WO2022126984A1 - Procédé et appareil de détection de données de mémoire cache, dispositif informatique et support de stockage - Google Patents

Procédé et appareil de détection de données de mémoire cache, dispositif informatique et support de stockage Download PDF

Info

Publication number
WO2022126984A1
WO2022126984A1 PCT/CN2021/091713 CN2021091713W WO2022126984A1 WO 2022126984 A1 WO2022126984 A1 WO 2022126984A1 CN 2021091713 W CN2021091713 W CN 2021091713W WO 2022126984 A1 WO2022126984 A1 WO 2022126984A1
Authority
WO
WIPO (PCT)
Prior art keywords
cache
key
target
request
task
Prior art date
Application number
PCT/CN2021/091713
Other languages
English (en)
Chinese (zh)
Inventor
陈志城
Original Assignee
平安科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 平安科技(深圳)有限公司 filed Critical 平安科技(深圳)有限公司
Publication of WO2022126984A1 publication Critical patent/WO2022126984A1/fr

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/448Execution paradigms, e.g. implementations of programming paradigms
    • G06F9/4482Procedural

Definitions

  • the present application relates to the technical field of data processing, and in particular, to a detection method, device, computer equipment and storage medium for cached data.
  • HTML5 introduced Localstorage (which can be called local storage)
  • local storage has been widely used in the front-end field.
  • Local storage is mainly operated through js code, and is used to store some commonly used and infrequently changed data in the project, such as user information, static data, etc. directly to the browser locally, so as to facilitate calls in multiple places in the project.
  • the inventor realizes that after the developer uses the project cache data in the local storage, if the project cache data in the local storage permanently exists locally in the browser and is not cleared in time, the project code may report an error, etc. question.
  • the user has the need to detect whether there is project cache data that has not been cleared in the local storage, how to quickly detect the project cache data that has not been cleared in the local storage to meet the user's needs has become an urgent need at present. solved problem.
  • the main purpose of this application is to provide a method, device, computer equipment and storage medium for detecting cached data, aiming to solve the existing technical problem of how to quickly detect the cached data of items in local storage that have not been cleared.
  • the present application proposes a method for detecting cached data, the method comprising the steps of:
  • the specified key is any one of all the first keys contained in the first array, and the matching result includes matching success or matching failure;
  • the matching result is a matching failure, it is determined that the specified cache data corresponding to the specified key has not been cleared;
  • the target cache data corresponding to the third key is acquired and displayed.
  • the application also provides a detection device for cached data, including:
  • the first judgment module is used for judging whether an input cache detection request is received, wherein the cache detection request carries the item information corresponding to the target item, and the cache detection request is used to detect the data contained in the local storage and the target item. A request for cached data corresponding to the target item that has not been cleared;
  • the first acquisition module is used to obtain a pre-stored cache detection script corresponding to the item information based on the cache detection request if an input cache detection request is received;
  • the second acquisition module is used for running the cache detection script, and based on the running logic of the cache detection script, acquires the js code of the target project;
  • the first generation module is used to generate the abstract syntax tree corresponding to the js code
  • the first storage module is used to traverse all the objects in the abstract syntax tree, obtain the first key corresponding to each first cached data contained in the js code through a preset first acquisition method, and store all the objects in the js code.
  • the first key is stored in the preset first array;
  • the second storage module is used for the first judgment module, and is used to obtain the second key corresponding to the second cache data in the js code that has undergone the cache clearing process through a preset second obtaining method, and store all the second keys in the js code.
  • the second key is stored in the preset second array;
  • a processing module configured to perform matching processing on the specified key with each of the second keys contained in the second array, to detect whether there is a target key that is the same as the specified key in the second array, and obtain A corresponding matching result, wherein the specified key is any one of all the first keys contained in the first array, and the matching result includes matching success or matching failure;
  • a determination module configured to determine that the specified cache data corresponding to the specified key has not been cleared if the matching result is a matching failure
  • a display module configured to acquire and display a target corresponding to the third key based on the third key that fails to match based on the matching result between the second key contained in the first array and the second key in the second array cache data.
  • the present application also provides a computer device, including a memory and a processor, where a computer program is stored in the memory, and the processor implements a method for detecting cached data when the processor executes the computer program, wherein the cached data is
  • the detection method includes the following steps:
  • the specified key is any one of all the first keys contained in the first array, and the matching result includes matching success or matching failure;
  • the matching result is a matching failure, it is determined that the specified cache data corresponding to the specified key has not been cleared;
  • the target cache data corresponding to the third key is acquired and displayed.
