CN117290203A - Code detection method and related equipment - Google Patents

Code detection method and related equipment Download PDF

Info

Publication number
CN117290203A
CN117290203A CN202210694195.9A CN202210694195A CN117290203A CN 117290203 A CN117290203 A CN 117290203A CN 202210694195 A CN202210694195 A CN 202210694195A CN 117290203 A CN117290203 A CN 117290203A
Authority
CN
China
Prior art keywords
code
object information
change
detection
file
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202210694195.9A
Other languages
Chinese (zh)
Inventor
陈迪川
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Zitiao Network Technology Co Ltd
Original Assignee
Beijing Zitiao Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Zitiao Network Technology Co Ltd filed Critical Beijing Zitiao Network Technology Co Ltd
Priority to CN202210694195.9A priority Critical patent/CN117290203A/en
Publication of CN117290203A publication Critical patent/CN117290203A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3604Software analysis for verifying properties of programs

Abstract

The disclosure provides a code detection method and related equipment. The method comprises the following steps: acquiring a change code which is changed in an object code file to be detected; acquiring the submitted object information of the change code; comparing whether the submitted object information is matched with the detection object information of the code detection object; and in response to the submitted object information being matched with the detection object information, displaying the change codes and/or the target code files to the code detection object so as to carry out code detection. According to the method and the device, the efficiency of code detection can be improved.

Description

Code detection method and related equipment
Technical Field
The disclosure relates to the field of computer technology, and in particular, to a code detection method and related equipment.
Background
During the development of an application, modifications to the code files are often required. The code detection object needs to find out relevant code files from a plurality of code files which are changed to detect, which reduces the efficiency of code detection.
Disclosure of Invention
The disclosure provides a code detection method and related equipment, so as to solve the technical problem of low code detection efficiency to a certain extent.
In a first aspect of the present disclosure, a code detection method is provided, including:
acquiring a change code which is changed in an object code file to be detected;
acquiring the submitted object information of the change code;
comparing whether the submitted object information is matched with the detection object information of the code detection object;
and in response to the submitted object information being matched with the detection object information, displaying the change codes and/or the target code files to the code detection object so as to carry out code detection.
In a second aspect of the present disclosure, there is provided a code detection apparatus including:
the acquisition module is used for acquiring a changed code which is changed in the target code file to be detected; acquiring submitted object information of the change code;
the identity matching module is used for comparing whether the submitted object information is matched with the detection object information of the code detection object;
and the code detection module is used for responding to the fact that the submitted object information is matched with the detection object information, displaying the change code and/or the target code file to the code detection object so as to detect the code.
In a third aspect of the disclosure, an electronic device is provided, which is characterized by comprising one or more processors and a memory; and one or more programs, wherein the one or more programs are stored in the memory and executed by the one or more processors, the programs comprising instructions for performing the method of the first aspect.
In a fourth aspect of the present disclosure, there is provided a non-transitory computer readable storage medium containing a computer program which, when executed by one or more processors, causes the processors to perform the method of the first aspect.
In a fifth aspect of the present disclosure, there is provided a computer program product comprising computer program instructions which, when run on a computer, cause the computer to perform the method of the first aspect.
As can be seen from the foregoing, according to the code detection method and the related device provided by the present disclosure, submitted object information of a change code is obtained based on a history modification record of the change code, and when the submitted object information matches with identity information of a code detection object, the change code or a code file of the change code is displayed to the code detection object. The code file related to the code detection object can be only displayed to the code detection object, the code detection object is not required to find out the code file related to the code detection object from all code files which are sent to be changed, and the code detection efficiency is improved.
Drawings
In order to more clearly illustrate the technical solutions of the present disclosure or related art, the drawings required for the embodiments or related art description will be briefly described below, and it is apparent that the drawings in the following description are only embodiments of the present disclosure, and other drawings may be obtained according to these drawings without inventive effort to those of ordinary skill in the art.
Fig. 1 is a schematic diagram of a code detection architecture according to an embodiment of the disclosure.
Fig. 2 is a schematic diagram of a hardware structure of an exemplary terminal according to an embodiment of the present disclosure.
Fig. 3 is a schematic diagram of a code detection method according to an embodiment of the disclosure.
Fig. 4 is a schematic diagram of a code detection apparatus according to an embodiment of the present disclosure.
Detailed Description
For the purposes of promoting an understanding of the principles and advantages of the disclosure, reference will now be made to the embodiments illustrated in the drawings and specific language will be used to describe the same.
It should be noted that unless otherwise defined, technical or scientific terms used in the embodiments of the present disclosure should be given the ordinary meaning as understood by one of ordinary skill in the art to which the present disclosure pertains. The terms "first," "second," and the like, as used in embodiments of the present disclosure, do not denote any order, quantity, or importance, but rather are used to distinguish one element from another. The word "comprising" or "comprises", and the like, means that elements or items preceding the word are included in the element or item listed after the word and equivalents thereof, but does not exclude other elements or items. The terms "connected" or "connected," and the like, are not limited to physical or mechanical connections, but may include electrical connections, whether direct or indirect. "upper", "lower", "left", "right", etc. are used merely to indicate relative positional relationships, which may also be changed when the absolute position of the object to be described is changed.
Code files often need to be continually modified during software development. For example, when developing relatively large new functions, the code files that are altered may be hundreds or even more. Code instrumentation objects typically only detect code files associated with themselves, however, many of the code files that change often do not have more code files associated with code instrumentation objects. This makes it necessary for the code detection object to find out the code file associated with itself among a plurality of code files that change, resulting in very low code detection efficiency.
In view of this, the embodiments of the present disclosure provide a code detection method and related devices. And obtaining the submitted object information of the change code based on the history modification record of the change code, and displaying the change code or the code file of the change code to the code detection object when the submitted object information is matched with the identity information of the code detection object. The method can only display the code files related to the code detection object without the code detection object finding out the code files related to the code detection object from all the code files which are sent to be changed, thereby reducing the workload of the code detection object, saving the time and improving the efficiency of code detection.
Fig. 1 shows a schematic diagram of a code detection architecture of an embodiment of the present disclosure. Referring to fig. 1, the code detection architecture 100 may include a server 110, a terminal 120, and a network 130 providing a communication link. The server 110 and the terminal 120 may be connected through a wired or wireless network 130. The server 110 may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server that provides basic cloud computing services such as cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, and middleware services CDN.
The terminal 120 may be a hardware or software implementation. For example, when the terminal 120 is a hardware implementation, it may be a variety of electronic devices having a display screen and supporting page display, including but not limited to smartphones, tablets, e-book readers, laptop and desktop computers, and the like. When the terminal 120 is implemented in software, it may be installed in the above-listed electronic device; it may be implemented as a plurality of software or software modules (e.g., software or software modules for providing distributed services) or as a single software or software module, without limitation.
It should be noted that, the code detection method provided in the embodiment of the present application may be executed by the terminal 120 or may be executed by the server 110. It should be understood that the number of terminals, networks, and servers in fig. 1 are illustrative only and are not intended to be limiting. There may be any number of terminals, networks, and servers, as desired for implementation.
Fig. 2 shows a schematic hardware structure of an exemplary terminal 200 provided by an embodiment of the present disclosure. As shown in fig. 2, the terminal 200 may include: processor 202, memory 204, network module 206, peripheral interface 208, and bus 210. Wherein the processor 202, the memory 204, the network module 206 and the peripheral interface 208 are communicatively coupled to each other within the terminal device 200 via a bus 210.
The processor 202 may be a central processing unit (Central Processing Unit, CPU), an image processor, a neural Network Processor (NPU), a Microcontroller (MCU), a programmable logic device, a Digital Signal Processor (DSP), an application specific integrated circuit (Application Specific Integrated Circuit, ASIC), or one or more integrated circuits. The processor 202 may be used to perform functions related to the techniques described in this disclosure. In some embodiments, processor 202 may also include multiple processors integrated as a single logic component. For example, as shown in fig. 2, the processor 202 may include a plurality of processors 202a, 202b, and 202c.
The memory 204 may be configured to store data (e.g., instructions, computer code, etc.). As shown in fig. 2, the data stored by the memory 204 may include program instructions (e.g., program instructions for implementing the code detection methods of embodiments of the present disclosure) as well as data to be processed (e.g., the memory may store configuration files of other modules, etc.). The processor 202 may also access program instructions and data stored in the memory 204 and execute the program instructions to perform operations on the data to be processed. The memory 204 may include volatile storage or nonvolatile storage. In some embodiments, memory 204 may include Random Access Memory (RAM), read Only Memory (ROM), optical disks, magnetic disks, hard disks, solid State Disks (SSD), flash memory, memory sticks, and the like.
The network module 206 may be configured to provide the terminal 200 with communication with other external devices via a network. The network may be any wired or wireless network capable of transmitting and receiving data. For example, the network may be a wired network, a local wireless network (e.g., bluetooth, wiFi, near Field Communication (NFC), etc.), a cellular network, the internet, or a combination of the foregoing. It will be appreciated that the type of network is not limited to the specific examples described above. In some embodiments, the network module 106 may include any combination of any number of Network Interface Controllers (NICs), radio frequency modules, receivers, modems, routers, gateways, adapters, cellular network chips, etc.
Peripheral interface 208 may be configured to connect terminal device 200 with one or more peripheral devices to enable information input and output. For example, the peripheral devices may include input devices such as keyboards, mice, touchpads, touch screens, microphones, various types of sensors, and output devices such as displays, speakers, vibrators, and indicators.
Bus 210 may be configured to transfer information between the various components of terminal 200 (e.g., processor 202, memory 204, network module 206, and peripheral interface 208), such as an internal bus (e.g., processor-memory bus), an external bus (USB port, PCI-E bus), etc.
It should be noted that, although the architecture of the terminal 200 above only shows the processor 202, the memory 204, the network module 206, the peripheral interface 208, and the bus 210, in a specific implementation, the architecture of the terminal device 200 may also include other components necessary for implementing normal operation. Furthermore, it will be understood by those skilled in the art that the architecture of the terminal 200 may include only the components necessary to implement the embodiments of the present disclosure, and not all the components shown in the drawings.
In the software development process, the development object K1 modifies the first code file A to obtain a second code file B. The development object K2 modifies the third code file C to obtain a fourth code file D.
In the process of code detection, when the code detection object S faces the second code file B and the fourth code file D, it is not possible to determine whether the code file to be detected is the second code file B or the fourth code file D. At this time, the first modified Code of the second Code file B may be obtained by comparing the first Code file a and the second Code file B based on a Code comparison tool (for example, diffMerge, diffuse, textDiff, etc.) B The method comprises the steps of carrying out a first treatment on the surface of the The first change Code B May refer to code line L in which the second code file B is changed relative to the first code file B . And, a second modified Code of the fourth Code file D can be obtained based on the comparison of the third Code file C and the fourth Code file D by the Code comparison tool D The method comprises the steps of carrying out a first treatment on the surface of the The second Code D May refer to code line L in which fourth code file D is changed relative to third code file C D
The second Code file B and the fourth Code file D after the Code change are respectively traced back by history modification records, so that a first change Code in the second Code file B is obtained B Is provided with commit object information T1 and a second change Code in a fourth Code file D D Is provided with the submitted object information T2. For example, the first change Code may be traced back based on a file line-by-line trace back instruction B And a second change Code D Is described. The file line-by-line tracing instruction may be a git frame command, which is used to trace back a history modification record of a specified file, and the last modified transaction record of each line of code in the specified file may be obtained through the git frame command. The transaction record (or history modification record) may include submitting the generationVersion (or ID) of the code line, commit object information, and commit time. Therefore, the submitted object information of the change code may be acquired based on the git frame command, for example, the first submitted object information T1 of the first change code is the development object K1, and the second submitted object information T2 of the second change code is the development object K2.
Then by comparing the change codes (e.g. the first change Code B Second change Code D ) Whether the code change requires detection of the detection object S can be determined by whether the commit object information TS of the code detection object S (e.g., the first commit object information T1, the second commit object information T2) and the commit object information T of the code detection object S match.
In some embodiments, if the submitted object information matches the identity information of the code detection object S, the detection code is presented to the code detection object S. For example, a first change Code B When the first submitted object information T1 (i.e. the development object K1) is consistent with or correlated with the identity information TS of the Code detection object S, the first submitted object information T1 can be determined to be matched with the identity information TS of the Code detection object S, and at the moment, the first change Code is Code B Or the second code file B is presented to the code detection object S for detection.
In some embodiments, if the commit object information does not match the identity information of the code detection object S, then no change code is exposed to the code detection object S. For example, the second change Code D When the second submitted object information T2 (i.e. the development object K2) is inconsistent or irrelevant to the identity information TS of the Code detection object S, the second submitted object information T2 is determined to be not matched with the identity information TS of the Code detection object S, and at the moment, the second change Code is not displayed to the Code detection object S D Or a fourth code file D.
It can be seen that, in the embodiment of the present disclosure, the submitted object information of the change code is obtained based on the history modification record of the change code, and when the submitted object information matches with the identity information of the code detection object, the change code or the code file of the change code is displayed to the code detection object. Therefore, only the code files related to the code detection object can be displayed to the code detection object, the code detection object is not required to find out the code files related to the code detection object from all code files which are sent to be changed, and the code detection efficiency is improved.
It should be appreciated that the first code file, the second code file, the third code file, and the fourth code file described above are merely examples and are not intended to limit embodiments of the present disclosure. Further code files may be included in which code changes occur, without limitation. When the code detection object faces the code file with the code change, the code file related to the code detection object can be determined by judging whether the submitted object information of the change code is matched with the identity information of the code detection object through the history modification record of the change code.
Referring to fig. 3, fig. 3 shows a schematic diagram of a code detection method according to an embodiment of the present disclosure. The method 300 may be used to implement code detection and may be implemented by the server 110 or the terminal 120 of fig. 1, or by both the server 110 and the terminal 120. The game includes a plurality of data packets, and as shown in fig. 3, the code detection method 300 may further include the following steps.
In step S310, a change Code (e.g., a first change Code in an embodiment of the present disclosure) of the change in the object Code file to be detected (e.g., the second Code file B and the fourth Code file D in an embodiment of the present disclosure) is obtained B Second change Code D )。
In some embodiments, obtaining the change code of the change in the object code file to be detected may further include:
comparing the object code file (e.g., the second code file B and the fourth code file D in the embodiment of the present disclosure) with the original code file (e.g., the first code file a and the third code file C in the embodiment of the present disclosure) before the object code file is changed, the change code is obtained.
Where the original code file is a file representing the object code file before the change relative to the object code file, and is not intended to limit the first version of the object code file.
In step S320, commit object information (e.g., first commit object information T1, second commit object information T2 in the embodiment of the present disclosure) of the change code is acquired.
In some embodiments, the commit object is, for example, an object that commits the change code, and may be, in particular, a commit maker, and the commit object information is, for example, an object identifier of the commit object, and the detection object is, for example, an object that detects the code, and may be, in particular, a detector, and the detection object information is, for example, an object identifier of the detection object. Acquiring the submitted object information of the change code may further include: obtaining a history modification record of the object Code file (e.g., a file line-by-line trace back instruction in embodiments of the present disclosure to trace back a first change Code) B And a second change Code D Historical modification records of the change code) and obtains commit object information for the change code based on the modification records.
The history modification record may include, among other things, the version (or ID) at the time the change code was submitted, the presenter information, and the time of the submission.
In step S330, whether the submitted object information matches with the detection object information of the code detection object (e.g., the identity information TS of the code detection object S in the embodiment of the present disclosure) is compared.
In some embodiments, the method 300 further comprises: and obtaining detection object information of the code detection object.
In step S340, in response to the commit object information (e.g., the first commit object information T1 of the embodiment of the present disclosure) matching the detection object information (e.g., the identity information TS of the Code detection object S of the embodiment of the present disclosure), the change Code (e.g., the first change Code of the embodiment of the present disclosure) is displayed to the Code detection object B ) And/or the object code file (e.g., second code file B of an embodiment of the present disclosure) for code detection.
Wherein matching may refer to agreement or association. For example, the code detection object may be a commit object of the change code, so at this time, commit object information coincides with detection object information; the code detection object may not be a commit object of the change code, but an object associated with the commit object, at which time the commit object information and the detection object information may be configured to be associated. For example, the detection object may be set as a superior or peer object of the commit object. If it is out that there is no object associated with the submitted object information in the current matching process, for example, the original associated object associated with the submitted object is taken away from the job or the post is mobilized, etc., at this time, the object associated with the original associated object (for example, the object associated with the original associated object) may be set as a new detection object associated with the submitted object, and the new detection object may be specified by the user.
In some embodiments, the method 300 further comprises:
in response to the submission object information, e.g., the second submission object information T2 of an embodiment of the present disclosure, not matching the detection object information (e.g., the identity information TS of the Code detection object S of an embodiment of the present disclosure), the change Code (e.g., the second change Code of an embodiment of the present disclosure) is not displayed to the Code detection object D ) And/or the object code file (e.g., the fourth code file D of the embodiments of the present disclosure).
It should be noted that the method of the embodiments of the present disclosure may be performed by a single device, such as a computer or a server. The method of the embodiment can also be applied to a distributed scene, and is completed by mutually matching a plurality of devices. In the case of such a distributed scenario, one of the devices may perform only one or more steps of the methods of embodiments of the present disclosure, the devices interacting with each other to accomplish the methods.
It should be noted that the foregoing describes some embodiments of the present disclosure. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments described above and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
Based on the same inventive concept, the present disclosure also provides a code detection device corresponding to the method of any embodiment.
Referring to fig. 4, the code detection apparatus includes:
the acquisition module is used for acquiring a changed code which is changed in the target code file to be detected; acquiring submitted object information of the change code;
the identity matching module is used for comparing whether the submitted object information is matched with the detection object information of the code detection object;
and the code detection module is used for responding to the fact that the submitted object information is matched with the detection object information, displaying the change code and/or the target code file to the code detection object so as to detect the code.
For convenience of description, the above devices are described as being functionally divided into various modules, respectively. Of course, the functions of the various modules may be implemented in the same one or more pieces of software and/or hardware when implementing the present disclosure.
The device of the foregoing embodiment is configured to implement the corresponding code detection method in any of the foregoing embodiments, and has the beneficial effects of the corresponding method embodiment, which is not described herein.
Based on the same inventive concept, the present disclosure also provides a non-transitory computer-readable storage medium storing computer instructions for causing the computer to perform the code detection method according to any of the above embodiments, corresponding to any of the above embodiments.
The computer readable media of the present embodiments, including both permanent and non-permanent, removable and non-removable media, may be used to implement information storage by any method or technology. The information may be computer readable instructions, data structures, modules of a program, or other data. Examples of storage media for a computer include, but are not limited to, phase change memory (PRAM), static Random Access Memory (SRAM), dynamic Random Access Memory (DRAM), other types of Random Access Memory (RAM), read Only Memory (ROM), electrically Erasable Programmable Read Only Memory (EEPROM), flash memory or other memory technology, compact disc read only memory (CD-ROM), digital Versatile Discs (DVD) or other optical storage, magnetic cassettes, magnetic tape magnetic disk storage or other magnetic storage devices, or any other non-transmission medium, which can be used to store information that can be accessed by a computing device.
The storage medium of the foregoing embodiments stores computer instructions for causing the computer to execute the code detection method according to any one of the foregoing embodiments, and has the advantages of the corresponding method embodiments, which are not described herein.
Those of ordinary skill in the art will appreciate that: the discussion of any of the embodiments above is merely exemplary and is not intended to suggest that the scope of the disclosure, including the claims, is limited to these examples; the technical features of the above embodiments or in the different embodiments may also be combined under the idea of the present disclosure, the steps may be implemented in any order, and there are many other variations of the different aspects of the embodiments of the present disclosure as described above, which are not provided in details for the sake of brevity.
Additionally, well-known power/ground connections to Integrated Circuit (IC) chips and other components may or may not be shown within the provided figures, in order to simplify the illustration and discussion, and so as not to obscure the embodiments of the present disclosure. Furthermore, the devices may be shown in block diagram form in order to avoid obscuring the embodiments of the present disclosure, and this also accounts for the fact that specifics with respect to implementation of such block diagram devices are highly dependent upon the platform on which the embodiments of the present disclosure are to be implemented (i.e., such specifics should be well within purview of one skilled in the art). Where specific details (e.g., circuits) are set forth in order to describe example embodiments of the disclosure, it should be apparent to one skilled in the art that embodiments of the disclosure can be practiced without, or with variation of, these specific details. Accordingly, the description is to be regarded as illustrative in nature and not as restrictive.
While the present disclosure has been described in conjunction with specific embodiments thereof, many alternatives, modifications, and variations of those embodiments will be apparent to those skilled in the art in light of the foregoing description. For example, other memory architectures (e.g., dynamic RAM (DRAM)) may use the embodiments discussed.
The disclosed embodiments are intended to embrace all such alternatives, modifications and variances which fall within the broad scope of the appended claims. Accordingly, any omissions, modifications, equivalents, improvements, and the like, which are within the spirit and principles of the embodiments of the disclosure, are intended to be included within the scope of the disclosure.

Claims (10)

1. A code detection method, comprising:
acquiring a change code which is changed in an object code file to be detected;
acquiring the submitted object information of the change code;
comparing whether the submitted object information is matched with the detection object information of the code detection object;
and in response to the submitted object information being matched with the detection object information, displaying the change codes and/or the target code files to the code detection object so as to carry out code detection.
2. The method of claim 1, wherein obtaining a change code for a change in the object code file to be detected comprises:
and comparing the target code file with the original code file before the target code file is changed to obtain the changed code.
3. The method of claim 1, wherein obtaining commit object information for the change code comprises:
and acquiring a historical modification record of the target code file, and acquiring the submitted object information of the change code based on the modification record.
4. A method according to claim 3, wherein obtaining a history modification record of the object code file comprises: and acquiring a history modification record of the target code file based on the file line-by-line tracing instruction.
5. The method as recited in claim 1, further comprising:
and in response to the submitted object information not matching the detection object information, not displaying the change code and/or the target code file to the code detection object.
6. The method as recited in claim 1, further comprising: and obtaining detection object information of the code detection object.
7. A code detection apparatus, comprising:
the acquisition module is used for acquiring a changed code which is changed in the target code file to be detected; acquiring submitted object information of the change code;
the identity matching module is used for comparing whether the submitted object information is matched with the detection object information of the code detection object;
and the code detection module is used for responding to the fact that the submitted object information is matched with the detection object information, displaying the change code and/or the target code file to the code detection object so as to detect the code.
8. An electronic device comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing the method of any one of claims 1 to 6 when the program is executed.
9. A non-transitory computer readable storage medium storing computer instructions for causing a computer to perform the method of any one of claims 1 to 6.
10. A computer program product comprising computer program instructions which, when run on a computer, cause the computer to perform the method of any of claims 1 to 6.
CN202210694195.9A 2022-06-17 2022-06-17 Code detection method and related equipment Pending CN117290203A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202210694195.9A CN117290203A (en) 2022-06-17 2022-06-17 Code detection method and related equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202210694195.9A CN117290203A (en) 2022-06-17 2022-06-17 Code detection method and related equipment

Publications (1)

Publication Number Publication Date
CN117290203A true CN117290203A (en) 2023-12-26

Family

ID=89255885

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202210694195.9A Pending CN117290203A (en) 2022-06-17 2022-06-17 Code detection method and related equipment

Country Status (1)

Country Link
CN (1) CN117290203A (en)

Similar Documents

Publication Publication Date Title
CN109145238B (en) Card display method and device and mobile device
CN109359118B (en) Data writing method and device
EP3816924B1 (en) Method for accepting blockchain evidence storage transaction and system
CN112650804B (en) Big data access method, device, system and storage medium
CN110119429B (en) Data processing method, data processing device, computer equipment and storage medium
CN109150643B (en) Service processing abnormity detection method and device
CN117290203A (en) Code detection method and related equipment
CN113869989B (en) Information processing method and device
CN107515821B (en) Control testing method and device
US20210248106A1 (en) Systems and methods for updating select files in an image backup
US9477448B2 (en) Screen-oriented computing program refactoring
CN112380115A (en) Regression testing method and device, electronic equipment and storage medium
CN109656805B (en) Method and device for generating code link for business analysis and business server
CN112333294A (en) Log merging method, device, medium and equipment
CN111506499A (en) Method and device for detecting availability of parameters in applet and electronic equipment
CN117575303A (en) Event execution method and related equipment
CN113434508B (en) Method and apparatus for storing information
CN112653595B (en) Chip network function testing method and device, storage medium and equipment
CN106371992B (en) Browser error detection method and error detector element
CN113094607B (en) Method and device for obtaining local resources
CN118052826A (en) Image processing method, device, apparatus, medium, and program product
CN118051959A (en) Hardware Trojan detection method and related equipment
CN117290847A (en) Unauthorized vulnerability detection method, device, equipment, storage medium and program product
CN117459484A (en) Message group processing method and related equipment
CN115344365A (en) Program task execution method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination