CN114329360B - Method, electronic device and medium for fuzzification pkg - Google Patents
Method, electronic device and medium for fuzzification pkg Download PDFInfo
- Publication number
- CN114329360B CN114329360B CN202210012991.XA CN202210012991A CN114329360B CN 114329360 B CN114329360 B CN 114329360B CN 202210012991 A CN202210012991 A CN 202210012991A CN 114329360 B CN114329360 B CN 114329360B
- Authority
- CN
- China
- Prior art keywords
- pkg
- file
- files
- installation amount
- class
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Landscapes
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
Abstract
The invention discloses a method, an electronic device and a medium for fuzzifying pkg, wherein the method comprises the steps of obtaining a first pkg list according to a pkg white list and obtaining a second pkg list based on the first pkg list; acquiring an installation amount interval corresponding to the file identifier of a first type pkg file according to a first installation amount corresponding to the file identifier of the first type pkg file, wherein an upper limit value and a lower limit value of the installation amount interval are acquired according to a device proportion threshold corresponding to the file identifier of the first type pkg file; the second pkg files corresponding to the first class pkg files are determined according to the installation amount interval, and therefore the method can accurately determine the limitation condition for screening the installation amount of the second class pkg texts, and avoid the situation that a pkg file group constructed by the first class pkg files and the second class pkg files corresponding to the first class pkg files cannot effectively obscure the first class pkg and further cannot improve the information security due to the fact that the number of the second class pkg files corresponding to the first class pkg files is small.
Description
Technical Field
The invention relates to the technical field of pkg processing, in particular to a method, electronic equipment and medium for fuzzification pkg.
Background
With the popularization of electronic devices, each electronic device is related to information security, and information security is more and more emphasized in the current network environment.
At present, most electronic equipment has installed a large amount of APPs, these APPs are used for the use of scenes such as life or work how much, therefore every APP all involves the information, and then can produce malicious behaviors such as revealing information or malicious transmission information and influence information security, especially must have installation package configuration file when installing the APP, pkg file for short, pkg file is one of the sources of obtaining the information, but among the prior art, all encrypt or many information transmission in-process through many information encryption to information security's technical scheme, few technical scheme relates to the security that improves pkg file information, therefore, lead to pkg file information's revealing or malicious transmission, influence electronic equipment's information security.
Disclosure of Invention
In order to solve the problems in the prior art, any second type pkg file corresponding to the first type pkg file is screened out through the installation amount of the first type pkg file to form a target pkg file group, so that a single pkg file is replaced, the pkg is fuzzified, and the information safety is improved; the embodiment of the invention provides a method for fuzzification pkg, which comprises the following steps:
a method for obfuscating pkg, the method comprising the steps of:
s10, obtaining a first pkg list A ═ A (A) according to pkg white list1,A2,……,Am) Wherein A isiThe file identifier of the ith first-type pkg file is referred, i is 1 … … m, and m is the number of first-type pkg files;
s20, obtaining AiCorresponding first installation amount TiAnd according to TiObtaining AiCorresponding installation amount interval ZiWherein, Zi=[Ziq,Zip]:
wherein, λ is a preset parameter;
s30, according to Z in AiThe upper limit value of (A) is obtained by sorting Am,Am-1,……,A1);
S40, get the second pkg list B ═ B (B)1,B2,……,Bn) And ordering B to obtain B ═ Bn,Bn-1,……,B1) Wherein, BjThe file identifier of the jth second-type pkg file is referred to, j is 1 … … n, and n is the number of the second-type pkg files;
s50, traverse A 'and B' and when BjSecond installation amount < ZiAt the time of corresponding installation amount, B is acquiredjSecond installation ofLoading capacityTo Bj+λSecond installation amount ofAnd build an intermediate data set
S70, according to FiObtaining FiCorresponding first object pkg group and FiThe corresponding set of first objectives pkg is fed back to the database.
The invention also protects a non-transitory computer readable storage medium having stored therein at least one instruction or at least one program, which is loaded and executed by a processor to implement the above method.
The invention also protects an electronic device comprising a processor and the non-transitory computer readable storage medium described above.
The invention provides a method, an electronic device and a medium for fuzzifying pkg, which have the following technical effects:
the method comprises the steps of obtaining a first pkg list and a second pkg list based on a first pkg list according to an pkg white list; acquiring an installation amount interval corresponding to the file identifier of a first type pkg file according to a first installation amount corresponding to the file identifier of the first type pkg file, wherein an upper limit value and a lower limit value of the installation amount interval are acquired according to a device proportion threshold corresponding to the file identifier of the first type pkg file; the second pkg files corresponding to the first pkg files are determined according to the installation amount interval, so that the method can accurately determine the limitation condition for screening the installation amount of the second pkg files, and avoid the situation that the pkg file group constructed by the first pkg files and the second pkg files corresponding to the first pkg files cannot effectively obscure the first pkg files due to the fact that the number of the second pkg files corresponding to the first pkg files is small, and further cannot improve the information safety.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present invention, the drawings needed to be used in the description of the embodiments will be briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present invention, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic flow chart of a method for obfuscating pkg according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be obtained by a person skilled in the art without any inventive step based on the embodiments of the present invention, are within the scope of the present invention.
It should be noted that the terms "first," "second," and the like in the description and claims of the present invention and in the drawings described above are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the data so used is interchangeable under appropriate circumstances such that the embodiments of the invention described herein are capable of operation in other sequences than those illustrated or described herein. Furthermore, the terms "comprises," "comprising," and "having," and any variations thereof, are intended to cover a non-exclusive inclusion, such that a process, method, system, article, or server that comprises a list of steps or elements is not necessarily limited to those steps or elements expressly listed, but may include other steps or elements not expressly listed or inherent to such process, method, article, or apparatus.
Example one
As shown in fig. 1, the present embodiment provides a method for obfuscating pkg, the method including the steps of:
s10, obtaining a first pkg list A ═ A (A) according to pkg white list1,A2,……,Am) Wherein A isiThe file identifier of the ith first-type pkg file is referred to, i is 1 … … m, and m is the number of first-type pkg files.
Specifically, the sample pkg list includes file identifications for the S sample pkg files.
Specifically, before the step S100, the sample pkg is also determined by the following steps:
s1, obtaining the file identification of a plurality of original pkg files and the installation amount corresponding to each original pkg file.
Further, the installation amount corresponding to the original pkg file refers to the number of electronic devices that install the original pkg file.
Further, the file identification of the original pkg file refers to the unique identity that characterizes the original pkg file.
And S3, when the installation amount corresponding to the original pkg file is larger than a preset first installation amount threshold value, taking the original pkg file as a sample pkg file.
Further, the value range of the first installation amount threshold is 500-600, and preferably, the value of the first installation amount threshold is 500.
The steps S1-S3 can remove pkg files with small installation amount, and avoid the influence of overlarge data amount on the data processing efficiency.
Specifically, the pkg white list refers to a pkg list constructed based on file identification of a target pkg file, where an installation amount corresponding to the target pkg file is greater than a preset second installation amount threshold D0。
Further, D0Has a value in the range of 10000-15000, preferably D0Has a value of 10000.
Specifically, the first type pkg file refers to any target pkg file in the pkg white list stored in the sample pkg list.
S20, obtaining AiCorresponding first installation amount TiAnd according to TiObtaining AiCorresponding installation amount interval ZiWherein, Zi=[Ziq,Zip]:
wherein λ is a preset parameter.
Specifically, the first installation amount refers to the number of electronic devices that install any one first type pkg file.
In particular, Zip>ZiqThe installation amount interval to be supplemented corresponding to any one first-type pkg file can be determined, so that the equipment proportion value of the first-type pkg file meets the corresponding equipment proportion threshold, pkg fuzzification is realized, and information safety is improved.
Specifically, in the step S20, q is also determined by the following stepsiAnd pi:
S201, obtaining a mounting quantity threshold set D { (D)0,D1],(D1,D2],……,(Dk-1,Dk]Wherein (D)r-1,Dr]The number of the r installation quantity threshold intervals is defined, wherein r is 1 … … k, and k is the number of the installation quantity intervals; it can be understood that: d1To DkAre all preset installation quantity threshold values, wherein Dr-1Is the lower limit value of the threshold interval of the r-th installation amount, DrIs the upper limit value of the threshold interval of the r-th installation quantity, namely Dr>Dr-1。
S203, obtaining L { [ L ] according to D1,L2),[L2,L3),……,[Lk,Lk+1)},LrMeans that (D)r-1,Dr]Corresponding device duty cycle threshold, specifically L1<L2<……<Lk<Lk+1And L isk+1Is 0.99 to 1, preferably, Lk+1Is 0.99.
Specifically, the device utilization threshold refers to a preset utilization threshold of the number of electronic devices corresponding to the first type pkg file.
S205, when TiIs in (D)r-1,Dr]When internal, the L isrAs q isiAnd will Lr+1As pi。
Preferably, when k is 3, L is (L)1,L2,L3) Wherein L is1=0.85,L2=0.9,L3=0.95,L40.99; the installation amount interval corresponding to any one first type pkg file can be determined according to the installation amount threshold and the equipment proportion threshold, and the accuracy of the installation amount interval corresponding to the first type pkg file is guaranteed.
S30, according to Z in AiThe upper limit value of (A) is obtained by sorting Am,Am-1,……,A1) It can be understood that: the file identification of the first type pkg file in A' is in Z1p<Z2p<……<Zip<……<ZmpThe rules of (c) are ordered.
S40, get the second pkg list B ═ B (B)1,B2,……,Bn) And ordering B to obtain B ═ Bn,Bn-1,……,B1) Wherein, BjRefers to the file identifier of the jth second type pkg file, j equals to 1 … … n, and n is the number of the second type pkg files.
Specifically, the second type pkg file refers to any sample pkg file in the list of samples pkg except a.
Further, S ═ m + n.
Preferably, BnSecond installation amount > Bn-1Second mounting amount > … … > B1The second mounting amount of (2).
Specifically, the second installation amount refers to the number of electronic devices that install any of the second type pkg files.
S50, go through A 'and B' and when BjSecond installation amount < ZiAt the time of corresponding installation amount, B is acquiredjSecond mounting amount ofTo Bj+λSecond installation amount ofAnd constructed as intermediate data sets
S70, according to FiObtaining FiCorresponding first target pkg group and FiThe corresponding set of first objectives pkg is fed back to the database.
Specifically, the step S70 further includes the steps of:
s701, obtaining FiCorresponding target ratio Fi', wherein, Fi' the following conditions are met:
wherein, VβiRefers to UiThe installation amount corresponding to the file identifier corresponding to the beta-th designated pkg file; any first type of files can be accurately determined through the installation amount interval corresponding to the first type pkg filespkg the second type pkg file matched with the file, the accuracy of the device occupation ratio of the pkg file group is ensured.
S703, when q isi≤Fi'≤piWhen is, F isi' corresponding first target pkg in the file group feedback database, wherein, Fi' corresponding first object pkg File group includes AiCorresponding first type pkg file and VβiThe corresponding designation pkg file.
The present implementation provides a method for obfuscating pkg by obtaining a first pkg list according to a pkg whitelist and obtaining a second pkg list based on the first pkg list; acquiring a mounting quantity interval corresponding to the file identifier of a first type pkg file according to a first mounting quantity corresponding to the file identifier of the first type pkg file, wherein an upper limit value and a lower limit value of the mounting quantity interval are acquired according to an equipment proportion threshold value corresponding to the file identifier of the first type pkg file; the second pkg files corresponding to the first class pkg files are determined according to the installation amount interval, and therefore the method can accurately determine the limitation condition for screening the installation amount of the second class pkg texts, and avoid the situation that a pkg file group constructed by the first class pkg files and the second class pkg files corresponding to the first class pkg files cannot effectively obscure the first class pkg and further cannot improve the information security due to the fact that the number of the second class pkg files corresponding to the first class pkg files is small.
In a specific embodiment, the method further comprises the following steps:
s600, according to FiObtaining FiCorresponding second target pkg group and FiThe corresponding set of second objectives pkg is fed back to the database.
Specifically, the step S600 further includes the steps of:
s601, obtaining A ═ A'1,A'2,……,A't),A'xThe file identifier of the xth first key pkg file is referred to, where x is 1 … … t, and t is the number of files of the first key pkg.
Specifically, the file identification of the file of the first key pkg refers to the deletion of F from Ai' the file identification of any first type pkg file after the corresponding Ai.
Specifically, A'1Corresponding installation amount > A'2Corresponding installation quantity > … … > A'tThe corresponding installation amount; it can be understood that: a'xThe corresponding mount amount is A'xThe upper limit value of the corresponding installation amount interval.
S603, obtaining B ═ B'1,B'2,……,B'g),B'yThe file identifier of the x-th second key pkg file is referred to, y is 1 … … g, and g is the number of second key pkg files.
Specifically, the file identification of the file of the second key pkg refers to the deletion of F from Bi' File identification of any second class pkg file following the file identification of the corresponding designated pkg file.
Specifically, B'1Installation amount of (2) > B'2Installation amount of > … … > B'gThe mounting amount of (a); it can be understood that: b'yThe corresponding mount amount is mount B'yThe number of electronic devices corresponding to the second key pkg file.
S605, traverse A ' and B ' and when B 'yInstallation amount of (2) < A'xA 'is obtained at the time of the corresponding mount amount'xA corresponding second target pkg file group, wherein A'xThe corresponding second target pkg file group includes: a'xCorresponding first Key pkg File and B'yCorresponding second Key pkg File to B'y+λCorresponding second key pkg file.
In the step S600, the second type pkg file which is suitable for the equipment occupation ratio value not meeting the condition pkg file group or the first type pkg file is not determined can be reconstructed or the second type pkg file is constructed, the installation amount of the screened second type pkg file is accurately determined, the suitable pkg file group is established, omission of the first type pkg file is avoided, the probability of templating the first type pkg is realized, and the information security is further improved.
In a specific embodiment, the method further comprises the following step of obtaining Fi:
S100, obtaining Zp=(Z1p,Z2p,……,Zip,……,Zmp) And Zq=(Z1q,Z2q,……,Ziq,……,Zmq)。
In particular, Z1p<Z2p<……<Zip<……<Zmp。
In particular, Z1q<Z2q<……<Ziq<……<Zmq。
S200, traverse H ═ H (H)1,H2,……,Hn) And when Z is1q≤Hj≤ZmpWhen it is, BjAs a file identifier for specifying pkg file, wherein HjMeans BjA corresponding second installation amount.
Specifically, the second installation amount refers to the number of electronic devices that install any of the second type pkg files.
S300, obtain V ═ V (V)1,V2,……,Vw) Wherein V isrThe installation amount corresponding to the file identifier corresponding to the r-th designated pkg file is defined, wherein r is 1 … … w, and w is λ m.
Specifically, V ∈ H and V1<V2<……<Vw。
S400, obtaining U ═ according to V1,U2,……,Um) Wherein, Ui=(Vλi-λ+1,……,Vλi)。
S500, according to U, obtaining FiAnd Fi=(Ti,Ui) I.e. Fi=(Ti,Vλi-λ+1,……,Vλi)。
Preferably, F is 2 when λi=(Ti,V2i-1,V2i) (ii) a The method can select the proper second-class pkg files through the installation amount interval and the preset parameters of the first-class pkg files, reduce the probability of poor matching degree of pkg file groups formed by a plurality of second-class pkg files and the first-class pkg files, improve the construction of a proper pkg file group to replace a single first-class pkg file, and further improve the information safety.
The above embodiment enables a rough determination of a group of pkg files that are partially suitable for obscuring the first type pkg file, improving the efficiency of determining pkg the group of files.
Embodiments of the present invention further provide an electronic device, which includes a processor and a memory, where at least one instruction or at least one program is stored in the memory, and the at least one instruction or the at least one program is loaded by the processor and executed to implement the method according to the above embodiments.
The computer apparatus of the embodiments of the present invention exists in many forms, including but not limited to:
(1) mobile communication devices, which are characterized by mobile communication functions and are primarily targeted at providing voice and data communications. Such terminals include: smart phones (e.g., iphones), multimedia phones, functional phones, and low-end phones, among others.
(2) The ultra-mobile personal computer equipment belongs to the category of personal computers, has calculation and processing functions and generally has the characteristic of mobile internet access. Such terminals include PDA, MID, and UMPC devices, such as ipads.
(3) Portable entertainment devices such devices may display and play multimedia content. Such devices include audio and video players (e.g., ipods), handheld game consoles, electronic books, as well as smart toys and portable car navigation devices.
(4) The server is similar to a general computer architecture, but has higher requirements on processing capacity, stability, reliability, safety, expandability, manageability and the like because of the need of providing high-reliability service.
(5) And other electronic devices with data interaction functions.
Embodiments of the present invention also provide a non-transitory computer readable storage medium, in which at least one instruction or at least one program is stored, and the at least one instruction or the at least one program is loaded and executed by a processor to implement the method of the above embodiments.
Alternatively, in this embodiment, the storage medium may be located in at least one network server of a plurality of network servers of a computer network. Optionally, in this embodiment, the storage medium may include, but is not limited to: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
It should be noted that: the precedence order of the above embodiments of the present invention is only for description, and does not represent the merits of the embodiments. And specific embodiments thereof have been described above. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The embodiments in the present specification are described in a progressive manner, and the same and similar parts among the embodiments are referred to each other, and each embodiment focuses on the differences from the other embodiments. In particular, for the device and electronic apparatus embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, and reference may be made to some descriptions of the method embodiments for relevant points.
It will be understood by those skilled in the art that all or part of the steps for implementing the above embodiments may be implemented by hardware, or may be implemented by a program instructing relevant hardware, where the program may be stored in a computer-readable storage medium, and the storage medium may be a read-only memory, a magnetic disk or an optical disk.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and should not be taken as limiting the scope of the present invention, which is intended to cover any modifications, equivalents, improvements, etc. within the spirit and scope of the present invention.
Claims (4)
1. A method for obfuscating pkg, the method comprising the steps of:
s10, according to pkg white list, obtain the first pkg list a ═ (a)1,A2,……,Am) Wherein A isiThe file identifier of the ith first-type pkg file is referred, i is 1 … … m, and m is the number of first-type pkg files;
wherein, prior to the step of S10, the sample pkg is further determined by:
s1, acquiring file identifications of a plurality of original pkg files and installation amount corresponding to each original pkg file;
s3, when the installation amount corresponding to the original pkg file is larger than a preset first installation amount threshold value, taking the original pkg file as a sample pkg file; the installation amount corresponding to the original pkg files refers to the number of electronic devices for installing the original pkg files;
s20, obtaining AiCorresponding first installation amount TiAnd according to TiObtaining AiCorresponding installation amount interval ZiWherein, Zi=[Ziq,Zip]:
wherein, λ is a preset parameter;
wherein, in the step of S20, q is further determined by the following stepsiAnd pi:
S201, obtaining a mounting quantity threshold set D { (D)0,D1],(D1,D2],……,(Dk-1,Dk]In which (D)r-1,Dr]The number of the r installation quantity threshold intervals is defined, wherein r is 1 … … k, and k is the number of the installation quantity intervals;
s203, obtaining L { [ L ] according to D1,L2),[L2,L3),……,[Lk,Lk+1)},LrMeans that (D)r-1,Dr]Corresponding device duty ratio threshold, where L1<L2<……<Lk<Lk+1;
S205, when TiIs in (D)r-1,Dr]When internal, the L isrAs q isiAnd will Lr+1As pi;
S30, in A, according to ZiThe upper limit value of (A) is obtained by sorting Am,Am-1,……,A1);
S40, get the second pkg list B ═ B (B)1,B2,……,Bn) And ordering B to obtain B ═ Bn,Bn-1,……,B1) Wherein B isjThe file identifier of the jth second-class pkg file is defined, j is 1 … … n, n is the number of second-class pkg files, and the second-class pkg file is any sample pkg file except a in the sample pkg list;
s50, go through A 'and B' and when BjSecond installation amount < ZiWhen the corresponding installation amount is obtained, BjSecond mounting amount Vi jTo Bj+λSecond mounting amount Vi j+λAnd build up an intermediate data set Uij=(Vi j,……,Vi j+λ);
S60, based on UijObtaining FiAnd Fi=(Ti,Vi j,……,Vi j+λ);
S70, according to FiObtaining FiCorresponding first object pkg group and FiThe corresponding set of first objectives pkg is fed back to the database;
wherein, the step of S70 further comprises the following steps:
s701, acquiring FiCorresponding target ratio Fi', wherein, Fi' the following conditions are met:
wherein, VβiRefers to UiThe installation amount corresponding to the file identifier corresponding to the beta-th appointed pkg file;
s703, when q isi≤Fi'≤piWhen is, F isi' corresponding first target pkg in the file group feedback database, wherein Fi' corresponding first object pkg File group includes AiCorresponding first type pkg file and VβiThe corresponding designation pkg file.
2. The method for obfuscating pkg of claim 1, wherein D isr>Dr-1。
3. A non-transitory computer readable storage medium having stored therein at least one instruction or at least one program, the at least one instruction or the at least one program being loaded and executed by a processor to implement the method of any one of claims 1 or 2.
4. An electronic device comprising a processor and the non-transitory computer readable storage medium of claim 3.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210012991.XA CN114329360B (en) | 2022-01-07 | 2022-01-07 | Method, electronic device and medium for fuzzification pkg |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202210012991.XA CN114329360B (en) | 2022-01-07 | 2022-01-07 | Method, electronic device and medium for fuzzification pkg |
Publications (2)
Publication Number | Publication Date |
---|---|
CN114329360A CN114329360A (en) | 2022-04-12 |
CN114329360B true CN114329360B (en) | 2022-07-15 |
Family
ID=81024608
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202210012991.XA Active CN114329360B (en) | 2022-01-07 | 2022-01-07 | Method, electronic device and medium for fuzzification pkg |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN114329360B (en) |
Family Cites Families (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN104424402B (en) * | 2013-08-28 | 2019-03-29 | 卓易畅想(北京)科技有限公司 | It is a kind of for detecting the method and device of pirate application program |
CN106681720A (en) * | 2016-12-23 | 2017-05-17 | 光锐恒宇(北京)科技有限公司 | Compression method and device and decompression method and device for installation packages |
CN110333874B (en) * | 2019-06-10 | 2022-09-23 | 腾讯科技(成都)有限公司 | iOS system installation packet data acquisition method, device, equipment and medium |
CN112364309A (en) * | 2021-01-13 | 2021-02-12 | 北京云真信科技有限公司 | Information processing method, electronic device, and computer-readable storage medium |
-
2022
- 2022-01-07 CN CN202210012991.XA patent/CN114329360B/en active Active
Also Published As
Publication number | Publication date |
---|---|
CN114329360A (en) | 2022-04-12 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110852882B (en) | Packet consensus method, apparatus, device, and medium for blockchain networks | |
CN105894028B (en) | User identification method and device | |
CN113591068B (en) | Online login device management method and device and electronic device | |
CN110851817A (en) | Terminal type identification method and device | |
CN111309946B (en) | Established file optimization method and device | |
CN106534280A (en) | Data sharing method and device | |
CN111625348A (en) | Task allocation method, device, server and storage medium | |
US20170104683A1 (en) | Dynamically segmenting traffic for a/b testing in a distributed computing environment | |
CN114329360B (en) | Method, electronic device and medium for fuzzification pkg | |
CN110737458A (en) | code updating method and related device | |
CN106982250A (en) | Information-pushing method and device | |
CN106326258B (en) | URL matching method and device | |
CN112767028B (en) | Method for predicting number of active users, computer device and storage medium | |
CN111274433A (en) | Method and device for updating voice resource library | |
CN111932076B (en) | Rule configuration and release method and device and computing equipment | |
CN113065748A (en) | Business risk assessment method, device, equipment and storage medium | |
CN111338607A (en) | Method and device for selecting service data for testing and electronic equipment | |
CN114021200A (en) | Data processing system for pkg fuzzification | |
CN109213924B (en) | Popularization task allocation method and device and computer equipment | |
CN111967798B (en) | Method, device and equipment for distributing experimental samples and computer readable storage medium | |
CN105653540A (en) | Method and device for processing file attribute information | |
CN110471926B (en) | File establishing method and device | |
CN110442456B (en) | Multi-channel load balancing method based on Hyperridge-fabric | |
CN108509560B (en) | User similarity obtaining method and device, equipment and storage medium | |
CN111538911A (en) | Information pushing method and device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |