CN116629232A - Password analysis method and device in text and storage medium - Google Patents
Password analysis method and device in text and storage medium Download PDFInfo
- Publication number
- CN116629232A CN116629232A CN202310518154.9A CN202310518154A CN116629232A CN 116629232 A CN116629232 A CN 116629232A CN 202310518154 A CN202310518154 A CN 202310518154A CN 116629232 A CN116629232 A CN 116629232A
- Authority
- CN
- China
- Prior art keywords
- password
- rule
- correct
- analysis rule
- change
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000004458 analytical method Methods 0.000 title claims abstract description 119
- 238000003860 storage Methods 0.000 title claims abstract description 22
- 230000008859 change Effects 0.000 claims abstract description 67
- 238000000034 method Methods 0.000 claims abstract description 37
- 230000007246 mechanism Effects 0.000 claims description 9
- 238000004590 computer program Methods 0.000 claims description 7
- 230000001360 synchronised effect Effects 0.000 claims description 5
- 238000006243 chemical reaction Methods 0.000 claims description 4
- 206010044565 Tremor Diseases 0.000 description 29
- 238000010586 diagram Methods 0.000 description 12
- 230000006870 function Effects 0.000 description 7
- 230000005540 biological transmission Effects 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 238000003491 array Methods 0.000 description 2
- 238000001514 detection method Methods 0.000 description 2
- 239000000835 fiber Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 230000003287 optical effect Effects 0.000 description 2
- 230000001902 propagating effect Effects 0.000 description 2
- RYGMFSIKBFXOCR-UHFFFAOYSA-N Copper Chemical compound [Cu] RYGMFSIKBFXOCR-UHFFFAOYSA-N 0.000 description 1
- 229910052802 copper Inorganic materials 0.000 description 1
- 239000010949 copper Substances 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000010365 information processing Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 238000004091 panning Methods 0.000 description 1
- 230000037361 pathway Effects 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F40/00—Handling natural language data
- G06F40/20—Natural language analysis
- G06F40/205—Parsing
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/90—Details of database functions independent of the retrieved data types
- G06F16/95—Retrieval from the web
- G06F16/955—Retrieval from the web using information identifiers, e.g. uniform resource locators [URL]
- G06F16/9558—Details of hyperlinks; Management of linked annotations
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q30/00—Commerce
- G06Q30/06—Buying, selling or leasing transactions
- G06Q30/0601—Electronic shopping [e-shopping]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L61/00—Network arrangements, protocols or services for addressing or naming
- H04L61/30—Managing network names, e.g. use of aliases or nicknames
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3226—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using a predetermined code, e.g. password, passphrase or PIN
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/20—Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
- H04N21/21—Server components or server architectures
- H04N21/218—Source of audio or video content, e.g. local disk arrays
- H04N21/2187—Live feed
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/40—Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
- H04N21/47—End-user applications
- H04N21/478—Supplemental services, e.g. displaying phone caller identification, shopping application
- H04N21/47815—Electronic shopping
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04N—PICTORIAL COMMUNICATION, e.g. TELEVISION
- H04N21/00—Selective content distribution, e.g. interactive television or video on demand [VOD]
- H04N21/80—Generation or processing of content or additional data by content creator independently of the distribution process; Content per se
- H04N21/85—Assembly of content; Generation of multimedia applications
- H04N21/858—Linking data to content, e.g. by linking an URL to a video object, by creating a hotspot
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Signal Processing (AREA)
- Databases & Information Systems (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Multimedia (AREA)
- Business, Economics & Management (AREA)
- General Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Accounting & Taxation (AREA)
- Data Mining & Analysis (AREA)
- Finance (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computational Linguistics (AREA)
- Audiology, Speech & Language Pathology (AREA)
- General Health & Medical Sciences (AREA)
- Health & Medical Sciences (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- General Business, Economics & Management (AREA)
- Artificial Intelligence (AREA)
- Storage Device Security (AREA)
Abstract
The embodiment of the application discloses a method, a device and a storage medium for resolving a password in a text, wherein the method for resolving the password in the text comprises the following steps: acquiring a text containing a password, and analyzing an export command from the text by using a password analysis rule; judging whether the password is correct, if so, analyzing a target ID based on the correct password and returning corresponding information; automatically pre-warning the change of the password analysis rule to find the change of the password analysis rule and alarm; and after the password analysis rule changes, checking the new password to obtain a change rule character in the password which does not pass the check, updating the password analysis rule based on the change rule character, checking the new password again until the correct password analysis rule is obtained, and synchronizing the correct password analysis rule to a formal environment.
Description
Technical Field
The present application relates to the field of computer information processing technologies, and in particular, to a method and apparatus for resolving a password in a text, and a storage medium.
Background
After copying the corresponding text through the mobile phone terminal, the user can reach details or reach the final purpose after switching to other applications. Such as a tremble password, requires copying the text containing the tremble password and opening the tremble sound to reach the product details. The process needs to switch the application program, is very tedious, reduces the experience of the user, and further reduces the experience of the user because the password format or version is different and the password is dynamically changed, so that the password parsing rule cannot be fully applied, and the user may not be able to obtain details or achieve the final purpose by copying the corresponding text.
Disclosure of Invention
The embodiment of the application aims to provide a method, a device and a storage medium for resolving a password in a text, which are used for solving the problems that the password resolving process in the text in the prior art needs to switch application programs, is very complicated, reduces user experience, and further reduces user experience because password resolving rules cannot be fully applicable due to different formats or versions of the password and dynamic changes of the password, and users may not be able to obtain details or achieve the final purpose by copying the corresponding text.
In order to achieve the above object, an embodiment of the present application provides a method for resolving a password in a text, including: acquiring a text containing a password, and analyzing an export command from the text by using a password analysis rule;
judging whether the password is correct, if so, analyzing a target ID based on the correct password and returning corresponding information;
automatically pre-warning the change of the password analysis rule to find the change of the password analysis rule and alarm;
and after the password analysis rule changes, checking the new password to obtain a change rule character in the password which does not pass the check, updating the password analysis rule based on the change rule character, checking the new password again until the correct password analysis rule is obtained, and synchronizing the correct password analysis rule to a formal environment.
Optionally, the password parsing rule includes a regular expression for password parsing the text containing the password.
Optionally, the determining whether the password is correct, if so, resolving the target ID based on the correct password and returning corresponding information includes:
regular judgment is carried out on the password, and whether the password is a correct password is judged;
if the password is correct, analyzing a target ID based on the password, judging whether information corresponding to the target ID is in a cache, if so, directly calling the information corresponding to the target ID, otherwise, acquiring and returning the information corresponding to the target ID, and storing the information in the cache;
if the password is not correct, the text containing the password is retrieved.
Optionally, the automatically pre-warning the change of the password parsing rule includes:
and acquiring the password generated by the password generating interface in real time at fixed time, analyzing the password by using the current password analysis rule, and if the analysis fails, indicating that the current password analysis rule needs to be changed and giving an alarm.
Optionally, the automatically pre-warning the change of the password parsing rule includes:
logging the request for analyzing the password each time, counting the correct rate of analyzing the password by using the password analysis rule, and when the change amplitude of the correct rate is larger than a preset value, indicating that the current password analysis rule needs to be changed and giving an alarm.
Optionally, after the password parsing rule changes, checking the new password includes:
and checking the new password through a checking mechanism, wherein the checking mechanism comprises the steps of analyzing the new password by using the password analysis rule and then carrying out regular judgment to judge whether the analyzed password is correct, so as to judge whether the new password passes the check.
Optionally, the obtaining the change rule character in the password that fails to pass the check, and updating the password parsing rule based on the change rule character includes:
and synchronizing the character of the change rule into the password analysis rule after carrying out unified code conversion, thereby updating the password analysis rule.
Optionally, the checking the new password again until the correct password parsing rule is obtained includes:
if the check is passed, the correct password analysis rule is synchronized to a formal environment, and if the check is not passed, the updating of the password analysis rule and the check of the new password are circularly carried out until the correct password analysis rule is obtained.
In order to achieve the above object, the present application further provides a device for resolving a password in a text, including: a memory; and
a processor coupled to the memory, the processor configured to:
acquiring a text containing a password, and analyzing an export command from the text by using a password analysis rule;
judging whether the password is correct, if so, analyzing a target ID based on the correct password and returning corresponding information;
automatically pre-warning the change of the password analysis rule to find the change of the password analysis rule and alarm;
and after the password analysis rule changes, checking the new password to obtain a change rule character in the password which does not pass the check, updating the password analysis rule based on the change rule character, checking the new password again until the correct password analysis rule is obtained, and synchronizing the correct password analysis rule to a formal environment.
To achieve the above object, the present application also provides a computer storage medium having stored thereon a computer program which, when executed by a machine, implements the steps of the method as described above.
The embodiment of the application has the following advantages:
the embodiment of the application provides a password analysis method in text, which comprises the following steps: acquiring a text containing a password, and analyzing an export command from the text by using a password analysis rule; judging whether the password is correct, if so, analyzing a target ID based on the correct password and returning corresponding information; automatically pre-warning the change of the password analysis rule to find the change of the password analysis rule and alarm; and after the password analysis rule changes, checking the new password to obtain a change rule character in the password which does not pass the check, updating the password analysis rule based on the change rule character, checking the new password again until the correct password analysis rule is obtained, and synchronizing the correct password analysis rule to a formal environment.
According to the method, the text which is copied by the user and contains the password is obtained, judgment is carried out through the password analysis rule, corresponding information is returned, namely, a key text path corresponding to the information is displayed on the current page, and the direct clicking mode is adopted, so that the efficiency and the user experience are improved; and through carrying out automatic early warning and updating synchronization on the change of the password analysis rule, even when the formats or versions of the passwords are different and the passwords are dynamically changed, the user can obtain details correctly or achieve the final purpose, and the efficiency and the user experience are further improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below. It will be apparent to those skilled in the art from this disclosure that the drawings described below are merely exemplary and that other embodiments may be derived from the drawings provided without undue effort.
FIG. 1 is a flowchart of a method for resolving a password in text according to an embodiment of the present application;
FIG. 2 is a password parsing flow chart of a method for parsing a password in text according to an embodiment of the present application;
FIG. 3 is a flowchart of a method for resolving a password in text and an automated early warning according to an embodiment of the present application;
FIG. 4 is a flowchart of an automatic process after a password resolution rule of a password resolution method in text changes according to an embodiment of the present application;
fig. 5 is a block diagram of a device for resolving a password in text according to an embodiment of the present application.
Detailed Description
Other advantages and advantages of the present application will become apparent to those skilled in the art from the following detailed description, which, by way of illustration, is to be read in connection with certain specific embodiments, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
In addition, the technical features of the different embodiments of the present application described below may be combined with each other as long as they do not collide with each other.
An embodiment of the present application provides a method for parsing a password in a text, referring to fig. 1, and fig. 1 is a flowchart of a method for parsing a password in a text provided in an embodiment of the present application, it should be understood that the method may further include additional blocks not shown and/or may omit the blocks shown, and the scope of the present application is not limited in this respect.
The method provided by the application can analyze the password in the text, including the tremble password, the panning password, the keywords and/or the hotwords, etc., and in the following embodiments, the tremble password with tremble sound is taken as an example to explain the scheme of the application.
At step 101, text containing a password is obtained, and an exit password is parsed from the text using password parsing rules.
In some embodiments, the password parsing rule includes a regular expression that password parses the text containing the password.
Specifically, the method for obtaining the text containing the password may be to identify and obtain the text copied by the user, and parse the correct shake-password from the text by using a shake-password parsing rule (the parsing rule includes a regular expression for parsing the text containing the password), so as to parse the commodity or the live broadcasting room (information corresponding to the target ID) by using the correct shake-password and return.
At step 102, it is determined whether the password is correct, and if so, the target ID is parsed based on the correct password and corresponding information is returned.
In some embodiments, the determining whether the password is correct, and if so, parsing the target ID and returning the corresponding information based on the correct password includes:
regular judgment is carried out on the password, and whether the password is a correct password is judged;
if the password is correct, analyzing a target ID based on the password, judging whether information corresponding to the target ID is in a cache, if so, directly calling the information corresponding to the target ID, otherwise, acquiring and returning the information corresponding to the target ID, and storing the information in the cache;
if the password is not correct, the text containing the password is retrieved.
Specifically, the tremble password parsing flowchart refers to fig. 2. Judging whether the shake password is a correct shake password through regular judgment (judging by using a regular expression), if the shake password is the correct shake password, analyzing the shake password, obtaining a corresponding target ID after the analysis is successful, judging whether the commodity is in a cache or not, and if the commodity is directly called in the cache (comprising commodity details and/or commodity links), returning commodity information (namely information corresponding to the target ID). If not, acquiring commodity information and storing the commodity information in the cache, and returning commodity details and/or commodity links.
At step 103, an automated pre-warning is performed of the change in the password resolution rule to discover the change in the password resolution rule and alarm.
Specifically, the tremble password parsing rule is a rule for extracting a tremble password from a piece of text, and is based on the following reasons:
1) The jittering shops, live broadcasting rooms and commodity passwords are different in format;
2) The tremble password can dynamically change in a certain period of time;
3) There are multiple versions of the tremble password in use.
The current rule cannot resolve the jitter password correctly, and when the current rule changes, the rule needs to be updated timely. In this embodiment, the rule change is divided into three steps: 1) automating the change of the pre-warning tremble password analysis rule (comprising at least two ways), 2) automating the processing of the regular scheme after the change of the tremble password analysis rule, and 3) changing the tremble password analysis rule. Specific methods reference is made to the following examples.
In some embodiments, the automatically pre-warning of the change in the password resolution rule comprises:
and acquiring the password generated by the password generating interface in real time at fixed time, analyzing the password by using the current password analysis rule, and if the analysis fails, indicating that the current password analysis rule needs to be changed and giving an alarm.
Specifically, referring to fig. 3, the automated detection pathway:
the method is that a shaking password generating interface of a shaking commodity or a live broadcasting room is used for generating a shaking password (the shaking password generated in real time through the interface can be regarded as the shaking password which is generated currently and latest) for a random commodity or live broadcasting room at regular time, and the shaking password is analyzed by using a current shaking password analysis rule, if the analysis is successful, the current shaking password analysis rule is free of problems, if the analysis is failed, the shaking password is changed, and the alarm is carried out according to the configuration of the triggering alarm rule.
In other embodiments, the automatically pre-warning of the change in the password resolution rule comprises:
logging the request for analyzing the password each time, counting the correct rate of analyzing the password by using the password analysis rule, and when the change amplitude of the correct rate is larger than a preset value, indicating that the current password analysis rule needs to be changed and giving an alarm.
Specifically, referring to fig. 3, the real-time resolution correct rate change detection approach:
logging each request for resolving the tremble password, counting the accuracy rate (success rate) of resolving the tremble password, and alarming when the accuracy rate of resolving the tremble password is changed greatly (the change amplitude is larger than a preset value, for example, 10%).
At step 104, after the password analysis rule changes, checking the new password to obtain a change rule character in the password which does not pass the check, updating the password analysis rule based on the change rule character to check the new password again until the correct password analysis rule is obtained, and synchronizing the correct password analysis rule to a formal environment.
In some embodiments, said checking for a new password after said password resolution rule changes comprises:
and checking the new password through a checking mechanism, wherein the checking mechanism comprises the steps of analyzing the new password by using the password analysis rule and then carrying out regular judgment to judge whether the analyzed password is correct, so as to judge whether the new password passes the check.
In some embodiments, the obtaining a change rule character in the password that fails the check, updating the password parsing rule based on the change rule character comprises:
and synchronizing the character of the change rule into the password analysis rule after carrying out unified code conversion, thereby updating the password analysis rule.
In some embodiments, said again checking the new password until the correct password resolution rule is obtained comprises:
if the check is passed, the correct password analysis rule is synchronized to a formal environment, and if the check is not passed, the updating of the password analysis rule and the check of the new password are circularly carried out until the correct password analysis rule is obtained.
Specifically, referring to fig. 4, when a new tremble password (dkl string) request is sent to the checking mechanism (checkDkl (dklString)) (including parsing using tremble password parsing rules and then performing regular judgment in some embodiments), if the new tremble password fails, parsing the new tremble password and obtaining a change rule character, converting a unified code (unicode) value of the change rule character, synchronizing the change rule character into tremble password identification regular (tremble password parsing rules), and performing regular matching on the new tremble password again after obtaining a regular expression of the new tremble password parsing rules. If successful, the new regular is synchronized to the formal environment, and if failed, the password shaking analysis circulating operation is performed again.
Finally, updating the tremble password analysis rule is to acquire manually-changed regular analysis of the tremble password, and synchronize the rule to a formal environment, so that the tremble password text can be accurately analyzed at the place (red dotted line part) where the regular analysis of the tremble password is required in fig. 3.
According to the method, the text which is copied by the user and contains the password is obtained, judgment is carried out through the password analysis rule, corresponding information is returned, namely, a key text path corresponding to the information is displayed on the current page, and the direct clicking mode is adopted, so that the efficiency and the user experience are improved; and through carrying out automatic early warning and updating synchronization on the change of the password analysis rule, even when the formats or versions of the passwords are different and the passwords are dynamically changed, the user can obtain details correctly or achieve the final purpose, and the efficiency and the user experience are further improved.
Fig. 5 is a block diagram of a device for resolving a password in text according to an embodiment of the present application. The device comprises:
a memory 201; and a processor 202 connected to the memory 201, the processor 202 configured to: acquiring a text containing a password, and analyzing an export command from the text by using a password analysis rule;
judging whether the password is correct, if so, analyzing a target ID based on the correct password and returning corresponding information;
automatically pre-warning the change of the password analysis rule to find the change of the password analysis rule and alarm;
and after the password analysis rule changes, checking the new password to obtain a change rule character in the password which does not pass the check, updating the password analysis rule based on the change rule character, checking the new password again until the correct password analysis rule is obtained, and synchronizing the correct password analysis rule to a formal environment.
In some embodiments, the processor 202 is further configured to: the password parsing rule includes a regular expression that performs password parsing on the text containing the password.
In some embodiments, the processor 202 is further configured to: judging whether the password is correct or not, if so, analyzing the target ID based on the correct password and returning corresponding information comprises the following steps:
regular judgment is carried out on the password, and whether the password is a correct password is judged;
if the password is correct, analyzing a target ID based on the password, judging whether information corresponding to the target ID is in a cache, if so, directly calling the information corresponding to the target ID, otherwise, acquiring and returning the information corresponding to the target ID, and storing the information in the cache;
if the password is not correct, the text containing the password is retrieved.
In some embodiments, the processor 202 is further configured to: the automatic early warning of the change of the password analysis rule comprises the following steps:
and acquiring the password generated by the password generating interface in real time at fixed time, analyzing the password by using the current password analysis rule, and if the analysis fails, indicating that the current password analysis rule needs to be changed and giving an alarm.
In some embodiments, the processor 202 is further configured to: the automatic early warning of the change of the password analysis rule comprises the following steps:
logging the request for analyzing the password each time, counting the correct rate of analyzing the password by using the password analysis rule, and when the change amplitude of the correct rate is larger than a preset value, indicating that the current password analysis rule needs to be changed and giving an alarm.
In some embodiments, the processor 202 is further configured to: after the password parsing rule is changed, checking the new password includes:
and checking the new password through a checking mechanism, wherein the checking mechanism comprises the steps of analyzing the new password by using the password analysis rule and then carrying out regular judgment to judge whether the analyzed password is correct, so as to judge whether the new password passes the check.
In some embodiments, the processor 202 is further configured to: the obtaining the change rule character in the password which does not pass the check, and updating the password analysis rule based on the change rule character comprises the following steps:
and synchronizing the character of the change rule into the password analysis rule after carrying out unified code conversion, thereby updating the password analysis rule.
In some embodiments, the processor 202 is further configured to: said again checking the new password until the correct password resolution rule is obtained comprises:
if the check is passed, the correct password analysis rule is synchronized to a formal environment, and if the check is not passed, the updating of the password analysis rule and the check of the new password are circularly carried out until the correct password analysis rule is obtained.
Reference is made to the foregoing method embodiments for specific implementation methods, and details are not repeated here.
The present application may be a method, apparatus, system, and/or computer program product. The computer program product may include a computer readable storage medium having computer readable program instructions embodied thereon for performing various aspects of the present application.
The computer readable storage medium may be a tangible device that can hold and store instructions for use by an instruction execution device. The computer readable storage medium may be, for example, but not limited to, an electronic storage device, a magnetic storage device, an optical storage device, an electromagnetic storage device, a semiconductor storage device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer-readable storage medium would include the following: portable computer disks, hard disks, random Access Memory (RAM), read-only memory (ROM), erasable programmable read-only memory (EPROM or flash memory), static Random Access Memory (SRAM), portable compact disk read-only memory (CD-ROM), digital Versatile Disks (DVD), memory sticks, floppy disks, mechanical coding devices, punch cards or in-groove structures such as punch cards or grooves having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media, as used herein, are not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through waveguides or other transmission media (e.g., optical pulses through fiber optic cables), or electrical signals transmitted through wires.
The computer readable program instructions described herein may be downloaded from a computer readable storage medium to a respective computing/processing device or to an external computer or external storage device over a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmissions, wireless transmissions, routers, firewalls, switches, gateway computers and/or edge servers. The network interface card or network interface in each computing/processing device receives computer readable program instructions from the network and forwards the computer readable program instructions for storage in a computer readable storage medium in the respective computing/processing device.
Computer program instructions for carrying out operations of the present application may be assembly instructions, instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, c++ or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer readable program instructions may be executed entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, aspects of the present application are implemented by personalizing electronic circuitry, such as programmable logic circuitry, field Programmable Gate Arrays (FPGAs), or Programmable Logic Arrays (PLAs), with state information for computer readable program instructions, which can execute the computer readable program instructions.
Various aspects of the present application are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the application. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer readable program instructions may be provided to a processing unit of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processing unit of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer readable program instructions may also be stored in a computer readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer readable medium having the instructions stored therein includes an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
Note that all features disclosed in this specification (including any accompanying claims, abstract and drawings) may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise. Thus, unless expressly stated otherwise, each feature disclosed is one example only of a generic set of equivalent or similar features. Where used, further, preferably, still further and preferably, the brief description of the other embodiment is provided on the basis of the foregoing embodiment, and further, preferably, further or more preferably, the combination of the contents of the rear band with the foregoing embodiment is provided as a complete construct of the other embodiment. A further embodiment is composed of several further, preferably, still further or preferably arrangements of the strips after the same embodiment, which may be combined arbitrarily.
While the application has been described in detail in the foregoing general description and specific examples, it will be apparent to those skilled in the art that modifications and improvements can be made thereto. Accordingly, such modifications or improvements may be made without departing from the spirit of the application and are intended to be within the scope of the application as claimed.
Claims (10)
1. A method for password parsing in text, comprising:
acquiring a text containing a password, and analyzing an export command from the text by using a password analysis rule;
judging whether the password is correct, if so, analyzing a target ID based on the correct password and returning corresponding information;
automatically pre-warning the change of the password analysis rule to find the change of the password analysis rule and alarm;
and after the password analysis rule changes, checking the new password to obtain a change rule character in the password which does not pass the check, updating the password analysis rule based on the change rule character, checking the new password again until the correct password analysis rule is obtained, and synchronizing the correct password analysis rule to a formal environment.
2. The method for password resolution in text as recited in claim 1, wherein,
the password parsing rule includes a regular expression that performs password parsing on the text containing the password.
3. The method of claim 1, wherein the determining whether the password is correct, and if so, resolving the target ID based on the correct password and returning the corresponding information comprises:
regular judgment is carried out on the password, and whether the password is a correct password is judged;
if the password is correct, analyzing a target ID based on the password, judging whether information corresponding to the target ID is in a cache, if so, directly calling the information corresponding to the target ID, otherwise, acquiring and returning the information corresponding to the target ID, and storing the information in the cache;
if the password is not correct, the text containing the password is retrieved.
4. The method for resolving a password in a text according to claim 1, wherein the automatically pre-warning of the change of the password resolving rule comprises:
and acquiring the password generated by the password generating interface in real time at fixed time, analyzing the password by using the current password analysis rule, and if the analysis fails, indicating that the current password analysis rule needs to be changed and giving an alarm.
5. The method for resolving a password in a text according to claim 1 or 4, wherein the automatically pre-warning of the change of the password resolving rule comprises:
logging the request for analyzing the password each time, counting the correct rate of analyzing the password by using the password analysis rule, and when the change amplitude of the correct rate is larger than a preset value, indicating that the current password analysis rule needs to be changed and giving an alarm.
6. The method of claim 1, wherein checking the new password after the password parsing rule is changed comprises:
and checking the new password through a checking mechanism, wherein the checking mechanism comprises the steps of analyzing the new password by using the password analysis rule and then carrying out regular judgment to judge whether the analyzed password is correct, so as to judge whether the new password passes the check.
7. The method of claim 1, wherein the obtaining the change rule character in the password that fails to be checked, and updating the password parsing rule based on the change rule character comprises:
and synchronizing the character of the change rule into the password analysis rule after carrying out unified code conversion, thereby updating the password analysis rule.
8. The method of in-text password resolution as recited in claim 1, wherein said again checking for a new password until a correct password resolution rule is obtained comprises:
if the check is passed, the correct password analysis rule is synchronized to a formal environment, and if the check is not passed, the updating of the password analysis rule and the check of the new password are circularly carried out until the correct password analysis rule is obtained.
9. A password in text parsing apparatus comprising:
a memory; and
a processor coupled to the memory, the processor configured to:
acquiring a text containing a password, and analyzing an export command from the text by using a password analysis rule;
judging whether the password is correct, if so, analyzing a target ID based on the correct password and returning corresponding information;
automatically pre-warning the change of the password analysis rule to find the change of the password analysis rule and alarm;
and after the password analysis rule changes, checking the new password to obtain a change rule character in the password which does not pass the check, updating the password analysis rule based on the change rule character, checking the new password again until the correct password analysis rule is obtained, and synchronizing the correct password analysis rule to a formal environment.
10. A computer storage medium having stored thereon a computer program, which when executed by a machine performs the steps of the method according to any of claims 1 to 8.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310518154.9A CN116629232A (en) | 2023-05-09 | 2023-05-09 | Password analysis method and device in text and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310518154.9A CN116629232A (en) | 2023-05-09 | 2023-05-09 | Password analysis method and device in text and storage medium |
Publications (1)
Publication Number | Publication Date |
---|---|
CN116629232A true CN116629232A (en) | 2023-08-22 |
Family
ID=87596532
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310518154.9A Pending CN116629232A (en) | 2023-05-09 | 2023-05-09 | Password analysis method and device in text and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116629232A (en) |
Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170180129A1 (en) * | 2015-12-17 | 2017-06-22 | International Business Machines Corporation | Password Re-Usage Identification Based on Input Method Editor Analysis |
US20170337167A1 (en) * | 2016-05-19 | 2017-11-23 | International Business Machines Corporation | Misaligned annotation processing |
CN112819061A (en) * | 2021-01-27 | 2021-05-18 | 北京小米移动软件有限公司 | Password information identification method, device, equipment and storage medium |
CN112988776A (en) * | 2021-04-26 | 2021-06-18 | 北京泰迪熊移动科技有限公司 | Method, device and equipment for updating text parsing rule and readable storage medium |
-
2023
- 2023-05-09 CN CN202310518154.9A patent/CN116629232A/en active Pending
Patent Citations (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20170180129A1 (en) * | 2015-12-17 | 2017-06-22 | International Business Machines Corporation | Password Re-Usage Identification Based on Input Method Editor Analysis |
US20170337167A1 (en) * | 2016-05-19 | 2017-11-23 | International Business Machines Corporation | Misaligned annotation processing |
CN112819061A (en) * | 2021-01-27 | 2021-05-18 | 北京小米移动软件有限公司 | Password information identification method, device, equipment and storage medium |
CN112988776A (en) * | 2021-04-26 | 2021-06-18 | 北京泰迪熊移动科技有限公司 | Method, device and equipment for updating text parsing rule and readable storage medium |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US9075918B1 (en) | System and method for creating change-resilient scripts | |
US11200291B2 (en) | Automated generation of web API descriptions from usage data | |
US11188560B2 (en) | Synchronizing object in local object storage node | |
CN112154420B (en) | Automatic intelligent cloud service testing tool | |
US20170187734A1 (en) | System and method for field extraction of data contained within a log stream | |
US10832164B2 (en) | Generating streaming analytics applications using a glossary | |
US11934287B2 (en) | Method, electronic device and computer program product for processing data | |
CN111736840A (en) | Compiling method and running method of applet, storage medium and electronic equipment | |
US11074119B2 (en) | Automatic root cause analysis for web applications | |
CN110321544B (en) | Method and device for generating information | |
CN110543297A (en) | method and apparatus for generating source code | |
CN114328208A (en) | Code detection method and device, electronic equipment and storage medium | |
US10394774B2 (en) | Determining when a change set was delivered to a workspace or stream and by whom | |
EP4182909A1 (en) | Automated skill tagging, knowledge graph, and customized assessment and exercise generation | |
CN112948726A (en) | Method, device and system for processing abnormal information | |
CN114443905A (en) | Interface document updating method and device, electronic equipment and readable storage medium | |
CN110727576B (en) | Web page testing method, device, equipment and storage medium | |
US11379421B1 (en) | Generating readable, compressed event trace logs from raw event trace logs | |
CN116629232A (en) | Password analysis method and device in text and storage medium | |
US20160070564A1 (en) | Dynamically schematized log messages for software applications | |
CN112988776B (en) | Method, device and equipment for updating text parsing rule and readable storage medium | |
CN113094086B (en) | Component integration method, device, computer readable storage medium and electronic equipment | |
US10140363B2 (en) | Social network crowd translation | |
CN115643094A (en) | Threat information fusion method and device, electronic equipment and storage medium | |
CN112699272A (en) | Information output method and device and electronic equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
CB02 | Change of applicant information |
Address after: East of 1st floor, No.36 Haidian Street, Haidian District, Beijing, 100080 Applicant after: Beijing Teddy Future Technology Co.,Ltd. Address before: East of 1st floor, No.36 Haidian Street, Haidian District, Beijing, 100080 Applicant before: Beijing Teddy Bear Mobile Technology Co.,Ltd. |
|
CB02 | Change of applicant information |