CN115098450A - Method, device and medium for log monitoring - Google Patents

Method, device and medium for log monitoring Download PDF

Info

Publication number
CN115098450A
CN115098450A CN202210531502.1A CN202210531502A CN115098450A CN 115098450 A CN115098450 A CN 115098450A CN 202210531502 A CN202210531502 A CN 202210531502A CN 115098450 A CN115098450 A CN 115098450A
Authority
CN
China
Prior art keywords
log
target
statistical information
information
log data
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
CN202210531502.1A
Other languages
Chinese (zh)
Inventor
金家芳
王旭
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Vision Credit Financial Technology Co ltd
Original Assignee
Vision Credit Financial Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Vision Credit Financial Technology Co ltd filed Critical Vision Credit Financial Technology Co ltd
Priority to CN202210531502.1A priority Critical patent/CN115098450A/en
Publication of CN115098450A publication Critical patent/CN115098450A/en
Withdrawn legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/17Details of further file system functions
    • G06F16/1734Details of monitoring file system events, e.g. by the use of hooks, filter drivers, logs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/10File systems; File servers
    • G06F16/18File system types
    • G06F16/1805Append-only file systems, e.g. using logs or journals to store data
    • G06F16/1815Journaling file systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Data Mining & Analysis (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

An object of the present application is to provide a method, an apparatus, and a medium for log monitoring, the method including: acquiring target log data; determining whether the target log data meets an alarm notification condition; if yes, executing alarm notification operation, and timely identifying abnormal data and giving an alarm by monitoring the log, thereby ensuring the stability of the service system.

Description

Method, device and medium for log monitoring
Technical Field
The present application relates to the field of communications, and in particular, to a technique for log monitoring.
Background
The log information records the running state of the device, operating system or application. By analyzing the log information, problems can be checked, abnormal conditions during operation can be identified, key processes can be recorded, and user behavior tracks can be collected.
Disclosure of Invention
An object of the present application is to provide a method, apparatus, and medium for log monitoring.
According to an aspect of the present application, there is provided a method for log monitoring, the method comprising:
acquiring target log data;
determining whether the target log data meets an alarm notification condition;
and if so, executing alarm notification operation.
According to one aspect of the present application, there is provided a computer device for log monitoring, comprising a memory, a processor and a computer program stored on the memory, characterized in that the processor executes the computer program to implement the steps of the method of:
acquiring target log data;
determining whether the target log data meets an alarm notification condition;
and if so, executing alarm notification operation.
According to an aspect of the application, a computer-readable storage medium is provided, on which a computer program is stored, characterized in that the computer program, when being executed by a processor, realizes the steps of the method:
acquiring target log data;
determining whether the target log data meets an alarm notification condition;
and if so, executing alarm notification operation.
According to an aspect of the present application, there is provided an apparatus for log monitoring, the apparatus including:
a one-to-one module for obtaining target log data;
a second module for determining whether the target log data satisfies an alarm notification condition;
and the third module is used for executing the alarm notification operation if the alarm notification condition is met.
Compared with the prior art, the method and the device for processing the target log data have the advantages that the target log data are obtained; determining whether the target log data meets an alarm notification condition; if the log is satisfied, executing an alarm notification operation, and monitoring the log to identify abnormal data in time and give an alarm so as to ensure the stability of the service system.
Drawings
Other features, objects and advantages of the present application will become more apparent upon reading of the detailed description of non-limiting embodiments made with reference to the following drawings:
FIG. 1 illustrates a flow diagram of a method for log monitoring according to one embodiment of the present application;
FIG. 2 illustrates an apparatus architecture diagram for log monitoring according to an embodiment of the present application;
FIG. 3 illustrates an exemplary system that can be used to implement the various embodiments described in this application.
The same or similar reference numbers in the drawings identify the same or similar elements.
Detailed Description
The present application is described in further detail below with reference to the attached figures.
In a typical configuration of the present application, the terminal, the device serving the network, and the trusted party each include one or more processors (e.g., Central Processing Units (CPUs)), input/output interfaces, network interfaces, and memory.
The Memory may include forms of volatile Memory, Random Access Memory (RAM), and/or non-volatile Memory in a computer-readable medium, such as Read Only Memory (ROM) or Flash Memory. Memory is an example of a computer-readable medium.
Computer-readable media, including both non-transitory and non-transitory, removable and non-removable media, may implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of computer storage media include, but are not limited to, Phase-Change Memory (PCM), Programmable Random Access Memory (PRAM), Static Random-Access Memory (SRAM), Dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), Read Only Memory (ROM), electrically Erasable Programmable Read-Only Memory (EEPROM), flash Memory or other Memory technology, Compact Disc Read-Only Memory (CD-ROM), Digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape, magnetic disk storage or other magnetic storage devices, or any other non-transmission medium may be used to store information that may be accessed by a computing device.
The device referred to in this application includes, but is not limited to, a user device, a network device, or a device formed by integrating a user device and a network device through a network. The user equipment includes, but is not limited to, any mobile electronic product, such as a smart phone, a tablet computer, etc., capable of performing human-computer interaction with a user (e.g., human-computer interaction through a touch panel), and the mobile electronic product may employ any operating system, such as an Android operating system, an iOS operating system, etc. The network Device includes an electronic Device capable of automatically performing numerical calculation and information processing according to a preset or stored instruction, and the hardware includes, but is not limited to, a microprocessor, an Application Specific Integrated Circuit (ASIC), a Programmable Logic Device (PLD), a Field Programmable Gate Array (FPGA), a Digital Signal Processor (DSP), an embedded Device, and the like. The network device includes but is not limited to a computer, a network host, a single network server, a plurality of network server sets or a cloud of a plurality of servers; here, the Cloud is made up of a large number of computers or web servers based on Cloud Computing (Cloud Computing), which is a type of distributed Computing, a virtual supercomputer consisting of a collection of loosely coupled computers. Including, but not limited to, the internet, a wide area network, a metropolitan area network, a local area network, a VPN network, a wireless Ad Hoc network (Ad Hoc network), etc. Preferably, the device may also be a program running on the user device, the network device, or a device formed by integrating the user device and the network device, the touch terminal, or the network device and the touch terminal through a network.
Of course, those skilled in the art will appreciate that the foregoing is by way of example only, and that other existing or future devices may be suitable for use in the present application and are intended to be encompassed within the scope of the present application and are hereby incorporated by reference.
In the description of the present application, "a plurality" means two or more unless specifically defined otherwise.
Fig. 1 shows a flowchart of a method for pushing information according to an embodiment of the present application, where the method includes steps S11, S12, and S13. In step S11, the network device acquires target log data; in step S12, the network device determines whether the target log data satisfies an alarm notification condition; in step S13, if the network device is satisfied, an alarm notification operation is performed.
In step S11, the network device acquires target log data. For example, the network device may obtain the target log data from the target server through a preset interface. The target server comprises a server corresponding to a platform or an application providing financial services. The user operation data of the financial service platform can be monitored by acquiring the target log data of the target server, abnormal data can be identified in time, and the stability of the system is guaranteed.
In some embodiments, the step S11 includes the network device receiving a log monitoring request; and responding to the log monitoring request, and acquiring target log data matched with the log monitoring request. In some embodiments, the log monitoring request includes, but is not limited to, time information, target server information, or target statistical objects. The network device may obtain target log data within a time period corresponding to the time information from the target server. The target statistical object comprises information needing to be determined from log data, such as an identity authentication bill paying state, an initial loan amount proposing state or a re-loan amount proposing state. The target log data is matched with the target statistical object, and the target log data can be used for calculating log statistical information corresponding to the target statistical object.
In step S12, the network device determines whether the target log data satisfies an alarm notification condition. In some embodiments, the network device may determine whether the target log data includes an abnormal field, and if so, may determine that the alarm notification condition is satisfied. In some embodiments, the network device may determine corresponding log statistics from the target log data to determine whether an alarm notification condition is satisfied from the daily statistics.
In some embodiments, the step S12 includes: step S121 (not shown), the network device determines corresponding log statistical information according to the target log data; step S122 (not shown), the network device determines whether the log statistical information satisfies an alarm notification condition based on the log statistical information and the corresponding historical log statistical information.
In some embodiments, the log statistical information includes statistical values corresponding to target statistical objects, for example, the log statistical information includes identity authentication outstanding bills, quantity information or proportion information of outstanding first credit or outstanding second credit. In some embodiments, the network device may determine whether an alarm notification condition is satisfied according to a difference between the log statistics and the historical log statistics. The historical log statistical information is log statistical information of a time period before a time period corresponding to the target log data. For example, the log statistics are determined from the target log data at 2 months, 2 days, 0-24, and the historical log statistics are determined from the log data at 2 months, 1 day, 0-24.
In some embodiments, the step S121 includes: the network equipment analyzes the target log data to obtain one or more pieces of monitoring target information; and determining corresponding log statistical information according to the one or more pieces of monitoring target information.
In some embodiments, the network device parses the target log data, extracts key field information therefrom, and determines one or more monitoring target information, where the monitoring target information includes one or more key field information. For example, if whether an alarm needs to be given is determined by monitoring data of the status of the identity authentication transaction order and the status of the credit amount, key field information associated with the status of the identity authentication transaction order and the status of the credit amount can be extracted from the target log data, and two pieces of monitoring target information associated with the status of the identity authentication transaction order and the status of the credit amount can be determined based on the key field information. In some embodiments, the network device determines sub-statistical information corresponding to each monitoring target information, and determines log statistical information according to the sub-statistical information. For example, the network device determines sub-statistical information corresponding to the status of identity authentication billing and status of credit and debit amount increase, and then determines corresponding log statistical information according to the sub-statistical information.
In some embodiments, the alert notification condition includes at least any one of: the difference percentage between the historical log statistical information and the log statistical information is greater than or equal to a preset proportional threshold; the difference value between the historical log statistical information and the log statistical information is greater than or equal to a preset difference threshold value; and the value corresponding to the log statistical information is not in a preset statistical value range. For example, if the difference or percentage of the difference between the log statistical information and the historical log statistical information of the previous period is too large, or the log statistical information is abnormal, an alarm notification operation is triggered.
In step S13, if the network device is satisfied, an alarm notification operation is performed. For example, if an alarm notification condition is satisfied, the network device sends an alarm notification to a corresponding notification user, where the alarm notification includes an alarm notification condition that the target log data is not satisfied. The notification user may perform problem remediation based on the alert notification. If not, the network device may continue to acquire log data of the next time period for log monitoring.
In some embodiments, the performing an alert notification operation comprises: determining notification user information corresponding to the alarm notification operation; and sending an alarm notification to the corresponding notification user based on the notification user information. In some embodiments, different notification users are configured to handle different problems, and the network device may determine corresponding notification user information according to an alarm notification condition that the target log data is not satisfied. The network equipment can also determine notification channel information matched with the notification user according to the notification user information. And the network equipment sends an alarm notice to the notice user based on the channel information. For example, different notification users receive information in different ways, and the network device may determine notification channel information (for example, short message, wechat, nail, or email) corresponding to the notification user according to a pre-stored user notification channel mapping table, and further notify the notification user.
In some embodiments, the method further includes step S14 (not shown), the network device obtains feedback information about the alarm notification operation. In some embodiments, if the feedback information includes a status fix, the network device may also send a repair prompt message to notify the user. If the feedback information includes that the state is not repaired, the network equipment can continue to send the alarm notification to the notification user.
Fig. 2 shows a structure diagram of a network device for extracting resources according to an embodiment of the present application, where the network device includes a one-to-one module 11, a two-to-two module 12, and a three-to-three module 13. A module 11 acquires target log data; a secondary module 12 determines whether the target log data meets an alarm notification condition; if the three modules 13 are satisfied, the alarm notification operation is executed. Here, the specific embodiments of the one-to-one module 11, the two-to-two module 12, and the one-to-three module 13 shown in fig. 2 are the same as or similar to the specific embodiments of the step S11, the step S12, and the step S13, respectively, and therefore are not repeated herein and are included by reference.
In some embodiments, the two modules 12 include a one-two module 121 (not shown), and a two-two module 122 (not shown). The second-first module 121 determines corresponding log statistical information according to the target log data; the second-second module 122 determines whether the log statistical information satisfies an alarm notification condition based on the log statistical information and corresponding historical log statistical information. Here, the embodiments of the first-second module 121 and the first-second module 122 are the same as or similar to the embodiments of the step S121 and the step S122, respectively, and thus are not repeated herein and are included herein by reference.
In some embodiments, the network device also includes a quad module 14 (not shown). The one-four module 14 obtains feedback information about the alert notification operation. Here, the embodiment of the four modules 14 is the same as or similar to the embodiment of the step S14, and therefore, the description thereof is omitted here for brevity.
FIG. 3 illustrates an exemplary system that can be used to implement the various embodiments described herein;
in some embodiments, as illustrated in FIG. 3, the system 300 can be implemented as any of the devices described in the various embodiments. In some embodiments, system 300 may include one or more computer-readable media (e.g., system memory or NVM/storage 320) having instructions and one or more processors (e.g., processor(s) 305) coupled with the one or more computer-readable media and configured to execute the instructions to implement modules to perform the actions described herein.
For one embodiment, system control module 310 may include any suitable interface controllers to provide any suitable interface to at least one of processor(s) 305 and/or to any suitable device or component in communication with system control module 310.
The system control module 310 may include a memory controller module 330 to provide an interface to the system memory 315. Memory controller module 330 may be a hardware module, a software module, and/or a firmware module.
System memory 315 may be used, for example, to load and store data and/or instructions for system 300. For one embodiment, system memory 315 may include any suitable volatile memory, such as suitable DRAM. In some embodiments, the system memory 315 may include a double data rate type four synchronous dynamic random access memory (DDR4 SDRAM).
For one embodiment, system control module 310 may include one or more input/output (I/O) controllers to provide an interface to NVM/storage 320 and communication interface(s) 325.
For example, NVM/storage 320 may be used to store data and/or instructions. NVM/storage 320 may include any suitable non-volatile memory (e.g., flash memory) and/or may include any suitable non-volatile storage device(s) (e.g., one or more Hard Disk Drives (HDDs), one or more Compact Disc (CD) drives, and/or one or more Digital Versatile Disc (DVD) drives).
NVM/storage 320 may include storage resources that are physically part of a device on which system 300 is installed or may be accessed by the device and not necessarily part of the device. For example, the NVM/storage 320 may be accessible over a network via the communication interface(s) 325.
Communication interface(s) 325 may provide an interface for system 300 to communicate over one or more networks and/or with any other suitable device. System 300 may wirelessly communicate with one or more components of a wireless network according to any of one or more wireless network standards and/or protocols.
For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controllers of the system control module 310, such as memory controller module 330. For one embodiment, at least one of the processor(s) 305 may be packaged together with logic for one or more controller(s) of the system control module 310 to form a System In Package (SiP). For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with the logic of one or more controller(s) of the system control module 310. For one embodiment, at least one of the processor(s) 305 may be integrated on the same die with logic for one or more controller(s) of the system control module 310 to form a system on a chip (SoC).
In various embodiments, system 300 may be, but is not limited to being: a server, a workstation, a desktop computing device, or a mobile computing device (e.g., a laptop computing device, a handheld computing device, a tablet, a netbook, etc.). In various embodiments, system 300 may have more or fewer components and/or different architectures. For example, in some embodiments, system 300 includes one or more cameras, a keyboard, a Liquid Crystal Display (LCD) screen (including touch screen displays), a non-volatile memory port, a plurality of antennas, a graphics chip, an Application Specific Integrated Circuit (ASIC), and speakers.
In addition to the methods and apparatus described in the embodiments above, the present application also provides a computer-readable storage medium storing computer code that, when executed, performs the method as described in any of the preceding claims.
The present application further provides a computer device, comprising:
one or more processors;
a memory for storing one or more computer programs;
the one or more computer programs, when executed by the one or more processors, cause the one or more processors to implement the method of any preceding claim.
It should be noted that the present application may be implemented in software and/or a combination of software and hardware, for example, implemented using Application Specific Integrated Circuits (ASICs), general purpose computers or any other similar hardware devices. In one embodiment, the software programs of the present application may be executed by a processor to implement the steps or functions described above. Likewise, the software programs (including associated data structures) of the present application may be stored in a computer readable recording medium, such as RAM memory, magnetic or optical drive or diskette and the like. Additionally, some of the steps or functions of the present application may be implemented in hardware, for example, as circuitry that cooperates with the processor to perform various steps or functions.
In addition, some of the present application may be implemented as a computer program product, such as computer program instructions, which when executed by a computer, may invoke or provide methods and/or techniques in accordance with the present application through the operation of the computer. Those skilled in the art will appreciate that the form in which the computer program instructions reside on a computer-readable medium includes, but is not limited to, source files, executable files, installation package files, and the like, and that the manner in which the computer program instructions are executed by a computer includes, but is not limited to: the computer directly executes the instruction, or the computer compiles the instruction and then executes the corresponding compiled program, or the computer reads and executes the instruction, or the computer reads and installs the instruction and then executes the corresponding installed program. In this regard, computer readable media can be any available computer readable storage media or communication media that can be accessed by a computer.
Communication media includes media whereby communication signals, including, for example, computer readable instructions, data structures, program modules, or other data, are transmitted from one system to another. Communication media may include conductive transmission media such as cables and wires (e.g., fiber optics, coaxial, etc.) and wireless (non-conductive transmission) media capable of propagating energy waves such as acoustic, electromagnetic, RF, microwave, and infrared. Computer readable instructions, data structures, program modules, or other data may be embodied in a modulated data signal, for example, in a wireless medium such as a carrier wave or similar mechanism such as is embodied as part of spread spectrum techniques. The term "modulated data signal" means a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. The modulation may be analog, digital, or hybrid modulation techniques.
By way of example, and not limitation, computer-readable storage media may include volatile and nonvolatile, removable and non-removable media implemented in any method or technology for storage of information such as computer-readable instructions, data structures, program modules or other data. For example, computer-readable storage media include, but are not limited to, volatile memory such as random access memory (RAM, DRAM, SRAM); and non-volatile memory such as flash memory, various read-only memories (ROM, PROM, EPROM, EEPROM), magnetic and ferromagnetic/ferroelectric memories (MRAM, FeRAM); and magnetic and optical storage devices (hard disk, tape, CD, DVD); or other now known media or later developed that can store computer-readable information/data for use by a computer system.
An embodiment according to the present application herein comprises an apparatus comprising a memory for storing computer program instructions and a processor for executing the program instructions, wherein the computer program instructions, when executed by the processor, trigger the apparatus to perform a method and/or solution according to the aforementioned embodiments of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned. Furthermore, it is obvious that the word "comprising" does not exclude other elements or steps, and the singular does not exclude the plural. A plurality of units or means recited in the apparatus claims may also be implemented by one unit or means in software or hardware. The terms first, second, etc. are used to denote names, but not to denote any particular order.

Claims (9)

1. A method for log monitoring, wherein the method comprises:
acquiring target log data;
determining whether the target log data meets an alarm notification condition;
and if so, executing alarm notification operation.
2. The method of claim 1, wherein the obtaining target log data comprises:
receiving a log monitoring request;
and responding to the log monitoring request, and acquiring target log data matched with the log monitoring request.
3. The method of claim 1, wherein the determining whether the target log data satisfies an alert notification condition comprises:
determining corresponding log statistical information according to the target log data;
and determining whether the log statistical information meets an alarm notification condition or not based on the log statistical information and corresponding historical log statistical information.
4. The method of claim 3, wherein the determining, from the target log data, corresponding log statistics comprises:
analyzing the target log data to acquire one or more pieces of monitoring target information;
and determining corresponding log statistical information according to the one or more pieces of monitoring target information.
5. The method of claim 3, wherein the alert notification condition comprises at least any one of:
the difference percentage between the historical log statistical information and the log statistical information is greater than or equal to a preset proportional threshold;
the difference value between the historical log statistical information and the log statistical information is greater than or equal to a preset difference threshold value;
and the value corresponding to the log statistical information is not in a preset statistical value range.
6. The method of claim 1, wherein the performing an alert notification operation comprises:
determining notification user information corresponding to the alarm notification operation;
and sending an alarm notification to the corresponding notification user based on the notification user information.
7. The method of claim 1, wherein the method further comprises:
and acquiring feedback information about the alarm notification operation.
8. A computer device for log monitoring comprising a memory, a processor and a computer program stored on the memory, characterized in that the processor executes the computer program to implement the steps of the method of any of claims 1 to 7.
9. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 7.
CN202210531502.1A 2022-05-16 2022-05-16 Method, device and medium for log monitoring Withdrawn CN115098450A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210531502.1A CN115098450A (en) 2022-05-16 2022-05-16 Method, device and medium for log monitoring

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210531502.1A CN115098450A (en) 2022-05-16 2022-05-16 Method, device and medium for log monitoring

Publications (1)

Publication Number Publication Date
CN115098450A true CN115098450A (en) 2022-09-23

Family

ID=83289718

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210531502.1A Withdrawn CN115098450A (en) 2022-05-16 2022-05-16 Method, device and medium for log monitoring

Country Status (1)

Country Link
CN (1) CN115098450A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109634818A (en) * 2018-10-24 2019-04-16 中国平安人寿保险股份有限公司 Log analysis method, system, terminal and computer readable storage medium
CN110191094A (en) * 2019-04-26 2019-08-30 北京奇安信科技有限公司 Monitoring method and device, storage medium, the terminal of abnormal data
CN113900905A (en) * 2021-10-28 2022-01-07 中国工商银行股份有限公司 Log monitoring method and device, electronic equipment and storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109634818A (en) * 2018-10-24 2019-04-16 中国平安人寿保险股份有限公司 Log analysis method, system, terminal and computer readable storage medium
CN110191094A (en) * 2019-04-26 2019-08-30 北京奇安信科技有限公司 Monitoring method and device, storage medium, the terminal of abnormal data
CN113900905A (en) * 2021-10-28 2022-01-07 中国工商银行股份有限公司 Log monitoring method and device, electronic equipment and storage medium

Similar Documents

Publication Publication Date Title
CN110290557B (en) Method and equipment for loading page tags in application
CN111523039B (en) Method and device for processing book promotion request in reading application
CN109409947B (en) Resident trip investigation method based on client
CN111177062B (en) Method and device for providing reading presentation information
CN110516414B (en) Method and equipment for accessing novel payment chapters
CN110166955B (en) Method and equipment for reminding schedule
CN115098450A (en) Method, device and medium for log monitoring
CN115134325A (en) Method, device and medium for information push
CN112948142A (en) Method, apparatus, medium, and program product for determining target feedback information
CN111680250B (en) Method and equipment for recalling presentation information
CN113918897A (en) Method, apparatus, and medium for displaying application in application open platform
CN109245938B (en) Method and equipment for executing resource configuration operation of user
CN110321205B (en) Method and equipment for managing hosted program in hosted program
CN112019621A (en) Method and equipment for customizing push message
CN112667468A (en) Method and equipment for cloud resource automation operation and maintenance in multi-cloud environment
CN113157162A (en) Method, apparatus, medium and program product for revoking session messages
CN110958315A (en) Method and equipment for presenting message notification
CN111934981A (en) Method and equipment for withdrawing red packet
CN111385353A (en) Method and equipment for providing application presentation information
CN111382321B (en) Method and equipment for requesting cache materials
CN115203154A (en) Method, device and medium for processing log data
CN110781431A (en) Method and equipment for providing novel information
CN111552906B (en) Method and equipment for responding to page access request in reading application
CN116862272A (en) Method, equipment and medium for determining credit investigation points of users
CN114944980B (en) System method, apparatus, and medium for monitoring alarms

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
WW01 Invention patent application withdrawn after publication

Application publication date: 20220923

WW01 Invention patent application withdrawn after publication