CN112084440A - Data verification method and device, electronic equipment and computer readable medium - Google Patents

Data verification method and device, electronic equipment and computer readable medium Download PDF

Info

Publication number
CN112084440A
CN112084440A CN202010955352.8A CN202010955352A CN112084440A CN 112084440 A CN112084440 A CN 112084440A CN 202010955352 A CN202010955352 A CN 202010955352A CN 112084440 A CN112084440 A CN 112084440A
Authority
CN
China
Prior art keywords
uniform resource
resource locator
target
initial
matching
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202010955352.8A
Other languages
Chinese (zh)
Other versions
CN112084440B (en
Inventor
巩秋铭
张婕
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Youzhuju Network Technology Co Ltd
Original Assignee
Beijing Youzhuju Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Youzhuju Network Technology Co Ltd filed Critical Beijing Youzhuju Network Technology Co Ltd
Priority to CN202010955352.8A priority Critical patent/CN112084440B/en
Publication of CN112084440A publication Critical patent/CN112084440A/en
Application granted granted Critical
Publication of CN112084440B publication Critical patent/CN112084440B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3003Monitoring arrangements specially adapted to the computing system or computing system component being monitored
    • G06F11/302Monitoring arrangements specially adapted to the computing system or computing system component being monitored where the computing system component is a software system
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F18/00Pattern recognition
    • G06F18/20Analysing
    • G06F18/22Matching criteria, e.g. proximity measures

Abstract

The embodiment of the disclosure discloses a data verification method, a data verification device, electronic equipment and a computer readable medium. One embodiment of the method comprises: acquiring an operation log; selecting at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data; acquiring at least one target uniform resource locator corresponding to the operation event; by which the result of the above-mentioned target data after transmission can be determined. And matching the at least one initial uniform resource locator with the at least one target uniform resource locator, and generating verification information according to a matching result. Whether the information of the target data is lost in the transmission process can be determined through the verification information, and the accuracy and the effectiveness of data transmission are improved.

Description

Data verification method and device, electronic equipment and computer readable medium
Technical Field
The embodiment of the disclosure relates to the technical field of computers, in particular to a data verification method, a data verification device, electronic equipment and a computer readable medium.
Background
With the development of computer networks and the popularity of big data in people's lives, more and more interactive data and streaming information are to be processed by computer servers. In the process of interactive data and streaming information processing, data cannot be well monitored, and the problems of data loss and the like in the data transmission process are difficult to find, so that the accuracy and the effectiveness of data transmission are not high.
Disclosure of Invention
This summary is provided to introduce a selection of concepts in a simplified form that are further described below in the detailed description. This summary is not intended to identify key features or essential features of the claimed subject matter, nor is it intended to be used to limit the scope of the claimed subject matter.
Some embodiments of the present disclosure propose data verification methods, apparatuses, electronic devices, and computer readable media to solve the technical problems mentioned in the background section above.
In a first aspect, some embodiments of the present disclosure provide a data verification method, including: acquiring an operation log, wherein the operation log comprises operation events corresponding to target data on a client; selecting at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data, wherein the initial uniform resource locator corresponds to an operation event in the operation log; acquiring at least one target uniform resource locator corresponding to the operation event, wherein the target uniform resource locator is a uniform resource locator which is received by a server and corresponds to the operation event; and matching the at least one initial uniform resource locator with the at least one target uniform resource locator, and generating verification information according to a matching result.
In a second aspect, some embodiments of the present disclosure provide a data verification apparatus, including: the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is configured to acquire an operation log which contains operation events corresponding to target data on a client; a selecting unit configured to select at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data, where the initial uniform resource locator corresponds to an operation event in the operation log; a second obtaining unit, configured to obtain at least one target uniform resource locator corresponding to the operation event, where the target uniform resource locator is a uniform resource locator corresponding to the operation event and received by a server; and the matching unit is configured to match the at least one initial uniform resource locator with the at least one target uniform resource locator and generate verification information according to a matching result.
In a third aspect, some embodiments of the present disclosure provide an electronic device, comprising: one or more processors; a storage device having one or more programs stored thereon which, when executed by one or more processors, cause the one or more processors to implement a method as in any one of the first aspects.
In a fourth aspect, some embodiments of the disclosure provide a computer readable medium having a computer program stored thereon, wherein the program when executed by a processor implements a method as in any one of the first aspect.
One of the above-described various embodiments of the present disclosure has the following advantageous effects: acquiring an operation log, wherein the operation log comprises operation events corresponding to target data on a client; selecting at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data, wherein the initial uniform resource locator corresponds to an operation event in the operation log; acquiring at least one target uniform resource locator corresponding to the operation event, wherein the target uniform resource locator is a uniform resource locator which is received by a server and corresponds to the operation event; by which the result of the above-mentioned target data after transmission can be determined. And matching the at least one initial uniform resource locator with the at least one target uniform resource locator, and generating verification information according to a matching result. Whether the information of the target data is lost in the transmission process can be determined through the verification information, and the accuracy and the effectiveness of data transmission are improved.
Drawings
The above and other features, advantages and aspects of various embodiments of the present disclosure will become more apparent by referring to the following detailed description when taken in conjunction with the accompanying drawings. Throughout the drawings, the same or similar reference numbers refer to the same or similar elements. It should be understood that the drawings are schematic and that elements and elements are not necessarily drawn to scale.
FIG. 1 is a schematic diagram of one application scenario of a data verification method according to some embodiments of the present disclosure;
FIG. 2 is a flow diagram of some embodiments of a data verification method according to the present disclosure;
FIG. 3 is a flow diagram of further embodiments of a data verification method according to the present disclosure;
FIG. 4 is a schematic block diagram of some embodiments of a data verification apparatus according to the present disclosure;
FIG. 5 is a schematic structural diagram of an electronic device suitable for use in implementing some embodiments of the present disclosure.
Detailed Description
Embodiments of the present disclosure will be described in more detail below with reference to the accompanying drawings. While certain embodiments of the present disclosure are shown in the drawings, it is to be understood that the disclosure may be embodied in various forms and should not be construed as limited to the embodiments set forth herein. Rather, these embodiments are provided for a more thorough and complete understanding of the present disclosure. It should be understood that the drawings and embodiments of the disclosure are for illustration purposes only and are not intended to limit the scope of the disclosure.
It should be noted that, for convenience of description, only the portions related to the related invention are shown in the drawings. The embodiments and features of the embodiments in the present disclosure may be combined with each other without conflict.
It should be noted that the terms "first", "second", and the like in the present disclosure are only used for distinguishing different devices, modules or units, and are not used for limiting the order or interdependence relationship of the functions performed by the devices, modules or units.
It is noted that references to "a", "an", and "the" modifications in this disclosure are intended to be illustrative rather than limiting, and that those skilled in the art will recognize that "one or more" may be used unless the context clearly dictates otherwise.
The names of messages or information exchanged between devices in the embodiments of the present disclosure are for illustrative purposes only, and are not intended to limit the scope of the messages or information.
The present disclosure will be described in detail below with reference to the accompanying drawings in conjunction with embodiments.
Fig. 1 is a schematic diagram of an application scenario of a data verification method according to some embodiments of the present disclosure.
As shown in fig. 1, an electronic device 101 may obtain an oplog 102 on a client that presents short videos. The operation log 102 may include several operation events, such as approval, comment, collection, forwarding, and downloading, corresponding to the short video. The electronic device 101 may select a reference uniform resource locator corresponding to the above-mentioned several operation events, such as like, comment, collection, forwarding, and downloading, from the reference uniform resource locator set 103 of the short video, to obtain at least one initial uniform resource locator 104. The electronic device 101 may obtain at least one target uniform resource locator 105 corresponding to the above-mentioned several operation events, such as approval, comment, collection, forwarding and downloading, from the server corresponding to the short video. And matching the at least one initial uniform resource locator 104 and the at least one target uniform resource locator 105, and generating verification information 106 according to a matching result.
The electronic device 101 may be hardware or software. When the electronic device 101 is hardware, it may be implemented as a distributed cluster formed by a plurality of servers or terminal devices, or may be implemented as a single server or a single terminal device. When the electronic device 101 is embodied as software, it may be installed in the hardware devices listed above. It may be implemented, for example, as multiple software or software modules to provide distributed services, or as a single software or software module. And is not particularly limited herein.
It should be understood that the number of computing devices in FIG. 1 is merely illustrative. There may be any number of computing devices, as implementation needs dictate.
With continued reference to fig. 2, a flow 200 of some embodiments of a data verification method according to the present disclosure is shown. The data verification method comprises the following steps:
step 201, obtaining an operation log.
In some embodiments, the execution subject of the data verification method (e.g., the electronic device 101 shown in fig. 1) may obtain the operation log through a wired connection or a wireless connection. The operation log may include an operation event on the client for the target data. The operation log may be a log file corresponding to any operation event, and the client may be a series of devices with a display function, such as a mobile phone and a computer. The target data may be data of short video, news, etc. presented on the client. The operation event of the target data may be an operation event of performing approval, comment, collection, and the like on the target data.
As an example, the execution subject of the method may obtain, through a network transmission manner, a log file corresponding to an operation event such as a like, a comment, a favorite, and the like of a certain short video.
Step 202, selecting at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data.
In some embodiments, the execution subject of the method may select at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data, where the initial uniform resource locator corresponds to an operation event in the operation log. The reference uniform resource locator of the target data may be a uniform resource locator corresponding to each operation event of the target data. The execution subject of the method may select at least one initial uniform resource locator corresponding to the operation log from the reference uniform resource locator set of the target data in various ways. The reference uniform resource locator may be stored in a predetermined database. The at least one initial uniform resource locator may include at least one initial macro parameter.
As an example, the executing entity of the method may select at least one initial uniform resource locator corresponding to the operation log from the reference uniform resource locator set of the certain short video by way of traversal search. The reference uniform resource locator set of the short video may include reference uniform resource locators corresponding to operational events such as praise, comment, collection, download, presentation, and the like. According to operation events (such as events such as praise, comment and download), selecting reference uniform resource positioning corresponding to the three events such as praise, comment and download from reference uniform resource positioning corresponding to the operation events such as praise, comment, collection, download and display, and further obtaining at least one initial uniform resource locator.
Step 203, at least one target uniform resource locator corresponding to the operation event is obtained.
In some embodiments, the execution subject of the data verification method obtains the at least one target uniform resource locator of the operation event in various ways. The target uniform resource locator is a uniform resource locator of the operation event received by the server. The server may be a third-party platform for monitoring target data, a cluster control system, or various devices such as a computer.
As an example, the reference uniform resource locators corresponding to the three events of approval, comment and download may be obtained in an online transmission manner, and then at least one target uniform resource locator of at least one initial uniform resource locator operation event is obtained.
And 204, matching the at least one initial uniform resource locator with the at least one target uniform resource locator, and generating verification information according to a matching result.
In some embodiments, the executing entity of the method may match the at least one initial uniform resource locator and the at least one target uniform resource locator in a statistical analysis manner or a comparison manner, and generate the verification information according to a matching result. The check information may be information on whether the number of the at least one initial uniform resource locator and the number of the at least one target uniform resource locator are identical, information on whether the number of the at least one initial macro parameter included in the at least one initial uniform resource locator and the number of the at least one target macro parameter included in the at least one target uniform resource locator are identical, information on whether the target macro parameter includes an illegal character, and information on whether the number of the at least one initial macro parameter included in the at least one initial uniform resource locator and the number of the at least one target macro parameter included in the at least one target uniform resource locator are identical, It may be information whether the above-mentioned target macro parameter contains a specific macro parameter.
As an example, the execution subject of the method may match at least one initial uniform resource locator and the at least one target uniform resource locator corresponding to a short video by way of comparison.
In some optional implementation manners of some embodiments, in response to that at least one target uniform resource locator of the operation event is completely acquired, matching the at least one initial uniform resource locator and the at least one target uniform resource locator based on an automatic verification tool, and generating verification information according to a matching result.
One of the above-described various embodiments of the present disclosure has the following advantageous effects: acquiring an operation log, wherein the operation log comprises operation events corresponding to target data on a client; selecting at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data, wherein the initial uniform resource locator corresponds to an operation event in the operation log; acquiring at least one target uniform resource locator corresponding to the operation event, wherein the target uniform resource locator is a uniform resource locator which is received by a server and corresponds to the operation event; by which the result of the above-mentioned target data after transmission can be determined. And matching the at least one initial uniform resource locator with the at least one target uniform resource locator, and generating verification information according to a matching result. Whether the information of the target data is lost in the transmission process can be determined through the verification information, and the accuracy and the effectiveness of data transmission are improved.
With further reference to FIG. 3, a flow 300 of further embodiments of a data verification method is illustrated. The flow 300 of the data verification method includes the following steps:
step 301, obtaining an operation log.
Step 302, selecting at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data.
Step 303, at least one target uniform resource locator corresponding to the operation event is obtained.
In some embodiments, the detailed implementation of steps 301 to 303 and the technical effect brought by the implementation may refer to steps 201 to 203 in those embodiments corresponding to fig. 2, and are not described herein again.
Step 304, determining a difference between the number of the at least one initial uniform resource locator and the number of the at least one target uniform resource locator.
In some embodiments, the performing subject of the method may determine the difference between the number of the at least one initial uniform resource locator and the number of the at least one target uniform resource locator by a comparison method or a statistical analysis method.
Step 305, in response to the difference being 0, generating macro parameter matching information between each initial uniform resource locator in the at least one initial uniform resource locator and a target uniform resource locator corresponding to the initial uniform resource locator.
In some embodiments, in response to that the difference between the number of the at least one initial uniform resource locator and the number of the at least one target uniform resource locator is 0, that is, the number of the at least one initial uniform resource locator is consistent with the number of the at least one target uniform resource locator, the execution subject of the method generates, in a statistical analysis manner or a comparison manner, macro parameter matching information between each of the at least one initial uniform resource locator and the target uniform resource locator corresponding to the initial uniform resource locator. The matching information may be information of whether the number of macro parameters between each initial uniform resource locator in the at least one initial uniform resource locator and the target uniform resource locator corresponding to the initial uniform resource locator is consistent.
In response to that the difference is not 0, the execution subject of the method may return a first check message, where the first check message may be: the number of the at least one initial uniform resource locator is inconsistent with the number of the at least one target uniform resource locator. In some optional implementation manners of some embodiments, for each of the at least one initial uniform resource locator, the execution subject of the method may query, in a traversal comparison manner, a first macro parameter quantity included in a target uniform resource locator corresponding to the initial uniform resource locator and a second macro parameter quantity included in the target uniform resource locator corresponding to the initial uniform resource locator; and determining macro parameter matching information according to the difference value of the first macro parameter quantity and the second macro parameter quantity.
Step 306, in response to that the macro parameter matching information is 0, performing a secondary check on at least one target macro parameter included in a target uniform resource locator corresponding to at least one initial macro parameter included in each initial uniform resource locator to obtain a secondary check result.
In some embodiments, in response to a condition that the number of macro parameters between each of the initial uniform resource locators and the target uniform resource locator corresponding to the initial uniform resource locator is consistent, the execution subject of the method may perform secondary verification on at least one target macro parameter included in the target uniform resource locator corresponding to at least one initial macro parameter included in each of the initial uniform resource locators, so as to obtain a secondary verification result. The secondary check result can be used for representing whether the target macro parameter has illegal characters.
In response to the difference not being 0, the execution subject of the method may return a second check message. The second check information may be: and on the basis that the number of the at least one initial uniform resource locator is consistent with the number of the at least one target uniform resource locator, the number of macro parameters between each initial uniform resource locator in the at least one initial uniform resource locator and the target uniform resource locator corresponding to the initial uniform resource locator is inconsistent.
Step 307, in response to that the secondary verification result meets the first preset condition, performing secondary additional verification on each target macro parameter included in each target uniform resource locator to obtain a secondary additional verification result.
In some embodiments, in response to that the secondary verification result meets a first preset condition, performing secondary additional verification on each target macro parameter included in each target uniform resource locator to obtain a secondary additional verification result, where the secondary additional verification result is used to represent whether the target macro parameter included in each target uniform resource locator includes target information that is the same as the corresponding initial macro parameter. The first preset condition is that the target macro parameter contained in each target uniform resource locator does not have illegal characters.
In response to that the secondary verification result does not satisfy the first preset condition, the execution main body of the method may return a secondary verification message, where the secondary verification message may be: on the basis that the quantity of macro parameters between each initial uniform resource locator in the at least one initial uniform resource locator and the target uniform resource locator corresponding to the initial uniform resource locator is consistent, illegal characters exist in the target macro parameters contained in each target uniform resource locator.
And 308, in response to that the secondary additional verification result meets a second preset condition, performing tertiary verification on the target macro parameter to obtain a tertiary verification result.
In some embodiments, in response to that the secondary additional verification result meets a second preset condition, performing a third verification on the target macro parameter to obtain a third verification result. The third check result is used for representing whether each target uniform resource locator contains at least one target macro parameter and whether the target macro parameter contains a specific macro parameter. The second predetermined result is that each target macro parameter included in each target url indicates target information.
In response to that the secondary additional verification result does not satisfy the second preset condition, the execution main body of the method may return a secondary additional verification message, where the secondary additional verification message may be: and on the basis that the target macro parameters contained in each target uniform resource locator do not have illegal characters, each target macro parameter contained in each target uniform resource locator cannot represent target information.
The above-mentioned check information can also be embodied in other forms such as a table, and is not described herein any more.
As can be seen from fig. 3, compared with the description of some embodiments corresponding to fig. 2, the flow 300 of the data verification method in some embodiments corresponding to fig. 3 embodies a process of refining the step of matching the at least one initial uniform resource locator and the at least one target uniform resource locator. For specific implementation and technical effects brought about, reference may be made to the technical effects corresponding to fig. 2, which are not described herein again.
With further reference to fig. 4, as an implementation of the methods shown in the above figures, the present disclosure provides some embodiments of a data verification apparatus, which correspond to those shown in fig. 2, and which may be applied in various electronic devices.
As shown in fig. 4, the data verification apparatus 400 of some embodiments includes: a first obtaining unit 401, a selecting unit 402, a second obtaining unit 403 and a matching unit 404. The first obtaining unit 401 is configured to obtain an operation log, where the operation log includes operation events corresponding to target data on a client; the selecting unit 402 is configured to select at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data, where the initial uniform resource locator corresponds to an operation event in the operation log; the second obtaining unit 403 is configured to obtain at least one target uniform resource locator corresponding to the operation event, where the target uniform resource locator is a uniform resource locator corresponding to the operation event and received by a server; the matching unit 404 is configured to match the at least one initial uniform resource locator and the at least one target uniform resource locator, and generate verification information according to a matching result.
In an optional implementation manner of some embodiments, the matching unit 404 of the data verification apparatus 400 further includes a determining unit configured to determine a difference between the number of the at least one initial uniform resource locator and the number of the at least one target uniform resource locator.
In an optional implementation manner of some embodiments, the matching unit 404 of the data verification apparatus 400 further includes a generating unit configured to generate macro parameter matching information between each of the at least one initial uniform resource locator and a target uniform resource locator corresponding to the initial uniform resource locator in response to the difference being 0.
In an optional implementation manner of some embodiments, the generating unit of the data checking apparatus 400 is further configured to, for each of the at least one initial uniform resource locator, query a first macro parameter quantity included in a target uniform resource locator corresponding to the initial uniform resource locator and a second macro parameter quantity included in a target uniform resource locator corresponding to the initial uniform resource locator; and determining macro parameter matching information according to the difference value of the first macro parameter quantity and the second macro parameter quantity.
In an optional implementation manner of some embodiments, the matching unit 404 of the data checking apparatus 400 further includes a secondary checking unit, configured to perform secondary checking on at least one target macro parameter included in a target uniform resource locator corresponding to at least one initial macro parameter included in each initial uniform resource locator in response to that the macro parameter matching information is 0, to obtain a secondary checking result, where the secondary checking result is used to represent whether an illegal character exists in the target macro parameter.
In an optional implementation manner of some embodiments, the matching unit 404 of the data checking apparatus 400 further includes a secondary additional checking unit, configured to perform a secondary additional checking on each target macro parameter included in each target uniform resource locator in response to that the secondary checking result satisfies a first preset condition, to obtain a secondary additional checking result, where the secondary additional checking result is used to characterize whether the target macro parameter included in each target uniform resource locator includes target information that is the same as the corresponding initial macro parameter, and the first preset condition is that there is no illegal character in each target macro parameter included in each target uniform resource locator.
In an optional implementation manner of some embodiments, the matching unit 404 of the data checking apparatus 400 further includes a third checking unit, configured to, in response to that the second additional checking result satisfies a second preset condition, perform a third checking on the target macro parameter to obtain a third checking result, where the third checking result is used to indicate whether each target uniform resource locator includes at least one target macro parameter and whether the at least one target macro parameter includes a specific macro parameter, and the second preset result is that each target macro parameter included in each target uniform resource locator can represent target information.
In an optional implementation manner of some embodiments, the data verification apparatus 400 is further configured to, in response to that the at least one target uniform resource locator of the operation event is obtained, match the at least one initial uniform resource locator and the at least one target uniform resource locator based on an automated verification tool, and generate verification information according to a matching result.
It will be understood that the elements described in the apparatus 400 correspond to various steps in the method described with reference to fig. 2. Thus, the operations, features and resulting advantages described above with respect to the method are also applicable to the apparatus 400 and the units included therein, and will not be described herein again.
Referring now to FIG. 5, a block diagram of an electronic device (e.g., the computing device of FIG. 1) 500 suitable for use in implementing some embodiments of the present disclosure is shown. The electronic device in some embodiments of the present disclosure may include, but is not limited to, a mobile terminal such as a mobile phone, a notebook computer, a digital broadcast receiver, a PDA (personal digital assistant), a PAD (tablet computer), a PMP (portable multimedia player), a vehicle-mounted terminal (e.g., a car navigation terminal), and the like, and a stationary terminal such as a digital TV, a desktop computer, and the like. The electronic device shown in fig. 5 is only an example, and should not bring any limitation to the functions and the scope of use of the embodiments of the present disclosure.
As shown in fig. 5, electronic device 500 may include a processing means (e.g., central processing unit, graphics processor, etc.) 501 that may perform various appropriate actions and processes in accordance with a program stored in a Read Only Memory (ROM)502 or a program loaded from a storage means 508 into a Random Access Memory (RAM) 503. In the RAM 503, various programs and data necessary for the operation of the electronic apparatus 500 are also stored. The processing device 501, the ROM 502, and the RAM 503 are connected to each other through a bus 504. An input/output (I/O) interface 505 is also connected to bus 504.
Generally, the following devices may be connected to the I/O interface 505: input devices 506 including, for example, a touch screen, touch pad, keyboard, mouse, camera, microphone, accelerometer, gyroscope, etc.; output devices 507 including, for example, a Liquid Crystal Display (LCD), speakers, vibrators, and the like; storage devices 508 including, for example, magnetic tape, hard disk, etc.; and a communication device 509. The communication means 509 may allow the electronic device 500 to communicate with other devices wirelessly or by wire to exchange data. While fig. 5 illustrates an electronic device 500 having various means, it is to be understood that not all illustrated means are required to be implemented or provided. More or fewer devices may alternatively be implemented or provided. Each block shown in fig. 5 may represent one device or may represent multiple devices as desired.
In particular, according to some embodiments of the present disclosure, the processes described above with reference to the flow diagrams may be implemented as computer software programs. For example, some embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method illustrated in the flow chart. In some such embodiments, the computer program may be downloaded and installed from a network via the communication means 509, or installed from the storage means 508, or installed from the ROM 502. The computer program, when executed by the processing device 501, performs the above-described functions defined in the methods of some embodiments of the present disclosure.
It should be noted that the computer readable medium described above in some embodiments of the present disclosure may be a computer readable signal medium or a computer readable storage medium or any combination of the two. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples of the computer readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In some embodiments of the disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In some embodiments of the present disclosure, however, a computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: electrical wires, optical cables, RF (radio frequency), etc., or any suitable combination of the foregoing.
In some embodiments, the clients, servers may communicate using any currently known or future developed network Protocol, such as HTTP (HyperText Transfer Protocol), and may interconnect with any form or medium of digital data communication (e.g., a communications network). Examples of communication networks include a local area network ("LAN"), a wide area network ("WAN"), the Internet (e.g., the Internet), and peer-to-peer networks (e.g., ad hoc peer-to-peer networks), as well as any currently known or future developed network.
The computer readable medium may be embodied in the computing device; or may exist separately without being assembled into the electronic device. The computer readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to: acquiring an operation log, wherein the operation log comprises operation events corresponding to target data on a client; selecting at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data, wherein the initial uniform resource locator corresponds to an operation event in the operation log; acquiring at least one target uniform resource locator corresponding to the operation event, wherein the target uniform resource locator is a uniform resource locator which is received by a server and corresponds to the operation event; and matching the at least one initial uniform resource locator with the at least one target uniform resource locator, and generating verification information according to a matching result.
Computer program code for carrying out operations for embodiments of the present disclosure may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + +, and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units described in some embodiments of the present disclosure may be implemented by software, and may also be implemented by hardware. The described units may also be provided in a processor, and may be described as: a processor includes a first obtaining unit, a selecting unit, a second obtaining unit, and a matching unit. Here, the names of these units do not constitute a limitation to the unit itself in some cases, and for example, the first acquisition unit may also be described as a "unit that acquires an operation log".
The functions described herein above may be performed, at least in part, by one or more hardware logic components. For example, without limitation, exemplary types of hardware logic components that may be used include: field Programmable Gate Arrays (FPGAs), Application Specific Integrated Circuits (ASICs), Application Specific Standard Products (ASSPs), systems on a chip (SOCs), Complex Programmable Logic Devices (CPLDs), and the like.
According to one or more embodiments of the present disclosure, there is provided a data verification method including: acquiring an operation log, wherein the operation log comprises operation events corresponding to target data on a client; selecting at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data, wherein the initial uniform resource locator corresponds to an operation event in the operation log; acquiring at least one target uniform resource locator corresponding to the operation event, wherein the target uniform resource locator is a uniform resource locator which is received by a server and corresponds to the operation event; and matching the at least one initial uniform resource locator with the at least one target uniform resource locator, and generating verification information according to a matching result.
According to one or more embodiments of the present disclosure, a difference between the number of the at least one initial uniform resource locator and the number of the at least one target uniform resource locator is determined.
According to one or more embodiments of the present disclosure, in response to that the difference is 0, macro parameter matching information between each of the at least one initial uniform resource locator and a target uniform resource locator corresponding to the initial uniform resource locator is generated.
According to one or more embodiments of the present disclosure, for each of the at least one initial uniform resource locator, querying a first macro parameter quantity included in the corresponding initial uniform resource locator and a second macro parameter quantity included in a target uniform resource locator corresponding to the initial uniform resource locator; and determining macro parameter matching information according to the difference value of the first macro parameter quantity and the second macro parameter quantity.
According to one or more embodiments of the present disclosure, in response to that the macro parameter matching information is 0, performing a second check on at least one target macro parameter included in a target uniform resource locator corresponding to at least one initial macro parameter included in each of the initial uniform resource locators to obtain a second check result, where the second check result is used to represent whether an illegal character exists in the target macro parameter.
According to one or more embodiments of the present disclosure, in response to that the secondary check result satisfies a first preset condition, performing secondary additional check on each target macro parameter included in each target uniform resource locator to obtain a secondary additional check result, where the secondary additional check result is used to represent whether the target macro parameter included in each target uniform resource locator includes target information that is the same as the corresponding initial macro parameter, and the first preset condition is that there is no illegal character in each target macro parameter included in each target uniform resource locator.
According to one or more embodiments of the present disclosure, in response to that the secondary additional verification result meets a second preset condition, performing a third verification on the target macro parameter to obtain a third verification result, where the third verification result is used to represent whether each target uniform resource locator includes at least one target macro parameter and whether the at least one target macro parameter includes a specific macro parameter, and the second preset result is that each target macro parameter included in each target uniform resource locator can represent target information.
According to one or more embodiments of the present disclosure, in response to that at least one target uniform resource locator of the operation event is completely acquired, matching the at least one initial uniform resource locator and the at least one target uniform resource locator based on an automatic verification tool, and generating verification information according to a matching result.
According to one or more embodiments of the present disclosure, there is provided a data verification apparatus including: the system comprises a first acquisition unit, a second acquisition unit and a third acquisition unit, wherein the first acquisition unit is configured to acquire an operation log which contains operation events corresponding to target data on a client; a selecting unit configured to select at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data, where the initial uniform resource locator corresponds to an operation event in the operation log; a second obtaining unit, configured to obtain at least one target uniform resource locator corresponding to the operation event, where the target uniform resource locator is a uniform resource locator corresponding to the operation event and received by a server; and the matching unit is configured to match the at least one initial uniform resource locator with the at least one target uniform resource locator and generate verification information according to a matching result.
According to one or more embodiments of the present disclosure, the matching unit of the data verification apparatus further includes a determining unit configured to determine a difference between the number of the at least one initial uniform resource locator and the number of the at least one target uniform resource locator.
According to one or more embodiments of the present disclosure, the matching unit of the data verification apparatus further includes a generating unit, where the generating unit is configured to generate macro parameter matching information between each initial uniform resource locator in the at least one initial uniform resource locator and a target uniform resource locator corresponding to the initial uniform resource locator in response to the difference being 0.
According to one or more embodiments of the present disclosure, the generating unit of the data verification apparatus is further configured to, for each of the at least one initial uniform resource locator, query a first macro parameter quantity included in a target uniform resource locator corresponding to the initial uniform resource locator and a second macro parameter quantity included in a target uniform resource locator corresponding to the initial uniform resource locator; and determining macro parameter matching information according to the difference value of the first macro parameter quantity and the second macro parameter quantity.
According to one or more embodiments of the present disclosure, the matching unit of the data checking device further includes a secondary checking unit, where the secondary checking unit is configured to perform a secondary check on at least one target macro parameter included in a target uniform resource locator corresponding to at least one initial macro parameter included in each of the initial uniform resource locators in response to that the macro parameter matching information is 0, so as to obtain a secondary check result, where the secondary check result is used to represent whether an illegal character exists in the target macro parameter.
According to one or more embodiments of the present disclosure, the matching unit of the data checking device further includes a secondary additional checking unit, where the secondary additional checking unit is configured to perform a secondary additional checking on each target macro parameter included in each target uniform resource locator in response to that the secondary checking result satisfies a first preset condition, so as to obtain a secondary additional checking result, where the secondary additional checking result is used to characterize whether the target macro parameter included in each target uniform resource locator includes target information that is the same as the corresponding initial macro parameter, and the first preset condition is that there is no illegal character in each target macro parameter included in each target uniform resource locator.
According to one or more embodiments of the present disclosure, the matching unit of the data checking device further includes a third checking unit, where the third checking unit is configured to perform a third checking on the target macro parameter in response to that the second additional checking result satisfies a second preset condition, so as to obtain a third checking result, where the third checking result is used to represent whether each target uniform resource locator includes at least one target macro parameter and whether the at least one target macro parameter includes a specific macro parameter, and the second preset result is that each target macro parameter included in each target uniform resource locator can represent target information.
According to one or more embodiments of the present disclosure, the data verification apparatus is further configured to, in response to that the at least one target uniform resource locator of the operation event is obtained, match the at least one initial uniform resource locator and the at least one target uniform resource locator based on an automated verification tool, and generate verification information according to a matching result.
In accordance with one or more embodiments of the present disclosure, some embodiments of the present disclosure provide an electronic device including: one or more processors; a storage device having one or more programs stored thereon which, when executed by one or more processors, cause the one or more processors to implement a method as in any one of the first aspects.
Some embodiments of the disclosure provide a computer readable medium having a computer program stored thereon, wherein the program when executed by a processor implements a method as in any one of the first aspects.
The foregoing description is only exemplary of the preferred embodiments of the disclosure and is illustrative of the principles of the technology employed. It will be appreciated by those skilled in the art that the scope of the invention in the embodiments of the present disclosure is not limited to the specific combination of the above-mentioned features, but also encompasses other embodiments in which any combination of the above-mentioned features or their equivalents is made without departing from the inventive concept as defined above. For example, the above features and (but not limited to) technical features with similar functions disclosed in the embodiments of the present disclosure are mutually replaced to form the technical solution.

Claims (11)

1. A method of data verification, comprising:
acquiring an operation log, wherein the operation log comprises operation events on target data on a client;
selecting at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data, wherein the initial uniform resource locator corresponds to an operation event in the operation log;
acquiring at least one target uniform resource locator corresponding to the operation event, wherein the target uniform resource locator is a uniform resource locator which is received by a server and corresponds to the operation event;
and matching the at least one initial uniform resource locator with the at least one target uniform resource locator, and generating verification information according to a matching result.
2. The method of claim 1, wherein the matching the at least one initial uniform resource locator and the at least one target uniform resource locator, and the generating of the verification information according to the matching result comprises:
determining a difference between the number of the at least one initial uniform resource locator and the number of the at least one target uniform resource locator.
3. The method of claim 2, wherein each initial uniform resource locator of the at least one initial uniform resource locator contains at least one initial macro parameter, and each target uniform resource locator of the at least one target uniform resource locator contains at least one target macro parameter; and
the matching the at least one initial uniform resource locator and the at least one target uniform resource locator and the generating of the verification information according to the matching result comprises:
and in response to the difference being 0, generating macro parameter matching information between each initial uniform resource locator in the at least one initial uniform resource locator and a target uniform resource locator corresponding to the initial uniform resource locator.
4. The method of claim 3, wherein the generating macro parameter matching information between each of the at least one initial uniform resource locator and a target uniform resource locator corresponding to the initial uniform resource locator comprises:
for each initial uniform resource locator in the at least one initial uniform resource locator, inquiring the number of first macro parameters contained in the corresponding initial uniform resource locator and the number of second macro parameters contained in a target uniform resource locator corresponding to the initial uniform resource locator;
and determining macro parameter matching information according to the difference value of the first macro parameter quantity and the second macro parameter quantity.
5. The method according to one of claims 3 to 4, wherein the matching the at least one initial uniform resource locator and the at least one target uniform resource locator, and the generating of the verification information according to the matching result comprises:
and in response to that the macro parameter matching information is 0, performing secondary verification on at least one target macro parameter contained in a target uniform resource locator corresponding to at least one initial macro parameter contained in each initial uniform resource locator to obtain a secondary verification result, wherein the secondary verification result is used for representing whether illegal characters exist in the target macro parameters.
6. The method of claim 5, wherein the matching the at least one initial uniform resource locator and the at least one target uniform resource locator, and the generating of the verification information according to the matching result comprises:
and in response to that the secondary check result meets a first preset condition, performing secondary additional check on each target macro parameter contained in each target uniform resource locator to obtain a secondary additional check result, wherein the secondary additional check result is used for representing whether the target macro parameter contained in each target uniform resource locator contains target information which is the same as the corresponding initial macro parameter, and the first preset condition is that each target macro parameter contained in each target uniform resource locator does not have illegal characters.
7. The method of claim 6, wherein the matching the at least one initial uniform resource locator and the at least one target uniform resource locator, and the generating of the verification information according to the matching result comprises:
and in response to that the secondary additional verification result meets a second preset condition, performing tertiary verification on the target macro parameters to obtain a tertiary verification result, wherein the tertiary verification result is used for representing whether each target uniform resource locator contains at least one target macro parameter and whether the target macro parameter contains a specific macro parameter, and the second preset result is that each target macro parameter contained in each target uniform resource locator can represent target information.
8. The method of claim 1, wherein the matching the at least one initial uniform resource locator and the at least one target uniform resource locator, and the generating of the verification information according to the matching result comprises:
and in response to the completion of the acquisition of the at least one target uniform resource locator of the operation event, matching the at least one initial uniform resource locator and the at least one target uniform resource locator based on an automatic verification tool, and generating verification information according to a matching result.
9. A data verification apparatus, comprising:
a first acquisition unit configured to acquire an operation log containing operation events on a client corresponding to target data;
a selecting unit configured to select at least one initial uniform resource locator corresponding to the operation log from a reference uniform resource locator set corresponding to the target data, where the initial uniform resource locator corresponds to an operation event in the operation log;
a second obtaining unit, configured to obtain at least one target uniform resource locator corresponding to the operation event, where the target uniform resource locator is a uniform resource locator corresponding to the operation event and received by a server;
and the matching unit is configured to match the at least one initial uniform resource locator with the at least one target uniform resource locator and generate verification information according to a matching result.
10. An electronic device, comprising:
one or more processors;
a storage device having one or more programs stored thereon,
when executed by the one or more processors, cause the one or more processors to implement the method of any one of claims 1-8.
11. A computer-readable medium, on which a computer program is stored, wherein the program, when executed by a processor, implements the method of any one of claims 1-8.
CN202010955352.8A 2020-09-11 2020-09-11 Data verification method, device, electronic equipment and computer readable medium Active CN112084440B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010955352.8A CN112084440B (en) 2020-09-11 2020-09-11 Data verification method, device, electronic equipment and computer readable medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010955352.8A CN112084440B (en) 2020-09-11 2020-09-11 Data verification method, device, electronic equipment and computer readable medium

Publications (2)

Publication Number Publication Date
CN112084440A true CN112084440A (en) 2020-12-15
CN112084440B CN112084440B (en) 2023-08-08

Family

ID=73737637

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010955352.8A Active CN112084440B (en) 2020-09-11 2020-09-11 Data verification method, device, electronic equipment and computer readable medium

Country Status (1)

Country Link
CN (1) CN112084440B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120246702A1 (en) * 2011-03-21 2012-09-27 Webcetera, L.P. System, method and computer program product for access authentication
CN104301806A (en) * 2014-09-11 2015-01-21 华为技术有限公司 Video recognition method, device and system
CN104820667A (en) * 2014-09-15 2015-08-05 腾讯科技(北京)有限公司 Method, device and system for reporting webpage click rate
CN109145194A (en) * 2017-06-27 2019-01-04 北京国双科技有限公司 The acquisition method and device of user behavior data
US20200137184A1 (en) * 2018-10-31 2020-04-30 EMC IP Holding Company LLC Methods, devices, and computer program products for processing target data
CN111193613A (en) * 2019-12-10 2020-05-22 北京你财富计算机科技有限公司 Method, device and system for collecting dotting information at client application

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120246702A1 (en) * 2011-03-21 2012-09-27 Webcetera, L.P. System, method and computer program product for access authentication
CN104301806A (en) * 2014-09-11 2015-01-21 华为技术有限公司 Video recognition method, device and system
CN104820667A (en) * 2014-09-15 2015-08-05 腾讯科技(北京)有限公司 Method, device and system for reporting webpage click rate
CN109145194A (en) * 2017-06-27 2019-01-04 北京国双科技有限公司 The acquisition method and device of user behavior data
US20200137184A1 (en) * 2018-10-31 2020-04-30 EMC IP Holding Company LLC Methods, devices, and computer program products for processing target data
CN111193613A (en) * 2019-12-10 2020-05-22 北京你财富计算机科技有限公司 Method, device and system for collecting dotting information at client application

Also Published As

Publication number Publication date
CN112084440B (en) 2023-08-08

Similar Documents

Publication Publication Date Title
CN110781373B (en) List updating method and device, readable medium and electronic equipment
CN111800513B (en) Method and device for pushing information and computer readable medium of electronic equipment
CN112684968A (en) Page display method and device, electronic equipment and computer readable medium
CN111209306A (en) Business logic judgment method and device, electronic equipment and storage medium
CN112995712A (en) Method, device and equipment for determining stuck factors and storage medium
CN112491859A (en) Domain name certificate detection method and device, electronic equipment and computer readable medium
CN111857720A (en) Method and device for generating user interface state information, electronic equipment and medium
CN112367241A (en) Message generation and message transmission method, device, equipment and computer readable medium
CN111756953A (en) Video processing method, device, equipment and computer readable medium
CN113590985B (en) Page jump configuration method and device, electronic equipment and computer readable medium
CN111460020B (en) Method, device, electronic equipment and medium for resolving message
CN112084440B (en) Data verification method, device, electronic equipment and computer readable medium
CN111625745B (en) Recommendation method, recommendation device, electronic equipment and computer readable medium
CN114490718A (en) Data output method, data output device, electronic equipment and computer readable medium
CN111367592B (en) Information processing method and device
CN112115154A (en) Data processing and data query method, device, equipment and computer readable medium
CN111782549A (en) Test method and device and electronic equipment
CN111580890A (en) Method, apparatus, electronic device, and computer-readable medium for processing features
CN110991312A (en) Method, apparatus, electronic device, and medium for generating detection information
CN111930704B (en) Service alarm equipment control method, device, equipment and computer readable medium
CN111581305B (en) Feature processing method, device, electronic equipment and medium
CN114039970A (en) Information downloading method and device, electronic equipment and computer readable medium
CN110855767B (en) Method, device, equipment and storage medium for responding operation request
CN115374320B (en) Text matching method and device, electronic equipment and computer medium
CN111507734B (en) Method and device for identifying cheating request, electronic equipment and computer storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant