CN114039801A - Short link generation method, short link analysis system, short link analysis equipment and storage medium - Google Patents
Short link generation method, short link analysis system, short link analysis equipment and storage medium Download PDFInfo
- Publication number
- CN114039801A CN114039801A CN202210024079.6A CN202210024079A CN114039801A CN 114039801 A CN114039801 A CN 114039801A CN 202210024079 A CN202210024079 A CN 202210024079A CN 114039801 A CN114039801 A CN 114039801A
- Authority
- CN
- China
- Prior art keywords
- address
- link
- domain name
- character string
- short
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Information Transfer Between Computers (AREA)
Abstract
The application discloses a short link generation method, a short link analysis system, short link analysis equipment and a short link storage medium, and belongs to the technical field of internet. The method comprises the following steps: acquiring an original long link address; determining a first target short domain name address corresponding to the original long-chain grounding address according to the original long-chain linking address; determining a first encryption character string corresponding to the first target short domain name address according to a preset encryption rule; comparing the length of the first encrypted character string with a preset character string length threshold value to obtain a first length comparison result; and when the first length comparison result shows that the length of the first encrypted character string is less than or equal to a preset character string length threshold, performing website address splicing processing on the first encrypted character string and the first target short domain name address to obtain a first target short link corresponding to the original long-chain grounding address. According to the method and the device, the encryption of the original long link is shortened by replacing the short domain name address, so that the stability of encryption and shortening of the website is improved.
Description
Technical Field
The present application relates to the field of internet technologies, and in particular, to a short link generation method, an analysis method, a system, a device, and a storage medium.
Background
The web address, usually refers to the address of a web page on the internet. The technical process is that the enterprise or individual stores some information on the internet page by page, each page has a corresponding address, so that other users can access the information to obtain information. In the internet, if one wants to access one computer from another computer on the internet, one must know the other's web address. At present, due to various service systems, particularly e-commerce systems, the number of categories and the like related to commodities is increased, so that the website length of commodity details is increased, and overlong websites not only occupy length positions, but also influence copying, forwarding, identifying and sending of users.
Therefore, a Short web address (Short URL) is to shorten a long website link to a Short link, and many application modes are already available in most microblogs, mobile phone mail reminders and the like at present, but free conversion services provided by web address shortening services in the market are mainly personal, and the safety and stability of the services cannot be guaranteed.
Disclosure of Invention
The embodiment of the application mainly aims to provide a short link generation method, an analysis method, a system, equipment and a storage medium, and realizes encryption shortening of a long-chain grounding address by replacing a short domain name address within a limited string length, so that the stability of encryption shortening of a website address is improved.
To achieve the above object, a first aspect of embodiments of the present application provides a short link generation method, including:
acquiring an original long link address;
determining a first target short domain name address corresponding to the original long link address according to the original long link address;
determining a first encryption character string corresponding to the first target short domain name address according to a preset encryption rule;
comparing the length of the first encrypted character string with a preset character string length threshold value to obtain a first length comparison result;
and when the first length comparison result shows that the length of the first encrypted character string is less than or equal to the preset character string length threshold, performing website splicing processing on the first encrypted character string and the first target short domain name address to obtain a first target short link corresponding to the original long-chain ground address.
In some embodiments, the determining, from the original long-link address, a first target short domain name address corresponding to the original long-link address comprises:
acquiring a short domain name database, wherein the short domain name database comprises a plurality of short domain name addresses;
and selecting a first target short domain name address corresponding to the original long-chain grounding address from the short domain name database, wherein the first target short domain name address and the original long-chain linking address have a unique corresponding relation.
In some embodiments, when the first length comparison result is that the length of the first encrypted string is greater than the preset string length threshold, the method further comprises:
selecting a second target short domain name address corresponding to the original long link address from the short domain name database, wherein the second target short domain name address and the original long link address have a unique corresponding relation;
determining a second encryption character string corresponding to the second target short domain name address according to a preset encryption rule;
comparing the length of the second encrypted character string with the preset character string length threshold value to obtain a second length comparison result;
and when the second length comparison result shows that the length of the second encrypted character string is less than or equal to the preset character string length threshold, performing website splicing processing on the second encrypted character string and the second target short domain name address to obtain a second target short link corresponding to the original long-chain ground address.
In some embodiments, the method further comprises:
acquiring all short domain name addresses of the short domain name database;
and when each short domain name address has a unique corresponding long-chain grounding address, performing length increasing processing on the preset character string length threshold to obtain an updated character string length threshold.
In some embodiments, after the performing the website address concatenation on the first encrypted character string and the first target short domain name address to obtain the first target short link corresponding to the original long-chain ground address, the method further includes:
and carrying out deep encryption processing on the first target short link to obtain a third target short link corresponding to the original long-chain grounding address.
A second aspect of the present application provides a short link parsing method, including:
sending the first target short link to the mobile terminal;
receiving access request information sent by the mobile terminal according to the first target short link;
and performing link analysis processing on the first target short link according to the access request information to obtain an original long link address corresponding to the first target short link.
A third aspect of an embodiment of the present application provides a short link generation system, including:
the address acquisition module is used for acquiring an original long link address;
the first mapping module is used for determining a first target short domain name address corresponding to the original long link address according to the original long link address;
the second mapping module is used for determining a first encryption character string corresponding to the first target short domain name address according to a preset encryption rule;
the length comparison module is used for comparing the length of the first encrypted character string with a preset character string length threshold value to obtain a first length comparison result;
and the website splicing module is used for performing website splicing processing on the first encrypted character string and the first target short domain name address to obtain a first target short link corresponding to the original long-chain grounding address when the first length comparison result shows that the length of the first encrypted character string is smaller than or equal to the preset character string length threshold.
A fourth aspect of the present application provides a short link parsing system, including:
the link sending module is used for sending the first target short link to the mobile terminal;
the information receiving module is used for receiving access request information sent by the mobile terminal according to the first target short link;
and the link analysis module is used for carrying out link analysis processing on the first target short link according to the access request information to obtain an original long link address corresponding to the first target short link.
A fifth aspect of the embodiments of the present application provides a computer device, which includes a memory and a processor, where the memory stores a program, and the processor is configured to execute the short link generation method according to any one of the embodiments of the first aspect of the present application or the short link resolution method according to the embodiments of the second aspect of the present application when the program is executed by the processor.
A sixth aspect of the embodiments of the present application provides a computer-readable storage medium, where computer-executable instructions are stored, and the computer-executable instructions are configured to cause a computer to execute a short link generation method according to any one of the embodiments of the first aspect of the present application or a short link resolution method according to the embodiments of the second aspect of the present application.
According to the short link generation method, the short link analysis system, the short link analysis device and the storage medium, the original long link address is obtained, the first target short domain name address corresponding to the original long-chain ground address is determined, and the first encryption character string corresponding to the first target short domain name address is determined according to the preset encryption rule. In order to more effectively realize encryption shortening of a website, a first length comparison result is obtained by comparing the length of a first encryption character string with a preset character string length threshold value, and when the first length comparison result is that the length of the first encryption character string is smaller than or equal to the preset character string length threshold value, website splicing processing is carried out on the first encryption character string and a first target short domain name address, so that a first target short link corresponding to an original long-chain grounding is obtained. Therefore, the encryption of the original long link address is shortened by replacing the short domain name address within the preset character string length threshold, and the stability of encryption shortening of the website is improved.
Drawings
FIG. 1 is a flow chart of a short link generation method provided in a first embodiment of the present application;
FIG. 2 is a flowchart of step S120 in FIG. 1;
FIG. 3 is a flow chart of a short link generation method provided in a second embodiment of the present application;
FIG. 4 is a flow chart of a short link generation method provided by a third embodiment of the present application;
fig. 5 is a flowchart of a short link parsing method according to an embodiment of the present application;
fig. 6 is a schematic hardware structure diagram of a computer device according to an embodiment of the present application.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
It should be noted that although functional blocks are partitioned in a schematic diagram of an apparatus and a logical order is shown in a flowchart, in some cases, the steps shown or described may be performed in a different order than the partitioning of blocks in the apparatus or the order in the flowchart. The terms first, second and the like in the description and in the claims, and the drawings described above, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order.
Unless defined otherwise, all technical and scientific terms used herein have the same meaning as commonly understood by one of ordinary skill in the art to which this application belongs. The terminology used herein is for the purpose of describing embodiments of the present application only and is not intended to be limiting of the application.
Uniform Resource Locator (URL): the numbers and letters are used to represent the addresses of the web page files on the web, and the resources accessible on the web all have unique URLs, including the transmission protocol used, the server name, and the complete path of the file. The standard URL consists of 3 parts: protocol type, hostname, and pathname.
The web address, usually refers to the address of a web page on the internet. The technical process is that the enterprise or individual stores some information on the internet page by page, each page has a corresponding address, so that other users can access the information to obtain information. In the internet, if one wants to access one computer from another computer on the internet, one must know the other's web address. At present, due to various service systems, particularly e-commerce systems, the number of categories and the like related to commodities is increased, so that the website length of commodity details is increased, and overlong websites not only occupy length positions, but also influence copying, forwarding, identifying and sending of users.
Therefore, a Short web address (Short URL) is to shorten a long website link to a Short link, and many application modes are already available in most microblogs, mobile phone mail reminders and the like at present, but free conversion services provided by web address shortening services in the market are mainly personal, and the safety and stability of the services cannot be guaranteed.
Based on this, the present application provides a short link generation method, an analysis method, a system, a device, and a storage medium, which can implement encryption shortening of a long-chain ground address by replacing a short domain name address within a limited string length, thereby improving stability of encryption shortening of a website.
The short link generation method and the short link analysis method provided by the embodiment of the application can be applied to a terminal, a server side and software running in the terminal or the server side. In some embodiments, the terminal may be a smartphone, tablet, laptop, desktop computer, smart watch, or the like; the server side can be configured into an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, and cloud servers for providing basic cloud computing services such as cloud service, a cloud database, cloud computing, cloud functions, cloud storage, network service, cloud communication, middleware service, domain name service, security service, CDN (content delivery network) and big data and artificial intelligence platforms; the software may be an application or the like implementing the above method, but is not limited to the above form.
Embodiments of the application are operational with numerous general purpose or special purpose computing system environments or configurations. For example: personal computers, server computers, hand-held or portable devices, tablet-type devices, multiprocessor systems, microprocessor-based systems, set top boxes, programmable consumer electronics, network PCs, minicomputers, mainframe computers, distributed computing environments that include any of the above systems or devices, and the like. The application may be described in the general context of computer-executable instructions, such as program modules, being executed by a computer. Generally, program modules include routines, programs, objects, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The application may also be practiced in distributed computing environments where tasks are performed by remote processing devices that are linked through a communications network. In a distributed computing environment, program modules may be located in both local and remote computer storage media including memory storage devices.
The embodiments of the present application provide a short link generation method, an analysis method, a system, a device, and a storage medium, which are specifically described in the following embodiments, and first a short link generation method in the embodiments of the present application is described.
Referring to fig. 1, a short link generation method according to an embodiment of the first aspect of the embodiment of the present application includes, but is not limited to, steps S110 to S150.
S110, acquiring an original long link address;
s120, determining a first target short domain name address corresponding to the original long-chain grounding address according to the original long-chain linking address;
s130, determining a first encryption character string corresponding to the first target short domain name address according to a preset encryption rule;
s140, comparing the length of the first encrypted character string with a preset character string length threshold value to obtain a first length comparison result;
s150, when the first length comparison result shows that the length of the first encrypted character string is smaller than or equal to a preset character string length threshold, performing website address splicing processing on the first encrypted character string and the first target short domain name address to obtain a first target short link corresponding to the original long-chain ground address.
In step S110, the original long-chain address refers to a path and an address for opening a web page, and the enterprise places content that the enterprise wants the client and the public to know into a website and sends the content to the client and the public in the form of a link address, so that the client and the public can obtain required information conveniently, and a URL of a complete original long-chain address may be hundreds of characters long. According to the method and the device, the encryption of the original long link is shortened by replacing the short domain name address within the preset character string length threshold, the traditional E-commerce commodity promotion cost can be reduced, and the application scene of enterprise promotion is expanded under the scenes of short message marketing, micro message sending, microblog forwarding, advertisement putting and the like.
In step S130, the preset encryption rule is that a conventional encryption algorithm is adopted, that is, 62-bit characters of a-Z, a-Z and 0-9 are adopted for combination, so that more than 500 hundred million combinations can be generated, the formed numbers and/or character combinations are mapped to a certain extent, so that a unique character string can be generated, and then the original character string is shuffled and stored by using a shuffling algorithm, so that the combined character strings at corresponding positions are unordered. And storing the original long-chain grounding address into a database, taking the returned ID, and finding out the corresponding character string according to the ID, wherein for example, if the returned ID is 1, the character string combination corresponding to the ID is bbb, and similarly, if the ID is 2, the character string combination is bba, and so on.
In step S140, the preset string length threshold is used to determine the length of the first encrypted string currently combined, so as to ensure the shortened length of the website and improve the shortened stability of the website encryption. The preset string length threshold is not specifically limited, and may be selected from one place or set according to actual requirements. For example, when the preset string length threshold is set to 3 bits, the length of the first encrypted string corresponding to the first target short domain name address is selected and matched from one bit according to the preset encryption rule, so that the encryption shortening of the original long link address is better realized, and the stability of the encryption shortening of the website address is improved.
In step S150, the website splicing process refers to processing the first target short domain name address and the first encrypted character string corresponding to the original long-chain ground address according to a website resolution rule to obtain a first target short link corresponding to the original long-chain ground address. Specifically, when a first target short domain name address corresponding to an original long-chain grounding address is murl.cn and a first encryption character string corresponding to the first target short domain name address is bbb, performing website splicing processing on the first encryption character string and the first target short domain name address, and adding a hypertext Transfer Protocol (http) or a hypertext Transfer Protocol over secure browser (https) for website resolution to obtain a first target short-chain connection https:// murl.cn/bbb.
In some embodiments, as shown in fig. 2, step S120 specifically includes, but is not limited to, step S210 to step S220.
S210, acquiring a short domain name database, wherein the short domain name database comprises a plurality of short domain name addresses;
s220, a first target short domain name address corresponding to the original long-chain grounding address is selected from the short domain name database, wherein the first target short domain name address and the original long-chain linking address have a unique corresponding relation.
In step S120, a first target short domain name address corresponding to the original long-chain ground address is determined according to the original long-chain ground address, where the first target short domain name address also corresponds to the original long-chain link address by using a conventional encryption algorithm, where the length of the first target short domain name address is not specifically limited, and may be selected from one bit or set according to actual requirements, for example, a.cn is selected as the first target short domain name address, in order to better implement encryption shortening of the original long-chain link address.
In steps S210 to S220, a short domain name database is constructed according to a conventional encryption algorithm, wherein the short domain name database includes a plurality of short domain name addresses, and the first target short domain name address corresponds to the original long-chain ground address from a low position by using the conventional encryption algorithm. After an original long-link address is obtained, a first target short domain name address corresponding to an original long-link ground address is selected from a short domain name database, wherein the first target short domain name address and the original long-link address have a unique corresponding relation, and the corresponding relation between the original long-link address and the first target short domain name address is stored in the short domain name database, so that the stability of encryption and shortening of the website address is improved.
In some embodiments, when the first length comparison result is that the length of the first encrypted string is greater than the preset string length threshold, as shown in fig. 3, the short link generation method further includes steps S310 to S340.
S310, selecting a second target short domain name address corresponding to the original long-chain grounding address from the short domain name database, wherein the second target short domain name address and the original long-chain linking address have a unique corresponding relation;
s320, determining a second encrypted character string corresponding to a second target short domain name address according to a preset encryption rule;
s330, comparing the length of the second encrypted character string with a preset character string length threshold value to obtain a second length comparison result;
and S340, when the second length comparison result shows that the length of the second encrypted character string is less than or equal to the preset character string length threshold, performing website address splicing processing on the second encrypted character string and the second target short domain name address to obtain a second target short link corresponding to the original long-chain ground address.
Specifically, when the first length comparison result shows that the length of the first encrypted character string is greater than a preset character string length threshold, that is, when all combinations of the first encrypted character string of the first target short domain address within the preset character string length threshold are used up, a second target short domain address corresponding to the original long-chain ground address is selected from the short domain database, wherein the second target short domain address and the original long-chain link address have a unique corresponding relationship. And then, according to a preset encryption rule, determining a second encryption character string corresponding to the second target short domain name address, and performing length comparison processing on the length of the second encryption character string and a preset character string length threshold value to obtain a second length comparison result. And when the second length comparison result shows that the length of the second encrypted character string is less than or equal to the preset character string length threshold, performing website splicing processing on the second encrypted character string and the second target short domain name address to obtain a second target short link corresponding to the original long-chain grounding address, so that the encryption shortening of the original long-link address is realized, and the stability of website encryption shortening is improved.
It should be noted that, in order to facilitate management of the mapping relationship between the short domain name address and the long-chain ground address in the short domain name database, when all the combinations of the first encrypted character strings of the first target short domain name address within the preset character string length threshold are used up, the next short domain name address of the first target short domain name address stored in the short domain name database is selected as the second target short domain name address, and then the second encrypted character string corresponding to the second target short domain name address is determined according to the preset encryption rule. For example, a.cn is selected as a first target short domain name address, and when all encrypted character strings corresponding to the first target short domain name address have a unique corresponding relationship with a corresponding long-chain grounding address within a preset character string length threshold, b.cn is selected as a second target short domain name address. According to the method and the device, the encryption of the original long link address is shortened by replacing the short domain name address within the preset character string length threshold, so that the stability of encryption shortening of the website is improved.
It should be noted that, when the second length comparison result is that the length of the second encrypted string is greater than the preset string length threshold, the steps S310 to S340 are repeatedly executed until the obtained second length comparison result is that the length of the second encrypted string is less than or equal to the preset string length threshold, thereby implementing encrypted shortening of the original long link address.
In some embodiments, as shown in fig. 4, the short link generation method further includes steps S410 to S420.
S410, acquiring all short domain name addresses of a short domain name database;
and S420, when each short domain name address has a unique corresponding long-chain grounding address, performing length increasing processing on a preset character string length threshold value to obtain an updated character string length threshold value.
Specifically, all short domain name addresses in the short domain name database are acquired, when each short domain name address has a uniquely corresponding long-chain ground address, that is, when each encrypted character string corresponding to each short domain name address in the short domain name database has a unique corresponding relationship with a corresponding long link address, it is indicated that the short domain name address of the short domain name database is saturated with the encrypted character string under the corresponding preset character string length threshold, length increment processing is performed on the preset character string length threshold, and the updated character string length threshold is obtained. For example, assuming that the preset string length threshold is 3 bits, when the short domain name address of the short domain name database and the encrypted string under the corresponding preset string length threshold are saturated correspondingly, length increment processing is performed on the preset string length threshold, 4 bits are set as an updated string length threshold, and then a short-chain generating method is executed again according to the updated string length threshold.
In some embodiments, after step S150, the short link generation method further comprises: and carrying out deep encryption processing on the first target short link to obtain a third target short link corresponding to the original long-chain grounding address.
Specifically, the method includes the steps of determining a first target short domain name address corresponding to an original long-chain grounding address by obtaining the original long-chain grounding address, then determining a first encryption character string corresponding to the first target short domain name address according to a preset encryption rule, and finally performing website address splicing processing on the first encryption character string and the first target short domain name address to obtain a first target short link corresponding to the original long-chain grounding address. The current website Encryption algorithms include an RSA public key Encryption Algorithm, an Advanced Encryption Standard (AES) Algorithm, a Data Encryption Standard (DES) Algorithm, an MD5 information Digest Algorithm (MD 5 Message-Digest Algorithm) and the like, and in the later development, a deeper Encryption Algorithm is also researched.
The short link generation method provided by the embodiment of the application comprises the steps of firstly, obtaining an original long link address, and determining a first target short domain name address corresponding to the original long link address from a short domain name database, wherein the first target short domain name address and the original long link address have a unique corresponding relation. And then, according to a preset encryption rule, determining a first encryption character string corresponding to the first target short domain name address. In order to more effectively realize encryption shortening of the website, a first length comparison result is obtained by comparing the length of the first encryption character string with a preset character string length threshold value. When the first length comparison result shows that the length of the first encrypted character string is smaller than or equal to a preset character string length threshold, performing website address splicing processing on the first encrypted character string and a first target short domain name address to obtain a first target short link corresponding to an original long-chain ground address; and when the first length comparison result shows that the length of the first encrypted character string is greater than a preset character string length threshold, namely the combination of the first encrypted character string of the first target short domain name address within the preset character string length threshold is completely used up, selecting a second target short domain name address corresponding to the original long-chain ground address from the short domain name database, wherein the second target short domain name address and the original long-chain link address have a unique corresponding relation. And then, according to a preset encryption rule, determining a second encryption character string corresponding to the second target short domain name address, and performing length comparison processing on the length of the second encryption character string and a preset character string length threshold value to obtain a second length comparison result. And when the second length comparison result shows that the length of the second encrypted character string is less than or equal to the preset character string length threshold, performing website splicing processing on the second encrypted character string and a second target short domain name address to obtain a second target short link corresponding to the original long-chain ground address. Meanwhile, when each short domain name address has a uniquely corresponding long-chain grounding address, length increasing processing is carried out on a preset character string length threshold value to obtain an updated character string length threshold value, and the updated character string length threshold value is used for encryption shortening of the long link. In addition, the obtained first target short link can be subjected to deep encryption processing by combining with other encryption algorithms, and a third target short link corresponding to the original long-chain grounding address is obtained. Therefore, the encryption of the original long link address is shortened by replacing the short domain name address within the preset character string length threshold, and the stability of encryption shortening of the website is improved.
Referring to fig. 5, an embodiment of the present application further provides a short link parsing method, including but not limited to step S510 to step S530.
S510, sending the first target short link to the mobile terminal;
s520, receiving access request information sent by the mobile terminal according to the first target short link;
s530, link analysis processing is carried out on the first target short link according to the access request information, and an original long link address corresponding to the first target short link is obtained.
Specifically, a first target short link obtained by any method in the first aspect of the present application is obtained, the first target short link is sent to a mobile terminal, a user clicks the first target short link through the mobile terminal to access, after receiving access request information sent by the mobile terminal according to the first target short link, link analysis processing is performed on the first target short link according to the access request information, and an original long link address corresponding to the first target short link is obtained. Therefore, the encryption shortening of the original long link address is realized by replacing the short domain name address within the preset character string length threshold value, so that the stability of the encryption shortening of the website address is improved.
The embodiment of the application further provides a short link generation system, which comprises an address acquisition module, a first mapping module, a second mapping module, a length comparison module and a website splicing module. The address acquisition module is used for acquiring an original long link address; the first mapping module is used for determining a first target short domain name address corresponding to the original long-chain grounding address according to the original long-chain link address; the second mapping module is used for determining a first encryption character string corresponding to the first target short domain name address according to a preset encryption rule; the length comparison module is used for comparing the length of the first encrypted character string with a preset character string length threshold value to obtain a first length comparison result; and the website splicing module is used for performing website splicing processing on the first encrypted character string and the first target short domain name address to obtain a first target short link corresponding to the original long-chain grounding address when the first length comparison result shows that the length of the first encrypted character string is less than or equal to a preset character string length threshold value. A short link generation system according to an embodiment of the present application is configured to execute a short link generation method according to the foregoing embodiment, and a specific processing procedure of the short link generation system is the same as that of the short link generation method according to the foregoing embodiment, which is not described herein again.
The embodiment of the application further provides a short link analysis system, which comprises a link sending module, an information receiving module and a link analysis module. The link sending module is used for sending the first target short link to the mobile terminal; the information receiving module is used for receiving access request information sent by the mobile terminal according to the first target short link; the link analysis module is used for carrying out link analysis processing on the first target short link according to the access request information to obtain an original long link address corresponding to the first target short link. A short link analysis system according to an embodiment of the present application is used to execute a short link analysis method according to the foregoing embodiment, and a specific processing procedure of the short link analysis system is the same as that of the short link analysis method according to the foregoing embodiment, which is not described here any more.
Embodiments of the present application further provide a computer device, which includes a memory and a processor, where the memory stores a program, and the processor is configured to execute a short link generation method according to any one of the embodiments of the first aspect of the present application or a short link resolution method according to any one of the embodiments of the second aspect of the present application when the program is executed by the processor.
The hardware structure of the computer apparatus will be described in detail below with reference to fig. 6. The computer device includes: a processor 601, a memory 602, an input/output interface 603, a communication interface 604, and a bus 605.
The processor 601 may be implemented by a general CPU (Central processing Unit), a microprocessor, an Application Specific Integrated Circuit (ASIC), or one or more Integrated circuits, and is configured to execute a relevant program to implement the technical solution provided in the embodiment of the present Application;
the Memory 602 may be implemented in a ROM (Read Only Memory), a static Memory device, a dynamic Memory device, or a RAM (Random Access Memory). The memory 602 may store an operating system and other application programs, and when the technical solution provided by the embodiments of the present disclosure is implemented by software or firmware, the relevant program codes are stored in the memory 602 and invoked by the processor 601 to execute a short link generation method according to the embodiments of the present disclosure or execute a short link resolution method according to the embodiments of the present disclosure;
an input/output interface 603 for implementing information input and output;
the communication interface 604 is configured to implement communication interaction between the device and other devices, and may implement communication in a wired manner (e.g., USB, network cable, etc.) or in a wireless manner (e.g., mobile network, WIFI, bluetooth, etc.); and a bus 605 that transfers information between the various components of the device (e.g., the processor 601, memory 602, input/output interfaces 603, and communication interface 604);
wherein the processor 601, the memory 602, the input/output interface 603 and the communication interface 604 are communicatively connected to each other within the device via a bus 605.
Embodiments of the present application further provide a computer-readable storage medium having a computer program, where when the computer program is executed by a computer, the computer is configured to execute a short link generation method according to an embodiment of the present application or execute a short link resolution method according to an embodiment of the present application.
The memory, which is a non-transitory computer readable storage medium, may be used to store non-transitory software programs as well as non-transitory computer executable programs. Further, the memory may include high speed random access memory, and may also include non-transitory memory, such as at least one disk storage device, flash memory device, or other non-transitory solid state storage device. In some embodiments, the memory optionally includes memory located remotely from the processor, and these remote memories may be connected to the processor through a network. Examples of such networks include, but are not limited to, the internet, intranets, local area networks, mobile communication networks, and combinations thereof.
The embodiments described in the embodiments of the present application are for more clearly illustrating the technical solutions of the embodiments of the present application, and do not constitute a limitation to the technical solutions provided in the embodiments of the present application, and it is obvious to those skilled in the art that the technical solutions provided in the embodiments of the present application are also applicable to similar technical problems with the evolution of technology and the emergence of new application scenarios.
Those skilled in the art will appreciate that the solutions shown in fig. 1 to 5 do not constitute a limitation on the embodiments of the present application, and may include more or less steps than those shown, or combine some steps, or different steps.
The above-described embodiments of the apparatus are merely illustrative, wherein the units illustrated as separate components may or may not be physically separate, i.e. may be located in one place, or may also be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment.
One of ordinary skill in the art will appreciate that all or some of the steps of the methods, systems, functional modules/units in the devices disclosed above may be implemented as software, firmware, hardware, and suitable combinations thereof.
The terms "first," "second," "third," "fourth," and the like in the description of the application and the above-described figures, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are capable of operation in sequences other than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
It should be understood that in the present application, "at least one" means one or more, "a plurality" means two or more. "and/or" for describing an association relationship of associated objects, indicating that there may be three relationships, e.g., "a and/or B" may indicate: only A, only B and both A and B are present, wherein A and B may be singular or plural. The character "/" generally indicates that the former and latter associated objects are in an "or" relationship. "at least one of the following" or similar expressions refer to any combination of these items, including any combination of single item(s) or plural items. For example, at least one (one) of a, b, or c, may represent: a, b, c, "a and b", "a and c", "b and c", or "a and b and c", wherein a, b, c may be single or plural.
In the several embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the units is only one logical division, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or units, and may be in an electrical, mechanical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit.
The integrated unit, if implemented in the form of a software functional unit and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application may be substantially implemented or contributed to by the prior art, or all or part of the technical solution may be embodied in a software product, which is stored in a storage medium and includes multiple instructions for causing a computer device (which may be a personal computer, a server, or a network device) to perform all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: various media capable of storing programs, such as a usb disk, a removable hard disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a magnetic disk, or an optical disk.
The preferred embodiments of the present application have been described above with reference to the accompanying drawings, and the scope of the claims of the embodiments of the present application is not limited thereto. Any modifications, equivalents and improvements that may occur to those skilled in the art without departing from the scope and spirit of the embodiments of the present application are intended to be within the scope of the claims of the embodiments of the present application.
Claims (10)
1. A short link generation method, comprising:
acquiring an original long link address;
determining a first target short domain name address corresponding to the original long link address according to the original long link address;
determining a first encryption character string corresponding to the first target short domain name address according to a preset encryption rule;
comparing the length of the first encrypted character string with a preset character string length threshold value to obtain a first length comparison result;
and when the first length comparison result shows that the length of the first encrypted character string is less than or equal to the preset character string length threshold, performing website splicing processing on the first encrypted character string and the first target short domain name address to obtain a first target short link corresponding to the original long-chain ground address.
2. The short link generation method according to claim 1, wherein the determining, according to the original long link address, a first target short domain name address corresponding to the original long link address comprises:
acquiring a short domain name database, wherein the short domain name database comprises a plurality of short domain name addresses;
and selecting a first target short domain name address corresponding to the original long-chain grounding address from the short domain name database, wherein the first target short domain name address and the original long-chain linking address have a unique corresponding relation.
3. A short link generation method according to claim 2, wherein when the first length comparison result is that the length of the first encrypted string is greater than the preset string length threshold, the method further comprises:
selecting a second target short domain name address corresponding to the original long link address from the short domain name database, wherein the second target short domain name address and the original long link address have a unique corresponding relation;
determining a second encryption character string corresponding to the second target short domain name address according to a preset encryption rule;
comparing the length of the second encrypted character string with the preset character string length threshold value to obtain a second length comparison result;
and when the second length comparison result shows that the length of the second encrypted character string is less than or equal to the preset character string length threshold, performing website splicing processing on the second encrypted character string and the second target short domain name address to obtain a second target short link corresponding to the original long-chain ground address.
4. A short link generation method according to claim 2, further comprising:
acquiring all short domain name addresses of the short domain name database;
and when each short domain name address has a unique corresponding long-chain grounding address, performing length increasing processing on the preset character string length threshold to obtain an updated character string length threshold.
5. The short link generation method according to claim 1, wherein after the performing the web address concatenation on the first encrypted character string and the first target short domain name address to obtain the first target short link corresponding to the original long link address, the method further comprises:
and carrying out deep encryption processing on the first target short link to obtain a third target short link corresponding to the original long-chain grounding address.
6. A short link analysis method is characterized by comprising:
sending the first target short link to the mobile terminal;
receiving access request information sent by the mobile terminal according to the first target short link;
and performing link analysis processing on the first target short link according to the access request information to obtain an original long link address corresponding to the first target short link.
7. A short link generation system, comprising:
the address acquisition module is used for acquiring an original long link address;
the first mapping module is used for determining a first target short domain name address corresponding to the original long link address according to the original long link address;
the second mapping module is used for determining a first encryption character string corresponding to the first target short domain name address according to a preset encryption rule;
the length comparison module is used for comparing the length of the first encrypted character string with a preset character string length threshold value to obtain a first length comparison result;
and the website splicing module is used for performing website splicing processing on the first encrypted character string and the first target short domain name address to obtain a first target short link corresponding to the original long-chain grounding address when the first length comparison result shows that the length of the first encrypted character string is smaller than or equal to the preset character string length threshold.
8. A short link resolution system, comprising:
the link sending module is used for sending the first target short link to the mobile terminal;
the information receiving module is used for receiving access request information sent by the mobile terminal according to the first target short link;
and the link analysis module is used for carrying out link analysis processing on the first target short link according to the access request information to obtain an original long link address corresponding to the first target short link.
9. A computer device comprising a memory and a processor, wherein the memory has stored therein a program, and wherein the processor is configured to perform, when the program is executed by the processor:
a short link generation process of any one of claims 1 to 5; or
A short link resolution method as defined in claim 6.
10. A computer-readable storage medium, having a computer program which, when executed by a computer, the computer is operable to perform:
a short link generation process of any one of claims 1 to 5; or
A short link resolution method as defined in claim 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210024079.6A CN114039801B (en) | 2022-01-11 | 2022-01-11 | Short link generation method, short link analysis system, short link analysis equipment and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210024079.6A CN114039801B (en) | 2022-01-11 | 2022-01-11 | Short link generation method, short link analysis system, short link analysis equipment and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114039801A true CN114039801A (en) | 2022-02-11 |
CN114039801B CN114039801B (en) | 2022-04-29 |
Family
ID=80147460
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210024079.6A Active CN114039801B (en) | 2022-01-11 | 2022-01-11 | Short link generation method, short link analysis system, short link analysis equipment and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114039801B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115587609A (en) * | 2022-09-27 | 2023-01-10 | 深圳市智码通科技有限公司 | Short-link two-dimensional code generation method and device |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202976172U (en) * | 2012-03-28 | 2013-06-05 | 边高伟 | Electronic ticketing system applying portable terminal based on Internet application |
CN106412140A (en) * | 2015-08-03 | 2017-02-15 | 沈阳东软睿道教育服务有限公司 | Short link address generating method and system thereof |
WO2018094594A1 (en) * | 2016-11-23 | 2018-05-31 | 华为技术有限公司 | Communication method and device |
CN108156479A (en) * | 2016-12-06 | 2018-06-12 | 创盛视联数码科技(北京)有限公司 | Video cloud platform video playing uri encipher-decipher methods |
CN111460502A (en) * | 2020-04-01 | 2020-07-28 | 得到(天津)文化传播有限公司 | Data sharing method, device, equipment and storage medium |
-
2022
- 2022-01-11 CN CN202210024079.6A patent/CN114039801B/en active Active
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN202976172U (en) * | 2012-03-28 | 2013-06-05 | 边高伟 | Electronic ticketing system applying portable terminal based on Internet application |
CN106412140A (en) * | 2015-08-03 | 2017-02-15 | 沈阳东软睿道教育服务有限公司 | Short link address generating method and system thereof |
WO2018094594A1 (en) * | 2016-11-23 | 2018-05-31 | 华为技术有限公司 | Communication method and device |
CN108156479A (en) * | 2016-12-06 | 2018-06-12 | 创盛视联数码科技(北京)有限公司 | Video cloud platform video playing uri encipher-decipher methods |
CN111460502A (en) * | 2020-04-01 | 2020-07-28 | 得到(天津)文化传播有限公司 | Data sharing method, device, equipment and storage medium |
Non-Patent Citations (1)
Title |
---|
常文治等: "《电缆接头尖刺缺陷局部放电发展过程的研究》", 《中 国 电 机 工 程 学 报 》 * |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN115587609A (en) * | 2022-09-27 | 2023-01-10 | 深圳市智码通科技有限公司 | Short-link two-dimensional code generation method and device |
Also Published As
Publication number | Publication date |
---|---|
CN114039801B (en) | 2022-04-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11321214B1 (en) | Detection of anomalous computer behavior | |
US10250526B2 (en) | Method and apparatus for increasing subresource loading speed | |
WO2019095416A1 (en) | Information pushing method and apparatus, and terminal device and storage medium | |
CN112184367B (en) | Order processing method and device | |
US20150227496A1 (en) | Method and system for microblog resource sharing | |
CN108737252B (en) | Information pushing method and device based on block chain | |
CN108733317B (en) | Data storage method and device | |
CN110851748A (en) | Short link generation method, server, storage medium and computer equipment | |
US11244153B2 (en) | Method and apparatus for processing information | |
CN108932640B (en) | Method and device for processing orders | |
CN114039801B (en) | Short link generation method, short link analysis system, short link analysis equipment and storage medium | |
Kobusińska et al. | Big Data fingerprinting information analytics for sustainability | |
CN107463536A (en) | A kind of method and system for realizing document in online preview server in Android device | |
CN113761565B (en) | Data desensitization method and device | |
CN113656737A (en) | Webpage content display method and device, electronic equipment and storage medium | |
CN112347383A (en) | Sharing link generation method and device and electronic equipment | |
CN112436943A (en) | Request deduplication method, device, equipment and storage medium based on big data | |
CN109145220B (en) | Data processing method and device and electronic equipment | |
CN116127945A (en) | Network link processing method and device, electronic equipment and storage medium | |
CN110851794A (en) | Media file uplink method and device, storage medium and electronic device | |
CN112182603B (en) | Anti-crawler method and device | |
CN110585724A (en) | Table data updating method and device in game client | |
CN110866196A (en) | Printer network information acquisition method and device and electronic equipment | |
US10592476B2 (en) | Enabling clients to expose secured files via virtual hosts | |
WO2014169497A1 (en) | Method and server for pushing media file |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |