amount ratio of the source address aa.com is 22.22%, the access amount ratio of the source address bb.com is 44.44%, and the access amount ratio of the source address cc.com is 33.33%.
Fig. 4 is a flowchart illustrating an access processing method according to another embodiment of the present invention.
Referring to fig. 4, in step S410, an item ID accessed by the user is acquired.
In an example embodiment, when receiving an access request for a target short link sent by the client 110, the server 120 extracts an item identifier corresponding to the target short link from the access request.
Next, in step S415, a predetermined number of accesses to automatically switch the two-dimensional code picture is determined from the short link item table.
In an example embodiment, a value of a Change _ number field, which is a predetermined number of accesses corresponding to an item identification, is queried from a short linked item table according to the item identification.
In step S420, initialization processing is performed such that, for example, a variable getflag indicating whether or not the two-dimensional code picture is obtained is set to false, and a variable getPic indicating that the obtained two-dimensional code picture is stored is set to null.
In step S425, all unreliated two-dimensional code pictures corresponding to the item identifier are determined, and the determined two-dimensional code pictures are sorted according to the picture ID.
In an example embodiment, a corresponding target link table is determined according to the item identifier, unreenabled two-dimensional code pictures are determined according to the link states of the two-dimensional code pictures in the target link table, and sorting is performed according to the IDs of the unreenabled two-dimensional code pictures in the target link table.
In step S430, traversing the sorted two-dimensional codes, and determining whether the traversing is finished, if so, performing step S460; if the traversal is not finished, proceed to step S435.
In step S435, the access amount of the traversed current two-dimensional code is determined, for example, the access log amount of the current two-dimensional code is queried from the log access table.
In step S440, it is determined whether the access amount of the current two-dimensional code is greater than or equal to a predetermined access number Change _ num, and if so, the process proceeds to step S455; if the number of accesses is less than the predetermined number of accesses, the process proceeds to step S445.
In step S445, the current two-dimensional code is used as a corresponding target two-dimensional code, that is, a getPic variable is assigned to a value of a Filepath field in a target link table, which is a picture storage path of the current two-dimensional code, and the getFlag variable is set to true.
In step S450, the access of this time is recorded in the access log table, and then it is determined that the traversal is ended.
In step S455, the link status of the current two-dimensional code picture is marked as a failure status.
In step S460, determining whether the two-dimensional code picture is acquired, for example, determining a value of a variable getFlag, and if the value of the variable getFlag is true, determining that the two-dimensional code picture is acquired, and proceeding to step S465; if the value of the variable getFlag is false, it is determined that the two-dimensional code picture is not acquired, and the process proceeds to step S470.
In step S465, a path along which the two-dimensional code picture is acquired, for example, the two-dimensional code picture is acquired from the getPic variable is displayed, and the two-dimensional code picture acquired from the path is displayed.
In step S470, alarm information is issued.
In addition, in the example embodiment, the short link item table and the target link table are scanned by an asynchronous program such as an asynchronous listening thread, whether the survival time of each link in the target link table such as a two-dimensional code exceeds a preset survival threshold value or not is determined, and if the survival time exceeds the preset survival threshold value, alarm information is sent out.
Fig. 5 is a schematic block diagram of an access processing apparatus provided in accordance with some embodiments of the present invention. Referring to fig. 5, the access processing apparatus 500 includes an identification determination module 510 and a link determination module 520. The identification determining module 510 is configured to determine, in response to an access request for a target short link, an item identification corresponding to the target short link; a link determining module 520, configured to determine a target access link corresponding to the target short link from the multiple links to be accessed corresponding to the item identifier
In some embodiments of the present invention, based on the above scheme, referring to fig. 6, the link determining module 520 includes: a first determining unit 610, configured to sequentially obtain each link to be accessed, and determine whether the access frequency of the obtained current link to be accessed is greater than or equal to a predetermined access frequency; a first marking unit 620, configured to mark the link state of the current link to be accessed as an invalid state if the access frequency of the current link to be accessed is greater than or equal to the predetermined access frequency; a first determining unit 630, configured to, if the access frequency of the current link to be accessed is less than the predetermined access frequency, use the current link to be accessed as the target access link corresponding to the target short link.
In some embodiments of the present invention, based on the above scheme, the link determining module includes: a second determining unit, configured to sequentially obtain each link to be accessed, and determine whether a survival time of the obtained current link to be accessed is greater than or equal to a corresponding predetermined survival threshold, where each link to be accessed in the multiple links to be accessed is provided with its own predetermined survival threshold; a second marking unit, configured to mark the link state of the current link to be accessed as a failure state if the survival time of the current link to be accessed is greater than or equal to the corresponding predetermined survival threshold; and a second determining unit, configured to, if the survival time of the current link to be accessed is less than the corresponding predetermined survival threshold, use the current link to be accessed as the target access link corresponding to the target short link.
In some embodiments of the present invention, based on the above scheme, the apparatus further includes: a link table determining module, configured to determine, based on the item identifier, a target link table corresponding to the target short link, where the target link table stores multiple links corresponding to the target short link; and the link to be accessed determining module is used for determining the plurality of links to be accessed based on the link states of all the links in the target link table, wherein the link states comprise effective states and invalid states.
In some embodiments of the present invention, based on the above scheme, the apparatus further includes: and the log recording module is used for recording the source page address and the corresponding source network address of the target short link in an access log table.
In some embodiments of the present invention, based on the above scheme, the apparatus further includes: the first log list acquisition module is used for acquiring the access log list corresponding to the item identifier in a preset time period; a total access amount determining module, configured to determine a total access amount to the target short link based on the number of log records in the access log table; and the independent visitor volume determining module is used for determining the independent visitor volume of the target short link based on each source network address in the access log table.
In some embodiments of the present invention, based on the above scheme, the apparatus further includes: the second log table acquisition module is used for acquiring the access log table corresponding to the item identifier in a preset time period; the access times counting module is used for counting the access times from the source page addresses based on the access log table; and the visit quantity determining module is used for determining the visit quantity of each source page address to the target short link based on the statistical result.
In some embodiments of the present invention, based on the above scheme, the apparatus further includes: the creation time acquisition module is used for acquiring the creation time of the link to be accessed; the time judgment module is used for determining whether the survival time of the link to be accessed is greater than a preset survival threshold value according to the creation time; and the alarm module is used for sending alarm information if the preset survival threshold value is larger than the preset survival threshold value.
In some embodiments of the present invention, based on the above scheme, the apparatus further includes: the data acquisition module is used for acquiring the item identifier of the target item, the domain name information of the target domain name and a short link interface corresponding to the target short link; and the target short link generation module is used for binding the item identifier, the domain name information and the short link interface to generate the target short link.
In some embodiments of the present invention, based on the above scheme, the target short link is a uniform resource locator and the link to be accessed is a two-dimensional code to be accessed, or the target short link is a short link two-dimensional code and the link to be accessed is a uniform resource locator.
According to the access processing apparatus in the example embodiment of fig. 5, on one hand, by setting a corresponding item identifier in the target short link, the target short link can be associated with a plurality of links to be accessed through the item identifier; on the other hand, the target access link corresponding to the target short link is determined from the multiple links to be accessed corresponding to the project identification, and the link to be accessed can be automatically switched to the next link to be accessed when the current link to be accessed is invalid, so that the page pointed by the target short link can be automatically updated.
The access processing device provided by the embodiment of the application can implement each process in the foregoing method embodiments, and achieve the same functions and effects, which are not repeated here.
Fig. 7 is a schematic structural diagram of a first embodiment of an access processing device according to some embodiments of the present invention, and as shown in fig. 7, an access processing device 700 provided in this embodiment may include: a receiver 710, a memory 720, a processor 730, and a transmitter 740.
Optionally, the access processing device may further include a bus. Wherein, the bus is used for realizing the connection between each element.
The memory is used for storing computer programs and data, and the processor calls the computer programs stored in the memory to execute the technical scheme of the access processing method provided by any one of the method embodiments.
Wherein the memory and the processor are electrically connected, directly or indirectly, to enable transmission or interaction of data. For example, the components may be electrically connected to each other via one or more communication buses or signal lines, such as a bus. The memory stores computer-executable instructions for implementing the data access control method, including at least one software functional module which can be stored in the memory 201 in the form of software or firmware, and the processor executes various functional applications and data processing by running the computer programs and modules stored in the memory.
The Memory may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Read-Only Memory (EEPROM), and the like. The memory is used for storing programs, and the processor executes the programs after receiving the execution instructions. Further, the software programs and modules within the aforementioned memories may also include an operating system, which may include various software components and/or drivers for managing system tasks (e.g., memory management, storage device control, power management, etc.), and may communicate with various hardware or software components to provide an operating environment for other software components.
The processor may be an integrated circuit chip having signal processing capabilities. The processor may be a general-purpose processor, and includes a Central Processing Unit (CPU), a Network Processor (NP), and the like. The various methods, steps and logic blocks disclosed in the embodiments of the present invention may be implemented or performed. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like. It will be appreciated that the configuration of fig. 7 is merely illustrative and may include more or fewer components than shown in fig. 7 or have a different configuration than shown in fig. 7. The components shown in fig. 7 may be implemented in hardware and/or software.
The embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, can implement the access processing method provided in any of the above method embodiments.
The computer-readable storage medium in this embodiment may be any available medium that can be accessed by a computer or a data storage device such as a server, a data center, etc. that is integrated with one or more available media, and the available media may be magnetic media (e.g., floppy disks, hard disks, magnetic tapes), optical media (e.g., DVDs), or semiconductor media (e.g., SSDs), etc.
Those of ordinary skill in the art will understand that: all or a portion of the steps of implementing the above-described method embodiments may be performed by hardware associated with program instructions. The program may be stored in a computer-readable storage medium. When executed, the program performs steps comprising the method embodiments described above; and the aforementioned storage medium includes: various media that can store program codes, such as ROM, RAM, magnetic or optical disks.
Finally, it should be noted that: the above embodiments are only used to illustrate the technical solution of the present invention, and not to limit the same; while the invention has been described in detail and with reference to the foregoing embodiments, it will be understood by those skilled in the art that: the technical solutions described in the foregoing embodiments may still be modified, or some or all of the technical features may be equivalently replaced; and the modifications or the substitutions do not make the essence of the corresponding technical solutions depart from the scope of the technical solutions of the embodiments of the present invention.

Claims (13)

1. An access processing method, comprising:
in response to an access request for a target short link, determining an item identifier corresponding to the target short link;
and determining a target access link corresponding to the target short link from a plurality of links to be accessed corresponding to the item identification.
2. The method according to claim 1, wherein the determining a target access link corresponding to the target short link from a plurality of links to be accessed corresponding to the item identifier comprises:
sequentially acquiring each link to be accessed, and judging whether the access frequency of the acquired current link to be accessed is greater than or equal to a preset access frequency;
if the access times of the current link to be accessed are larger than or equal to the preset access times, marking the link state of the current link to be accessed as a failure state;
and if the access times of the current link to be accessed are less than the preset access times, taking the current link to be accessed as the target access link corresponding to the target short link.
3. The method according to claim 1, wherein the determining a target access link corresponding to the target short link from a plurality of links to be accessed corresponding to the item identifier comprises:
sequentially acquiring each link to be accessed, and judging whether the survival time of the acquired current link to be accessed is greater than or equal to a corresponding preset survival threshold, wherein each link to be accessed in the plurality of links to be accessed is provided with the preset survival threshold;
if the survival time of the link to be accessed currently is greater than or equal to the corresponding preset survival threshold, marking the link state of the link to be accessed currently as a failure state;
and if the survival time of the current link to be accessed is less than the corresponding preset survival threshold, taking the current link to be accessed as the target access link corresponding to the target short link.
4. The method of claim 1, further comprising:
determining a target link table corresponding to the target short link based on the item identifier, wherein a plurality of links corresponding to the target short link are stored in the target link table;
and determining the plurality of links to be accessed based on the link states of the links in the target link table, wherein the link states comprise effective states and ineffective states.
5. The method of claim 1, further comprising:
and recording the address of the source page for accessing the target short link and the corresponding network address of the source in an access log table.
6. The method of claim 5, further comprising:
acquiring the access log table corresponding to the item identifier in a preset time period;
determining a total access amount to the target short link based on the number of log records in the access log table;
and determining the independent passenger volume of the target short link based on each source network address in the access log table.
7. The method of claim 5, further comprising:
acquiring the access log table corresponding to the item identifier in a preset time period;
counting the access times from each source page address based on the access log table;
and determining the access amount of each source page address to the target short link based on the statistical result.
8. The method of claim 1, further comprising:
acquiring the creation time of the link to be accessed;
determining whether the survival time of the link to be accessed is greater than a preset survival threshold value according to the creation time;
and if the current value is greater than the preset survival threshold value, sending alarm information.
9. The method of claim 1, further comprising:
acquiring the item identifier of a target item, domain name information of a target domain name and a short link interface corresponding to the target short link;
and binding the item identifier, the domain name information and the short link interface to generate the target short link.
10. The method according to any one of claims 1 to 9, wherein the target short link is a uniform resource locator and the link to be accessed is a two-dimensional code to be accessed, or the target short link is a short-link two-dimensional code and the link to be accessed is a uniform resource locator.
11. An access processing apparatus, comprising:
the identification determining module is used for responding to an access request of a target short link and determining an item identification corresponding to the target short link;
and the link determining module is used for determining a target access link corresponding to the target short link from a plurality of links to be accessed corresponding to the item identification.
12. An access processing device, comprising:
a receiver, a processor, a memory, and a transmitter;
the memory is used for storing a computer program and data, and the processor calls the computer program stored in the memory to execute the access processing method of any one of claims 1 to 10.
13. A computer-readable storage medium, characterized in that the computer-readable storage medium comprises a computer program which, when being executed by a processor, is adapted to carry out the access processing method of any one of claims 1 to 10.
CN201911060622.2A 2019-11-01 2019-11-01 Access processing method, device, equipment and storage medium Active CN111767481B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911060622.2A CN111767481B (en) 2019-11-01 2019-11-01 Access processing method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911060622.2A CN111767481B (en) 2019-11-01 2019-11-01 Access processing method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN111767481A true CN111767481A (en) 2020-10-13
CN111767481B CN111767481B (en) 2024-02-06

Family

ID=72718439

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911060622.2A Active CN111767481B (en) 2019-11-01 2019-11-01 Access processing method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN111767481B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113886338A (en) * 2021-12-07 2022-01-04 天津联想协同科技有限公司 Method, device and storage medium for reverse tracing of outer link
CN115208890A (en) * 2022-06-09 2022-10-18 北京达佳互联信息技术有限公司 Information acquisition method and device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050125285A1 (en) * 2003-12-04 2005-06-09 International Business Machines Corporation Method, system, and storage medium for providing deep linking functions with digital rights management
CN104680114A (en) * 2015-03-03 2015-06-03 黄伟军 Method for processing multiple requests via two-dimension code and system thereof
CN106528569A (en) * 2015-09-11 2017-03-22 北京国双科技有限公司 Method and device for calculating validity of site search
CN106933871A (en) * 2015-12-30 2017-07-07 阿里巴巴集团控股有限公司 Short linking processing method, device and short linked server
CN107679888A (en) * 2017-09-07 2018-02-09 深圳市买买提乐购金融服务有限公司 Marketing effectiveness appraisal procedure, server and computer-readable recording medium
CN109918586A (en) * 2019-01-21 2019-06-21 广东万丈金数信息技术股份有限公司 Short link jump method, device, short linked server and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20050125285A1 (en) * 2003-12-04 2005-06-09 International Business Machines Corporation Method, system, and storage medium for providing deep linking functions with digital rights management
CN104680114A (en) * 2015-03-03 2015-06-03 黄伟军 Method for processing multiple requests via two-dimension code and system thereof
CN106528569A (en) * 2015-09-11 2017-03-22 北京国双科技有限公司 Method and device for calculating validity of site search
CN106933871A (en) * 2015-12-30 2017-07-07 阿里巴巴集团控股有限公司 Short linking processing method, device and short linked server
CN107679888A (en) * 2017-09-07 2018-02-09 深圳市买买提乐购金融服务有限公司 Marketing effectiveness appraisal procedure, server and computer-readable recording medium
CN109918586A (en) * 2019-01-21 2019-06-21 广东万丈金数信息技术股份有限公司 Short link jump method, device, short linked server and storage medium

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN113886338A (en) * 2021-12-07 2022-01-04 天津联想协同科技有限公司 Method, device and storage medium for reverse tracing of outer link
CN113886338B (en) * 2021-12-07 2022-03-15 天津联想协同科技有限公司 Method, device and storage medium for reverse tracing of outer link
CN115208890A (en) * 2022-06-09 2022-10-18 北京达佳互联信息技术有限公司 Information acquisition method and device, electronic equipment and storage medium
CN115208890B (en) * 2022-06-09 2024-04-30 北京达佳互联信息技术有限公司 Information acquisition method and device, electronic equipment and storage medium

Also Published As

Publication number Publication date
CN111767481B (en) 2024-02-06

Similar Documents

Publication Publication Date Title
CN108427705B (en) Electronic device, distributed system log query method and storage medium
CN111198976B (en) Cloud asset association analysis system, method, electronic equipment and medium
CN109167840B (en) Task pushing method, node autonomous server and edge cache server
CN106534268B (en) Data sharing method and device
CN107239701B (en) Method and device for identifying malicious website
CN111885216B (en) DNS query method, device, equipment and storage medium
US20170289243A1 (en) Domain name resolution method and electronic device
CN111752770A (en) Service request processing method, system, computer device and storage medium
CN114095567A (en) Data access request processing method and device, computer equipment and medium
CN111767481B (en) Access processing method, device, equipment and storage medium
CN108154024B (en) Data retrieval method and device and electronic equipment
CN113900907A (en) Mapping construction method and system
CN105491172B (en) It is a kind of for determining the method and apparatus of the information of home location of network address
CN109391658B (en) Account data synchronization method and equipment, storage medium and terminal thereof
CN108600255B (en) Mock service management method, device, computer equipment and storage medium
CN111212153A (en) IP address checking method, device, terminal equipment and storage medium
CN107332856B (en) Address information detection method and device, storage medium and electronic device
CN116028696A (en) Resource information acquisition method and device, electronic equipment and storage medium
CN114185804A (en) Interface testing method and device and terminal equipment
CN107203915B (en) Data storage method and device
CN115795100A (en) User event processing method and device, electronic equipment and readable storage medium
CN113434069A (en) Menu configuration method, device, equipment and storage medium
CN108667769B (en) Domain name tracing method and device
CN104951449B (en) Data processing method and device
CN112261134B (en) Network data access auditing method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant