CN115242638B - Feasible touch screening method and device, electronic equipment and storage medium - Google Patents

Feasible touch screening method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN115242638B
CN115242638B CN202210893410.8A CN202210893410A CN115242638B CN 115242638 B CN115242638 B CN 115242638B CN 202210893410 A CN202210893410 A CN 202210893410A CN 115242638 B CN115242638 B CN 115242638B
Authority
CN
China
Prior art keywords
touch
verification
message body
idempotent
acquiring
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202210893410.8A
Other languages
Chinese (zh)
Other versions
CN115242638A (en
Inventor
张蓓
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ping An Consumer Finance Co Ltd
Original Assignee
Ping An Consumer Finance Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ping An Consumer Finance Co Ltd filed Critical Ping An Consumer Finance Co Ltd
Priority to CN202210893410.8A priority Critical patent/CN115242638B/en
Publication of CN115242638A publication Critical patent/CN115242638A/en
Application granted granted Critical
Publication of CN115242638B publication Critical patent/CN115242638B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0866Checking the configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/084Configuration by using pre-existing information, e.g. using templates or copying from other elements
    • H04L41/0843Configuration by using pre-existing information, e.g. using templates or copying from other elements based on generic templates
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Storage Device Security (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The invention relates to an artificial intelligence technology, and discloses a feasible touch screening method, which comprises the following steps: acquiring an initial frame of a touch tool, and carrying out parameter configuration on the initial frame to obtain a configured touch tool; acquiring a positioning request, and carrying out identification analysis on the positioning request to obtain a unique identification of the positioning request; acquiring configuration information of the positioning request by utilizing the unique identifier and the touch-up tool; carrying out message body correctness verification, idempotent verification and existence verification on the configuration information, and screening out that the touch result of the template is touch; and carrying out service parameter desirability verification on the presence trigger, and collecting the presence trigger passing verification as a feasible trigger. In addition, the invention also relates to a blockchain technology, and a data list can be stored in a node of the blockchain. The invention further provides a feasible touch screening device, electronic equipment and a storage medium. The invention can improve the screening efficiency of the feasible touch.

Description

Feasible touch screening method and device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of artificial intelligence technologies, and in particular, to a feasible touch screening method, a feasible touch screening device, an electronic device, and a storage medium.
Background
The e-commerce is popular, how to set operation activities and rules and make operation strategies and operation targets according to the requirements of users is important by taking the users as centers. Generally, implementation processes and results are tightly controlled by a touch system to achieve desired set operational goals and tasks. The touch system can connect the user with the activity, can be used for customized operation of different user groups, and the superior touch system can realize the activation, the activity, the income, the retention and the updating of the user,
today, the access system is more because of more channels of the access system when the access system is checked in the test stage, the processing logic of each access mode is complex, each link is possibly problematic, and different types of errors can occur in the access modes in the test stage. When the infeasible touch system is detected in the test stage, the infeasible touch system is reworked and then detected, so that a large amount of time is wasted, and the communication cost is increased; meanwhile, each node of the touch system is detected manually, so that screening of the touch system is realized, screening efficiency is low, and therefore, how to improve the screening efficiency of feasible touch is a problem to be solved urgently.
Disclosure of Invention
The invention provides a feasible touch screening method, a feasible touch screening device and a storage medium, and mainly aims to solve the problem of low efficiency in feasible touch screening.
In order to achieve the above object, the present invention provides a method for screening feasible touch, comprising:
acquiring an initial frame of a touch tool, and carrying out parameter configuration on the initial frame to obtain a configured touch tool;
acquiring a positioning request, and carrying out identification analysis on the positioning request to obtain a unique identification of the positioning request;
acquiring configuration information of the positioning request by utilizing the unique identifier and the touch-up tool;
verifying the correctness of the message body of the configuration information, and collecting the configuration information passing the verification as a correct message body;
performing idempotent verification on the correct message body, and determining that the correct message body passing through the idempotent verification is an idempotent message body;
acquiring a touch result of the idempotent message body, and when the touch result is waiting, verifying the existence of a template for the touch result, and screening out that the touch result of the template is touch;
and carrying out service parameter desirability verification on the presence trigger, and collecting the presence trigger passing verification as a feasible trigger.
Optionally, the performing parameter configuration on the initial frame to obtain a configured touch tool includes:
performing parameter entering format configuration on the initial frame to obtain a primary frame;
configuring a unique field of the primary framework to obtain a secondary framework;
template information configuration is carried out on the secondary frames to obtain tertiary frames;
and carrying out service parameter configuration on the three-level framework to obtain a configured touch tool.
Optionally, the performing the identification parsing on the positioning request to obtain the unique identification of the positioning request includes:
acquiring a request header field of the positioning request, and analyzing the request header field to obtain a field value of the request header field;
and acquiring keywords from the field value, and performing identification screening on the keywords according to a preset keyword array tree to obtain the unique identification of the positioning request.
Optionally, the obtaining, by using the unique identifier and the touch-up tool, configuration information of the positioning request includes:
determining an information interface of the touch tool according to the unique identification;
acquiring an interface protocol of the information interface, and acquiring interface calling parameters in the interface protocol according to a preset description mode;
and acquiring configuration information of the positioning request according to the interface calling parameters.
Optionally, the obtaining, by using the unique identifier and the touch-up tool, configuration information of the positioning request includes:
performing field screening on the configuration information to obtain a parameter entering field;
performing parameter entering format verification according to the parameter entering fields, and collecting the parameter entering fields passing the parameter entering format verification as parameter entering field sets;
and mapping the message bodies one by one for the parameter entering fields in the parameter entering field set to obtain the correct message body.
Optionally, the performing an idempotent verification on the correct message body, and determining that the correct message body passing the idempotent verification is an idempotent message body includes:
acquiring idempotent keywords in the parameter entry field according to a preset key value rule;
inquiring whether the idempotent key value exists in a preset storage result table, and when the idempotent key value does not exist in the storage result table, determining that the correct message body passes the idempotent verification, and taking the correct message body passing the idempotent verification as the idempotent message body.
Optionally, the verifying the existence of the template on the touch result, screening out the touch result of the existence of the template as the existence of the touch, including:
obtaining a template field in the touch result, and performing key value mapping on the template field to obtain a template value of the template field;
and searching the template value in a preset template table, and determining that the touch result is touch when the template value is searched from the template table.
In order to solve the above problems, the present invention further provides a feasible screening device, which includes:
the parameter configuration module is used for acquiring an initial frame of the touch tool, and carrying out parameter configuration on the initial frame to obtain the configured touch tool;
the identification analysis module is used for acquiring a positioning request, carrying out identification analysis on the positioning request and obtaining a unique identification of the positioning request;
the configuration information acquisition module is used for acquiring the configuration information of the positioning request by utilizing the unique identifier and the touch tool;
the correctness verification module is used for verifying the correctness of the message body of the configuration information and collecting the configuration information passing the verification as a correct message body;
the idempotent verification module is used for carrying out idempotent verification on the correct message body and determining that the correct message body passing through the idempotent verification is the idempotent message body;
the presence verification module is used for obtaining the touch result of the idempotent message body, carrying out template presence verification on the touch result when the touch result is waiting, and screening out that the touch result of the template is presence touch;
and the service parameter verification module is used for carrying out service parameter demand verification on the presence trigger, and collecting the presence trigger passing verification as a feasible trigger.
In order to solve the above-mentioned problems, the present invention also provides an electronic apparatus including:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the viable touchdown screening method described above.
In order to solve the above-mentioned problems, the present invention further provides a storage medium having stored therein at least one computer program that is executed by a processor in an electronic device to implement the above-mentioned viable touchdown screening method.
According to the embodiment of the invention, the acquired initial frame of the touch tool is subjected to parameter configuration, so that the touch tool is acquired, meanwhile, the acquired positioning request is analyzed, the unique identifier of the positioning request is acquired, the unique identifier and the touch tool are utilized to acquire the configuration information of the positioning request, the integrity and the accuracy of the configuration information are improved, the correct and complete configuration information is subjected to message body correctness verification, idempotent verification, template existence verification and service parameter desirability verification in sequence, the complicated and long time consumption of manual testing are avoided, and efficient and rapid screening of the configuration information is ensured, so that a feasible touch system is obtained. Therefore, the invention provides a screening method, a screening device, electronic equipment and a storage medium for feasible touch, which can solve the problem of low screening efficiency of feasible touch.
Drawings
FIG. 1 is a flow chart of a method for screening feasible touch according to an embodiment of the invention;
FIG. 2 is a flowchart of acquiring configuration information according to an embodiment of the present invention;
FIG. 3 is a flowchart illustrating a parameter entry format verification according to an embodiment of the present invention;
FIG. 4 is a functional block diagram of a screening apparatus capable of being reached according to an embodiment of the present invention;
fig. 5 is a schematic structural diagram of an electronic device for implementing the method for screening feasible touch according to an embodiment of the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
The embodiment of the application provides a feasible touch screening method. The execution subject of the viable touch screening method includes, but is not limited to, at least one of a server, a terminal, and the like, which can be configured to execute the method provided by the embodiments of the present application. In other words, the feasible touch screening method may be performed by software or hardware installed in a terminal device or a server device, where the software may be a blockchain platform. The service end includes but is not limited to: a single server, a server cluster, a cloud server or a cloud server cluster, and the like. The server may be an independent server, or may be a cloud server that provides cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communications, middleware services, domain name services, security services, content delivery networks (ContentDelivery Network, CDN), and basic cloud computing services such as big data and artificial intelligence platforms.
Referring to fig. 1, a flow chart of a method for screening a viable touch according to an embodiment of the invention is shown. In this embodiment, the method for screening feasible touch includes:
s1, acquiring an initial frame of the touch tool, and carrying out parameter configuration on the initial frame to obtain the configured touch tool.
In the embodiment of the invention, the touch tool can be used for acquiring the configuration information, and the touch system corresponding to the configuration information after verification is beneficial to continuous and effective operation of the platform.
In an embodiment of the present invention, the performing parameter configuration on the initial frame to obtain a configured touch tool includes: performing parameter entering format configuration on the initial frame to obtain a primary frame; configuring a unique field of the primary framework to obtain a secondary framework; template information configuration is carried out on the secondary frames to obtain tertiary frames; and carrying out service parameter configuration on the three-level framework to obtain a configured touch tool.
In detail, the access format depends on the access mode, and when the access mode is MQ, the access format is an MQ message body format; when the access mode is an interface, the parameter entering format is an interface parameter entering format parameter entering field; the configuration of the template information of the secondary framework is to assign a stored result table and a stored result table idempotent keywords, wherein the stored result table is a related table for storing a certain touch mode in a touch system; the configuration of the service parameters of the three-level framework comprises determining whether to acquire the service parameters, adjusting the URL of the service parameter acquiring interface and which field in the message body is used for acquiring the service parameters.
S2, acquiring a positioning request, and carrying out identification analysis on the positioning request to obtain a unique identification of the positioning request.
In the embodiment of the invention, the configuration information pushed to the target user by the touch system can be determined by utilizing the positioning request, so that the operation scheme is optimized, and personalized operation is realized.
In the embodiment of the present invention, the performing the identification analysis on the positioning request to obtain the unique identification of the positioning request includes: acquiring a request header field of the positioning request, and analyzing the request header field to obtain a field value of the request header field; and acquiring keywords from the field value, and performing identification screening on the keywords according to a preset keyword array tree to obtain the unique identification of the positioning request.
In detail, the request header field is a field of an HTTP request header that provides information about a request, response, or other transmitting entity. The header information of the HTTP comprises four parts, namely a general header, a request header, a response header and an entity header, wherein each header field consists of a domain name, a colon and a domain value, the general header can be used for requesting and responding, and the general header can be used for being associated with a transaction as a whole rather than a specific resource; the request header allows the client to communicate information about itself and a desired form of response; the response header is a response of the server and the information of the server; the entity header is used to define information of the transmitted resource.
In detail, the keyword array tree is a tree structure formed by a plurality of arrays, and is used for storing configured keyword data, each array comprises a plurality of nodes, and each node comprises three elements: array, is_leaf, and id; element array is a pointer to the next array, element is_leaf is used to mark whether the node is a leaf node, and element id is the unique numerical code of this key.
Further, the keyword array tree sets each character of a keyword, takes the value of the character as an array index, and sets whether each character exists in the keyword character string or not and the position where each character exists in the keyword character string. For example, storing a key "abc", array 1 is indexed to an array element with the value (97) of character "a", array 2 is indexed to an array element with the value (98) of character "b" as an index, array 3 is indexed to an array element with the value (99) of character "c" as an index, array pointer of the element is NULL, because this is the last character, the last character is to be set to be 1, indicating a leaf node, then the value of id is set, and the ids of all keys are not repeatable.
Further, after the key word array tree reads the configured key word, when the key word array tree needs to be searched, each character of the key word character string is used as a subscript, the key word array tree is directly positioned to the array element to check the content, if the element content label is not the end of the key word, namely is not a leaf node, then the array pointed by the array pointer is checked, if the element of the array tree is searched layer by layer according to each character of the key word as the subscript, the element can be found to be the leaf node, the configured key word is contained in the character string, the id of the key word can be obtained, after the key word is stored in the array tree, the rule id to which the key word belongs and the field name information to be checked by the key word are stored in the rule id table, and the rule id table is a hash table with the key word id as a key, and the key word array tree and the rule id table can be used for carrying out identification screening on the key word, so that the unique identification of the positioning request is obtained.
S3, acquiring configuration information of the positioning request by utilizing the unique identification and the touch-up tool.
In an embodiment of the present invention, the configuration information may include: target object, transfer content, reach channel, usage scenario, reach mechanism; the channel for touching is divided into an in-station channel and an out-of-station channel, the channels on application are called in-station channel, are generally system messages, app-push channels and advertisement push channels, and the channels outside application are called out-of-station channel, are generally short messages, telephones, weChat public numbers and mails; the use scenario refers to that operation directly pushes activity information to a user, which belongs to push, the user performs operation on a platform, and after a certain mechanism is triggered, the platform responds to the user with specific action, which belongs to pull type.
In detail, as shown in fig. 2, in the embodiment of the present invention, the obtaining, by using the unique identifier and the touch-to-reach tool, the configuration information of the positioning request includes:
s21, determining an information interface of the touch tool according to the unique identifier;
s22, acquiring an interface protocol of the information interface, and acquiring interface calling parameters in the interface protocol according to a preset description mode;
s23, acquiring configuration information of the positioning request according to the interface calling parameters.
In detail, the interface protocol is Http protocol, which is an abbreviation of Hyper Text Transfer Protocol (hypertext transfer protocol), is a transfer protocol for transferring hypertext from a web server to a local browser, wherein Http is a standard of a client and a server side request and response, the client is an end user, and the server side is a web site. The web site address we input in the browser's address bar is called URL (Uniform Resource Locator ).
In detail, the preset description mode refers to the corresponding relation between the interface protocol and the interface call parameter, and the interface call parameter can be obtained by using the interface protocol.
Further, the obtaining the configuration information of the positioning request according to the interface call parameter is similar to: each user has a house number address, each Web page also has an Internet address, when you input a URL or click a hyperlink in the address frame of the browser, the URL determines the address to be browsed, the browser extracts the Web page code of the website on the Web server through the hypertext transfer protocol, thereby obtaining the target Web page, and the configuration information of the positioning request can be obtained from the target Web page.
And S4, verifying the correctness of the message body of the configuration information, and collecting the configuration information passing the verification as the correct message body.
In the embodiment of the invention, the correctness verification of the message body is utilized to determine whether the configuration message has the configuration message corresponding to the personality label of the target user, if the verification is not passed, the task is ended, and the message body is incorrect.
In detail, as shown in fig. 3, in the embodiment of the present invention, the obtaining, by using the unique identifier and the touch-to-reach tool, the configuration information of the positioning request includes:
s31, performing field screening on the configuration information to obtain a parameter entering field;
s32, performing parameter entering format verification according to the parameter entering fields, and collecting parameter entering fields passing the parameter entering format verification as parameter entering field sets;
and S33, mapping the message bodies one by one for the parameter entering fields in the parameter entering field set to obtain the correct message body.
In detail, the message body map is obtained according to the correspondence between the entry field and the message body.
In detail, the field screening of the configuration information may first extract keywords of the obtained configuration information, retrieve the extracted keywords by using a preset field template, and use the keywords retrieved in the field template as the parameter entry field.
Further, the entry field may be a representation of an access means including, but not limited to, MQ and interface, when the entry field is displayed as MQ, the entry format is an MQ message body format; when the parameter entering field is displayed as an interface, the parameter entering format is an interface parameter entering format; when the type of the access format is acquired, for example: when the entry format is the interface entry format, entry format verification can be performed according to a preset verification rule tag, wherein @ Null verification object is Null, @ Notnull verification object is not Null, character strings with the length of 0 cannot be checked, @ Notblank checks whether constraint character strings are Null and whether the length of Trim is larger than 0, only the character strings are checked, front and rear spaces are removed, @ assetTrue verification is performed on whether a Boolean object is true, @ assetFalse verification is performed on Boolean object is false, and the like.
In detail, for example, a post request in the HTTP request may encapsulate an entry field in json format into message body data, and a correspondence between the entry field and the message body data may be obtained, that is, a correct message body may be obtained by using an entry field in the entry field set.
And S5, performing idempotent verification on the correct message body, and determining that the correct message body passing through the idempotent verification is the idempotent message body.
In the embodiment of the invention, when the idempotent key value exists in the preset stored result table, the screening task is ended, and the result is that the idempotent verification fails.
In an embodiment of the present invention, the performing an idempotent verification on the correct message body, and determining that the correct message body passing the idempotent verification is an idempotent message body includes: acquiring idempotent keywords in the parameter entry field according to a preset key value rule; inquiring whether the idempotent key value exists in a preset storage result table, and when the idempotent key value does not exist in the storage result table, determining that the correct message body passes the idempotent verification, and taking the correct message body passing the idempotent verification as the idempotent message body.
S6, acquiring a touch result of the idempotent message body, and when the touch result is waiting, verifying the existence of the template on the touch result, and screening that the touch result of the template exists is touch.
In the embodiment of the present invention, the touch result may be classified into three types: ending the task when the touch result is successful, and displaying that the pushing is successful; ending the task when the touch result is failure, and displaying that pushing fails; when the touch result is waiting, ending the task and continuing to screen;
in the embodiment of the present invention, the step of verifying the existence of the template on the touch result, and screening that the touch result of the template exists is that there is a touch, includes: obtaining a template field in the touch result, and performing key value mapping on the template field to obtain a template value of the template field; and searching the template value in a preset template table, and determining that the touch result is touch when the template value is searched from the template table.
And S7, carrying out service parameter desirability verification on the presence trigger, and collecting the presence trigger passing verification as a feasible trigger.
In the embodiment of the present invention, the performing service parameter desirability verification on the presence trigger refers to determining whether to acquire a service parameter, ending a task when the service parameter is not required to be acquired, indicating that interface call fails, indicating that interface call is successful when the service parameter is required to be acquired, acquiring a URL required to acquire the service parameter, and continuing to screen the presence trigger; and acquiring keywords of the service parameters, acquiring the service parameters by using the keywords and the URL, ending the task when the service parameters are acquired, displaying that the interface call fails, and ending the task when the service parameters are not acquired, displaying that the service parameters are acquired.
Further, configuration information passing all the verifications is collected as a viable touch.
According to the embodiment of the invention, the acquired initial frame of the touch tool is subjected to parameter configuration, so that the touch tool is acquired, meanwhile, the acquired positioning request is analyzed, the unique identifier of the positioning request is acquired, the unique identifier and the touch tool are utilized to acquire the configuration information of the positioning request, the integrity and the accuracy of the configuration information are improved, the correct and complete configuration information is subjected to message body correctness verification, idempotent verification, template existence verification and service parameter desirability verification in sequence, the complicated and long time consumption of manual testing are avoided, and efficient and rapid screening of the configuration information is ensured, so that a feasible touch system is obtained. Therefore, the invention provides a screening method for the feasible touch, which can solve the problem of lower screening efficiency of the feasible touch.
Fig. 4 is a functional block diagram of a screening apparatus capable of being reached according to an embodiment of the present invention.
The screening device 100 capable of being touched according to the present invention may be installed in an electronic device. Depending on the implementation function, the feasible touch screening device 100 may include a parameter configuration module 101, an identification analysis module 102, a configuration information acquisition module 103, a correctness verification module 104, an idempotent verification module 105, a presence verification module 106, and a service parameter verification module 107. The module of the invention, which may also be referred to as a unit, refers to a series of computer program segments, which are stored in the memory of the electronic device, capable of being executed by the processor of the electronic device and of performing a fixed function.
In the present embodiment, the functions concerning the respective modules/units are as follows:
the parameter configuration module 101 is configured to obtain an initial frame of the touch tool, and perform parameter configuration on the initial frame to obtain a configured touch tool;
the identifier parsing module 102 is configured to obtain a positioning request, perform identifier parsing on the positioning request, and obtain a unique identifier of the positioning request;
the configuration information acquiring module 103 is configured to acquire configuration information of the positioning request by using the unique identifier and the touch tool;
the correctness verification module 104 is configured to perform message body correctness verification on the configuration information, and collect the configuration information passing the verification as a correct message body;
the idempotent verification module 105 is configured to perform idempotent verification on the correct message body, and determine that the correct message body that passes the idempotent verification is an idempotent message body;
the presence verification module 106 is configured to obtain a touch result of the idempotent message body, perform template presence verification on the touch result when the touch result is waiting, and screen out that the touch result of the template is presence touch;
the service parameter verification module 107 is configured to perform service parameter desirability verification on the presence trigger, and aggregate the presence trigger that passes the verification into a viable trigger.
Fig. 5 is a schematic structural diagram of an electronic device for implementing a screening method of viable touch according to an embodiment of the present invention.
The electronic device 1 may comprise a processor 10, a memory 11, a communication bus 12 and a communication interface 13, and may further comprise a computer program, such as a actionable filter, stored in the memory 11 and executable on the processor 10.
The processor 10 may be formed by an integrated circuit in some embodiments, for example, a single packaged integrated circuit, or may be formed by a plurality of integrated circuits packaged with the same function or different functions, including one or more central processing units (Central Processing Unit, CPU), a microprocessor, a digital processing chip, a graphics processor, a combination of various control chips, and so on. The processor 10 is a Control Unit (Control Unit) of the electronic device, connects various components of the entire electronic device using various interfaces and lines, executes or executes programs or modules (e.g., a screening program or the like that is accessible) stored in the memory 11, and invokes data stored in the memory 11 to perform various functions of the electronic device and process the data.
The memory 11 includes at least one type of storage medium including flash memory, a removable hard disk, a multimedia card, a card type memory (e.g., SD or DX memory, etc.), a magnetic memory, a magnetic disk, an optical disk, etc. The memory 11 may in some embodiments be an internal storage unit of the electronic device, such as a mobile hard disk of the electronic device. The memory 11 may in other embodiments also be an external storage device of the electronic device, such as a plug-in mobile hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the electronic device. Further, the memory 11 may also include both an internal storage unit and an external storage device of the electronic device. The memory 11 may be used not only to store application software installed in an electronic device and various data, such as codes of a reachable screening program, but also to temporarily store data that has been output or is to be output.
The communication bus 12 may be a peripheral component interconnect standard (Peripheral Component Interconnect, PCI) bus, or an extended industry standard architecture (Extended Industry Standard Architecture, EISA) bus, among others. The bus may be classified as an address bus, a data bus, a control bus, etc. The bus is arranged to enable a connection communication between the memory 11 and at least one processor 10 etc.
The communication interface 13 is used for communication between the electronic device and other devices, including a network interface and a user interface. Optionally, the network interface may include a wired interface and/or a wireless interface (e.g., WI-FI interface, bluetooth interface, etc.), typically used to establish a communication connection between the electronic device and other electronic devices. The user interface may be a Display (Display), an input unit such as a Keyboard (Keyboard), or alternatively a standard wired interface, a wireless interface. Alternatively, in some embodiments, the display may be an LED display, a liquid crystal display, a touch-sensitive liquid crystal display, an OLED (Organic Light-Emitting Diode) touch, or the like. The display may also be referred to as a display screen or display unit, as appropriate, for displaying information processed in the electronic device and for displaying a visual user interface.
Only an electronic device having components is shown, and it will be understood by those skilled in the art that the structures shown in the figures do not limit the electronic device, and may include fewer or more components than shown, or may combine certain components, or a different arrangement of components.
For example, although not shown, the electronic device may further include a power source (such as a battery) for supplying power to the respective components, and preferably, the power source may be logically connected to the at least one processor 10 through a power management device, so that functions of charge management, discharge management, power consumption management, and the like are implemented through the power management device. The power supply may also include one or more of any of a direct current or alternating current power supply, recharging device, power failure detection circuit, power converter or inverter, power status indicator, etc. The electronic device may further include various sensors, bluetooth modules, wi-Fi modules, etc., which are not described herein.
It should be understood that the embodiments described are for illustrative purposes only and are not limited to this configuration in the scope of the patent application.
The actionable filter stored in the memory 11 of the electronic device 1 is a combination of instructions that, when executed in the processor 10, enable:
acquiring an initial frame of a touch tool, and carrying out parameter configuration on the initial frame to obtain a configured touch tool;
acquiring a positioning request, and carrying out identification analysis on the positioning request to obtain a unique identification of the positioning request;
acquiring configuration information of the positioning request by utilizing the unique identifier and the touch-up tool;
verifying the correctness of the message body of the configuration information, and collecting the configuration information passing the verification as a correct message body;
performing idempotent verification on the correct message body, and determining that the correct message body passing through the idempotent verification is an idempotent message body;
acquiring a touch result of the idempotent message body, and when the touch result is waiting, verifying the existence of a template for the touch result, and screening out that the touch result of the template is touch;
and carrying out service parameter desirability verification on the presence trigger, and collecting the presence trigger passing verification as a feasible trigger.
In particular, the specific implementation method of the above instructions by the processor 10 may refer to the description of the relevant steps in the corresponding embodiment of the drawings, which is not repeated herein.
Further, the modules/units integrated in the electronic device 1 may be stored in a storage medium if implemented in the form of software functional units and sold or used as separate products. The storage medium may be volatile or nonvolatile. For example, the computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM).
The present invention also provides a storage medium storing a computer program which, when executed by a processor of an electronic device, can implement:
acquiring an initial frame of a touch tool, and carrying out parameter configuration on the initial frame to obtain a configured touch tool;
acquiring a positioning request, and carrying out identification analysis on the positioning request to obtain a unique identification of the positioning request;
acquiring configuration information of the positioning request by utilizing the unique identifier and the touch-up tool;
verifying the correctness of the message body of the configuration information, and collecting the configuration information passing the verification as a correct message body;
performing idempotent verification on the correct message body, and determining that the correct message body passing through the idempotent verification is an idempotent message body;
acquiring a touch result of the idempotent message body, and when the touch result is waiting, verifying the existence of a template for the touch result, and screening out that the touch result of the template is touch;
and carrying out service parameter desirability verification on the presence trigger, and collecting the presence trigger passing verification as a feasible trigger.
In the several embodiments provided in the present invention, it should be understood that the disclosed apparatus, device and method may be implemented in other manners. For example, the above-described apparatus embodiments are merely illustrative, and for example, the division of the modules is merely a logical function division, and there may be other manners of division when actually implemented.
The modules described as separate components may or may not be physically separate, and components shown as modules may or may not be physical units, may be located in one place, or may be distributed over multiple network units. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional module in the embodiments of the present invention may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units can be realized in a form of hardware or a form of hardware and a form of software functional modules.
It will be evident to those skilled in the art that the invention is not limited to the details of the foregoing illustrative embodiments, and that the present invention may be embodied in other specific forms without departing from the spirit or essential characteristics thereof.
The present embodiments are, therefore, to be considered in all respects as illustrative and not restrictive, the scope of the invention being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference signs in the claims shall not be construed as limiting the claim concerned.
The blockchain is a novel application mode of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanism, encryption algorithm and the like. The Blockchain (Blockchain), which is essentially a decentralised database, is a string of data blocks that are generated by cryptographic means in association, each data block containing a batch of information of network transactions for verifying the validity of the information (anti-counterfeiting) and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, an application services layer, and the like.
The embodiment of the application can acquire and process the related data based on the artificial intelligence technology. Among these, artificial intelligence (Artificial Intelligence, AI) is the theory, method, technique and application system that uses a digital computer or a digital computer-controlled machine to simulate, extend and extend human intelligence, sense the environment, acquire knowledge and use knowledge to obtain optimal results.
Furthermore, it is evident that the word "comprising" does not exclude other elements or steps, and that the singular does not exclude a plurality. A plurality of units or means recited in the system claims can also be implemented by means of software or hardware by means of one unit or means. The terms first, second, etc. are used to denote a name, but not any particular order.
Finally, it should be noted that the above-mentioned embodiments are merely for illustrating the technical solution of the present invention and not for limiting the same, and although the present invention has been described in detail with reference to the preferred embodiments, it should be understood by those skilled in the art that modifications and equivalents may be made to the technical solution of the present invention without departing from the spirit and scope of the technical solution of the present invention.

Claims (10)

1. A method for screening for viable touches, the method comprising:
acquiring an initial frame of a touch tool, and performing parameter configuration on the initial frame to obtain a configured touch tool;
acquiring a positioning request, and carrying out identification analysis on the positioning request to obtain a unique identification of the positioning request;
acquiring configuration information of the positioning request by utilizing the unique identifier of the positioning request and the configured touch-up tool;
verifying the correctness of the message body of the configuration information to collect the configuration information passing the verification as a correct message body;
performing idempotent verification on the correct message body to determine that the correct message body passing through the idempotent verification is an idempotent message body;
acquiring a touch result of the idempotent message body, and when the touch result is waiting, verifying the existence of the template for the touch result to screen out that the touch result of the template exists as existence touch;
and carrying out business parameter desirability verification on the presence trigger so as to collect the presence trigger passing verification as a feasible trigger.
2. The method for screening feasible touch as claimed in claim 1, wherein said performing parameter configuration on said initial frame to obtain a configured touch tool comprises:
performing parameter entering format configuration on the initial frame to obtain a primary frame;
configuring a unique field of the primary framework to obtain a secondary framework;
template information configuration is carried out on the secondary frames to obtain tertiary frames;
and carrying out service parameter configuration on the three-level framework to obtain a configured touch tool.
3. The feasible touch screen method of claim 1, wherein the performing an identification resolution on the location request to obtain the unique identification of the location request comprises:
acquiring a request header field of the positioning request, and analyzing the request header field to obtain a field value of the request header field;
and acquiring keywords from the field value, and performing identification screening on the keywords according to a preset keyword array tree to obtain the unique identification of the positioning request.
4. The method for screening for viable touches according to claim 1, wherein said obtaining configuration information of said positioning request using said unique identification and said touch implement comprises:
determining an information interface of the touch tool according to the unique identification;
acquiring an interface protocol of the information interface, and acquiring interface calling parameters in the interface protocol according to a preset description mode;
and acquiring configuration information of the positioning request according to the interface calling parameters.
5. The method for screening for viable touches according to claim 1, wherein said obtaining configuration information of said positioning request using said unique identification and said touch implement comprises:
performing field screening on the configuration information to obtain a parameter entering field;
performing parameter entering format verification according to the parameter entering fields, and collecting the parameter entering fields passing the parameter entering format verification as parameter entering field sets;
and mapping the message bodies one by one for the parameter entering fields in the parameter entering field set to obtain the correct message body.
6. The method for filtering feasible touches according to claim 5, wherein said performing an idempotent check on said correct message body, determining that the correct message body passing said idempotent check is an idempotent message body, comprises:
acquiring idempotent keywords in the parameter entry field according to a preset key value rule;
inquiring whether the idempotent keywords exist in a preset storage result table, and when the idempotent keywords do not exist in the storage result table, determining that the correct message body passes the idempotent verification, and taking the correct message body passing the idempotent verification as the idempotent message body.
7. The method for screening for viable touches according to any one of claims 1 to 6, wherein said verifying the presence of a template on the touch result, screening out the touch result of the presence of a template as the presence of a touch, comprises:
obtaining a template field in the touch result, and performing key value mapping on the template field to obtain a template value of the template field;
and searching the template value in a preset template table, and determining that the touch result is touch when the template value is searched from the template table.
8. A viable touch screening device, the device comprising:
the parameter configuration module is used for acquiring an initial frame of the touch tool, and carrying out parameter configuration on the initial frame to obtain the configured touch tool;
the identification analysis module is used for acquiring a positioning request, carrying out identification analysis on the positioning request and obtaining a unique identification of the positioning request;
the configuration information acquisition module is used for acquiring the configuration information of the positioning request by utilizing the unique identifier and the touch tool;
the correctness verification module is used for verifying the correctness of the message body of the configuration information and collecting the configuration information passing the verification as a correct message body;
the idempotent verification module is used for carrying out idempotent verification on the correct message body and determining that the correct message body passing through the idempotent verification is the idempotent message body;
the presence verification module is used for obtaining the touch result of the idempotent message body, carrying out template presence verification on the touch result when the touch result is waiting, and screening out that the touch result of the template is presence touch;
and the service parameter verification module is used for carrying out service parameter demand verification on the presence trigger, and collecting the presence trigger passing verification as a feasible trigger.
9. An electronic device, the electronic device comprising:
at least one processor; the method comprises the steps of,
a memory communicatively coupled to the at least one processor; wherein,,
the memory stores a computer program executable by the at least one processor to enable the at least one processor to perform the viable touchdown screening method of any of claims 1 to 7.
10. A storage medium storing a computer program which, when executed by a processor, implements the viable touchdown screening method of any of claims 1 to 7.
CN202210893410.8A 2022-07-27 2022-07-27 Feasible touch screening method and device, electronic equipment and storage medium Active CN115242638B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210893410.8A CN115242638B (en) 2022-07-27 2022-07-27 Feasible touch screening method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210893410.8A CN115242638B (en) 2022-07-27 2022-07-27 Feasible touch screening method and device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN115242638A CN115242638A (en) 2022-10-25
CN115242638B true CN115242638B (en) 2023-06-27

Family

ID=83677456

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210893410.8A Active CN115242638B (en) 2022-07-27 2022-07-27 Feasible touch screening method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN115242638B (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108171528A (en) * 2016-12-07 2018-06-15 阿里巴巴集团控股有限公司 A kind of attribution method and attribution system
WO2019085579A1 (en) * 2017-10-30 2019-05-09 阿里巴巴集团控股有限公司 Information pushing method and apparatus
CN112311868A (en) * 2020-10-27 2021-02-02 上海淇馥信息技术有限公司 Message touch method and device and electronic equipment
CN112346884A (en) * 2020-10-12 2021-02-09 口碑(上海)信息技术有限公司 Message reach data processing method and device
CN112801763A (en) * 2021-04-14 2021-05-14 浙江口碑网络技术有限公司 Touch and reach scheme generation method and device and electronic equipment
CN113760976A (en) * 2020-09-23 2021-12-07 北京沃东天骏信息技术有限公司 Service processing method, device, equipment and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN108171528A (en) * 2016-12-07 2018-06-15 阿里巴巴集团控股有限公司 A kind of attribution method and attribution system
WO2019085579A1 (en) * 2017-10-30 2019-05-09 阿里巴巴集团控股有限公司 Information pushing method and apparatus
CN113760976A (en) * 2020-09-23 2021-12-07 北京沃东天骏信息技术有限公司 Service processing method, device, equipment and storage medium
CN112346884A (en) * 2020-10-12 2021-02-09 口碑(上海)信息技术有限公司 Message reach data processing method and device
CN112311868A (en) * 2020-10-27 2021-02-02 上海淇馥信息技术有限公司 Message touch method and device and electronic equipment
CN112801763A (en) * 2021-04-14 2021-05-14 浙江口碑网络技术有限公司 Touch and reach scheme generation method and device and electronic equipment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
电商交易数据实时计算平台设计与实现;陈振华;中国优秀硕士学位论文全文数据库信息科技辑(第02期);I138-827 *

Also Published As

Publication number Publication date
CN115242638A (en) 2022-10-25

Similar Documents

Publication Publication Date Title
CN112613917B (en) Information pushing method, device, equipment and storage medium based on user portrait
CN112860727B (en) Data query method, device, equipment and medium based on big data query engine
CN110795697A (en) Logic expression obtaining method and device, storage medium and electronic device
CN112702228B (en) Service flow limit response method, device, electronic equipment and readable storage medium
CN106600082A (en) Processing method and device of task in service system, and service system construction system
CN112559923A (en) Website resource recommendation method and device, electronic equipment and computer storage medium
CN112507230A (en) Webpage recommendation method and device based on browser, electronic equipment and storage medium
CN113282854A (en) Data request response method and device, electronic equipment and storage medium
CN116362684A (en) Library cluster-based book management method, library cluster-based book management device, library cluster-based book management equipment and storage medium
CN113886204A (en) User behavior data collection method and device, electronic equipment and readable storage medium
CN113434542B (en) Data relationship identification method and device, electronic equipment and storage medium
CN113515703A (en) Information recommendation method and device, electronic equipment and readable storage medium
CN115242638B (en) Feasible touch screening method and device, electronic equipment and storage medium
CN116450723A (en) Data extraction method, device, computer equipment and storage medium
CN114691782B (en) Database table increment synchronization method, device and storage medium
CN114780688A (en) Text quality inspection method, device and equipment based on rule matching and storage medium
CN114662005A (en) Message pushing method, device, equipment and storage medium for user behavior track
CN114637866A (en) Information management method and device for digital new media
CN114518993A (en) System performance monitoring method, device, equipment and medium based on business characteristics
CN111177501B (en) Label processing method, device and system
CN114238024A (en) Timing diagram generation method and system
CN112528112B (en) Data collection and analysis method and device, electronic equipment and storage medium
CN112527880B (en) Method, device, equipment and medium for collecting metadata information of big data cluster
CN112527282B (en) Front-end page verification method and device, electronic equipment and storage medium
CN113360505B (en) Time sequence data-based data processing method and device, electronic equipment and readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant