CN115865809A - Data transmission method and device, electronic equipment and readable storage medium - Google Patents

Data transmission method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN115865809A
CN115865809A CN202310052428.XA CN202310052428A CN115865809A CN 115865809 A CN115865809 A CN 115865809A CN 202310052428 A CN202310052428 A CN 202310052428A CN 115865809 A CN115865809 A CN 115865809A
Authority
CN
China
Prior art keywords
data
verification
detected
user side
strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202310052428.XA
Other languages
Chinese (zh)
Other versions
CN115865809B (en
Inventor
王景鹤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aijiwei Consulting Xiamen Co ltd
Original Assignee
Aijiwei Consulting Xiamen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aijiwei Consulting Xiamen Co ltd filed Critical Aijiwei Consulting Xiamen Co ltd
Priority to CN202310052428.XA priority Critical patent/CN115865809B/en
Publication of CN115865809A publication Critical patent/CN115865809A/en
Application granted granted Critical
Publication of CN115865809B publication Critical patent/CN115865809B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Information Transfer Between Computers (AREA)

Abstract

The application discloses a data transmission method, a data transmission device, an electronic device and a readable storage medium, wherein the method comprises the following steps: responding to data detection operation aiming at a user side, and acquiring to-be-detected data corresponding to the data detection operation; determining a client version corresponding to the data to be detected; identifying a detection scene corresponding to the data to be detected; and transmitting verification data corresponding to the data to be detected to the user side based on the client version and the detection scene so that the user side can detect the data to be detected based on the verification data. The scheme can improve the effectiveness of data transmission.

Description

Data transmission method and device, electronic equipment and readable storage medium
Technical Field
The present application relates to the field of information processing technologies, and in particular, to a data transmission method, an apparatus, an electronic device, and a readable storage medium.
Background
With the rapid development of internet technology, a large number of application programs appear on different platforms, such as IOS, windows, android, and the like, and at present, application programs applied to different platforms are developed for the same application in order to meet the requirements of different users on different platforms.
Before an application program is formally online, the application program needs to be tested, such as interface testing or function testing, and the like, in the current method, each platform has a respective validation rule, and a framework under each platform has a respective validation rule, for multi-platform applications, a server needs to transmit a large amount of data to a multi-platform framework during testing, and for the same platform application, the same platform application contains all versions of test data, and thus, the validity of the transmitted data in the current data transmission method is low.
Disclosure of Invention
In view of this, the present application provides a data transmission method, an apparatus, an electronic device, and a readable storage medium, so as to improve the effectiveness of data transmission.
The application provides a data transmission method, which comprises the following steps:
responding to data detection operation aiming at a user side, and acquiring to-be-detected data corresponding to the data detection operation;
determining a client version corresponding to the to-be-detected data;
identifying a detection scene corresponding to the data to be detected;
and transmitting verification data corresponding to the data to be detected to the user side based on the client version and the detection scene so that the user side can detect the data to be detected based on the verification data.
Optionally, in some embodiments, the transmitting, based on the client version and the detection scenario, verification data corresponding to the data to be detected to the user side, so that the user side detects the data to be detected based on the verification data, includes:
obtaining a verification policy set corresponding to the client version, wherein the verification policy set comprises a plurality of verification policies;
determining the verification strategy corresponding to the detection scene as a target verification strategy in the verification strategy set;
and transmitting the target verification strategy to the user side so that the user side can detect the data to be detected based on the verification data.
Optionally, in some embodiments, the determining, in the verification policy set, the verification policy corresponding to the detection scenario as a target verification policy includes:
identifying a scene type of the detection scene;
and determining the verification strategy corresponding to the detection scene as a target verification strategy in the verification strategy set based on the scene type.
Optionally, in some embodiments, the transmitting the target verification policy to the user side so that the user side detects the data to be detected based on the verification data includes:
determining a priority between the target verification policies;
extracting the network intensity when the target verification strategy is transmitted from the current network environment information;
determining a transmission speed when the target verification strategy is transmitted based on the priority and the network strength;
and transmitting the target verification strategy to the user side according to the transmission speed so that the user side can detect the data to be detected based on the verification data.
Optionally, in some embodiments, the determining, based on the priority and the network strength, a transmission speed at which the target verification policy is transmitted includes:
when the network intensity is detected to be greater than or equal to the preset intensity, distributing a first preset transmission speed for each target verification strategy;
when the network intensity is detected to be smaller than the preset intensity, distributing a second preset transmission speed to the target verification strategy with the priority as the first priority, and distributing a third preset transmission speed to the target verification strategy with the priority as the second priority, wherein the first preset transmission speed is larger than the second preset transmission speed, and the second transmission speed is larger than the third transmission speed;
the transmitting the target verification strategy to the user side according to the transmission speed so that the user side can detect the data to be detected based on the verification data comprises: when the network intensity is detected to be smaller than the preset intensity, the target verification strategy with the priority level as the first priority level is transmitted to the user side according to the second preset transmission speed, and the target verification strategy with the priority level as the second priority level is transmitted to the user side according to the third preset transmission speed until the target verification strategy with the priority level as the first priority level is transmitted, so that the user side can detect the data to be detected based on the verification data.
Optionally, in some embodiments, the transmitting, based on the client version and the detection scenario, verification data corresponding to the data to be detected to the user side, so that before the user side detects the data to be detected based on the verification data, the method further includes:
carrying out rationality verification on the data to be detected;
and when the rationality verification passes, transmitting verification data corresponding to the data to be detected to the user side based on the client version and the detection scene so that the user side can detect the data to be detected based on the verification data.
Optionally, in some embodiments, the identifying a detection scenario corresponding to the data to be detected includes:
extracting data characteristics corresponding to the data to be detected;
and identifying a detection scene corresponding to the data to be detected based on the data characteristics.
Correspondingly, the present application further provides a data transmission device, including:
the acquisition module is used for responding to data detection operation aiming at a user side and acquiring to-be-detected data corresponding to the data detection operation;
the determining module is used for determining the client version corresponding to the data to be detected;
the identification module is used for identifying a detection scene corresponding to the data to be detected;
and the transmission module is used for transmitting the verification data corresponding to the data to be detected to the user side based on the client version and the detection scene so that the user side can detect the data to be detected based on the verification data.
The present application further provides an electronic device, which includes a memory and a processor, where the memory stores a computer program, and the processor executes the steps of the data transmission method of the foregoing embodiment.
The present application also provides a readable storage medium storing a computer program, which when executed by a processor, performs the above method.
The application provides a data transmission method, a device, an electronic device and a readable storage medium, wherein the data transmission method comprises the following steps: the data transmission method comprises the steps of responding to data detection operation of a user side, obtaining to-be-detected data corresponding to the data detection operation, determining a client version corresponding to the to-be-detected data, identifying a detection scene corresponding to the to-be-detected data, and transmitting verification data corresponding to the to-be-detected data to the user side based on the client version and the detection scene, so that the user side can detect the to-be-detected data based on the verification data, therefore, the verification data can be transmitted to the user side in a refined mode, invalid data in the transmitted data are reduced, and effectiveness of data transmission can be improved.
Drawings
In order to more clearly illustrate the technical solutions in the embodiments of the present application, the drawings needed to be used in the description of the embodiments are briefly introduced below, and it is obvious that the drawings in the following description are only some embodiments of the present application, and it is obvious for those skilled in the art to obtain other drawings based on these drawings without creative efforts.
Fig. 1 is a schematic view of a scenario of a data transmission method provided in an embodiment of the present application;
fig. 2 is a schematic flowchart of a data transmission method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a data transmission device according to an embodiment of the present application;
fig. 4 is another schematic structural diagram of a data transmission device according to an embodiment of the present application.
Detailed Description
The technical solutions in the embodiments of the present application are clearly and completely described below with reference to the accompanying drawings, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application. The following embodiments and their technical features may be combined with each other without conflict.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, such information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope herein. The word "if" as used herein may be interpreted as "at" \8230; "or" when 8230; \8230; "or" in response to a determination ", depending on the context. Also, as used herein, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes" and/or "including," when used in this specification, specify the presence of stated features, steps, operations, elements, components, items, species, and/or groups, but do not preclude the presence, or addition of one or more other features, steps, operations, elements, components, species, and/or groups thereof. The terms "or," "and/or," "including at least one of the following," and the like, as used herein, are to be construed as inclusive or mean any one or any combination. For example, "includes at least one of: A. b, C "means" any of the following: a; b; c; a and B; a and C; b and C; a and B and C ", again for example," a, B or C "or" a, B and/or C "means" any one of the following: a; b; c; a and B; a and C; b and C; a and B and C'. An exception to this definition will occur only when a combination of elements, functions, steps or operations are inherently mutually exclusive in some way.
It should be understood that, although the steps in the flowcharts in the embodiments of the present application are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and may be performed in other orders unless otherwise indicated herein. Moreover, at least some of the steps in the figures may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, in different orders, and may be performed alternately or partially with other steps or at least some of the sub-steps or stages of other steps.
The words "if", as used herein may be interpreted as "at \8230; \8230whenor" when 8230; \8230when or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrases "if determined" or "if detected (a stated condition or event)" may be interpreted as "when determined" or "in response to a determination" or "when detected (a stated condition or event)" or "in response to a detection (a stated condition or event)", depending on the context.
It should be noted that, step numbers such as 101, 102, etc. are used herein for the purpose of more clearly and briefly describing the corresponding content, and do not constitute a substantial limitation on the sequence, and those skilled in the art may perform 101 and then 102, etc. in the specific implementation, but these shall be within the protection scope of the present application.
The application provides a data transmission method, a data transmission device, electronic equipment and a readable storage medium.
The data transmission device may be specifically integrated in a server, the server may include an independently operating server or a distributed server, or may include a server cluster including a plurality of servers, the server may be connected to an electronic device in a wired or wireless manner, and the electronic device may include a mobile phone, a tablet Computer, or a Personal Computer (PC).
For example, referring to fig. 1, the present application provides a data transmission apparatus, where the data transmission apparatus is integrated in a server 10, the server 10 is connected to a plurality of electronic devices 20, the server 10 responds to a data detection operation for the electronic devices 20 to obtain data to be detected corresponding to the data detection operation, then the server 10 determines a client version corresponding to the data to be detected, then the server 10 identifies a detection scenario corresponding to the data to be detected, and finally, the server 10 transmits verification data corresponding to the data to be detected to the electronic devices 20 based on the client version and the detection scenario, so that the electronic devices 20 detect the data to be detected based on the verification data.
The data transmission scheme provided by the application can finely transmit the verification data to the user side, and reduces invalid data in the transmitted data, so that the effectiveness of data transmission can be improved.
The following are detailed below. It should be noted that the description sequence of the following embodiments is not intended to limit the priority sequence of the embodiments.
A method of data transmission, comprising: responding to data detection operation aiming at a user side, and acquiring to-be-detected data corresponding to the data detection operation; determining a client version corresponding to the data to be detected; identifying a detection scene corresponding to data to be detected; and transmitting verification data corresponding to the data to be detected to the user side based on the client version and the detection scene so that the user side can detect the data to be detected based on the verification data.
Referring to fig. 2, fig. 2 is a schematic flow chart illustrating a data transmission method according to an embodiment of the present application. The specific flow of the data transmission method may be as follows:
101. and responding to the data detection operation aiming at the user side, and acquiring the data to be detected corresponding to the data detection operation.
The triggering operation may be triggered by a user, may also be triggered by the electronic device, and may also be triggered by the server, for example, a click operation triggered by the user for a triggering control of the electronic device, for example, a data detection operation triggered by the electronic device or the server for the data to be detected within a preset time, and the like.
102. And determining the client version corresponding to the data to be detected.
In the application, the version of the client corresponding to the data to be detected needs to be determined, and if a specific statement in the data to be detected can be identified, the specific statement generally carries the version of the client corresponding to the specific statement, so that the version of the client corresponding to the data to be detected is determined.
103. And identifying a detection scene corresponding to the data to be detected.
In this application, mainly, the function or the page corresponding to the data to be identified is used for scene discrimination, for example, the function corresponding to the data a to be detected is to check the user identity, and the function corresponding to the data B to be detected is to show a certain control in the xx page, which is visible, the detection scene corresponding to the data a to be detected and the detection scene corresponding to the data B to be detected are different, and specifically, the detection scene corresponding to the data to be detected can be identified by using the data characteristics corresponding to the data to be detected, that is, optionally, in some embodiments, the step "identifying the detection scene corresponding to the data to be detected" may specifically include:
(11) Extracting data characteristics corresponding to the data to be detected;
(12) And identifying a detection scene corresponding to the data to be detected based on the data characteristics.
The scene detection model may be a convolutional neural network model, and the convolutional neural network model may be set according to an actual situation, for example, the convolutional neural network model may include four convolutional layers and a full connection layer.
A convolutional layer: the method is mainly used for feature extraction of an input image (such as a training sample or an image to be identified), wherein the size of the convolution kernel can be determined according to practical application, for example, the sizes of the convolution kernels from a first convolution layer to a fourth convolution layer can be (7, 7), (5, 5), (3, 3); optionally, in order to reduce the complexity of the calculation and improve the calculation efficiency, in this embodiment, the sizes of convolution kernels of the four convolution layers may all be set to (3, 3), the activation functions all use "relu (Linear rectification function)", the padding (which refers to a space between an attribute definition element border and an element content) modes are all set to "same", and the "same" padding mode may be simply understood as that an edge is padded with 0, and the number of 0 padding on the left side (upper side) is the same as or less than the number of 0 padding on the right side (lower side). Optionally, the convolutional layers may be directly connected to each other, so as to accelerate the network convergence speed, and in order to further reduce the calculation amount, downsampling (downsampling) may be performed on all layers or any 1 to 2 layers of the second to fourth convolutional layers, where the downsampling operation is substantially the same as the convolution operation, and the downsampling convolution kernel is only a maximum value (max) or an average value (average) of corresponding positions.
It should be noted that, for convenience of description, in the embodiment of the present invention, both the layer where the activation function is located and the down-sampling layer (also referred to as a pooling layer) are included in the convolution layer, and it should be understood that the structure may also be considered to include the convolution layer, the layer where the activation function is located, the down-sampling layer (i.e., a pooling layer), and a full-connection layer, and of course, the structure may also include an input layer for inputting data and an output layer for outputting data, which are not described herein again.
Full connection layer: the learned features may be mapped to a sample label space, which mainly functions as a "classifier" in the whole convolutional neural network, and each node of the fully-connected layer is connected to all nodes output by the previous layer (e.g., the down-sampling layer in the convolutional layer), where one node of the fully-connected layer is referred to as one neuron in the fully-connected layer, and the number of neurons in the fully-connected layer may be determined according to the requirements of the practical application, for example, in the upper half branch network and the lower half branch network of the twin neural network model, the number of neurons in the fully-connected layer may be set to 512 each, or may be set to 128 each, and so on. Similar to the convolutional layer, optionally, in the fully-connected layer, a non-linear factor may also be added by adding an activation function, for example, an activation function sigmoid (sigmoid function) may be added.
104. And transmitting verification data corresponding to the data to be detected to the user side based on the client version and the detection scene so that the user side can detect the data to be detected based on the verification data.
In this application, a user side refers to a user device, and specifically, verification data corresponding to data to be detected may be obtained based on a client version and a detection scenario, where the verification data may include a plurality of verification policies, that is, optionally, in some embodiments, the step "transmitting the verification data corresponding to the data to be detected to the user side based on the client version and the detection scenario, so that the user side detects the data to be detected based on the verification data" may specifically include:
(21) Acquiring a verification strategy set corresponding to a client version;
(22) Determining a verification strategy corresponding to the detection scene as a target verification strategy in a verification strategy set;
(23) And transmitting the target verification strategy to the user side so that the user side can detect the data to be detected based on the verification data.
The verification policy set includes a plurality of verification policies, and first, according to a client version, a verification policy set matching the client version may be obtained from a large number of verification policies, and then, the verification policy corresponding to a detection scenario may be determined as a target verification policy in the verification policy set, specifically, according to a scenario type of the detection scenario, the verification policy corresponding to the detection scenario may be determined as a target verification policy in the verification policy set, that is, optionally, in some embodiments, the step "determining the verification policy corresponding to the detection scenario as the target verification policy in the verification policy set" may specifically include:
(31) Identifying a scene type of a detection scene;
(32) And determining the verification strategy corresponding to the detection scene as a target verification strategy in the verification strategy set based on the scene type.
After the target verification policy is determined, the target verification policy may be transmitted to the user side, so that the user side detects the data to be detected based on the target verification policy. It should be noted that, because the authentication policy required by the user end is often a plurality of authentication policies, and the execution sequence of different authentication policies may be different, for example, for a certain detection plan, it needs to detect the login function of the application program first, and then detect the display function of the application program, that is, it needs to detect the login function and the display function of the data to be detected according to the authentication policy, and the priority of the login function is higher than the priority of the display function, so when the network strength is poor or is limited by the transmission throughput, the authentication policy for detecting the login function may be preferentially transmitted to the user end, that is, optionally, in some embodiments, the step "transmitting the target authentication policy to the user end so that the user end detects the data to be detected based on the authentication data" may specifically include:
(41) Determining a priority between target verification policies;
(42) Extracting the network intensity when the target verification strategy is transmitted from the current network environment information;
(43) Determining a transmission speed when the target verification strategy is transmitted based on the priority and the network strength;
(44) And transmitting the target verification strategy to the user side according to the transmission speed so that the user side can detect the data to be detected based on the verification data.
In the actual data transmission process, the network strength is one of the key factors affecting the transmission speed, so under different network strengths, different transmission speeds are allocated for different priority levels of the authentication policies, thereby improving the flexibility of data transmission, that is, optionally, in some embodiments, the step "determining the transmission speed when the target authentication policy is transmitted based on the priority level and the network strength" may specifically include:
(51) When the network intensity is detected to be greater than or equal to the preset intensity, distributing a first preset transmission speed for each target verification strategy;
(52) And when the network intensity is detected to be smaller than the preset intensity, distributing a second preset transmission speed to the target verification strategy with the priority as the first priority, and distributing a third preset transmission speed to the target verification strategy with the priority as the second priority.
The first preset transmission speed is greater than the second preset transmission speed, the second transmission speed is greater than the third transmission speed, the preset speed and the preset intensity can be preset in advance, the preset speed and the preset intensity can be specifically set according to actual conditions, and the detailed description is omitted here.
Further, in some embodiments, the step "transmitting the target verification policy to the user side according to the transmission speed, so that the user side detects the data to be detected based on the verification data" may specifically include:
when the network intensity is detected to be smaller than the preset intensity, the target verification strategy with the priority level as the first priority level is transmitted to the user side according to the second preset transmission speed, and the target verification strategy with the priority level as the second priority level is transmitted to the user side according to the third preset transmission speed until the target verification strategy with the priority level as the first priority level is transmitted, so that the user side can detect the data to be detected based on the verification data.
It should be further noted that before the verification data is transmitted, the rationality of the data to be detected needs to be verified, where the rationality verification is to verify whether the verification data conforms to a preset data verification rule, that is, the verification is legal, or not, for example, the statement validity corresponding to the data to be detected is verified, that is, optionally, in some embodiments, the step "transmitting the verification data corresponding to the data to be detected to the user side based on the version of the client and the detection scenario, so that the user side detects the data to be detected based on the verification data" may specifically include:
carrying out rationality verification on data to be detected;
and when the rationality verification passes, transmitting verification data corresponding to the data to be detected to the user side based on the client version and the detection scene so that the user side can detect the data to be detected based on the verification data.
The data transmission process of the present application is completed above.
According to the data transmission method, after the data to be detected corresponding to the data detection operation is obtained in response to the data detection operation for the user side, the client version corresponding to the data to be detected is determined, then the detection scene corresponding to the data to be detected is identified, and finally the verification data corresponding to the data to be detected is transmitted to the user side based on the client version and the detection scene, so that the user side can detect the data to be detected based on the verification data.
Referring to fig. 3, fig. 3 is a schematic structural diagram of a data transmission device according to an embodiment of the present application, where the data transmission device specifically includes: the obtaining module 301, the determining module 302, the identifying module 303, and the transmitting module 304 may specifically be as follows:
the obtaining module 301 is configured to, in response to a data detection operation for a user side, obtain to-be-detected data corresponding to the data detection operation.
The triggering operation may be triggered by a user, may also be triggered by the electronic device, and may also be triggered by the server, for example, a click operation triggered by the user for a triggering control of the electronic device, for example, a data detection operation triggered by the electronic device or the server for the data to be detected within a preset time, and the like.
The determining module 302 is configured to determine a client version corresponding to the data to be detected.
In the application, the client version corresponding to the data to be detected needs to be determined, for example, a specific statement in the data to be detected can be identified, and the specific statement generally carries the version of the client corresponding to the specific statement, so that the client version corresponding to the data to be detected is determined.
The identifying module 303 is configured to identify a detection scene corresponding to the data to be detected.
In the application, scene distinguishing is mainly performed by using a function or a page corresponding to data to be identified, for example, the function corresponding to the data a to be detected is to check the identity of a user, and the function corresponding to the data B to be detected is to display a certain control in an xx page.
Optionally, in some embodiments, the identifying module 303 may be specifically configured to: extracting data characteristics corresponding to the data to be detected; and identifying a detection scene corresponding to the data to be detected based on the data characteristics.
The transmission module 304 is configured to transmit verification data corresponding to the to-be-detected data to the user side based on the client version and the detection scenario, so that the user side detects the to-be-detected data based on the verification data.
In this application, a user side refers to a user device, and specifically, verification data corresponding to data to be detected may be obtained based on a client side version and a detection scenario, where the verification data may include a plurality of verification policies, and optionally, in some embodiments, the transmission module 304 may specifically include:
the acquiring unit is used for acquiring a verification strategy set corresponding to the client version;
the determining unit is used for determining the verification strategy corresponding to the detection scene as a target verification strategy in the verification strategy set;
and the transmission unit is used for transmitting the target verification strategy to the user side so that the user side can detect the data to be detected based on the verification data.
Optionally, in some embodiments, the determining unit may specifically include:
the identification subunit is used for identifying the scene type of the detection scene;
and the first determining subunit is used for determining the verification strategy corresponding to the detection scene as the target verification strategy in the verification strategy set based on the scene type.
Optionally, in some embodiments, the transmission unit may specifically include:
a second determining subunit, configured to determine a priority between the target authentication policies;
an extraction subunit, configured to extract, from the current network environment information, a network strength at which the target verification policy is transmitted;
a third determining subunit, configured to determine, based on the priority and the network strength, a transmission speed at which the target verification policy is transmitted;
and the transmission subunit is used for transmitting the target verification strategy to the user side according to the transmission speed so that the user side can detect the data to be detected based on the verification data.
Optionally, in some embodiments, the third determining subunit may be specifically configured to: when the network intensity is detected to be greater than or equal to the preset intensity, distributing a first preset transmission speed for each target verification strategy; and when the network intensity is detected to be smaller than the preset intensity, distributing a second preset transmission speed to the target verification strategy with the priority as the first priority, and distributing a third preset transmission speed to the target verification strategy with the priority as the second priority.
Optionally, in some embodiments, the transmission subunit may specifically be configured to: when the network intensity is detected to be smaller than the preset intensity, the target verification strategy with the priority level as the first priority level is transmitted to the user side according to the second preset transmission speed, and the target verification strategy with the priority level as the second priority level is transmitted to the user side according to the third preset transmission speed until the target verification strategy with the priority level as the first priority level is transmitted, so that the user side can detect the data to be detected based on the verification data.
Optionally, in some embodiments, referring to fig. 4, the data transmission apparatus of the present application may further include a verification module 305, where the verification module 305 may be specifically configured to: carrying out rationality verification on data to be detected; when the rationality verification passes, the transmission module 304 transmits verification data corresponding to the data to be detected to the user side based on the client version and the detection scene, so that the user side detects the data to be detected based on the verification data.
According to the data transmission device, after the acquisition module 301 responds to data detection operation of a user side and acquires data to be detected corresponding to the data detection operation, the determination module 302 determines a client version corresponding to the data to be detected, then the recognition module 303 recognizes a detection scene corresponding to the data to be detected, and finally the transmission module 304 transmits verification data corresponding to the data to be detected to the user side based on the client version and the detection scene, so that the user side detects the data to be detected based on the verification data, therefore, the verification data can be transmitted to the user side in a refined mode, invalid data in the transmitted data are reduced, and effectiveness of data transmission can be improved.
The application further provides an electronic device, which includes a memory and a processor, wherein the memory stores an interface processing program, and the interface processing program implements the steps of the interface processing method in any of the embodiments when executed by the processor.
The present application further provides a readable storage medium, where an interface processing program is stored on the readable storage medium, and the interface processing program, when executed by a processor, implements the steps of the interface processing method in any of the above embodiments.
In the embodiments of the electronic device and the readable storage medium provided in the present application, all technical features of any one of the embodiments of the interface processing method may be included, and the expanding and explaining contents of the specification are basically the same as those of the embodiments of the method, and are not described herein again.
Embodiments of the present application also provide a computer program product, which includes computer program code, when the computer program code runs on a computer, the computer is caused to execute the method in the above various possible embodiments.
Embodiments of the present application further provide a chip, which includes a memory and a processor, where the memory is used to store a computer program, and the processor is used to call and run the computer program from the memory, so that a device in which the chip is installed executes the method in the above various possible embodiments.
It should be understood that the foregoing scenarios are only examples, and do not constitute a limitation on application scenarios of the technical solutions provided in the embodiments of the present application, and the technical solutions of the present application may also be applied to other scenarios. For example, as can be known by those skilled in the art, with the evolution of system architecture and the emergence of new service scenarios, the technical solution provided in the embodiments of the present application is also applicable to similar technical problems.
The above-mentioned serial numbers of the embodiments of the present application are merely for description and do not represent the merits of the embodiments.
The steps in the method of the embodiment of the application can be sequentially adjusted, combined and deleted according to actual needs.
The units in the device in the embodiment of the application can be merged, divided and deleted according to actual needs.
In the present application, the same or similar term concepts, technical solutions and/or application scenario descriptions will be generally described only in detail at the first occurrence, and when the description is repeated later, the detailed description will not be repeated in general for brevity, and when understanding the technical solutions and the like of the present application, reference may be made to the related detailed description before the description for the same or similar term concepts, technical solutions and/or application scenario descriptions and the like which are not described in detail later.
In the present application, each embodiment is described with an emphasis on the description, and reference may be made to the description of other embodiments for parts that are not described or recited in any embodiment.
The technical features of the technical solution of the present application may be arbitrarily combined, and for brevity of description, all possible combinations of the technical features in the embodiments are not described, however, as long as there is no contradiction between the combinations of the technical features, the scope of the present application should be considered as being described in the present application.
Through the above description of the embodiments, those skilled in the art will clearly understand that the method of the above embodiments can be implemented by software plus a necessary general hardware platform, and certainly can also be implemented by hardware, but in many cases, the former is a better implementation manner. Based on such understanding, the technical solutions of the present application or portions contributing to the prior art may be embodied in the form of a software product, where the computer software product is stored in a storage medium (such as a ROM/RAM, a magnetic disk, and an optical disk) as above, and includes several instructions to enable a terminal device (which may be a mobile phone, a computer, a server, a controlled terminal, or a network device) to execute the method of each embodiment of the present application.
In the above embodiments, the implementation may be wholly or partially realized by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. The procedures or functions according to the embodiments of the present application are all or partially generated when the computer program instructions are loaded and executed on a computer. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable device. The computer instructions may be stored on a computer readable storage medium or transmitted from one computer readable storage medium to another, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by wire (e.g., coaxial cable, fiber optic, digital subscriber line) or wirelessly (e.g., infrared, wireless, microwave, etc.). The computer-readable storage medium can be any available medium that can be accessed by a computer or a data storage device, such as a server, a data center, etc., that incorporates one or more of the available media. The usable medium may be a magnetic medium (e.g., floppy Disk, memory Disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid State Disk (SSD)), among others.
The above description is only a preferred embodiment of the present application, and not intended to limit the scope of the present application, and all the equivalent structures or equivalent processes that can be directly or indirectly applied to other related technical fields by using the contents of the specification and the drawings of the present application are also included in the scope of the present application.

Claims (10)

1. A method of data transmission, comprising:
responding to data detection operation aiming at a user side, and acquiring to-be-detected data corresponding to the data detection operation;
determining a client version corresponding to the to-be-detected data;
identifying a detection scene corresponding to the data to be detected;
and transmitting verification data corresponding to the data to be detected to the user side based on the client version and the detection scene so that the user side can detect the data to be detected based on the verification data.
2. The method according to claim 1, wherein the transmitting, based on the client version and the detection scenario, verification data corresponding to the data to be detected to the user side so that the user side detects the data to be detected based on the verification data comprises:
obtaining a verification policy set corresponding to the client version, wherein the verification policy set comprises a plurality of verification policies;
determining the verification strategy corresponding to the detection scene as a target verification strategy in the verification strategy set;
and transmitting the target verification strategy to the user side so that the user side can detect the data to be detected based on the verification data.
3. The method according to claim 2, wherein the determining, in the verification policy set, the verification policy corresponding to the detection scenario as a target verification policy comprises:
identifying a scene type of the detection scene;
and determining the verification strategy corresponding to the detection scene as a target verification strategy in the verification strategy set based on the scene type.
4. The method according to claim 2, wherein the transmitting the target verification policy to the user side so that the user side detects the data to be detected based on the verification data comprises:
determining a priority between the target verification policies;
extracting the network intensity when the target verification strategy is transmitted from the current network environment information;
determining a transmission speed when the target verification strategy is transmitted based on the priority and the network strength;
and transmitting the target verification strategy to the user side according to the transmission speed so that the user side can detect the data to be detected based on the verification data.
5. The method of claim 4, wherein determining the transmission speed for transmitting the target authentication policy based on the priority and a network strength comprises:
when the network intensity is detected to be greater than or equal to the preset intensity, distributing a first preset transmission speed for each target verification strategy;
when the network strength is detected to be smaller than the preset strength, distributing a second preset transmission speed to the target verification strategy with the priority of the first priority, and distributing a third preset transmission speed to the target verification strategy with the priority of the second priority, wherein the first preset transmission speed is larger than the second preset transmission speed, and the second transmission speed is larger than the third transmission speed;
the transmitting the target verification strategy to the user side according to the transmission speed so that the user side can detect the data to be detected based on the verification data comprises: when the network intensity is detected to be smaller than the preset intensity, the target verification strategy with the priority level as the first priority level is transmitted to the user side according to the second preset transmission speed, and the target verification strategy with the priority level as the second priority level is transmitted to the user side according to the third preset transmission speed until the target verification strategy with the priority level as the first priority level is transmitted, so that the user side can detect the data to be detected based on the verification data.
6. The method according to claim 1, wherein the transmitting, based on the client version and the detection scenario, the verification data corresponding to the data to be detected to the user side so that before the user side detects the data to be detected based on the verification data, further comprises:
carrying out rationality verification on the data to be detected;
and when the rationality verification passes, transmitting verification data corresponding to the data to be detected to the user side based on the client version and the detection scene so that the user side can detect the data to be detected based on the verification data.
7. The method according to any one of claims 1 to 5, wherein the identifying the detection scene corresponding to the data to be detected comprises:
extracting data characteristics corresponding to the data to be detected;
and identifying a detection scene corresponding to the data to be detected based on the data characteristics.
8. A data transmission apparatus, comprising:
the acquisition module is used for responding to data detection operation aiming at a user side and acquiring to-be-detected data corresponding to the data detection operation;
the determining module is used for determining the client version corresponding to the data to be detected;
the identification module is used for identifying a detection scene corresponding to the data to be detected;
and the transmission module is used for transmitting the verification data corresponding to the data to be detected to the user side based on the client version and the detection scene so that the user side can detect the data to be detected based on the verification data.
9. An electronic device comprising a memory and a processor, the memory storing a computer program, wherein the processor when executing the computer program implements the steps of the data transmission method according to any one of claims 1 to 7.
10. A readable storage medium, characterized in that it stores a computer program which, when executed by a processor, implements the data transmission method of any one of claims 1 to 7.
CN202310052428.XA 2023-02-02 2023-02-02 Data transmission method, device, electronic equipment and readable storage medium Active CN115865809B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310052428.XA CN115865809B (en) 2023-02-02 2023-02-02 Data transmission method, device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310052428.XA CN115865809B (en) 2023-02-02 2023-02-02 Data transmission method, device, electronic equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN115865809A true CN115865809A (en) 2023-03-28
CN115865809B CN115865809B (en) 2023-06-02

Family

ID=85657470

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310052428.XA Active CN115865809B (en) 2023-02-02 2023-02-02 Data transmission method, device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN115865809B (en)

Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101789888A (en) * 2010-01-12 2010-07-28 腾讯科技(深圳)有限公司 Detection method and device for software installation
CN103631625A (en) * 2013-12-02 2014-03-12 腾讯科技(成都)有限公司 Data acquisition method, user terminal, server and system
US20150227452A1 (en) * 2014-02-12 2015-08-13 Wipro Limited System and method for testing software applications
CN104967613A (en) * 2015-05-27 2015-10-07 王春 Data transmission system and method under mobile network environments
CN107329763A (en) * 2017-06-30 2017-11-07 北京金山安全软件有限公司 Application program interface display method and device, electronic equipment and storage medium
CN107908540A (en) * 2017-07-26 2018-04-13 平安壹钱包电子商务有限公司 Test case creation method, apparatus, computer equipment and medium
US20180137035A1 (en) * 2016-11-15 2018-05-17 Accenture Global Solutions Limited Simultaneous multi-platform testing
CN109344048A (en) * 2018-08-17 2019-02-15 中国平安人寿保险股份有限公司 A kind of test method, storage medium and server
CN109726100A (en) * 2018-04-19 2019-05-07 平安普惠企业管理有限公司 Application performance test method, apparatus, equipment and computer readable storage medium
CN111078529A (en) * 2019-11-15 2020-04-28 汉海信息技术(上海)有限公司 Client write-in module testing method and device and electronic equipment
US20200396017A1 (en) * 2018-03-08 2020-12-17 Huawei Technologies Co., Ltd. Transmission rate switching method, bluetooth device, and computer-readable medium
CN112231206A (en) * 2020-09-30 2021-01-15 广州掌动智能科技有限公司 Script editing method for application program test, computer readable storage medium and test platform
CN112860569A (en) * 2021-02-23 2021-05-28 腾讯科技(深圳)有限公司 Automatic testing method and device, electronic equipment and storage medium
CN113568841A (en) * 2021-08-18 2021-10-29 支付宝(杭州)信息技术有限公司 Risk detection method, device and equipment for applet
US11182273B1 (en) * 2018-08-24 2021-11-23 Intuit, Inc. Application testing using automatically generated test cases
CN113806212A (en) * 2020-06-17 2021-12-17 北京字节跳动网络技术有限公司 Application program exception positioning method and device and electronic equipment
CN114860563A (en) * 2021-01-20 2022-08-05 腾讯科技(深圳)有限公司 Application program testing method and device, computer readable storage medium and equipment
CN115221037A (en) * 2021-04-20 2022-10-21 北京嘀嘀无限科技发展有限公司 Interactive page testing method and device, computer equipment and program product
CN115292163A (en) * 2022-07-08 2022-11-04 中国工商银行股份有限公司 Application program detection method and device and computer readable storage medium

Patent Citations (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101789888A (en) * 2010-01-12 2010-07-28 腾讯科技(深圳)有限公司 Detection method and device for software installation
CN103631625A (en) * 2013-12-02 2014-03-12 腾讯科技(成都)有限公司 Data acquisition method, user terminal, server and system
US20150227452A1 (en) * 2014-02-12 2015-08-13 Wipro Limited System and method for testing software applications
CN104967613A (en) * 2015-05-27 2015-10-07 王春 Data transmission system and method under mobile network environments
US20180137035A1 (en) * 2016-11-15 2018-05-17 Accenture Global Solutions Limited Simultaneous multi-platform testing
CN107329763A (en) * 2017-06-30 2017-11-07 北京金山安全软件有限公司 Application program interface display method and device, electronic equipment and storage medium
CN107908540A (en) * 2017-07-26 2018-04-13 平安壹钱包电子商务有限公司 Test case creation method, apparatus, computer equipment and medium
US20200396017A1 (en) * 2018-03-08 2020-12-17 Huawei Technologies Co., Ltd. Transmission rate switching method, bluetooth device, and computer-readable medium
CN109726100A (en) * 2018-04-19 2019-05-07 平安普惠企业管理有限公司 Application performance test method, apparatus, equipment and computer readable storage medium
CN109344048A (en) * 2018-08-17 2019-02-15 中国平安人寿保险股份有限公司 A kind of test method, storage medium and server
US11182273B1 (en) * 2018-08-24 2021-11-23 Intuit, Inc. Application testing using automatically generated test cases
CN111078529A (en) * 2019-11-15 2020-04-28 汉海信息技术(上海)有限公司 Client write-in module testing method and device and electronic equipment
CN113806212A (en) * 2020-06-17 2021-12-17 北京字节跳动网络技术有限公司 Application program exception positioning method and device and electronic equipment
CN112231206A (en) * 2020-09-30 2021-01-15 广州掌动智能科技有限公司 Script editing method for application program test, computer readable storage medium and test platform
CN114860563A (en) * 2021-01-20 2022-08-05 腾讯科技(深圳)有限公司 Application program testing method and device, computer readable storage medium and equipment
CN112860569A (en) * 2021-02-23 2021-05-28 腾讯科技(深圳)有限公司 Automatic testing method and device, electronic equipment and storage medium
CN115221037A (en) * 2021-04-20 2022-10-21 北京嘀嘀无限科技发展有限公司 Interactive page testing method and device, computer equipment and program product
CN113568841A (en) * 2021-08-18 2021-10-29 支付宝(杭州)信息技术有限公司 Risk detection method, device and equipment for applet
CN115292163A (en) * 2022-07-08 2022-11-04 中国工商银行股份有限公司 Application program detection method and device and computer readable storage medium

Also Published As

Publication number Publication date
CN115865809B (en) 2023-06-02

Similar Documents

Publication Publication Date Title
EP3869385B1 (en) Method for extracting structural data from image, apparatus and device
CN108021806B (en) Malicious installation package identification method and device
CN109194689B (en) Abnormal behavior recognition method, device, server and storage medium
CN111273891A (en) Business decision method and device based on rule engine and terminal equipment
CN112633159A (en) Human-object interaction relation recognition method, model training method and corresponding device
CN111241873A (en) Image reproduction detection method, training method of model thereof, payment method and payment device
CN112200772A (en) Pox check out test set
WO2021042895A1 (en) Neural network-based verification code identification method and system, and computer device
CN110046571B (en) Method and device for identifying age
CN110162957B (en) Authentication method and device for intelligent equipment, storage medium and electronic device
CN113988225A (en) Method and device for establishing representation extraction model, representation extraction and type identification
CN114091551A (en) Pornographic image identification method and device, electronic equipment and storage medium
CN111767543B (en) Replay attack vulnerability determination method, device, equipment and readable storage medium
CN116524206B (en) Target image identification method and device
CN113472860A (en) Service resource allocation method and server under big data and digital environment
CN115865809B (en) Data transmission method, device, electronic equipment and readable storage medium
US20220358572A1 (en) Device and method to provide data associated with shopping mall web page
CN116071590A (en) Model training method, system, computer device and storage medium
CN114297735A (en) Data processing method and related device
CN116129484A (en) Method, device, electronic equipment and storage medium for model training and living body detection
CN115272682A (en) Target object detection method, target detection model training method and electronic equipment
US20220327849A1 (en) Computer-Implemented Method For Optical Character Recognition
CN112597209A (en) Data verification method, device and system and computer readable storage medium
CN112633285A (en) Domain adaptation method, domain adaptation device, electronic equipment and storage medium
CN112165594A (en) Service handling method and device based on video communication and computer equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant