CN115865809B - Data transmission method, device, electronic equipment and readable storage medium - Google Patents

Data transmission method, device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN115865809B
CN115865809B CN202310052428.XA CN202310052428A CN115865809B CN 115865809 B CN115865809 B CN 115865809B CN 202310052428 A CN202310052428 A CN 202310052428A CN 115865809 B CN115865809 B CN 115865809B
Authority
CN
China
Prior art keywords
data
verification
detected
transmission speed
strategy
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202310052428.XA
Other languages
Chinese (zh)
Other versions
CN115865809A (en
Inventor
王景鹤
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Aijiwei Consulting Xiamen Co ltd
Original Assignee
Aijiwei Consulting Xiamen Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Aijiwei Consulting Xiamen Co ltd filed Critical Aijiwei Consulting Xiamen Co ltd
Priority to CN202310052428.XA priority Critical patent/CN115865809B/en
Publication of CN115865809A publication Critical patent/CN115865809A/en
Application granted granted Critical
Publication of CN115865809B publication Critical patent/CN115865809B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Abstract

The application discloses a data transmission method, a device, an electronic device and a readable storage medium, comprising: responding to a data detection operation aiming at a user side, and acquiring data to be detected corresponding to the data detection operation; determining a client version corresponding to the data to be detected; identifying a detection scene corresponding to the data to be detected; and transmitting verification data corresponding to the data to be detected to the user terminal based on the client version and the detection scene, so that the user terminal detects the data to be detected based on the verification data. The scheme can improve the effectiveness of data transmission.

Description

Data transmission method, device, electronic equipment and readable storage medium
Technical Field
The present disclosure relates to the field of information processing technologies, and in particular, to a data transmission method, a data transmission device, an electronic device, and a readable storage medium.
Background
With the rapid development of internet technology, a large number of application programs are presented on different platforms, such as IOS, windows, android, etc., and currently, in order to meet the requirements of different users on different platforms, application programs applied to different platforms are developed for the same type of application.
Before the application program is formally online, the application program needs to be tested, such as interface test or function test, etc., in the current method, each platform has a respective verification rule, and a framework under each platform has a respective verification rule, so that for the application of multiple platforms, a server needs to transmit a large amount of data to the framework of multiple platforms during the test, and for the application of the same platform, the server contains all versions of test data, and therefore, the validity of the transmitted data of the current data transmission method is low.
Disclosure of Invention
In view of the above, the present application provides a data transmission method, apparatus, electronic device, and readable storage medium, which improve the effectiveness of data transmission.
The application provides a data transmission method, which comprises the following steps:
responding to a data detection operation aiming at a user side, and acquiring data to be detected corresponding to the data detection operation;
determining a client version corresponding to the data to be detected;
identifying a detection scene corresponding to the data to be detected;
and transmitting verification data corresponding to the data to be detected to the user terminal based on the client version and the detection scene, so that the user terminal detects the data to be detected based on the verification data.
Optionally, in some embodiments, the transmitting, based on the client version and the detection scenario, verification data corresponding to the data to be detected to the user side, so that the user side detects the data to be detected based on the verification data includes:
acquiring a verification policy set corresponding to the client version, wherein the verification policy set comprises a plurality of verification policies;
determining the verification strategy corresponding to the detection scene as a target verification strategy in the verification strategy set;
and transmitting the target verification strategy to the user side so that the user side can detect the data to be detected based on the verification data.
Optionally, in some embodiments, the determining, in the verification policy set, the verification policy corresponding to the detection scenario as the target verification policy includes:
identifying a scene type of the detected scene;
and determining the verification strategy corresponding to the detection scene as a target verification strategy in the verification strategy set based on the scene type.
Optionally, in some embodiments, the transmitting the target verification policy to the user terminal, so that the user terminal detects the data to be detected based on the verification data, includes:
determining a priority between the target verification policies;
extracting network intensity when the target verification strategy is transmitted from the current network environment information;
determining a transmission speed when the target verification policy is transmitted based on the priority and the network strength;
and transmitting the target verification strategy to the user terminal according to the transmission speed so that the user terminal detects the data to be detected based on the verification data.
Optionally, in some embodiments, the determining, based on the priority and the network strength, a transmission speed when transmitting the target authentication policy includes:
when the network strength is detected to be greater than or equal to the preset strength, a first preset transmission speed is allocated to each target verification strategy;
when the network strength is detected to be smaller than the preset strength, a second preset transmission speed is allocated for the target verification strategy with the priority being the first priority, and a third preset transmission speed is allocated for the target verification strategy with the priority being the second priority, wherein the first preset transmission speed is larger than the second preset transmission speed, and the second transmission speed is larger than the third transmission speed;
transmitting the target verification policy to the user terminal according to the transmission speed, so that the user terminal detects the data to be detected based on the verification data, including: and when the network strength is detected to be smaller than the preset strength, transmitting the target verification strategy with the first priority to the user terminal according to a second preset transmission speed until the transmission of the target verification strategy with the first priority is completed, and transmitting the target verification strategy with the second priority to the user terminal according to a third preset transmission speed, so that the user terminal detects the data to be detected based on the verification data.
Optionally, in some embodiments, the transmitting verification data corresponding to the data to be detected to the user terminal based on the client version and the detection scenario, so that before the user terminal detects the data to be detected based on the verification data, further includes:
verifying rationality of the data to be detected;
and when the rationality verification passes, transmitting verification data corresponding to the data to be detected to the user terminal based on the client version and the detection scene, so that the user terminal detects the data to be detected based on the verification data.
Optionally, in some embodiments, the identifying a detection scenario corresponding to the data to be detected includes:
extracting data characteristics corresponding to the data to be detected;
and identifying a detection scene corresponding to the data to be detected based on the data characteristics.
Correspondingly, the application also provides a data transmission device, which comprises:
the acquisition module is used for responding to the data detection operation aiming at the user side and acquiring the data to be detected corresponding to the data detection operation;
the determining module is used for determining a client version corresponding to the data to be detected;
the identification module is used for identifying a detection scene corresponding to the data to be detected;
and the transmission module is used for transmitting verification data corresponding to the data to be detected to the user terminal based on the client version and the detection scene, so that the user terminal can detect the data to be detected based on the verification data.
The present application also provides an electronic device comprising a memory storing a computer program and a processor executing the steps of the data transmission method of the above embodiments.
The present application also provides a readable storage medium storing a computer program which, when executed by a processor, performs the above method.
The application provides a data transmission method, a device, an electronic device and a readable storage medium, wherein the data transmission method comprises the following steps: responding to data detection operation aiming at a user side, acquiring data to be detected corresponding to the data detection operation, determining a client version corresponding to the data to be detected, identifying a detection scene corresponding to the data to be detected, and transmitting verification data corresponding to the data to be detected to the user side based on the client version and the detection scene, so that the user side detects the data to be detected based on the verification data, thereby transmitting the verification data to the user side in a refined manner, reducing invalid data in the transmitted data, and improving the effectiveness of data transmission.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the description of the embodiments will be briefly introduced below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic view of a scenario of a data transmission method provided in an embodiment of the present application;
fig. 2 is a schematic flow chart of a data transmission method according to an embodiment of the present application;
fig. 3 is a schematic structural diagram of a data transmission device according to an embodiment of the present application;
fig. 4 is another schematic structural diagram of a data transmission device according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and fully with reference to the accompanying drawings, in which it is evident that the embodiments described are only some, but not all, of the embodiments of the present application. All other embodiments, which can be made by those skilled in the art based on the embodiments herein without making any inventive effort, are intended to be within the scope of the present application. The various embodiments described below and their technical features can be combined with each other without conflict.
It should be understood that although the terms first, second, third, etc. may be used herein to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, first information may also be referred to as second information, and similarly, second information may also be referred to as first information, without departing from the scope herein. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context. Furthermore, as used herein, the singular forms "a", "an" and "the" are intended to include the plural forms as well, unless the context indicates otherwise. It will be further understood that the terms "comprises," "comprising," "includes," and/or "including" specify the presence of stated features, steps, operations, elements, components, items, categories, and/or groups, but do not preclude the presence, presence or addition of one or more other features, steps, operations, elements, components, items, categories, and/or groups. The terms "or," "and/or," "including at least one of," and the like, as used herein, may be construed as inclusive, or meaning any one or any combination. For example, "including at least one of: A. b, C "means" any one of the following: a, A is as follows; b, a step of preparing a composite material; c, performing operation; a and B; a and C; b and C; a and B and C ", again as examples," A, B or C "or" A, B and/or C "means" any of the following: a, A is as follows; b, a step of preparing a composite material; c, performing operation; a and B; a and C; b and C; a and B and C). An exception to this definition will occur only when a combination of elements, functions, steps or operations are in some way inherently mutually exclusive.
It should be understood that, although the steps in the flowcharts in the embodiments of the present application are shown in order as indicated by the arrows, these steps are not necessarily performed in order as indicated by the arrows. The steps are not strictly limited in order and may be performed in other orders, unless explicitly stated herein. Moreover, at least some of the steps in the figures may include multiple sub-steps or stages that are not necessarily performed at the same time, but may be performed at different times, the order of their execution not necessarily occurring in sequence, but may be performed alternately or alternately with other steps or at least a portion of the other steps or stages.
The words "if", as used herein, may be interpreted as "at … …" or "at … …" or "in response to a determination" or "in response to a detection", depending on the context. Similarly, the phrase "if determined" or "if detected (stated condition or event)" may be interpreted as "when determined" or "in response to determination" or "when detected (stated condition or event)" or "in response to detection (stated condition or event), depending on the context.
It should be noted that, in this document, step numbers such as 101 and 102 are used for the purpose of describing the corresponding content more clearly and briefly, and not to constitute a substantial limitation on the sequence, and those skilled in the art may execute 101 and then execute 102 when they are implemented, which is within the scope of protection of the present application.
The application provides a data transmission method, a data transmission device, electronic equipment and a readable storage medium.
The data transmission device may be integrated in a server, where the server may include an independently operated server or a distributed server, or may include a server cluster formed by a plurality of servers, where the server may be connected to an electronic device in a wired or wireless manner, and the electronic device may include a mobile phone, a tablet computer, or a personal computer (PC, personal Computer).
For example, referring to fig. 1, the present application provides a data transmission apparatus, the data transmission apparatus is integrated in a server 10, the server 10 is connected to a plurality of electronic devices 20, the server 10 responds to a data detection operation for the electronic devices 20, acquires data to be detected corresponding to the data detection operation, then the server 10 determines a client version corresponding to the data to be detected, then the server 10 identifies a detection scene corresponding to the data to be detected, and finally, the server 10 transmits verification data corresponding to the data to be detected to the electronic devices 20 based on the client version and the detection scene, so that the electronic devices 20 detect the data to be detected based on the verification data.
According to the data transmission scheme, verification data can be transmitted to the user terminal in a refined mode, invalid data in the transmitted data is reduced, and therefore the effectiveness of data transmission can be improved.
The following will describe in detail. It should be noted that the following description order of embodiments is not a limitation of the priority order of embodiments.
A data transmission method, comprising: responding to data detection operation aiming at a user side, and acquiring data to be detected corresponding to the data detection operation; determining a client version corresponding to the data to be detected; identifying a detection scene corresponding to the data to be detected; based on the client version and the detection scene, the verification data corresponding to the data to be detected are transmitted to the user side, so that the user side detects the data to be detected based on the verification data.
Referring to fig. 2, fig. 2 is a flow chart of a data transmission method according to an embodiment of the present application. The specific flow of the data transmission method can be as follows:
101. and responding to the data detection operation aiming at the user side, and acquiring data to be detected corresponding to the data detection operation.
The triggering operation may be triggered by a user, or may be triggered by an electronic device, or may be triggered by a server, for example, a clicking operation triggered by a user on a triggering control of the electronic device, for example, a data detection operation triggered by the electronic device or the server on data to be detected in a preset time, or the like.
102. And determining the client version corresponding to the data to be detected.
In this application, in order to facilitate the subsequent data detection, a version of the client corresponding to the data to be detected needs to be determined, for example, a specific sentence in the data to be detected may be identified, and the specific sentence generally carries a version of the corresponding client, so that the version of the client corresponding to the data to be detected is determined.
103. And identifying a detection scene corresponding to the data to be detected.
In this application, mainly, the function or page corresponding to the data to be identified is used to perform scene distinction, for example, the function corresponding to the data to be detected a is to check the identity of the user, the function corresponding to the data to be detected B is to display a control in the xx page, it is visible that the detection scenes corresponding to the data to be detected a and the data to be detected B are different, and the detection scenes corresponding to the data to be detected can be identified by using the data features corresponding to the data to be detected, that is, optionally, in some embodiments, the step of identifying the detection scene corresponding to the data to be detected may specifically include:
(11) Extracting data characteristics corresponding to data to be detected;
(12) Based on the data characteristics, identifying a detection scene corresponding to the data to be detected.
The scene detection model may be a convolutional neural network model, which may be set according to actual situations, for example, the convolutional neural network model may include four convolutional layers and one fully-connected layer.
Convolution layer: the method is mainly used for extracting features of an input image (such as a training sample or an image to be identified), wherein the size of a convolution kernel can be determined according to practical application, for example, the sizes of convolution kernels from a first layer of convolution layer to a fourth layer of convolution layer can be (7, 7), (5, 5), (3, 3) in sequence; optionally, in order to reduce the complexity of computation and improve the computation efficiency, in this embodiment, the convolution kernels of the four convolution layers may be set to (3, 3), the activation functions are all "relu (linear rectification function, rectified Linear Unit)", and the padding (padding refers to the space between the attribute defining element frame and the element content) is set to "same", and the "same" padding mode may be simply understood as padding edges with 0, where the number of left (upper) 0 supplements is the same as or less than the number of right (lower) 0 supplements. Optionally, the convolution layers may be connected by a direct connection manner, so as to increase the network convergence speed, in order to further reduce the calculation amount, a downsampling (sampling) operation may be performed on all layers or any 1-2 layers of the second to fourth convolution layers, where the downsampling operation is substantially the same as the convolution operation, and only the downsampling convolution kernel is a maximum value (max sampling) or an average value (average sampling) of only the corresponding positions, which is described as an example in the second layer convolution layer and the third layer convolution layer for convenience of description.
It should be noted that, for convenience of description, in the embodiment of the present invention, the layer where the activation function is located and the downsampling layer (also referred to as the pooling layer) are both included in the convolution layer, it should be understood that the structure may also be considered to include the convolution layer, the layer where the activation function is located, the downsampling layer (i.e. the pooling layer), and the full connection layer, and of course, may also include an input layer for inputting data and an output layer for outputting data, which are not described herein again.
Full tie layer: the learned features can be mapped to a sample marking space, which mainly plays a role of a "classifier" in the whole convolutional neural network, each node of the fully connected layer is connected with all nodes output by the upper layer (such as a downsampling layer in the convolutional layer), wherein one node of the fully connected layer is called one neuron in the fully connected layer, the number of the neurons in the fully connected layer can be determined according to the practical requirements, for example, in the upper half branch network and the lower half branch network of the twin neural network model, the number of the neurons of the fully connected layer can be set to 512, or can also be set to 128, and the like. Similar to the convolutional layer, optionally, in the fully connected layer, non-linear factors can also be added by adding an activation function, for example, an activation function sigmoid (S-type function) can be added.
104. Based on the client version and the detection scene, the verification data corresponding to the data to be detected are transmitted to the user side, so that the user side detects the data to be detected based on the verification data.
In this application, the user side refers to a user device, specifically, the verification data corresponding to the data to be detected may be obtained based on the client version and the detection scenario, where the verification data may include a plurality of verification policies, that is, optionally, in some embodiments, the step of transmitting, based on the client version and the detection scenario, the verification data corresponding to the data to be detected to the user side, so that the user side detects, based on the verification data, the data to be detected may specifically include:
(21) Acquiring a verification policy set corresponding to a client version;
(22) Determining a verification strategy corresponding to the detection scene as a target verification strategy in a verification strategy set;
(23) And transmitting the target verification strategy to the user side so that the user side can detect the data to be detected based on the verification data.
The verification policy set includes a plurality of verification policies, first, a verification policy set matched with a client version may be obtained from a large number of verification policies according to the client version, then, a verification policy corresponding to a detection scene may be determined as a target verification policy in the verification policy set, specifically, a verification policy corresponding to the detection scene may be determined as a target verification policy in the verification policy set according to a scene type of the detection scene, that is, optionally, in some embodiments, the step of determining a verification policy corresponding to the detection scene as a target verification policy in the verification policy set may specifically include:
(31) Identifying a scene type of the detected scene;
(32) And determining the verification strategy corresponding to the detection scene as a target verification strategy in the verification strategy set based on the scene type.
After determining the target verification policy, the target verification policy may be transmitted to the user side, so that the user side detects the data to be detected based on the target verification policy. It should be noted that, since the authentication policy required by the ue is often a plurality of authentication policies, the order of execution of the authentication policies may be different for different authentication policies, for example, for a certain detection plan, it is required to detect the login function of the application program first, then detect the presentation function of the application program, that is, it is required to detect the login function and the presentation function of the data to be detected according to the authentication policies, and the priority of detecting the login function is higher than the priority of detecting the presentation function, so when the network strength is poor or limited by the transmission throughput, the authentication policy of detecting the login function may be preferentially transmitted to the ue, that is, optionally, in some embodiments, the step of "transmitting the target authentication policy to the ue so that the ue detects the data to be detected based on the authentication data" may specifically include:
(41) Determining priorities among target verification policies;
(42) Extracting network intensity when a target verification strategy is transmitted from the current network environment information;
(43) Determining a transmission speed when transmitting the target verification policy based on the priority and the network strength;
(44) And transmitting the target verification strategy to the user terminal according to the transmission speed, so that the user terminal detects the data to be detected based on the verification data.
In the process of actually transmitting data, the network strength is one of the key factors affecting the transmission speed, so different transmission speeds are allocated for verification strategies with different priorities under different network strengths, thereby improving the flexibility of data transmission, that is, optionally, in some embodiments, the step of determining the transmission speed when transmitting the target verification strategy based on the priority and the network strength may specifically include:
(51) When the network strength is detected to be greater than or equal to the preset strength, a first preset transmission speed is allocated to each target verification strategy;
(52) When the network strength is detected to be smaller than the preset strength, a second preset transmission speed is allocated for the target verification strategy with the first priority, and a third preset transmission speed is allocated for the target verification strategy with the second priority.
The first preset transmission speed is greater than the second preset transmission speed, the second transmission speed is greater than the third transmission speed, and both the preset speed and the preset intensity can be preset, specifically can be set according to actual conditions, and are not described herein.
Further, in some embodiments, the step of transmitting the target verification policy to the user terminal according to the transmission speed so that the user terminal detects the data to be detected based on the verification data may specifically include:
when the network strength is detected to be smaller than the preset strength, transmitting the target verification strategy with the first priority to the user side according to the second preset transmission speed until the transmission of the target verification strategy with the first priority is completed, and transmitting the target verification strategy with the second priority to the user side according to the third preset transmission speed, so that the user side can detect data to be detected based on verification data.
It should be further noted that, before transmitting the verification data, the verification data needs to be validated, where the validation is whether the verification data meets a preset data validation rule, and if the verification data is legal, the verification is not legal, for example, the verification of statement validity corresponding to the data to be detected, or the like, that is, optionally, in some embodiments, the step of "transmitting, based on the client version and the detection scenario, the verification data corresponding to the data to be detected to the client, so that the client detects the data to be detected based on the verification data", and specifically further includes:
verifying rationality of the data to be detected;
and when the rationality verification is passed, transmitting verification data corresponding to the data to be detected to the user terminal based on the client version and the detection scene, so that the user terminal detects the data to be detected based on the verification data.
The data transmission flow of the application is completed.
According to the data transmission method, after the data to be detected corresponding to the data detection operation is obtained in response to the data detection operation aiming at the user side, the client version corresponding to the data to be detected is determined, then the detection scene corresponding to the data to be detected is identified, and finally the verification data corresponding to the data to be detected is transmitted to the user side based on the client version and the detection scene, so that the user side detects the data to be detected based on the verification data, and therefore the verification data can be transmitted to the user side in a refined mode, invalid data in the transmitted data is reduced, and therefore the effectiveness of data transmission can be improved.
Referring to fig. 3, fig. 3 is a schematic structural diagram of a data transmission device according to an embodiment of the present application, where the data transmission device may specifically include: the acquiring module 301, the determining module 302, the identifying module 303 and the transmitting module 304 may specifically be as follows:
the acquiring module 301 is configured to respond to a data detection operation for the user side, and acquire data to be detected corresponding to the data detection operation.
The triggering operation may be triggered by a user, or may be triggered by an electronic device, or may be triggered by a server, for example, a clicking operation triggered by a user on a triggering control of the electronic device, for example, a data detection operation triggered by the electronic device or the server on data to be detected in a preset time, or the like.
A determining module 302, configured to determine a client version corresponding to the data to be detected.
In this application, in order to facilitate the subsequent data detection, a version of the client corresponding to the data to be detected needs to be determined, for example, a specific sentence in the data to be detected may be identified, and the specific sentence generally carries a version of the corresponding client, so that the version of the client corresponding to the data to be detected is determined.
The identifying module 303 is configured to identify a detection scenario corresponding to the data to be detected.
In the application, the function or page corresponding to the data to be identified is mainly utilized to perform scene discrimination, for example, the function corresponding to the data to be detected A is to check the identity of a user, the function corresponding to the data to be detected B is to display a control in the xx page, and it is visible that the detection scenes corresponding to the data to be detected A and the data to be detected B are different, and specifically, the data characteristics corresponding to the data to be detected can be utilized to identify the detection scene corresponding to the data to be detected.
Optionally, in some embodiments, the identification module 303 may specifically be configured to: extracting data characteristics corresponding to data to be detected; based on the data characteristics, identifying a detection scene corresponding to the data to be detected.
And the transmission module 304 is configured to transmit verification data corresponding to the data to be detected to the user terminal based on the client version and the detection scene, so that the user terminal detects the data to be detected based on the verification data.
In this application, the user side refers to a user device, specifically, the verification data corresponding to the data to be detected may be obtained based on the client version and the detection scenario, where the verification data may include a plurality of verification policies, and optionally, in some embodiments, the transmission module 304 may specifically include:
the acquisition unit is used for acquiring the verification policy set corresponding to the client version;
the determining unit is used for determining the verification strategy corresponding to the detection scene as a target verification strategy in the verification strategy set;
and the transmission unit is used for transmitting the target verification strategy to the user side so that the user side can detect the data to be detected based on the verification data.
Optionally, in some embodiments, the determining unit may specifically include:
an identification subunit, configured to identify a scene type of the detected scene;
the first determining subunit is configured to determine, based on the scene type, a verification policy corresponding to the detection scene in the verification policy set as a target verification policy.
Optionally, in some embodiments, the transmission unit may specifically include:
a second determining subunit, configured to determine a priority between target verification policies;
an extraction subunit, configured to extract, from the current network environment information, a network strength when the target verification policy is transmitted;
a third determining subunit, configured to determine, based on the priority and the network strength, a transmission speed at which the target authentication policy is transmitted;
and the transmission subunit is used for transmitting the target verification strategy to the user terminal according to the transmission speed so that the user terminal can detect the data to be detected based on the verification data.
Optionally, in some embodiments, the third determining subunit may be specifically configured to: when the network strength is detected to be greater than or equal to the preset strength, a first preset transmission speed is allocated to each target verification strategy; when the network strength is detected to be smaller than the preset strength, a second preset transmission speed is allocated for the target verification strategy with the first priority, and a third preset transmission speed is allocated for the target verification strategy with the second priority.
Optionally, in some embodiments, the transmission subunit may be specifically configured to: when the network strength is detected to be smaller than the preset strength, transmitting the target verification strategy with the first priority to the user side according to the second preset transmission speed until the transmission of the target verification strategy with the first priority is completed, and transmitting the target verification strategy with the second priority to the user side according to the third preset transmission speed, so that the user side can detect data to be detected based on verification data.
Optionally, in some embodiments, referring to fig. 4, the data transmission apparatus of the present application may specifically further include an authentication module 305, where the authentication module 305 may specifically be configured to: verifying rationality of the data to be detected; when the rationality verification passes, the transmission module 304 transmits verification data corresponding to the data to be detected to the user terminal based on the client version and the detection scene, so that the user terminal detects the data to be detected based on the verification data.
According to the data transmission device provided by the application, after the acquisition module 301 responds to the data detection operation aiming at the user side, the determination module 302 determines the client version corresponding to the data to be detected after the data detection operation corresponds to the data to be detected, then the identification module 303 identifies the detection scene corresponding to the data to be detected, and finally the transmission module 304 transmits the verification data corresponding to the data to be detected to the user side based on the client version and the detection scene, so that the user side detects the data to be detected based on the verification data, thereby the verification data can be transmitted to the user side in a refined mode, invalid data in the transmitted data is reduced, and the effectiveness of data transmission can be improved.
The application also provides an electronic device, which comprises a memory and a processor, wherein the memory stores an interface processing program, and the interface processing program realizes the steps of the interface processing method in any embodiment when being executed by the processor.
The present application also provides a readable storage medium, on which an interface processing program is stored, which when executed by a processor, implements the steps of the interface processing method in any of the above embodiments.
In the embodiments of the electronic device and the readable storage medium provided in the present application, all technical features of any one of the embodiments of the interface processing method may be included, and the expansion and explanation contents of the description are substantially the same as those of each embodiment of the method, which are not repeated herein.
The present embodiments also provide a computer program product comprising computer program code which, when run on a computer, causes the computer to perform the method in the various possible implementations as above.
The embodiments also provide a chip including a memory for storing a computer program and a processor for calling and running the computer program from the memory, so that a device on which the chip is mounted performs the method in the above possible embodiments.
It can be understood that the above scenario is merely an example, and does not constitute a limitation on the application scenario of the technical solution provided in the embodiments of the present application, and the technical solution of the present application may also be applied to other scenarios. For example, as one of ordinary skill in the art can know, with the evolution of the system architecture and the appearance of new service scenarios, the technical solutions provided in the embodiments of the present application are equally applicable to similar technical problems.
The foregoing embodiment numbers of the present application are merely for describing, and do not represent advantages or disadvantages of the embodiments.
The steps in the method of the embodiment of the application can be sequentially adjusted, combined and deleted according to actual needs.
The units in the device of the embodiment of the application can be combined, divided and pruned according to actual needs.
In this application, the same or similar term concept, technical solution, and/or application scenario description will generally be described in detail only when first appearing, and when repeated later, for brevity, will not generally be repeated, and when understanding the content of the technical solution of the present application, etc., reference may be made to the previous related detailed description thereof for the same or similar term concept, technical solution, and/or application scenario description, etc., which are not described in detail later.
In this application, the descriptions of the embodiments are focused on, and the details or descriptions of one embodiment may be found in the related descriptions of other embodiments.
The technical features of the technical solutions of the present application may be arbitrarily combined, and for brevity of description, all possible combinations of the technical features in the above embodiments are not described, however, as long as there is no contradiction between the combinations of the technical features, they should be considered as the scope of the present application.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present application may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. ROM/RAM, magnetic disk, optical disk) as above, including several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, a controlled terminal, or a network device, etc.) to perform the method of each embodiment of the present application.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When the computer program instructions are loaded and executed on a computer, the processes or functions in accordance with embodiments of the present application are produced in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable devices. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, the computer instructions may be transmitted from one website, computer, server, or data center to another website, computer, server, or data center by a wired (e.g., coaxial cable, fiber optic, digital subscriber line), or wireless (e.g., infrared, wireless, microwave, etc.). Computer readable storage media can be any available media that can be accessed by a computer or data storage devices, such as servers, data centers, etc., that contain an integration of one or more available media. Usable media may be magnetic media (e.g., floppy disks, storage disks, magnetic tape), optical media (e.g., DVD), or semiconductor media (e.g., solid State Disk (SSD)), among others.
The foregoing description is only of the preferred embodiments of the present application, and is not intended to limit the scope of the claims, and all equivalent structures or equivalent processes using the descriptions and drawings of the present application, or direct or indirect application in other related technical fields are included in the scope of the claims of the present application.

Claims (8)

1. A data transmission method, comprising:
responding to a data detection operation aiming at a user side, and acquiring data to be detected corresponding to the data detection operation;
determining a client version corresponding to the data to be detected;
identifying a detection scene corresponding to the data to be detected;
acquiring a verification policy set corresponding to the client version, wherein the verification policy set comprises a plurality of verification policies;
determining the verification strategy corresponding to the detection scene as a target verification strategy in the verification strategy set;
determining a priority between the target verification policies;
extracting network intensity when the target verification strategy is transmitted from the current network environment information;
determining a transmission speed when the target verification policy is transmitted based on the priority and the network strength;
and transmitting the target verification strategy to the user terminal according to the transmission speed, so that the user terminal detects the data to be detected based on the target verification strategy.
2. The method according to claim 1, wherein the determining, in the set of verification policies, the verification policy corresponding to the detection scenario as the target verification policy includes:
identifying a scene type of the detected scene;
and determining the verification strategy corresponding to the detection scene as a target verification strategy in the verification strategy set based on the scene type.
3. The method of claim 1, wherein the determining a transmission speed at which the target authentication policy is transmitted based on the priority and network strength comprises:
when the network strength is detected to be greater than or equal to the preset strength, a first preset transmission speed is allocated to each target verification strategy;
when the network strength is detected to be smaller than the preset strength, a second preset transmission speed is allocated for the target verification strategy with the priority being the first priority, and a third preset transmission speed is allocated for the target verification strategy with the priority being the second priority, wherein the first preset transmission speed is larger than the second preset transmission speed, and the second preset transmission speed is larger than the third preset transmission speed;
the step of transmitting the target verification policy to the user terminal according to the transmission speed so that the user terminal detects the data to be detected based on the target verification policy, including: when the network strength is detected to be smaller than the preset strength, transmitting a target verification policy with a first priority to the user terminal according to a second preset transmission speed until the transmission of the target verification policy with the first priority is completed, and transmitting the target verification policy with the second priority to the user terminal according to a third preset transmission speed, so that the user terminal detects the data to be detected based on the target verification policy.
4. The method of claim 1, wherein the obtaining the verification policy set corresponding to the client version, before the verification policy set includes a plurality of verification policies, further comprises:
verifying rationality of the data to be detected;
and when the rationality verification passes, executing the step of acquiring a verification policy set corresponding to the client version, wherein the verification policy set comprises a plurality of verification policies.
5. A method according to any one of claims 1 to 3, wherein the identifying a detection scenario to which the data to be detected corresponds comprises:
extracting data characteristics corresponding to the data to be detected;
and identifying a detection scene corresponding to the data to be detected based on the data characteristics.
6. A data transmission apparatus, comprising:
the acquisition module is used for responding to the data detection operation aiming at the user side and acquiring the data to be detected corresponding to the data detection operation;
the determining module is used for determining a client version corresponding to the data to be detected;
the identification module is used for identifying a detection scene corresponding to the data to be detected;
the transmission module is used for acquiring a verification policy set corresponding to the client version, wherein the verification policy set comprises a plurality of verification policies; determining the verification strategy corresponding to the detection scene as a target verification strategy in the verification strategy set; determining a priority between the target verification policies; extracting network intensity when the target verification strategy is transmitted from the current network environment information; determining a transmission speed when the target verification policy is transmitted based on the priority and the network strength; and transmitting the target verification strategy to the user terminal according to the transmission speed, so that the user terminal detects the data to be detected based on the target verification strategy.
7. An electronic device comprising a memory and a processor, the memory storing a computer program, characterized in that the processor implements the steps of the data transmission method of any one of claims 1 to 5 when the computer program is executed.
8. A readable storage medium, characterized in that the readable storage medium stores a computer program which, when executed by a processor, implements the data transmission method of any one of claims 1 to 5.
CN202310052428.XA 2023-02-02 2023-02-02 Data transmission method, device, electronic equipment and readable storage medium Active CN115865809B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310052428.XA CN115865809B (en) 2023-02-02 2023-02-02 Data transmission method, device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310052428.XA CN115865809B (en) 2023-02-02 2023-02-02 Data transmission method, device, electronic equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN115865809A CN115865809A (en) 2023-03-28
CN115865809B true CN115865809B (en) 2023-06-02

Family

ID=85657470

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310052428.XA Active CN115865809B (en) 2023-02-02 2023-02-02 Data transmission method, device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN115865809B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104967613A (en) * 2015-05-27 2015-10-07 王春 Data transmission system and method under mobile network environments
CN109726100A (en) * 2018-04-19 2019-05-07 平安普惠企业管理有限公司 Application performance test method, apparatus, equipment and computer readable storage medium
CN112231206A (en) * 2020-09-30 2021-01-15 广州掌动智能科技有限公司 Script editing method for application program test, computer readable storage medium and test platform

Family Cites Families (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101789888B (en) * 2010-01-12 2012-04-11 腾讯科技(深圳)有限公司 Detection method and device for software installation
CN103631625B (en) * 2013-12-02 2018-02-23 腾讯科技(成都)有限公司 A kind of method of data acquisition, user terminal, server and system
US20150227452A1 (en) * 2014-02-12 2015-08-13 Wipro Limited System and method for testing software applications
US10169206B2 (en) * 2016-11-15 2019-01-01 Accenture Global Solutions Limited Simultaneous multi-platform testing
CN107329763B (en) * 2017-06-30 2020-12-18 北京金山安全软件有限公司 Application program interface display method and device, electronic equipment and storage medium
CN107908540B (en) * 2017-07-26 2021-04-06 平安壹钱包电子商务有限公司 Test case creating method and device, computer equipment and medium
CN110248341A (en) * 2018-03-08 2019-09-17 华为技术有限公司 Transmission rate switching method, bluetooth equipment and computer-readable medium
CN109344048A (en) * 2018-08-17 2019-02-15 中国平安人寿保险股份有限公司 A kind of test method, storage medium and server
US11182273B1 (en) * 2018-08-24 2021-11-23 Intuit, Inc. Application testing using automatically generated test cases
CN111078529B (en) * 2019-11-15 2023-07-14 汉海信息技术(上海)有限公司 Client writing module testing method and device and electronic equipment
CN113806212A (en) * 2020-06-17 2021-12-17 北京字节跳动网络技术有限公司 Application program exception positioning method and device and electronic equipment
CN114860563A (en) * 2021-01-20 2022-08-05 腾讯科技(深圳)有限公司 Application program testing method and device, computer readable storage medium and equipment
CN112860569A (en) * 2021-02-23 2021-05-28 腾讯科技(深圳)有限公司 Automatic testing method and device, electronic equipment and storage medium
CN115221037A (en) * 2021-04-20 2022-10-21 北京嘀嘀无限科技发展有限公司 Interactive page testing method and device, computer equipment and program product
CN113568841A (en) * 2021-08-18 2021-10-29 支付宝(杭州)信息技术有限公司 Risk detection method, device and equipment for applet
CN115292163A (en) * 2022-07-08 2022-11-04 中国工商银行股份有限公司 Application program detection method and device and computer readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104967613A (en) * 2015-05-27 2015-10-07 王春 Data transmission system and method under mobile network environments
CN109726100A (en) * 2018-04-19 2019-05-07 平安普惠企业管理有限公司 Application performance test method, apparatus, equipment and computer readable storage medium
CN112231206A (en) * 2020-09-30 2021-01-15 广州掌动智能科技有限公司 Script editing method for application program test, computer readable storage medium and test platform

Also Published As

Publication number Publication date
CN115865809A (en) 2023-03-28

Similar Documents

Publication Publication Date Title
JP6832867B2 (en) Methods and devices for verifying images based on image verification codes
CN109194689B (en) Abnormal behavior recognition method, device, server and storage medium
US20130236070A1 (en) Automatic face detection and parental approval in images and video and applications thereof
CN110414335A (en) Video frequency identifying method, device and computer readable storage medium
CN114219971A (en) Data processing method, data processing equipment and computer readable storage medium
CN111241873A (en) Image reproduction detection method, training method of model thereof, payment method and payment device
CN112200772A (en) Pox check out test set
CN117409419A (en) Image detection method, device and storage medium
CN114091551A (en) Pornographic image identification method and device, electronic equipment and storage medium
CN111767543B (en) Replay attack vulnerability determination method, device, equipment and readable storage medium
CN115865809B (en) Data transmission method, device, electronic equipment and readable storage medium
CN116956117A (en) Method, device, equipment, storage medium and program product for identifying label
CN116226850A (en) Method, device, equipment, medium and program product for detecting virus of application program
US11886590B2 (en) Emulator detection using user agent and device model learning
CN112637148B (en) Method, device, electronic equipment and medium for verifying user
CN116129484A (en) Method, device, electronic equipment and storage medium for model training and living body detection
CN115346084A (en) Sample processing method, sample processing apparatus, electronic device, storage medium, and program product
CN114580354A (en) Synonym-based information encoding method, device, equipment and storage medium
CN116503918A (en) Palm vein image classification method, device, equipment and medium based on ViT network
CN114299304A (en) Image processing method and related equipment
CN115410201A (en) Method, device and related equipment for processing verification code characters
CN112633285A (en) Domain adaptation method, domain adaptation device, electronic equipment and storage medium
CN113642532B (en) Video classification model processing method and device and data processing equipment
CN117786058A (en) Method for constructing multi-mode large model knowledge migration framework
CN117671332A (en) Vehicle damage assessment method, device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant