CN114265642A - Information processing method, information processing device, electronic equipment and computer readable storage medium - Google Patents

Information processing method, information processing device, electronic equipment and computer readable storage medium Download PDF

Info

Publication number
CN114265642A
CN114265642A CN202111544832.6A CN202111544832A CN114265642A CN 114265642 A CN114265642 A CN 114265642A CN 202111544832 A CN202111544832 A CN 202111544832A CN 114265642 A CN114265642 A CN 114265642A
Authority
CN
China
Prior art keywords
information
detection
target object
target
authorization
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111544832.6A
Other languages
Chinese (zh)
Inventor
高亚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zitiao Network Technology Co Ltd
Original Assignee
Beijing Zitiao Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zitiao Network Technology Co Ltd filed Critical Beijing Zitiao Network Technology Co Ltd
Priority to CN202111544832.6A priority Critical patent/CN114265642A/en
Publication of CN114265642A publication Critical patent/CN114265642A/en
Pending legal-status Critical Current

Links

Images

Abstract

The application discloses an information processing method, an information processing device, electronic equipment and a computer readable storage medium, wherein the information processing method comprises the following steps: acquiring authorization information aiming at a target object, wherein the authorization information is received from target equipment and is determined by the target equipment based on operation information of a user; detecting the target object by using the authorization information and the configuration information corresponding to the target object to obtain detection information; analyzing the detection information and a reference graph corresponding to the target object to obtain a detection result corresponding to the target object; sending the detection result to the target equipment so that the target equipment can display the detection result; the detection efficiency of the service system can be improved.

Description

Information processing method, information processing device, electronic equipment and computer readable storage medium
Technical Field
The present application belongs to the field of internet technologies, and in particular, to an information processing method and apparatus, an electronic device, and a computer-readable storage medium.
Background
In the prior art, detection of a service system generally depends on detection of internal service and interface stability of a server, when the server detects that the internal service and the interface stability are abnormal, a great amount of time is consumed by troubleshooting personnel to perform troubleshooting detection, the service system is detected by the method, so that a process of determining a problem consumes more time, and the detection efficiency of detecting the service system by the method is low.
Disclosure of Invention
The embodiment of the application provides an implementation scheme different from that of the prior art so as to solve the technical problem that the detection efficiency of a detection system in the prior art is low.
In a first aspect, the present application provides an information processing method, including: acquiring authorization information aiming at a target object, wherein the authorization information is received from target equipment and is determined by the target equipment based on operation information of a user; detecting the target object by using the authorization information and the configuration information corresponding to the target object to obtain detection information; analyzing the detection information and a reference graph corresponding to the target object to obtain a detection result corresponding to the target object; and sending the detection result to the target equipment so that the target equipment can display the detection result.
In a second aspect, the present application provides an information processing method, including: determining authorization information and configuration information aiming at a target object according to operation information of a user, and sending the authorization information and the configuration information to server-side equipment; receiving a detection result determined by the server device by using the authorization information and the configuration information, wherein the detection result is that the server device detects the target object to obtain detection information; analyzing the detection information and a reference image corresponding to the target object to obtain the detection information; and displaying the detection result.
In a third aspect, the present application provides an information processing apparatus comprising: the acquisition module is used for acquiring authorization information aiming at the target object, wherein the authorization information is received from the target equipment and is determined by the target equipment based on the operation information of the user; the detection module is used for detecting the target object by utilizing the authorization information and the configuration information corresponding to the target object to obtain detection information; the analysis module is used for analyzing the detection information and the reference graph corresponding to the target object to obtain a detection result corresponding to the target object; and the sending module is used for sending the detection result to the target equipment so that the target equipment can display the detection result.
In a fourth aspect, the present application provides an electronic device comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform any of the first aspect, the second aspect, the possible implementations of the first aspect, or the possible implementations of the second aspect via execution of executable instructions.
In a fifth aspect, embodiments of the present application provide a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements any one of the methods of the first aspect, the second aspect, the possible implementations of the first aspect, or the possible implementations of the second aspect.
In a sixth aspect, an embodiment of the present application provides a computer program product, which includes a computer program that, when executed by a processor, implements any one of the methods in the first aspect, the second aspect, the possible embodiments of the first aspect, or the possible embodiments of the second aspect.
The method comprises the steps that authorization information aiming at a target object is obtained, the authorization information is received from target equipment and is determined by the target equipment based on operation information of a user; detecting the target object by using the authorization information and the configuration information corresponding to the target object to obtain detection information; analyzing the detection information and a reference graph corresponding to the target object to obtain a detection result corresponding to the target object; the detection result is sent to the target device, so that the target device can display the detection result, authorization information of the user is stored through configuration authorization, page detection of an online environment can be automatically performed on a service system corresponding to the authorization information under the authorization information, the detection result can be sent to the front-end device in real time for the user to observe, the efficiency of the user for determining problems according to the detection result is improved, and the detection efficiency is correspondingly improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly described below, and it is obvious that the drawings in the following description are some embodiments of the present application, and other drawings can be obtained by those skilled in the art without creative efforts. In the drawings:
fig. 1 is a schematic structural diagram of a detection system according to an embodiment of the present application;
fig. 2a is a schematic flowchart of an information processing method according to an embodiment of the present application;
fig. 2b is a schematic view of a scenario in which the information processing method provided in an embodiment of the present application is combined with a function module of a server;
fig. 3 is a schematic view of a scenario of an information processing method according to an embodiment of the present application;
fig. 4 is a schematic structural diagram of an information processing apparatus according to an embodiment of the present application;
fig. 5 is a schematic structural diagram of an electronic device according to an embodiment of the present application.
Detailed Description
Reference will now be made in detail to embodiments of the present application, examples of which are illustrated in the accompanying drawings. The embodiments described below with reference to the drawings are exemplary and intended to be used for explaining the present application and should not be construed as limiting the present application.
The terms "first" and "second," and the like in the description, the claims, and the drawings of the embodiments of the present application are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the application described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or apparatus that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
First, some terms in the embodiments of the present application are explained below to facilitate understanding by those skilled in the art.
Puppeteeer: an API may be provided for manipulating the browser;
mysql: a relational database management system;
redis caching: the system is an open source log-type and Key-Value database which is written by using ANSIC language, supports network, can be based on memory and can also be persistent, and provides API of multiple languages.
A file server: also known as a file server, refers to a file storage device accessible by all users in a computer network environment;
RocktMQ: is a message middleware of a distributed queue model.
CAS: the central authentication service is an independent open instruction protocol and aims to provide a reliable single sign-on method for a Web application system.
SSO: SingleSignOn, single sign-on, i.e., one-time authenticated sign-on by a user; when the user logs in the identity authentication server once, the authority of accessing other associated systems and application software in the single sign-on system can be obtained, meanwhile, the realization does not need an administrator to modify the login state or other information of the user, and in a plurality of application systems, the user can access all mutually trusted application systems only by logging in once.
The inventor finds that most of current detection systems focus on the detection of resources and interface stability at the service end side of a business system, and lack complex semantic detection aiming at a front-end page, and how to ensure that a core page of the system can be normally accessed after online every time and pages can be normally displayed at different time nodes or regional nodes (domestic/overseas) under the background of business requirement change and accelerated iteration speed, the application provides an end-to-end Web end page detection scheme based on a headless tool, a headless browser is opened at the service end to access the business system, a real-time page screenshot is generated and compared with a reference diagram, a picture similarity calculation method is used for calculating a similarity between a real-time operation diagram and the reference diagram to obtain a detection result, and the detection result is sent to a front-end device for display, the detection efficiency can be effectively improved. In addition, in a service system needing authentication, based on the scheme of the application, the headless browser can continuously access the service system, and does not skip to scan the code login page, so that the detection efficiency is further improved.
The following describes the technical solutions of the present application and how to solve the above technical problems with specific examples. The following several specific embodiments may be combined with each other, and details of the same or similar concepts or processes may not be repeated in some embodiments. Embodiments of the present application will be described below with reference to the accompanying drawings.
Fig. 1 is a schematic structural diagram of a detection system according to an exemplary embodiment of the present application, where the structure includes: a target device 11 and a server device 12; wherein:
the target device 11 is configured to determine authorization information and configuration information for a target object based on the operation information of the user, and send the authorization information and the configuration information to the server device 12;
the server device 12 is configured to receive the authorization information and the configuration information, and detect the target object by using the authorization information and the configuration information corresponding to the target object to obtain detection information; analyzing the detection information and a reference graph corresponding to the target object to obtain a detection result corresponding to the target object; and sending the detection result to the target device so that the target device 11 displays the detection result.
The execution principle and the interaction process of the components in the embodiment of the system, such as the specific programs in the target device 11 and the server device 12, can be referred to the following description of the embodiments of the methods.
Fig. 2a is a schematic flowchart of an information processing method according to an exemplary embodiment of the present application, where an execution subject of the method may be a server device, and the method may include at least the following steps:
s201, obtaining authorization information aiming at a target object, wherein the authorization information is received from target equipment and is determined by the target equipment based on operation information of a user;
s202, detecting the target object by using the authorization information and the configuration information corresponding to the target object to obtain detection information;
s203, analyzing the detection information and the reference graph corresponding to the target object to obtain a detection result corresponding to the target object;
and S204, sending the detection result to the target equipment so that the target equipment can display the detection result.
Specifically, the target object is web page content of a web page of a destination address set by the user, the authorization information may be login information or cookie information of a user login web page or a business system corresponding to the login web page, and the login information may include an account number and password information. The target device is a device with a display function, such as a PC, a mobile device, and the like, for a user to enter a corresponding detection platform and obtain operation information of the user, where the operation information of the user may be determined based on an operation of the user on a control in a display screen of the target device, for example: authorization information, detection address, destination address, configuration information, etc.
Optionally, the configuration information may be input by a user through a display page of the target device, and specifically, the configuration information may include one or more of detection frequency, detection start time, detection end time, and detection duration; further, the configuration information may also include a corresponding authorization name, etc., which may be used to distinguish the target object or the authorization information.
Further, as shown in fig. 2b, fig. 2b is a schematic view of a scenario in which the information processing method provided by an embodiment of the present application is combined with a function module of a server. The detection management platform 20 in fig. 2b is configured to provide an interactive interface for a user, where the interactive interface may provide an operation entry for the user, so that the target device obtains operation information of the user, and may also be configured to display a detection result and alarm information corresponding to the detection result, and the detection management platform 20 may also provide a communication interface with the target device for the server device.
The detection information can be a running chart obtained by screenshot of the target object; the reference image is a reference image corresponding to a detection image determined according to a destination address input by a user through the detection management platform 20 and/or a determination instruction of the user.
Further, in step S202, detecting the target object by using the configuration information corresponding to the authorization information and the target object, and obtaining the detection information includes:
acquiring image information of the target object based on a first browser by using the authorization information and the configuration information as the detection information; specifically, the operation map is the same as the detection information.
The first browser may be a headless browser, and the image information of the target object obtained based on the first browser may be screenshot information obtained by screenshot the target object based on the first browser.
The detection result may specifically include a comparison result of the detection information and the reference map, the comparison result may include the same information and the different information of the operation map and the reference map, and the comparison result may be an image or a character, which is not limited in this application. Further, the detection result may further include a similarity value between the operation diagram and the reference diagram, and accordingly, the method further includes: and when the detection result meets the alarm condition, sending corresponding alarm information to the target equipment to display the alarm information by the target equipment. For example: and when the similarity value is lower than a preset value, sending corresponding warning information to the target equipment.
Further, for the specific obtaining manner of the authorization information, the method further includes:
s001, starting a second browser when receiving an authorized starting request sent by target equipment when detecting an authorized starting instruction of a user;
s002, obtaining login service information corresponding to the authorization starting request based on the second browser;
s003, generating preset code information by using the login service information;
and S004, sending the preset code information to the target equipment so that the target equipment displays the corresponding login code based on the preset code information for the user to scan to determine the authorization information.
Specifically, the authorization initiation request may include a detection address input or selected by the user, where the detection address may be a representative address of the service system corresponding to the destination address. A detected address may correspond to one or more destination addresses, and authorization information determined based on the detected address is valid for the one or more destination addresses corresponding to the detected address. The corresponding relation between the detection address and the corresponding destination address can be set by related personnel.
Optionally, the detection address may be a first address of the service system, the destination address may be a first address of the service system or another address, and the detection address may also be the same as or different from the destination address, which is not limited in this application. Optionally, the second browser may be a headless browser.
Further, different service systems may depend on different authentication methods, and based on this, the login service information corresponding to the authorization initiation request may be login service information corresponding to the detection address, the login service information corresponds to an authentication method, and the authentication method may be CAS or SSO.
Further, the preset code information may be a two-dimensional code generation text, the login code may be a two-dimensional code, and the target device may generate and display the two-dimensional code according to the two-dimensional code generation text.
Further, referring to fig. 2b, the front-end detection module 21, the instance operation module 22, and the comparison service module 23 are services included in the service-side device; the interaction between the front-end detection module 21 and the instance running module 22 and the target device can be implemented based on the detection management platform 20.
Specifically, the front-end detection module 21 may execute an initialization process when receiving an authorized start request sent by a target device after detecting an authorized start instruction of a user through an authorization management unit included therein, specifically, may generate an authorization code, open a page in the form of a headless browser (i.e., a second browser), detect requests of multiple login manners, intercept different login interfaces, obtain a two-dimensional code generation text, feed back the two-dimensional code generation text to the target device, simultaneously store a current page state (a two-dimensional code scanning state) to redis, write corresponding cookie information and the authorization code into mysql and set the cookie information and the authorization code to a draft state after detecting that the user successfully scans the two-dimensional code, and set a corresponding page state in the redis to a massaged state for indicating that the user has successfully scanned the code. Further, after the front-end detection module 21 detects that the user clicks the saving information corresponding to the saved two-dimensional code, the cookie in the Mysql is set to be in the saving effective state.
Optionally, the front-end detection module 21 specifically detects, by the authorization management unit thereof, that the target device successfully scans the two-dimensional code, then jumps to the service system page to be authorized, stores the cookie corresponding to the service system page to be authorized in Mysql to a draft state, and may also store the instance ID corresponding to the authorization code in the database.
Further, the front-end detection module 21 may detect a scanning state of the two-dimensional code, and store the detected scanning state of the two-dimensional code to Redis, where the scanning state of the two-dimensional code includes: waiting for scanning, expired, successful scanning and failed scanning.
Further, after the target device detects that the user scans the two-dimensional code, prompt information that the user successfully logs in can be further displayed. The two-dimensional code display page can be further controlled to be closed, and a destination address input by a user and aiming at the target object can be further obtained; correspondingly, the method further comprises the following steps:
s01, when a destination address aiming at the target object sent by the target equipment is received, determining reference information corresponding to the target object according to the destination address;
s02, sending the reference information to the target equipment so that the target equipment can display the corresponding image to be confirmed according to the reference information;
and S03, determining the reference map based on the reference information when receiving the confirmation information of the image to be confirmed, which is sent by the target device.
The reference information can be image information of a reference graph corresponding to the destination address for the target equipment to display, and can also be link information; specifically, the link information may be generated by a file server.
Specifically, the front-end detection module 21 may directly determine an image to be confirmed according to the authorization information and the target address, and store the image to be confirmed in the file server, so that the file server generates link information according to the image to be confirmed, feeds the link information back to the front-end detection module 21, and sends the link information to the target device through the front-end detection module 21. The target device can further obtain the image to be confirmed from the server device side according to the link information and display the image. Further, the confirmation information may be sent to the server device after the target device detects a confirmation instruction of the user for the image to be confirmed.
After the front-end detection module 21 receives the confirmation information for the image to be confirmed sent by the target device, the image to be confirmed is determined as a reference map, the link information corresponding to the image to be confirmed is stored in the database as a link address (first link information) of the reference map, and the destination address and the configuration information set by the user for the reference map are further stored in the database.
Further, the detection generator in the front-end detection module 21 may query the database periodically, and when a target object that needs to be detected is detected, generate an authorization code, a destination address, first link information, and configuration information corresponding to the target object into a message queue, which may be consumed by the instance running module 22 through a message middleware rockmq.
Further, when actually executing the detection task, the instance running module 22 may open a headless browser (a first browser) by using Puppeteer, acquire a corresponding cookie from the database according to the authorization code in the message queue, configure the cookie for the headless browser after querying the cookie, open a detection page corresponding to the destination address according to the destination address in the message queue, capture a screenshot of the detection page after loading the detection page, generate a real-time running chart, and store the running chart in the file server. The file server can store the operation diagram and generate second link information corresponding to the operation diagram.
Further, the instance running module 22 further obtains second link information corresponding to the running chart from the file server; and sends the first link information and the second link information to the comparison service module 23, and the comparison service module 23 obtains the reference graph and the operation graph according to the first link information and the second link information, obtains a comparison result according to a preset comparison algorithm, and feeds the comparison result back to the instance operation module 22. The comparison algorithm may be a similarity algorithm or a histogram similarity algorithm, and specific algorithms may refer to the prior art and are not described herein again.
Optionally, the instance running module 22 may also send the network request log and the console log in the foregoing detection page loading process, together with the detection result, to the target device.
Specifically, the example running module 22 may send the network request log, the console log, and the detection result in the foregoing detection page loading process to the file server, and the file server generates a url corresponding to the network request log, a url corresponding to the console log, and a url corresponding to the detection result, respectively; and the example running module 22 sends the url corresponding to the network request log, the url corresponding to the console log, and the url corresponding to the detection result to the target device, so that the target device obtains corresponding content from the file server to display according to the operation of the user on any url or a plurality of urls in the url corresponding to the network request log, the url corresponding to the console log, and the url corresponding to the detection result.
Accordingly, in step S204, analyzing the reference graph whose detection information corresponds to the target object, and obtaining the detection result corresponding to the target object includes:
s2041, comparing the detection information with a reference image, and determining difference information between the detection information and the reference image;
s2042, determining a detection result by using the distinguishing information. Specifically, the aforementioned S204 may be performed by the aforementioned comparison service module 23.
Further, the method further comprises:
and detecting whether the sending time length for sending the preset code information to the target equipment exceeds the preset time length or not, and if so, sending the preset code information to the target equipment again.
Further, since the front-end detection module 21 may be deployed on multiple servers, and include multiple instances, when it is detected that the sending duration of the preset code information corresponding to the known authorization code sent to the target device exceeds the preset duration, or it is detected that the user refreshes the two-dimensional code, the scanning state of the two-dimensional code corresponding to the two-dimensional code stored in the Redis may be set to be expired, and the two-dimensional code generation text is sent to the target device again based on another instance.
Optionally, each instance may correspond to a page with a timing task responsible for clearing the two-dimensional code out of date, or a page with a successfully scanned code, and control to close the corresponding browser page and delete the Rediskey at the same time, thereby avoiding memory leakage.
Further, the target device side may display detection result item information corresponding to each time point, where the detection result item information may include a url corresponding to the comparison result, a similarity value, a url corresponding to the resource request log, and the like.
Further, the detection generator in the front-end detection module 21 may further determine an update period of the corresponding cookie according to the configuration information corresponding to the target object, and determine an indication identifier according to the update period, where the indication identifier may be included in the message sequence, and when the instance running module 22 determines that the cookie corresponding to the target object needs to be updated according to the message sequence, correspondingly update the cookie in the database, and save the corresponding cookie into the database again. Alternatively, the front-end detection module 21 may update the cookie information once a day.
The method comprises the steps that authorization information aiming at a target object is obtained, the authorization information is received from target equipment and is determined by the target equipment based on operation information of a user; detecting the target object by using the authorization information and the configuration information corresponding to the target object to obtain detection information; analyzing the detection information and a reference graph corresponding to the target object to obtain a detection result corresponding to the target object; the detection result is sent to the target device, so that the target device can display the detection result, authorization information of the user is stored through configuration authorization, page detection of an online environment can be automatically performed on a service system corresponding to the authorization information under the authorization information, the detection result can be sent to the front-end device in real time for the user to observe, the efficiency of the user for determining problems according to the detection result is improved, and the detection efficiency is correspondingly improved.
According to the scheme, the user login state information can be stored through configuration authorization, under the authorization information, the relevant page is configured to perform static page detection of an online environment, end-to-end detection is achieved, the online stability of the system is guaranteed, online automatic testing of the server side is supported, the function of artificial intelligence picture similarity calculation is combined specifically, the stability of the business system can be detected in real time, online problems generated by each node of a front end, a network link layer, a rear end service and a bottom layer service which can be perceived by a user can be fed back in time, and the detection efficiency of the business system is further improved.
The scheme is further explained by combining specific scenes as follows:
scene one,
Referring to fig. 3, a user clicks an authorization management button on one page of a detection management platform, a first setting frame pops up on the page, the user fills a detection address and a self-defined authorization name in the first setting frame, clicks to acquire an authorization two-dimensional code, a PC generates an authorization start instruction, sends an authorization start request to a server, and after receiving the authorization start request, the server starts a headless browser (a first browser), intercepts corresponding login service information, generates preset code information by using the login service information, and feeds the preset code information back to the PC; and the PC displays the two-dimensional code for scanning by a user.
Scene two,
Referring to fig. 3, a user clicks a detection management button on a page of a detection management platform, a second setting frame pops up on the page, the user inputs a target address in the second setting frame, selects a target authorization name from the set authorization names, clicks an acquire reference map button, and the PC sends a reference map acquisition request to a server; the server side receives the reference image acquisition request and determines reference image information according to a target address in the reference image acquisition request; sending the reference graph information to a PC (personal computer), enabling the PC to display the reference graph for a user to confirm, and further receiving link information corresponding to a detection result corresponding to the detection frequency sent by a server and alarm information corresponding to the link information after the user sets the detection frequency based on the reference graph; the user can obtain the corresponding detection result by clicking the link information to observe the detailed condition of the detection result.
Scene three,
A front-end detection module in the server-side equipment can execute the initialization and a two-dimensional code expiration refreshing program based on the establishment authorization interface, and inquire the latest key state of redis according to the authorization code based on a timed polling code scanning state interface; setting the mysql cookie to be in a storage state according to the authorization code through the storage authorization interface; by acquiring a reference graph interface, opening a browser page, inquiring cookies from mysql, setting browser cookies, opening the page, generating a reference graph and closing the browser. Meanwhile, a two-dimension code state polling interface of the authentication service can be detected, and the two-dimension code state of the page is stored in the redis.
Further, the present application also provides an information processing method, which is applicable to the aforementioned target device, and specifically, the method includes: determining authorization information and configuration information aiming at the target object according to the operation information of the user, and sending the authorization information and the configuration information to the server-side equipment; receiving a detection result determined by the server device by using the authorization information and the configuration information, wherein the detection result is that the server device detects the target object to obtain detection information; analyzing the detection information and a reference image corresponding to the target object to obtain the detection information; and displaying the detection result.
For the specific implementation corresponding to this embodiment, reference may be made to the foregoing description, and details are not described herein.
Fig. 4 is a schematic structural diagram of an information processing apparatus according to an exemplary embodiment of the present application, where the apparatus is applicable to a server device, and specifically includes: an acquisition module 41, a detection module 42, an analysis module 43, and a transmission module 44; wherein:
an obtaining module 41, configured to obtain authorization information for a target object, where the authorization information is received from a target device and determined by the target device based on operation information of a user;
the detection module 42 is configured to detect the target object by using the authorization information and the configuration information corresponding to the target object, so as to obtain detection information;
an analysis module 43, configured to analyze the reference map corresponding to the target object and the detection information to obtain a detection result corresponding to the target object;
and the sending module 44 is configured to send the detection result to the target device, so that the target device displays the detection result.
Optionally, when the apparatus is configured to detect the target object by using the authorization information and the configuration information corresponding to the target object to obtain the detection information, the apparatus is specifically configured to:
and acquiring image information of the target object based on a first browser as the detection information by using the authorization information and the configuration information.
Optionally, the apparatus is further configured to:
when a destination address aiming at a target object sent by target equipment is received, determining reference information corresponding to the target object according to the destination address;
sending the reference information to the target equipment so that the target equipment displays the corresponding image to be confirmed according to the reference information;
and if the confirmation information aiming at the image to be confirmed, which is sent by the target equipment, is received, determining the reference image based on the reference information.
Optionally, when the apparatus is configured to analyze the reference map of the detection information corresponding to the target object to obtain a detection result corresponding to the target object, the apparatus is specifically configured to:
comparing the detection information with the reference image to determine the difference information between the detection information and the reference image;
and determining the detection result by using the distinguishing information.
Optionally, the apparatus is further configured to:
starting a second browser when receiving an authorized starting request sent by target equipment when detecting an authorized starting instruction of a user;
obtaining login service information corresponding to the authorization starting request based on the second browser;
generating preset code information by using login service information;
and sending the preset code information to the target equipment so that the target equipment displays the corresponding login code based on the preset code information for the user to scan to determine the authorization information.
Optionally, the apparatus is further configured to:
detecting whether the sending time length of the preset code information sent to the target equipment exceeds the preset time length or not, if so, judging whether the sending time length exceeds the preset time length
And re-sending the preset code information to the target equipment.
Optionally, the apparatus is further configured to:
and when the detection result meets the alarm condition, sending corresponding alarm information to the target equipment so that the target equipment can display the alarm information.
It is to be understood that apparatus embodiments and method embodiments may correspond to one another and that similar descriptions may refer to method embodiments. To avoid repetition, further description is omitted here. Specifically, the apparatus may perform the method embodiment, and the foregoing and other operations and/or functions of each module in the apparatus are respectively corresponding flows in each method in the method embodiment, and for brevity, are not described again here.
The apparatus of the embodiments of the present application is described above in connection with the drawings from the perspective of functional modules. It should be understood that the functional modules may be implemented by hardware, by instructions in software, or by a combination of hardware and software modules. Specifically, the steps of the method embodiments in the present application may be implemented by integrated logic circuits of hardware in a processor and/or instructions in the form of software, and the steps of the method disclosed in conjunction with the embodiments in the present application may be directly implemented by a hardware decoding processor, or implemented by a combination of hardware and software modules in the decoding processor. Alternatively, the software modules may be located in random access memory, flash memory, read only memory, programmable read only memory, electrically erasable programmable memory, registers, and the like, as is well known in the art. The storage medium is located in a memory, and a processor reads information in the memory and completes the steps in the above method embodiments in combination with hardware thereof.
Fig. 5 is a schematic block diagram of an electronic device provided in an embodiment of the present application, where the electronic device may include:
a memory 501 and a processor 502, the memory 501 being adapted to store a computer program and to transfer the program code to the processor 502. In other words, the processor 502 may call and run a computer program from the memory 501 to implement the method in the embodiment of the present application.
For example, the processor 502 may be configured to perform the above-described method embodiments according to instructions in the computer program.
In some embodiments of the present application, the processor 502 may include, but is not limited to:
general purpose processors, Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components, and the like.
In some embodiments of the present application, the memory 501 includes, but is not limited to:
volatile memory and/or non-volatile memory. The non-volatile memory may be a Read-only memory (ROM), a programmable Read-only memory (PROM), an erasable programmable Read-only memory (erasabprom, EPROM), an electrically erasable programmable Read-only memory (EEPROM), or a flash memory. Volatile Memory can be Random Access Memory (RAM), which acts as external cache Memory. By way of illustration, and not limitation, many forms of RAM are available, such as static random access memory (statram, SRAM), dynamic random access memory (dynamic RAM, DRAM), synchronous dynamic random access memory (synchronous DRAM, SDRAM), Double Data Rate synchronous dynamic random access memory (ddr Data Rate SDRAM, ddr SDRAM), enhanced synchronous SDRAM (ESDRAM), synclink DRAM (SLDRAM), and Direct Rambus RAM (DRRAM).
In some embodiments of the present application, the computer program may be partitioned into one or more modules, which are stored in the memory 501 and executed by the processor 502 to perform the methods provided herein. The one or more modules may be a series of computer program instruction segments capable of performing certain functions, the instruction segments describing the execution of the computer program in the electronic device.
As shown in fig. 5, the electronic device may further include:
a transceiver 503, the transceiver 503 may be connected to the processor 502 or the memory 501.
The processor 502 may control the transceiver 503 to communicate with other devices, and specifically, may transmit information or data to the other devices or receive information or data transmitted by the other devices. The transceiver 503 may include a transmitter and a receiver. The transceiver 503 may further include one or more antennas.
It should be understood that the various components in the electronic device are connected by a bus system that includes a power bus, a control bus, and a status signal bus in addition to a data bus.
The present application also provides a computer storage medium having stored thereon a computer program which, when executed by a computer, enables the computer to perform the method of the above-described method embodiments. In other words, the present application also provides a computer program product containing instructions, which when executed by a computer, cause the computer to execute the method of the above method embodiments.
When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions described in accordance with the embodiments of the present application occur, in whole or in part, when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, from one website, computer, server, or data center to another website, computer, server, or data center via wire (e.g., coaxial cable, fiber optic, Digital Subscriber Line (DSL)) or wireless (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that includes one or more of the available media. The usable medium may be a magnetic medium (e.g., a floppy disk, a hard disk, a magnetic tape), an optical medium (e.g., a Digital Video Disk (DVD)), or a semiconductor medium (e.g., a Solid State Disk (SSD)), among others.
According to one or more embodiments of the present application, there is provided an information processing method including: acquiring authorization information aiming at a target object, wherein the authorization information is received from target equipment and is determined by the target equipment based on operation information of a user; detecting the target object by using the authorization information and the configuration information corresponding to the target object to obtain detection information; analyzing the detection information and a reference graph corresponding to the target object to obtain a detection result corresponding to the target object; and sending the detection result to the target equipment so that the target equipment can display the detection result.
According to one or more embodiments of the present application, detecting a target object by using configuration information corresponding to authorization information and the target object, and obtaining detection information includes:
and acquiring image information of the target object based on a first browser as the detection information by using the authorization information and the configuration information.
According to one or more embodiments of the present application, the method further comprises:
when a destination address aiming at a target object sent by target equipment is received, determining reference information corresponding to the target object according to the destination address;
sending the reference information to the target equipment so that the target equipment displays the corresponding image to be confirmed according to the reference information;
and if the confirmation information aiming at the image to be confirmed, which is sent by the target equipment, is received, determining the reference image based on the reference information.
According to one or more embodiments of the present application, analyzing the reference graph in which the detection information corresponds to the target object, and obtaining the detection result corresponding to the target object includes:
comparing the detection information with the reference image to determine the difference information between the detection information and the reference image;
and determining the detection result by using the distinguishing information.
According to one or more embodiments of the present application, the method further comprises:
starting a second browser when receiving an authorized starting request sent by target equipment when detecting an authorized starting instruction of a user;
obtaining login service information corresponding to the authorization starting request based on the second browser;
generating preset code information by using login service information;
and sending the preset code information to the target equipment so that the target equipment displays the corresponding login code based on the preset code information for the user to scan to determine the authorization information.
According to one or more embodiments of the present application, the method further comprises:
detecting whether the sending time length of the preset code information sent to the target equipment exceeds the preset time length or not, if so, judging whether the sending time length exceeds the preset time length
And re-sending the preset code information to the target equipment.
According to one or more embodiments of the present application, the method further comprises: and when the detection result meets the alarm condition, sending corresponding alarm information to the target equipment so that the target equipment can display the alarm information.
According to one or more embodiments of the present application, there is provided an information processing method including: determining authorization information and configuration information aiming at the target object according to the operation information of the user, and sending the authorization information and the configuration information to the server-side equipment; receiving a detection result determined by the server device by using the authorization information and the configuration information, wherein the detection result is that the server device detects the target object to obtain detection information; analyzing the detection information and a reference image corresponding to the target object to obtain the detection information; and displaying the detection result.
According to one or more embodiments of the present application, there is provided an information processing apparatus including: the acquisition module is used for acquiring authorization information aiming at the target object, wherein the authorization information is received from the target equipment and is determined by the target equipment based on the operation information of the user; the detection module is used for detecting the target object by utilizing the authorization information and the configuration information corresponding to the target object to obtain detection information; the analysis module is used for analyzing the detection information and the reference graph corresponding to the target object to obtain a detection result corresponding to the target object; and the sending module is used for sending the detection result to the target equipment so that the target equipment can display the detection result.
According to one or more embodiments of the present application, when the apparatus is configured to detect a target object by using configuration information corresponding to authorization information and the target object, and obtain detection information, the apparatus is specifically configured to:
and acquiring image information of the target object based on a first browser as the detection information by using the authorization information and the configuration information.
According to one or more embodiments of the present application, the apparatus is further configured to:
when a destination address aiming at a target object sent by target equipment is received, determining reference information corresponding to the target object according to the destination address;
sending the reference information to the target equipment so that the target equipment displays the corresponding image to be confirmed according to the reference information;
and if the confirmation information aiming at the image to be confirmed, which is sent by the target equipment, is received, determining the reference image based on the reference information.
According to one or more embodiments of the present application, when the apparatus is configured to analyze a reference map of detection information corresponding to a target object to obtain a detection result corresponding to the target object, the apparatus is specifically configured to:
comparing the detection information with the reference image to determine the difference information between the detection information and the reference image;
and determining the detection result by using the distinguishing information.
According to one or more embodiments of the present application, the apparatus is further configured to:
starting a second browser when receiving an authorized starting request sent by target equipment when detecting an authorized starting instruction of a user;
obtaining login service information corresponding to the authorization starting request based on the second browser;
generating preset code information by using login service information;
and sending the preset code information to the target equipment so that the target equipment displays the corresponding login code based on the preset code information for the user to scan to determine the authorization information.
According to one or more embodiments of the present application, the apparatus is further configured to:
and detecting whether the sending time length for sending the preset code information to the target equipment exceeds the preset time length or not, and if so, sending the preset code information to the target equipment again.
According to one or more embodiments of the present application, the apparatus is further configured to: and when the detection result meets the alarm condition, sending corresponding alarm information to the target equipment so that the target equipment can display the alarm information.
According to one or more embodiments of the present application, there is provided an electronic device including:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the methods described above via execution of the executable instructions.
According to one or more embodiments of the present application, a computer-readable storage medium is provided, on which a computer program is stored, characterized in that the computer program realizes the above-mentioned methods when executed by a processor.
Those of ordinary skill in the art will appreciate that the various illustrative modules and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware or combinations of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the several embodiments provided in the present application, it should be understood that the disclosed system, apparatus and method may be implemented in other ways. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the module is merely a logical division, and other divisions may be realized in practice, for example, a plurality of modules or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed mutual coupling or direct coupling or communication connection may be an indirect coupling or communication connection through some interfaces, devices or modules, and may be in an electrical, mechanical or other form.
Modules described as separate parts may or may not be physically separate, and parts displayed as modules may or may not be physical modules, may be located in one place, or may be distributed on a plurality of network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of the present embodiment. For example, functional modules in the embodiments of the present application may be integrated into one processing module, or each of the modules may exist alone physically, or two or more modules are integrated into one module.
The above description is only for the specific embodiments of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily conceive of the changes or substitutions within the technical scope of the present application, and shall be covered by the scope of the present application. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (11)

1. An information processing method characterized by comprising:
acquiring authorization information aiming at a target object, wherein the authorization information is received from target equipment and is determined by the target equipment based on operation information of a user;
detecting the target object by using the authorization information and the configuration information corresponding to the target object to obtain detection information;
analyzing the detection information and a reference graph corresponding to the target object to obtain a detection result corresponding to the target object;
and sending the detection result to the target equipment so that the target equipment displays the detection result.
2. The method of claim 1, wherein detecting the target object by using the authorization information and configuration information corresponding to the target object, and obtaining detection information comprises:
and acquiring image information of the target object based on a first browser as the detection information by using the authorization information and the configuration information.
3. The method of claim 2, further comprising:
when a destination address aiming at the target object and sent by the target equipment is received, determining reference information corresponding to the target object according to the destination address;
sending the reference information to the target equipment so that the target equipment displays a corresponding image to be confirmed according to the reference information;
and if the confirmation information aiming at the image to be confirmed, which is sent by the target equipment, is received, determining the reference image based on the reference information.
4. The method of claim 1, wherein analyzing the detection information and the reference map corresponding to the target object to obtain the detection result corresponding to the target object comprises:
comparing the detection information with the reference image to determine the difference information between the detection information and the reference image;
and determining the detection result by using the distinguishing information.
5. The method of claim 1, further comprising:
starting a second browser when receiving an authorized starting request sent by the target device when detecting an authorized starting instruction of a user;
obtaining login service information corresponding to the authorization starting request based on the second browser;
generating preset code information by using the login service information;
and sending the preset code information to the target equipment so that the target equipment displays a corresponding login code for a user to scan based on the preset code information to determine the authorization information.
6. The method of claim 5, further comprising:
detecting whether the sending time length of the preset code information sent to the target equipment exceeds the preset time length or not, if so, judging whether the sending time length exceeds the preset time length
And re-sending the preset code information to the target equipment.
7. The method of claim 1, further comprising:
and when the detection result meets an alarm condition, sending corresponding alarm information to the target equipment so that the target equipment displays the alarm information.
8. An information processing method characterized by comprising:
determining authorization information and configuration information aiming at a target object according to operation information of a user, and sending the authorization information and the configuration information to server-side equipment;
receiving a detection result determined by the server device by using the authorization information and the configuration information, wherein the detection result is that the server device detects the target object to obtain detection information; analyzing the detection information and a reference image corresponding to the target object to obtain the detection information;
and displaying the detection result.
9. An information processing apparatus characterized by comprising:
the system comprises an acquisition module, a storage module and a processing module, wherein the acquisition module is used for acquiring authorization information aiming at a target object, the authorization information is received from a target device and is determined by the target device based on operation information of a user;
the detection module is used for detecting the target object by utilizing the authorization information and the configuration information corresponding to the target object to obtain detection information;
the analysis module is used for analyzing the detection information and a reference graph corresponding to the target object to obtain a detection result corresponding to the target object;
and the sending module is used for sending the detection result to the target equipment so as to display the detection result by the target equipment.
10. An electronic device, comprising:
a processor; and
a memory for storing executable instructions of the processor;
wherein the processor is configured to perform the method of any one of claims 1-7 or claim 8 via execution of the executable instructions.
11. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the method of any one of claims 1-7 or 8.
CN202111544832.6A 2021-12-16 2021-12-16 Information processing method, information processing device, electronic equipment and computer readable storage medium Pending CN114265642A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111544832.6A CN114265642A (en) 2021-12-16 2021-12-16 Information processing method, information processing device, electronic equipment and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111544832.6A CN114265642A (en) 2021-12-16 2021-12-16 Information processing method, information processing device, electronic equipment and computer readable storage medium

Publications (1)

Publication Number Publication Date
CN114265642A true CN114265642A (en) 2022-04-01

Family

ID=80827560

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111544832.6A Pending CN114265642A (en) 2021-12-16 2021-12-16 Information processing method, information processing device, electronic equipment and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN114265642A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117744064A (en) * 2024-02-19 2024-03-22 民航成都电子技术有限责任公司 Protection method, device, medium and equipment for civil aviation duty verification terminal
CN117744064B (en) * 2024-02-19 2024-04-30 民航成都电子技术有限责任公司 Protection method, device, medium and equipment for civil aviation duty verification terminal

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN117744064A (en) * 2024-02-19 2024-03-22 民航成都电子技术有限责任公司 Protection method, device, medium and equipment for civil aviation duty verification terminal
CN117744064B (en) * 2024-02-19 2024-04-30 民航成都电子技术有限责任公司 Protection method, device, medium and equipment for civil aviation duty verification terminal

Similar Documents

Publication Publication Date Title
US10277697B2 (en) Method and system for pushing web application message
CN105530175B (en) Message processing method, device and system
CN103329113B (en) Configuration is accelerated and custom object and relevant method for proxy server and the Dynamic Website of hierarchical cache
CN103023918B (en) The mthods, systems and devices logged in are provided for multiple network services are unified
CN108632253B (en) Client data security access method and device based on mobile terminal
CN102413151B (en) Network resource sharing method and system
CN102137059B (en) Method and system for blocking malicious accesses
CN108259425A (en) The determining method, apparatus and server of query-attack
CN104468592B (en) Login method and login system
CN103607385A (en) Method and apparatus for security detection based on browser
US20170318054A1 (en) Authentication incident detection and management
US20200084204A1 (en) Third party multi-factor authentication with push notifications
CN108810896B (en) Connection authentication method and device of wireless access point
CN106254319B (en) Light application login control method and device
CN109726545B (en) Information display method, equipment, computer readable storage medium and device
CN116484338A (en) Database access method and device
US11075922B2 (en) Decentralized method of tracking user login status
US9537807B2 (en) Automatically transitioning a user from a call to action to an enrollment interface
CN107391714A (en) A kind of screenshot method, capture server, sectional drawing service system and medium
CN104009999A (en) Method and device for preventing ARP cheating and network access server
CN114265642A (en) Information processing method, information processing device, electronic equipment and computer readable storage medium
CN110177096B (en) Client authentication method, device, medium and computing equipment
CN115189897A (en) Access processing method and device for zero trust network, electronic equipment and storage medium
CN113626789A (en) User operation request processing method and device and electronic equipment
CN109302446B (en) Cross-platform access method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination