CN116629232A - Password analysis method and device in text and storage medium - Google Patents

Password analysis method and device in text and storage medium Download PDF

Info

Publication number
CN116629232A
CN116629232A CN202310518154.9A CN202310518154A CN116629232A CN 116629232 A CN116629232 A CN 116629232A CN 202310518154 A CN202310518154 A CN 202310518154A CN 116629232 A CN116629232 A CN 116629232A
Authority
CN
China
Prior art keywords
password
rule
correct
analysis rule
change
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202310518154.9A
Other languages
Chinese (zh)
Inventor
温丽蒙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Teddy Bear Mobile Technology Co ltd
Original Assignee
Beijing Teddy Bear Mobile Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Teddy Bear Mobile Technology Co ltd filed Critical Beijing Teddy Bear Mobile Technology Co ltd
Priority to CN202310518154.9A priority Critical patent/CN116629232A/en
Publication of CN116629232A publication Critical patent/CN116629232A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F40/00Handling natural language data
    • G06F40/20Natural language analysis
    • G06F40/205Parsing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/955Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
    • G06F16/9558Details of hyperlinks; Management of linked annotations
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/06Buying, selling or leasing transactions
    • G06Q30/0601Electronic shopping [e-shopping]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L61/00Network arrangements, protocols or services for addressing or naming
    • H04L61/30Managing network names, e.g. use of aliases or nicknames
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3226Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/21Server components or server architectures
    • H04N21/218Source of audio or video content, e.g. local disk arrays
    • H04N21/2187Live feed
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/47End-user applications
    • H04N21/478Supplemental services, e.g. displaying phone caller identification, shopping application
    • H04N21/47815Electronic shopping
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/80Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
    • H04N21/85Assembly of content; Generation of multimedia applications
    • H04N21/858Linking data to content, e.g. by linking an URL to a video object, by creating a hotspot

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Signal Processing (AREA)
  • Databases & Information Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Multimedia (AREA)
  • Business, Economics & Management (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Accounting & Taxation (AREA)
  • Data Mining & Analysis (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computational Linguistics (AREA)
  • Audiology, Speech & Language Pathology (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Artificial Intelligence (AREA)
  • Storage Device Security (AREA)

Abstract

The embodiment of the application discloses a method, a device and a storage medium for resolving a password in a text, wherein the method for resolving the password in the text comprises the following steps: acquiring a text containing a password, and analyzing an export command from the text by using a password analysis rule; judging whether the password is correct, if so, analyzing a target ID based on the correct password and returning corresponding information; automatically pre-warning the change of the password analysis rule to find the change of the password analysis rule and alarm; and after the password analysis rule changes, checking the new password to obtain a change rule character in the password which does not pass the check, updating the password analysis rule based on the change rule character, checking the new password again until the correct password analysis rule is obtained, and synchronizing the correct password analysis rule to a formal environment.

Description

Password analysis method and device in text and storage medium
Technical Field
The present application relates to the field of computer information processing technologies, and in particular, to a method and apparatus for resolving a password in a text, and a storage medium.
Background
After copying the corresponding text through the mobile phone terminal, the user can reach details or reach the final purpose after switching to other applications. Such as a tremble password, requires copying the text containing the tremble password and opening the tremble sound to reach the product details. The process needs to switch the application program, is very tedious, reduces the experience of the user, and further reduces the experience of the user because the password format or version is different and the password is dynamically changed, so that the password parsing rule cannot be fully applied, and the user may not be able to obtain details or achieve the final purpose by copying the corresponding text.
Disclosure of Invention
The embodiment of the application aims to provide a method, a device and a storage medium for resolving a password in a text, which are used for solving the problems that the password resolving process in the text in the prior art needs to switch application programs, is very complicated, reduces user experience, and further reduces user experience because password resolving rules cannot be fully applicable due to different formats or versions of the password and dynamic changes of the password, and users may not be able to obtain details or achieve the final purpose by copying the corresponding text.
In order to achieve the above object, an embodiment of the present application provides a method for resolving a password in a text, including: acquiring a text containing a password, and analyzing an export command from the text by using a password analysis rule;
judging whether the password is correct, if so, analyzing a target ID based on the correct password and returning corresponding information;
automatically pre-warning the change of the password analysis rule to find the change of the password analysis rule and alarm;
and after the password analysis rule changes, checking the new password to obtain a change rule character in the password which does not pass the check, updating the password analysis rule based on the change rule character, checking the new password again until the correct password analysis rule is obtained, and synchronizing the correct password analysis rule to a formal environment.
Optionally, the password parsing rule includes a regular expression for password parsing the text containing the password.
Optionally, the determining whether the password is correct, if so, resolving the target ID based on the correct password and returning corresponding information includes:
regular judgment is carried out on the password, and whether the password is a correct password is judged;
if the password is correct, analyzing a target ID based on the password, judging whether information corresponding to the target ID is in a cache, if so, directly calling the information corresponding to the target ID, otherwise, acquiring and returning the information corresponding to the target ID, and storing the information in the cache;
if the password is not correct, the text containing the password is retrieved.
Optionally, the automatically pre-warning the change of the password parsing rule includes:
and acquiring the password generated by the password generating interface in real time at fixed time, analyzing the password by using the current password analysis rule, and if the analysis fails, indicating that the current password analysis rule needs to be changed and giving an alarm.
Optionally, the automatically pre-warning the change of the password parsing rule includes:
logging the request for analyzing the password each time, counting the correct rate of analyzing the password by using the password analysis rule, and when the change amplitude of the correct rate is larger than a preset value, indicating that the current password analysis rule needs to be changed and giving an alarm.
Optionally, after the password parsing rule changes, checking the new password includes:
and checking the new password through a checking mechanism, wherein the checking mechanism comprises the steps of analyzing the new password by using the password analysis rule and then carrying out regular judgment to judge whether the analyzed password is correct, so as to judge whether the new password passes the check.
Optionally, the obtaining the change rule character in the password that fails to pass the check, and updating the password parsing rule based on the change rule character includes:
and synchronizing the character of the change rule into the password analysis rule after carrying out unified code conversion, thereby updating the password analysis rule.
Optionally, the checking the new password again until the correct password parsing rule is obtained includes:
if the check is passed, the correct password analysis rule is synchronized to a formal environment, and if the check is not passed, the updating of the password analysis rule and the check of the new password are circularly carried out until the correct password analysis rule is obtained.
In order to achieve the above object, the present application further provides a device for resolving a password in a text, including: a memory; and
a processor coupled to the memory, the processor configured to:
acquiring a text containing a password, and analyzing an export command from the text by using a password analysis rule;
judging whether the password is correct, if so, analyzing a target ID based on the correct password and returning corresponding information;
automatically pre-warning the change of the password analysis rule to find the change of the password analysis rule and alarm;
and after the password analysis rule changes, checking the new password to obtain a change rule character in the password which does not pass the check, updating the password analysis rule based on the change rule character, checking the new password again until the correct password analysis rule is obtained, and synchronizing the correct password analysis rule to a formal environment.
To achieve the above object, the present application also provides a computer storage medium having stored thereon a computer program which, when executed by a machine, implements the steps of the method as described above.
The embodiment of the application has the following advantages:
the embodiment of the application provides a password analysis method in text, which comprises the following steps: acquiring a text containing a password, and analyzing an export command from the text by using a password analysis rule; judging whether the password is correct, if so, analyzing a target ID based on the correct password and returning corresponding information; automatically pre-warning the change of the password analysis rule to find the change of the password analysis rule and alarm; and after the password analysis rule changes, checking the new password to obtain a change rule character in the password which does not pass the check, updating the password analysis rule based on the change rule character, checking the new password again until the correct password analysis rule is obtained, and synchronizing the correct password analysis rule to a formal environment.
According to the method, the text which is copied by the user and contains the password is obtained, judgment is carried out through the password analysis rule, corresponding information is returned, namely, a key text path corresponding to the information is displayed on the current page, and the direct clicking mode is adopted, so that the efficiency and the user experience are improved; and through carrying out automatic early warning and updating synchronization on the change of the password analysis rule, even when the formats or versions of the passwords are different and the passwords are dynamically changed, the user can obtain details correctly or achieve the final purpose, and the efficiency and the user experience are further improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It will be apparent to those skilled in the art from this disclosure that the drawings described below are merely exemplary and that other embodiments may be derived from the drawings provided without undue effort.
FIG. 1 is a flowchart of a method for resolving a password in text according to an embodiment of the present application;
FIG. 2 is a password parsing flow chart of a method for parsing a password in text according to an embodiment of the present application;
FIG. 3 is a flowchart of a method for resolving a password in text and an automated early warning according to an embodiment of the present application;
FIG. 4 is a flowchart of an automatic process after a password resolution rule of a password resolution method in text changes according to an embodiment of the present application;
fig. 5 is a block diagram of a device for resolving a password in text according to an embodiment of the present application.
Detailed Description
Other advantages and advantages of the present application will become apparent to those skilled in the art from the following detailed description, which, by way of illustration, is to be read in connection with certain specific embodiments, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In addition, the technical features of the different embodiments of the present application described below may be combined with each other as long as they do not collide with each other.
An embodiment of the present application provides a method for parsing a password in a text, referring to fig. 1, and fig. 1 is a flowchart of a method for parsing a password in a text provided in an embodiment of the present application, it should be understood that the method may further include additional blocks not shown and/or may omit the blocks shown, and the scope of the present application is not limited in this respect.
The method provided by the application can analyze the password in the text, including the tremble password, the panning password, the keywords and/or the hotwords, etc., and in the following embodiments, the tremble password with tremble sound is taken as an example to explain the scheme of the application.
At step 101, text containing a password is obtained, and an exit password is parsed from the text using password parsing rules.
In some embodiments, the password parsing rule includes a regular expression that password parses the text containing the password.
Specifically, the method for obtaining the text containing the password may be to identify and obtain the text copied by the user, and parse the correct shake-password from the text by using a shake-password parsing rule (the parsing rule includes a regular expression for parsing the text containing the password), so as to parse the commodity or the live broadcasting room (information corresponding to the target ID) by using the correct shake-password and return.
At step 102, it is determined whether the password is correct, and if so, the target ID is parsed based on the correct password and corresponding information is returned.
In some embodiments, the determining whether the password is correct, and if so, parsing the target ID and returning the corresponding information based on the correct password includes:
regular judgment is carried out on the password, and whether the password is a correct password is judged;
if the password is correct, analyzing a target ID based on the password, judging whether information corresponding to the target ID is in a cache, if so, directly calling the information corresponding to the target ID, otherwise, acquiring and returning the information corresponding to the target ID, and storing the information in the cache;
if the password is not correct, the text containing the password is retrieved.
Specifically, the tremble password parsing flowchart refers to fig. 2. Judging whether the shake password is a correct shake password through regular judgment (judging by using a regular expression), if the shake password is the correct shake password, analyzing the shake password, obtaining a corresponding target ID after the analysis is successful, judging whether the commodity is in a cache or not, and if the commodity is directly called in the cache (comprising commodity details and/or commodity links), returning commodity information (namely information corresponding to the target ID). If not, acquiring commodity information and storing the commodity information in the cache, and returning commodity details and/or commodity links.
At step 103, an automated pre-warning is performed of the change in the password resolution rule to discover the change in the password resolution rule and alarm.
Specifically, the tremble password parsing rule is a rule for extracting a tremble password from a piece of text, and is based on the following reasons:
1) The jittering shops, live broadcasting rooms and commodity passwords are different in format;
2) The tremble password can dynamically change in a certain period of time;
3) There are multiple versions of the tremble password in use.
The current rule cannot resolve the jitter password correctly, and when the current rule changes, the rule needs to be updated timely. In this embodiment, the rule change is divided into three steps: 1) automating the change of the pre-warning tremble password analysis rule (comprising at least two ways), 2) automating the processing of the regular scheme after the change of the tremble password analysis rule, and 3) changing the tremble password analysis rule. Specific methods reference is made to the following examples.
In some embodiments, the automatically pre-warning of the change in the password resolution rule comprises:
and acquiring the password generated by the password generating interface in real time at fixed time, analyzing the password by using the current password analysis rule, and if the analysis fails, indicating that the current password analysis rule needs to be changed and giving an alarm.
Specifically, referring to fig. 3, the automated detection pathway:
the method is that a shaking password generating interface of a shaking commodity or a live broadcasting room is used for generating a shaking password (the shaking password generated in real time through the interface can be regarded as the shaking password which is generated currently and latest) for a random commodity or live broadcasting room at regular time, and the shaking password is analyzed by using a current shaking password analysis rule, if the analysis is successful, the current shaking password analysis rule is free of problems, if the analysis is failed, the shaking password is changed, and the alarm is carried out according to the configuration of the triggering alarm rule.
In other embodiments, the automatically pre-warning of the change in the password resolution rule comprises:
logging the request for analyzing the password each time, counting the correct rate of analyzing the password by using the password analysis rule, and when the change amplitude of the correct rate is larger than a preset value, indicating that the current password analysis rule needs to be changed and giving an alarm.
Specifically, referring to fig. 3, the real-time resolution correct rate change detection approach:
logging each request for resolving the tremble password, counting the accuracy rate (success rate) of resolving the tremble password, and alarming when the accuracy rate of resolving the tremble password is changed greatly (the change amplitude is larger than a preset value, for example, 10%).
At step 104, after the password analysis rule changes, checking the new password to obtain a change rule character in the password which does not pass the check, updating the password analysis rule based on the change rule character to check the new password again until the correct password analysis rule is obtained, and synchronizing the correct password analysis rule to a formal environment.
In some embodiments, said checking for a new password after said password resolution rule changes comprises:
and checking the new password through a checking mechanism, wherein the checking mechanism comprises the steps of analyzing the new password by using the password analysis rule and then carrying out regular judgment to judge whether the analyzed password is correct, so as to judge whether the new password passes the check.
In some embodiments, the obtaining a change rule character in the password that fails the check, updating the password parsing rule based on the change rule character comprises:
and synchronizing the character of the change rule into the password analysis rule after carrying out unified code conversion, thereby updating the password analysis rule.
In some embodiments, said again checking the new password until the correct password resolution rule is obtained comprises:
if the check is passed, the correct password analysis rule is synchronized to a formal environment, and if the check is not passed, the updating of the password analysis rule and the check of the new password are circularly carried out until the correct password analysis rule is obtained.
Specifically, referring to fig. 4, when a new tremble password (dkl string) request is sent to the checking mechanism (checkDkl (dklString)) (including parsing using tremble password parsing rules and then performing regular judgment in some embodiments), if the new tremble password fails, parsing the new tremble password and obtaining a change rule character, converting a unified code (unicode) value of the change rule character, synchronizing the change rule character into tremble password identification regular (tremble password parsing rules), and performing regular matching on the new tremble password again after obtaining a regular expression of the new tremble password parsing rules. If successful, the new regular is synchronized to the formal environment, and if failed, the password shaking analysis circulating operation is performed again.
Finally, updating the tremble password analysis rule is to acquire manually-changed regular analysis of the tremble password, and synchronize the rule to a formal environment, so that the tremble password text can be accurately analyzed at the place (red dotted line part) where the regular analysis of the tremble password is required in fig. 3.
According to the method, the text which is copied by the user and contains the password is obtained, judgment is carried out through the password analysis rule, corresponding information is returned, namely, a key text path corresponding to the information is displayed on the current page, and the direct clicking mode is adopted, so that the efficiency and the user experience are improved; and through carrying out automatic early warning and updating synchronization on the change of the password analysis rule, even when the formats or versions of the passwords are different and the passwords are dynamically changed, the user can obtain details correctly or achieve the final purpose, and the efficiency and the user experience are further improved.
Fig. 5 is a block diagram of a device for resolving a password in text according to an embodiment of the present application. The device comprises:
a memory 201; and a processor 202 connected to the memory 201, the processor 202 configured to: acquiring a text containing a password, and analyzing an export command from the text by using a password analysis rule;
judging whether the password is correct, if so, analyzing a target ID based on the correct password and returning corresponding information;
automatically pre-warning the change of the password analysis rule to find the change of the password analysis rule and alarm;
and after the password analysis rule changes, checking the new password to obtain a change rule character in the password which does not pass the check, updating the password analysis rule based on the change rule character, checking the new password again until the correct password analysis rule is obtained, and synchronizing the correct password analysis rule to a formal environment.
In some embodiments, the processor 202 is further configured to: the password parsing rule includes a regular expression that performs password parsing on the text containing the password.
In some embodiments, the processor 202 is further configured to: judging whether the password is correct or not, if so, analyzing the target ID based on the correct password and returning corresponding information comprises the following steps:
regular judgment is carried out on the password, and whether the password is a correct password is judged;
if the password is correct, analyzing a target ID based on the password, judging whether information corresponding to the target ID is in a cache, if so, directly calling the information corresponding to the target ID, otherwise, acquiring and returning the information corresponding to the target ID, and storing the information in the cache;
if the password is not correct, the text containing the password is retrieved.
In some embodiments, the processor 202 is further configured to: the automatic early warning of the change of the password analysis rule comprises the following steps:
and acquiring the password generated by the password generating interface in real time at fixed time, analyzing the password by using the current password analysis rule, and if the analysis fails, indicating that the current password analysis rule needs to be changed and giving an alarm.
In some embodiments, the processor 202 is further configured to: the automatic early warning of the change of the password analysis rule comprises the following steps:
logging the request for analyzing the password each time, counting the correct rate of analyzing the password by using the password analysis rule, and when the change amplitude of the correct rate is larger than a preset value, indicating that the current password analysis rule needs to be changed and giving an alarm.
In some embodiments, the processor 202 is further configured to: after the password parsing rule is changed, checking the new password includes:
and checking the new password through a checking mechanism, wherein the checking mechanism comprises the steps of analyzing the new password by using the password analysis rule and then carrying out regular judgment to judge whether the analyzed password is correct, so as to judge whether the new password passes the check.
In some embodiments, the processor 202 is further configured to: the obtaining the change rule character in the password which does not pass the check, and updating the password analysis rule based on the change rule character comprises the following steps:
and synchronizing the character of the change rule into the password analysis rule after carrying out unified code conversion, thereby updating the password analysis rule.
In some embodiments, the processor 202 is further configured to: said again checking the new password until the correct password resolution rule is obtained comprises:
if the check is passed, the correct password analysis rule is synchronized to a formal environment, and if the check is not passed, the updating of the password analysis rule and the check of the new password are circularly carried out until the correct password analysis rule is obtained.
Reference is made to the foregoing method embodiments for specific implementation methods, and details are not repeated here.
The present application may be a method, apparatus, system, and/or computer program product. The computer program product may include a computer readable storage medium having computer readable program instructions embodied thereon for performing various aspects of the present application.
The computer readable storage medium may be a tangible device that can hold and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: portable computer disks, hard disks, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), static Random Access Memory (SRAM), portable compact disk read-only memory (CD-ROM), digital Versatile Disks (DVD), memory sticks, floppy disks, mechanical coding devices, punch cards or in-groove structures such as punch cards or grooves having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media, as used herein, are not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through waveguides or other transmission media (e.g., optical pulses through fiber optic cables), or electrical signals transmitted through wires.
The computer readable program instructions described herein may be downloaded from a computer readable storage medium to a respective computing/processing device or to an external computer or external storage device over a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmissions, wireless transmissions, routers, firewalls, switches, gateway computers and/or edge servers. The network interface card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium in the respective computing/processing device.
Computer program instructions for carrying out operations of the present application may be assembly instructions, instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, c++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer readable program instructions may be executed entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, aspects of the present application are implemented by personalizing electronic circuitry, such as programmable logic circuitry, field Programmable Gate Arrays (FPGAs), or Programmable Logic Arrays (PLAs), with state information for computer readable program instructions, which can execute the computer readable program instructions.
Various aspects of the present application are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer readable program instructions may be provided to a processing unit of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processing unit of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable medium having the instructions stored therein includes an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Note that all features disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise. Thus, unless expressly stated otherwise, each feature disclosed is one example only of a generic set of equivalent or similar features. Where used, further, preferably, still further and preferably, the brief description of the other embodiment is provided on the basis of the foregoing embodiment, and further, preferably, further or more preferably, the combination of the contents of the rear band with the foregoing embodiment is provided as a complete construct of the other embodiment. A further embodiment is composed of several further, preferably, still further or preferably arrangements of the strips after the same embodiment, which may be combined arbitrarily.
While the application has been described in detail in the foregoing general description and specific examples, it will be apparent to those skilled in the art that modifications and improvements can be made thereto. Accordingly, such modifications or improvements may be made without departing from the spirit of the application and are intended to be within the scope of the application as claimed.

Claims (10)

1. A method for password parsing in text, comprising:
acquiring a text containing a password, and analyzing an export command from the text by using a password analysis rule;
judging whether the password is correct, if so, analyzing a target ID based on the correct password and returning corresponding information;
automatically pre-warning the change of the password analysis rule to find the change of the password analysis rule and alarm;
and after the password analysis rule changes, checking the new password to obtain a change rule character in the password which does not pass the check, updating the password analysis rule based on the change rule character, checking the new password again until the correct password analysis rule is obtained, and synchronizing the correct password analysis rule to a formal environment.
2. The method for password resolution in text as recited in claim 1, wherein,
the password parsing rule includes a regular expression that performs password parsing on the text containing the password.
3. The method of claim 1, wherein the determining whether the password is correct, and if so, resolving the target ID based on the correct password and returning the corresponding information comprises:
regular judgment is carried out on the password, and whether the password is a correct password is judged;
if the password is correct, analyzing a target ID based on the password, judging whether information corresponding to the target ID is in a cache, if so, directly calling the information corresponding to the target ID, otherwise, acquiring and returning the information corresponding to the target ID, and storing the information in the cache;
if the password is not correct, the text containing the password is retrieved.
4. The method for resolving a password in a text according to claim 1, wherein the automatically pre-warning of the change of the password resolving rule comprises:
and acquiring the password generated by the password generating interface in real time at fixed time, analyzing the password by using the current password analysis rule, and if the analysis fails, indicating that the current password analysis rule needs to be changed and giving an alarm.
5. The method for resolving a password in a text according to claim 1 or 4, wherein the automatically pre-warning of the change of the password resolving rule comprises:
logging the request for analyzing the password each time, counting the correct rate of analyzing the password by using the password analysis rule, and when the change amplitude of the correct rate is larger than a preset value, indicating that the current password analysis rule needs to be changed and giving an alarm.
6. The method of claim 1, wherein checking the new password after the password parsing rule is changed comprises:
and checking the new password through a checking mechanism, wherein the checking mechanism comprises the steps of analyzing the new password by using the password analysis rule and then carrying out regular judgment to judge whether the analyzed password is correct, so as to judge whether the new password passes the check.
7. The method of claim 1, wherein the obtaining the change rule character in the password that fails to be checked, and updating the password parsing rule based on the change rule character comprises:
and synchronizing the character of the change rule into the password analysis rule after carrying out unified code conversion, thereby updating the password analysis rule.
8. The method of in-text password resolution as recited in claim 1, wherein said again checking for a new password until a correct password resolution rule is obtained comprises:
if the check is passed, the correct password analysis rule is synchronized to a formal environment, and if the check is not passed, the updating of the password analysis rule and the check of the new password are circularly carried out until the correct password analysis rule is obtained.
9. A password in text parsing apparatus comprising:
a memory; and
a processor coupled to the memory, the processor configured to:
acquiring a text containing a password, and analyzing an export command from the text by using a password analysis rule;
judging whether the password is correct, if so, analyzing a target ID based on the correct password and returning corresponding information;
automatically pre-warning the change of the password analysis rule to find the change of the password analysis rule and alarm;
and after the password analysis rule changes, checking the new password to obtain a change rule character in the password which does not pass the check, updating the password analysis rule based on the change rule character, checking the new password again until the correct password analysis rule is obtained, and synchronizing the correct password analysis rule to a formal environment.
10. A computer storage medium having stored thereon a computer program, which when executed by a machine performs the steps of the method according to any of claims 1 to 8.
CN202310518154.9A 2023-05-09 2023-05-09 Password analysis method and device in text and storage medium Pending CN116629232A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202310518154.9A CN116629232A (en) 2023-05-09 2023-05-09 Password analysis method and device in text and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202310518154.9A CN116629232A (en) 2023-05-09 2023-05-09 Password analysis method and device in text and storage medium

Publications (1)

Publication Number Publication Date
CN116629232A true CN116629232A (en) 2023-08-22

Family

ID=87596532

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202310518154.9A Pending CN116629232A (en) 2023-05-09 2023-05-09 Password analysis method and device in text and storage medium

Country Status (1)

Country Link
CN (1) CN116629232A (en)

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170180129A1 (en) * 2015-12-17 2017-06-22 International Business Machines Corporation Password Re-Usage Identification Based on Input Method Editor Analysis
US20170337167A1 (en) * 2016-05-19 2017-11-23 International Business Machines Corporation Misaligned annotation processing
CN112819061A (en) * 2021-01-27 2021-05-18 北京小米移动软件有限公司 Password information identification method, device, equipment and storage medium
CN112988776A (en) * 2021-04-26 2021-06-18 北京泰迪熊移动科技有限公司 Method, device and equipment for updating text parsing rule and readable storage medium

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20170180129A1 (en) * 2015-12-17 2017-06-22 International Business Machines Corporation Password Re-Usage Identification Based on Input Method Editor Analysis
US20170337167A1 (en) * 2016-05-19 2017-11-23 International Business Machines Corporation Misaligned annotation processing
CN112819061A (en) * 2021-01-27 2021-05-18 北京小米移动软件有限公司 Password information identification method, device, equipment and storage medium
CN112988776A (en) * 2021-04-26 2021-06-18 北京泰迪熊移动科技有限公司 Method, device and equipment for updating text parsing rule and readable storage medium

Similar Documents

Publication Publication Date Title
US9075918B1 (en) System and method for creating change-resilient scripts
US11200291B2 (en) Automated generation of web API descriptions from usage data
US11188560B2 (en) Synchronizing object in local object storage node
CN112154420B (en) Automatic intelligent cloud service testing tool
US20170187734A1 (en) System and method for field extraction of data contained within a log stream
US10832164B2 (en) Generating streaming analytics applications using a glossary
US11934287B2 (en) Method, electronic device and computer program product for processing data
CN111736840A (en) Compiling method and running method of applet, storage medium and electronic equipment
US11074119B2 (en) Automatic root cause analysis for web applications
CN110321544B (en) Method and device for generating information
CN110543297A (en) method and apparatus for generating source code
CN114328208A (en) Code detection method and device, electronic equipment and storage medium
US10394774B2 (en) Determining when a change set was delivered to a workspace or stream and by whom
EP4182909A1 (en) Automated skill tagging, knowledge graph, and customized assessment and exercise generation
CN112948726A (en) Method, device and system for processing abnormal information
CN114443905A (en) Interface document updating method and device, electronic equipment and readable storage medium
CN110727576B (en) Web page testing method, device, equipment and storage medium
US11379421B1 (en) Generating readable, compressed event trace logs from raw event trace logs
CN116629232A (en) Password analysis method and device in text and storage medium
US20160070564A1 (en) Dynamically schematized log messages for software applications
CN112988776B (en) Method, device and equipment for updating text parsing rule and readable storage medium
CN113094086B (en) Component integration method, device, computer readable storage medium and electronic equipment
US10140363B2 (en) Social network crowd translation
CN115643094A (en) Threat information fusion method and device, electronic equipment and storage medium
CN112699272A (en) Information output method and device and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: East of 1st floor, No.36 Haidian Street, Haidian District, Beijing, 100080

Applicant after: Beijing Teddy Future Technology Co.,Ltd.

Address before: East of 1st floor, No.36 Haidian Street, Haidian District, Beijing, 100080

Applicant before: Beijing Teddy Bear Mobile Technology Co.,Ltd.

CB02 Change of applicant information