  • the present application also provides a computer-readable storage medium on which a computer program is stored, and when the computer program is executed by a processor, a method for detecting cached data is implemented, wherein the method for detecting cached data includes the following steps:
  • the specified key is any one of all the first keys contained in the first array, and the matching result includes matching success or matching failure;
  • the matching result is a matching failure, it is determined that the specified cache data corresponding to the specified key has not been cleared;
  • the target cache data corresponding to the third key is acquired and displayed.
  • the detection method, device, computer equipment and storage medium for cached data provided in the present application can quickly detect the cached data that has not been cleared in the local cache, improve the detection efficiency of cached data, and help to reduce the number of cached data that has not been cleared. Eliminate program bugs caused by problems and improve the quality of project code.
  • FIG. 1 is a schematic flowchart of a method for detecting cached data according to an embodiment of the present application
  • FIG. 2 is a schematic structural diagram of an apparatus for detecting cached data according to an embodiment of the present application
  • FIG. 3 is a schematic structural diagram of a computer device according to an embodiment of the present application.
  • a method for detecting cached data includes:
  • S1 Determine whether an input cache detection request is received, wherein the cache detection request carries item information corresponding to the target item, and the cache detection request is used to detect the cache detection request included in the local storage and corresponding to the target item Requests for cached data that have not been cleared;
  • S6 Acquire the second keys corresponding to the second cache data in the js code that have undergone the cache clearing process by using the preset second acquisition method, and store all the second keys in the preset second array ;
  • S7 Perform matching processing on the specified key with each of the second keys included in the second array, to detect whether there is a target key that is the same as the specified key in the second array, and obtain a corresponding match
  • the specified key is any one of all the first keys contained in the first array, and the matching result includes matching success or matching failure;
  • a key/value pair can be called a "cache data", or it can also be called a cache item, for example, "key1-value1" is one cache item and "key2-value2" is another cache item.
  • the key can be called the index key, which can be used when retrieving the value; the value can be called the data object, and the data object can be the data that the client actually wants to store in the local storage.
  • the data can be 1001. If a client needs to obtain data 1001, it can use the key corresponding to the data to retrieve it.
  • the execution body of this embodiment of the method is a detection device for cached data.
  • the above-mentioned detection device for cached data can be implemented by a virtual device, such as software code, or by a physical device written or integrated with relevant execution codes, and can communicate with the user through a keyboard, mouse, remote control, touch Human-computer interaction is carried out by means of board or voice control device.
  • the detection device for the above cached data may specifically be a browser.
  • the device for detecting cached data in this embodiment can quickly detect cached data that has not been cleared in the local cache.
  • the cache detection request carries item information corresponding to the target item
  • the target item may be any business item
  • the item information may specifically include the item of the target item name.
  • the above-mentioned cache request is a request for detecting the item cache data corresponding to the above-mentioned target item, which is included in the local storage of the browser and has not been cleared. If an input cache detection request is received, based on the cache detection request, a pre-stored cache detection script corresponding to the item information is acquired. Wherein, the item information in the cache detection request may be parsed first, and then the item information may be filled into a preset detection script template to generate the cache detection script.
  • the above cache detection script is run, and based on the running logic of the above cache detection script, the js code of the above target project is obtained.
  • the js code related to the target project can be obtained by querying a related code database, such as GitHub.
  • a related code database such as GitHub.
  • an abstract syntax tree corresponding to the above js code is generated.
  • the abstract syntax tree (Abstract Syntax Tree, AST), or simply syntax tree (Syntax tree)
  • AST Simple syntax tree
  • syntax tree is an abstract representation of the source code syntax structure. It represents the syntax structure of the programming language in the form of a tree, and each node on the tree represents a structure in the source code.
  • an abstract syntax tree corresponding to the above js code can be generated based on a related generation tool, such as an esprima tool. Then traverse all the objects in the above abstract syntax tree, obtain the first key corresponding to each first cache data contained in the above js code through the preset first acquisition method, and store all the above first keys in the preset in the first array of .
  • the above abstract syntax tree is an array formed by multiple objects. The JavaScript statement is divided into one part, that is, the object.
  • the above-mentioned first obtaining method is the setItem() method, through which the first key corresponding to each first cached data contained in the above-mentioned js code can be obtained by the setItem() method, so that the following can be quickly used according to the first key.
  • the preset first array does not contain data. and obtaining the second keys corresponding to the second cache data in the js code that have undergone the cache clearing process by using a preset second obtaining method, and storing all the second keys in the preset second array.
  • the above-mentioned second acquisition method is the removeItem() method, which analyzes the js code of the target item based on the abstract syntax tree, can quickly identify whether all the used cache data in the js code has been cleared, and can extract the The second key corresponding to the cached data that has not been cleared in the js code, so that the cached data that has not been cleared in the js code can be quickly detected according to the second key subsequently.
  • the specified key is matched with each of the above-mentioned second keys contained in the above-mentioned second array to detect whether there is a target key that is the same as the above-mentioned designated key in the above-mentioned second array, and a corresponding matching result is obtained, wherein the above-mentioned
  • the specified key is any one of all the above-mentioned first keys contained in the above-mentioned first array, and the above-mentioned matching result includes matching success or matching failure, and the preset second array does not contain data.
  • whether the specified key and any one of the second keys included in the second array can be compared based on the parallel data comparison instruction.
  • the above-mentioned parallel data comparison instruction may specifically be a single instruction stream multiple data stream (single instruction multiple data, SIMD) instruction, by utilizing the parallel computing capability of the parallel comparison instruction to carry out the above-mentioned designated key and any one contained in the above-mentioned second array at the same time.
  • SIMD single instruction multiple data
  • the data matching processing of the second key helps to further improve the processing rate of the data matching and the generation speed of the generated data matching result. If the above matching result is a matching failure, it is determined that the designated cache data corresponding to the above designated key has not been cleared. Wherein, if the specified key exists only in the first array but not in the second array, it can be determined that the specified cache data corresponding to the above specified key has not been cleared.
  • the target cache data corresponding to the third key is acquired and displayed.
  • the matching result that the above-mentioned matching fails means that for the third key included in the first array, there is no key identical to the third key in all the second keys included in the second array.
  • step S2 before the above step S2, it includes:
  • S206 Adjust the eliminated target task request to be processed within a preset idle time period, wherein the idle time period is different from the processing time period of the cache detection request.
  • the step may further include: firstly judging whether there are other task requests to be processed other than the above cache detection request. If there are other pending task requests other than the above cache detection request, obtain the request quantity of the above other task requests.
  • the above-mentioned quantity threshold is not specifically limited, and can be set according to actual needs, for example, it can be generated according to an empirical value obtained after statistical analysis of relevant historical data. If the above-mentioned number of requests is greater than the above-mentioned quantity threshold, a specified number of target task requests are selected from the above-mentioned other task requests according to preset rules.
  • the above specified number is not specifically limited, and can be determined according to actual needs, as long as it is ensured that the specified number is not greater than the number requested by the other tasks mentioned above.
  • the above preset rules are not specifically limited.
  • the preset rules may include: based on the resource consumption of each of the above other task requests, screening out the specified number of task requests with the largest processing resource consumption from the above other task requests as The above-mentioned target task request; or the preset rule may further include: based on the processing priority of each of the above-mentioned other task requests, screening out the specified number of task requests with the lowest processing priority from the above-mentioned other task requests as the above-mentioned target task request. Then, it is determined whether there is a specific task request whose processing time cannot be adjusted in the above target task. Among them, whether the task request belongs to a specific task request whose task time cannot be adjusted can be determined based on the task attribute of the task request.
  • corresponding rules can be preset. If the task attribute of the task request satisfies the preset conditions, it is determined that it belongs to the task.
  • a specific task request whose time is not adjustable.
  • the above preset conditions may be set according to actual needs. For example, the above preset conditions may be that the service to which the task request belongs is a preset designated service, or the task request belongs to a preset designated service type. If the above-mentioned specific task request exists in the above-mentioned target task, the above-mentioned specific task is eliminated from the above-mentioned target task request, and the eliminated target task request is obtained. Finally, the deleted target task request is adjusted to a preset idle time period for processing, wherein the idle time period is different from the processing time period of the cache detection request.
  • step S203 includes:
  • S2031 sort all the other task requests in descending order of the resource consumption to obtain a corresponding first sorting result
  • the above-mentioned step of selecting a specified number of target task requests from the above-mentioned other task requests according to a preset rule may specifically include: firstly determining the resource consumption of each of the above-mentioned other task requests.
  • the above-mentioned resource consumption refers to the storage space, CPU, or traffic required to execute the task request.
  • the historical resource consumption of each of the above-mentioned other task requests can be queried by querying the resource consumption statistics corresponding to the historical task requests. Specifically, other tasks specified within a preset time period can be queried based on the resource consumption statistics.
  • the above specified other task request is any one of all the above other task requests. ask. Then, sort all the above-mentioned other task requests in descending order of the above-mentioned resource consumption to obtain a corresponding first sorting result. Then, starting from other task requests ranked first in the first sorting result, multiple first task requests that are the same as the above-specified number are sequentially acquired. Finally, all the above-mentioned first task requests are regarded as the above-mentioned target task requests.
  • the first task request with a large amount of resource consumption is extracted from all other task requests based on the amount of resource consumption as the target task request, so that the subsequent task request with a large amount of processing resource consumption will be intelligently adjusted to Different from the idle time of the current time period, the processing can prevent this part of the task request from affecting the normal processing of the current cache detection request, effectively ensure the normal processing of the above cache detection request, and improve the intelligence of the cache detection request processing.
  • step S203 includes:
  • S2034 Obtain the processing priority of each of the other task requests based on a preset task request priority table
  • S2035 Sort all the other task requests according to the order of the processing priority from low to high to obtain a corresponding second sorting result
  • the above-mentioned step of selecting a specified number of target task requests from the above-mentioned other task requests according to a preset rule includes: acquiring each of the above-mentioned other task requests based on a preset task request priority table. priority.
  • a task request priority table is pre-created, and the task request priority table records request identifiers of different task requests and processing priority serial numbers corresponding to each request identifier one-to-one. The smaller the processing priority sequence number corresponding to the request identifier is, the higher the processing priority of the task request corresponding to the request identifier is.
  • a second task request with a lower processing priority is extracted from all other task requests based on the processing priority as the target task request, so that the task request with a lower processing priority will be intelligently adjusted to be different in the future. Processing in the idle time of the current time period can prevent this part of the task request from affecting the normal processing of the current cache detection request, effectively ensure the normal processing of the above cache detection request, and improve the intelligence of the cache detection request processing.
  • step S9 it includes:
  • S902 Calculate the expiration time point corresponding to the target cache data based on the writing time and the expiration time;
  • S906 Generate corresponding expiration reminder information based on the target cache data and the difference, and display the expiration reminder information.
  • the cached data in an expired state As described in the above steps S900 to S906, if the storage time of the cached data in the local storage exceeds the specified lifetime, it cannot be accessed, that is, the cached data is in an expired state.
  • the operation of clearing cached data in an expired state may be referred to as life cycle management of cached data.
  • the writing time of the target cache data and the expiration time of the target cache data are obtained first.
  • the above write time refers to the time when the target cache data is first stored in the local storage.
  • the above expiration time refers to the lifetime of the target cached data. If the storage time of the target cached data in the local storage is longer than the expiration time, it means that the target cached data has expired, that is, it has no actual use value. Then, based on the writing time and the expiration time, the expiration time point corresponding to the target cache data is calculated. Wherein, the sum value between the writing time and the expiration time can be calculated, and the time corresponding to the sum value is the above-mentioned expiration time point.
  • the current time is obtained, and it is judged whether the above-mentioned current time exceeds the above-mentioned expiration time point. If the above-mentioned current time exceeds the above-mentioned expiration time point, the above-mentioned target cache data is cleared. And if the current time does not exceed the expiration time point, the difference between the expiration time point and the current time is calculated. Then, based on the above-mentioned target cache data and the above-mentioned difference, the corresponding expired reminder information is generated, and the above-mentioned expired reminder information is displayed. Wherein, the above-mentioned expiration reminder information includes at least the target cache data and the above-mentioned difference.
  • the target cached data after detecting the target cached data that has not been cleared, when it is determined that the target cached data is currently in an expired state, the target cached data will be cleared intelligently, so as to effectively save precious local storage resources , to avoid data problems in subsequent links or even project code errors due to the fact that expired cached data has not been cleaned up in time.
  • the target cached data if the target cached data is currently in an unexpired state, the remaining valid lifetime of the target cached data will also be calculated and the corresponding expiration reminder information will be generated, so that the relevant users can clearly understand the current status of the target cached data based on the expiration reminder information. Survival information, so that the clear processing work for the target cache data can be performed in a timely manner.
  • step S2 before the above step S2, it includes:
  • a generation process of generating the above cache detection script may also be included. Specifically, first, based on the above cache detection request, a pre-stored detection script template is obtained. Among them, for the operation processing of the cache detection request, a detection script template corresponding to the cache detection will be preset. The above detection script template can be written and generated by the developer according to the actual cache detection requirements, and the item field in the detection script template The corresponding variable parameter is the state to be filled. Then, the above-mentioned cache detection request is analyzed and processed, and the above-mentioned item information is extracted.
  • the above-mentioned detection script template is filled with the above-mentioned item information to obtain a filled-processed detection script template.
  • the above-mentioned detection script template contains detection code for performing the detection of item cache data, by first determining the information filling position corresponding to the item field in the detection template, and then filling the above-mentioned item information to the information filling position.
  • the cache detection script corresponding to the target project is generated, so that the cache detection script corresponding to the different projects is generated by filling in the project variable parameters corresponding to different projects in the detection script template.
  • the above processed detection script template is used as the above cache detection script.
  • the detection script by using the detection script to realize the automatic processing of the cache detection, the manual detection time of the developer can be effectively saved, and the processing efficiency of the cache data detection can be improved.
  • step S9 it includes:
  • S911 Obtain preset email login information, and obtain a preset email address
  • S913 Send the alarm information to the preset email address through the email server.
  • the above-mentioned third key corresponding to the above-mentioned third key is obtained and displayed based on the matching result between the second key contained in the above-mentioned first array and the second key in the above-mentioned second array being that the matching fails
  • the step of generating the target cached data it may further include a generating process of generating alarm information corresponding to the above-mentioned target cached data. Specifically, first, based on the above-mentioned target cache data, alarm information corresponding to the above-mentioned target cache data is generated.
  • the above-mentioned alarm information includes at least the above-mentioned target cache data, and the above-mentioned alarm information can be generated by filling the target cache data into a pre-created alarm information template.
  • the above-mentioned alarm information templates are written and generated by developers according to actual usage requirements. Then obtain the default email login information, and obtain the default email address.
  • the email login information is information used to log in to the email server, and the preset email address is email address information of a relevant user for receiving the alarm information. Then log in to the corresponding mail server based on the above mail login information.
  • the above-mentioned alarm information is sent to the above-mentioned preset email address through the above-mentioned mail server.
  • the email server is used to send the alarm information corresponding to the target cached data to a preset email address, so that the relevant users can timely learn the target cached data corresponding to the target item that has not been cleared, and then can follow up
  • the expired cached data in the target cached data contained in the local storage is cleaned up in a timely manner, which effectively saves local storage resources and avoids data problems or even data problems in subsequent links due to the fact that the expired cached data is not cleaned up in time.
  • the project code reports an error.
  • the method for detecting cached data in the embodiments of the present application can also be applied to the blockchain field, for example, the above-mentioned target cached data and other data are stored on the blockchain.
  • the blockchain By using the blockchain to store and manage the above-mentioned target cache data, the security and immutability of the above-mentioned target cache data can be effectively guaranteed.
  • an embodiment of the present application also provides a detection device for cached data, including:
  • the first judgment module 1 is used for judging whether an input cache detection request is received, wherein the cache detection request carries item information corresponding to the target item, and the cache detection request is used to detect the A request for cached data corresponding to the target item that has not been cleared;
  • the first acquisition module 2 is used to obtain a pre-stored cache detection script corresponding to the item information based on the cache detection request if an input cache detection request is received;
  • the second acquisition module 3 is used to run the cache detection script, and obtain the js code of the target project based on the running logic of the cache detection script;
  • the first generation module 4 is used to generate the abstract syntax tree corresponding to the js code
  • the first storage module 5 is used to traverse all the objects in the abstract syntax tree, obtain the first key corresponding to each first cached data contained in the js code through a preset first obtaining method, and store the All the first keys are stored in a preset first array; and,
  • the second storage module 6 is used for the first judgment module, and is used to obtain the second key corresponding to the second cached data in the js code that has undergone the cache clearing process through the preset second obtaining method, and store all the The second key is stored in the preset second array;
  • a processing module 7 configured to perform matching processing on the specified key with each of the second keys contained in the second array, to detect whether there is a target key identical to the specified key in the second array, A corresponding matching result is obtained, wherein the specified key is any one of all the first keys contained in the first array, and the matching result includes matching success or matching failure;
  • the determination module 8 is used to determine that the specified cache data corresponding to the specified key has not been cleared if the matching result is a matching failure;
  • the display module 9 is used for obtaining and displaying the third key corresponding to the third key based on the matching result between the second key contained in the first array and the second key in the second array that fails to match.
  • Target cache data is used for obtaining and displaying the third key corresponding to the third key based on the matching result between the second key contained in the first array and the second key in the second array that fails to match.
  • the first determination module the first acquisition module, the second acquisition module, the first generation module, the first storage module, the second storage module, the processing module, the determination module and the display
  • the implementation process corresponding to steps S1 to S9 in the above-mentioned method for detecting cached data please refer to the implementation process corresponding to steps S1 to S9 in the above-mentioned method for detecting cached data, which will not be repeated here.
  • the above-mentioned detection device for cached data includes:
  • the second judgment module is used to judge whether there are other task requests to be processed other than the cache detection request
  • a third obtaining module configured to obtain the number of requests of the other task requests if there are other task requests to be processed other than the cache detection request;
  • a third judging module configured to judge whether the requested quantity is greater than a preset quantity threshold
  • a screening module configured to screen out a specified number of target task requests from the other task requests according to preset rules if the number of requests is greater than the number threshold;
  • a fourth judging module for judging whether there is a specific task request whose processing time cannot be adjusted in the target task
  • a culling module configured to cull the specific task from the target task request if the specific task request exists in the target task, to obtain the culled target task request;
  • An adjustment module configured to adjust the eliminated target task request to a preset idle time period for processing, wherein the idle time period is different from the processing time period of the cache detection request.
  • the implementation process of the functions and functions of the second judgment module, the third acquisition module, the third judgment module, the screening module, the fourth judgment module, the elimination module and the adjustment module in the above-mentioned cached data detection device is detailed in detail. See the implementation process corresponding to steps S200 to S206 in the above-mentioned method for detecting cached data, which will not be repeated here.
  • the above-mentioned screening module includes:
  • a first determining unit configured to determine the resource consumption requested by each of the other tasks
  • a first sorting unit configured to sort all the other task requests in descending order of the resource consumption to obtain a corresponding first sorting result
  • a first obtaining unit configured to sequentially obtain a plurality of first task requests that are the same as the specified number, starting from other task requests ranked first in the first sorting result;
  • the second determining unit is configured to use all the first task requests as the target task requests.
  • the implementation process of the functions and functions of the first determination unit, the first sorting unit, the first acquisition unit, and the second determination unit in the above-mentioned cached data detection device are detailed in the corresponding cached data detection method.
  • the implementation process of steps S2030 to S2033 will not be repeated here.
  • the above-mentioned screening module includes:
  • a second obtaining unit configured to obtain the processing priority of each of the other task requests based on a preset task request priority table
  • a second sorting unit configured to sort all the other task requests according to the order of the processing priority from low to high to obtain a corresponding second sorting result
  • a third acquiring unit configured to sequentially acquire a plurality of second task requests that are the same as the specified number, starting from other task requests ranked first in the second sorting result;
  • a third determining unit configured to use the second task request as the target task request.
  • the implementation process of the functions and functions of the second acquisition unit, the second sorting unit, the third acquisition unit, and the third determination unit in the above-mentioned cached data detection device are detailed in the corresponding cached data detection method.
  • the implementation process of steps S2034 to S2037 will not be repeated here.
  • the above-mentioned detection device for cached data includes:
  • the fourth acquisition module for acquiring the write time of the target cache data
  • a fifth obtaining module used for obtaining the expiration time of the target cache data
  • a first calculation module configured to calculate the expiration time point corresponding to the target cache data based on the writing time and the expiration time
  • a fifth judgment module used to obtain the current time, and judge whether the current time exceeds the expiration time point
  • a clearing module configured to clear the target cache data if the current time exceeds the expiration time point
  • a second calculation module configured to calculate the difference between the expiration time and the current time if the current time does not exceed the expiration time
  • the second generating module is configured to generate corresponding expiration reminder information based on the target cache data and the difference, and display the expiration reminder information.
  • the functions and functions of the fourth acquisition module, the fifth acquisition module, the first calculation module, the fifth judgment module, the clearing module, the second calculation module and the second generation module in the above-mentioned cached data detection device please refer to the implementation process corresponding to steps S900 to S906 in the above-mentioned method for detecting cached data, which will not be repeated here.
  • the above-mentioned detection device for cached data includes:
  • a sixth acquisition module configured to acquire a pre-stored detection script template based on the cache detection request
  • an extraction module configured to perform parsing processing on the cache detection request, and extract the item information
  • a filling module for filling the detection script template with the project information to obtain the detection script template after filling
  • a determination module configured to use the processed detection script template as the cache detection script.
  • the above-mentioned detection device for cached data includes:
  • a third generating module configured to generate alarm information corresponding to the target cache data based on the target cache data
  • the seventh obtaining module is used to obtain the preset email login information and obtain the preset email address;
  • a login module configured to log in to the corresponding mail server based on the email login information
  • a sending module configured to send the alarm information to the preset mail address through the mail server.
  • the implementation process of the functions and functions of the third generation module, the seventh acquisition module, the login module and the sending module in the above-mentioned cached data detection device can be found in the corresponding steps S910 to S913 in the above-mentioned cached data detection method for details. The implementation process is not repeated here.
  • an embodiment of the present application further provides a computer device.
  • the computer device may be a server, and its internal structure may be as shown in FIG. 3 .
  • the computer equipment includes a processor, memory, a network interface, a display screen, an input device and a database connected by a system bus.
  • the processor of the computer equipment is designed to provide computing and control capabilities.
  • the memory of the computer device includes a storage medium and an internal memory.
  • the storage medium stores an operating system, a computer program and a database.
  • the internal memory provides an environment for the operation of the operating system and computer programs in the storage medium.
  • the database of the computer device is used for storing data such as cache detection script, abstract syntax tree, first key, second key, first array, second array and target cache data.
  • the network interface of the computer device is used to communicate with an external terminal through a network connection.
  • the display screen of the computer equipment is an indispensable graphic and text output device in the computer, which is used to convert digital signals into optical signals, so that text and graphics can be displayed on the screen of the display screen.
  • the input device of the computer equipment is the main device for information exchange between the computer and the user or other devices, and is used to transmit data, instructions and certain flag information to the computer. When the computer program is executed by the processor, a method for detecting cached data is implemented.
  • the above-mentioned processor executes the steps of the above-mentioned method for detecting cached data:
  • the specified key is any one of all the first keys contained in the first array, and the matching result includes matching success or matching failure;
  • the matching result is a matching failure, it is determined that the specified cache data corresponding to the specified key has not been cleared;
  • the target cache data corresponding to the third key is acquired and displayed.
  • FIG. 3 is only a block diagram of a partial structure related to the solution of the present application, and does not constitute a limitation on the apparatus or computer equipment to which the solution of the present application is applied.
  • An embodiment of the present application further provides a computer-readable storage medium, the computer-readable storage medium may be non-volatile or volatile, and a computer program is stored thereon, and the computer program is implemented when executed by a processor
  • the method for detecting cached data shown in any of the above exemplary embodiments, the method for detecting cached data includes the following steps:
  • the specified key is any one of all the first keys contained in the first array, and the matching result includes matching success or matching failure;
  • the matching result is a matching failure, it is determined that the specified cache data corresponding to the specified key has not been cleared;
  • the target cache data corresponding to the third key is acquired and displayed.
  • any reference to memory, storage, database or other medium provided in this application and used in the embodiments may include non-volatile and/or volatile memory.
  • Nonvolatile memory may include read only memory (ROM), programmable ROM (PROM), electrically programmable ROM (EPROM), electrically erasable programmable ROM (EEPROM), or flash memory.
  • Volatile memory may include random access memory (RAM) or external cache memory.
  • RAM is available in various forms such as static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double-rate SDRAM (SSRSDRAM), enhanced SDRAM (ESDRAM), synchronous Link (Synchlink) DRAM (SLDRAM), memory bus (Rambus) direct RAM (RDRAM), direct memory bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM), etc.

Abstract

La présente demande se rapporte au domaine technique du traitement de données et concerne un procédé et un appareil de détection de données de mémoire cache, un dispositif informatique et un support de stockage. Le procédé consiste : lorsqu'une demande de détection de mémoire cache d'entrée est reçue, à acquérir un script de détection de mémoire cache correspondant à des informations d'élément ; à exécuter le script de détection de mémoire cache et à acquérir un code js d'un élément cible ; à générer un arbre de syntaxe abstraite correspondant au code js ; à parcourir tous les objets dans l'arbre de syntaxe abstraite et à acquérir une première clé de chaque premières données de mémoire cache comprises dans le code js ; à acquérir une deuxième clé de secondes données de mémoire cache soumises à un effacement de mémoire cache ; et sur la base d'une troisième clé qui est comprise dans un premier réseau et ne correspond pas à la deuxième clé, à acquérir et à afficher des données de cache cibles correspondant à la troisième clé. Au moyen de la présente demande, des données de mémoire cache cibles dans une mémoire cache locale qui n'est pas effacée peuvent être rapidement détectées. La présente demande peut également être appliquée au domaine des chaînes de blocs. Des données telles que les données de mémoire cache cibles peuvent être stockées sur une chaîne de blocs.
PCT/CN2021/091713 2020-12-15 2021-04-30 Procédé et appareil de détection de données de mémoire cache, dispositif informatique et support de stockage WO2022126984A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN202011479824.3 2020-12-15
CN202011479824.3A CN112540811B (zh) 2020-12-15 2020-12-15 缓存数据的检测方法、装置、计算机设备和存储介质

Publications (1)

Publication Number Publication Date
WO2022126984A1 true WO2022126984A1 (fr) 2022-06-23

Family

ID=75018808

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2021/091713 WO2022126984A1 (fr) 2020-12-15 2021-04-30 Procédé et appareil de détection de données de mémoire cache, dispositif informatique et support de stockage

Country Status (2)

Country Link
CN (1) CN112540811B (fr)
WO (1) WO2022126984A1 (fr)

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115599711A (zh) * 2022-11-30 2023-01-13 苏州浪潮智能科技有限公司(Cn) 缓存数据处理方法、系统、装置、设备及计算机存储介质
CN116016261A (zh) * 2022-12-26 2023-04-25 广州市保伦电子有限公司 一种系统运维方法、装置及设备
CN116112561A (zh) * 2023-02-14 2023-05-12 江西数字网联信息安全技术有限公司 基于web浏览器缓存的3d车联网可视化管理方法及系统
CN117390072A (zh) * 2023-12-07 2024-01-12 深圳市云希谷科技有限公司 一种嵌入式系统中提高网络请求速度的方法
CN116016261B (zh) * 2022-12-26 2024-05-14 广东保伦电子股份有限公司 一种系统运维方法、装置及设备

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112540811B (zh) * 2020-12-15 2022-03-18 平安科技(深圳)有限公司 缓存数据的检测方法、装置、计算机设备和存储介质
CN113626483B (zh) * 2021-08-18 2022-04-26 重庆允成互联网科技有限公司 一种填写表单的前端缓存方法、系统、设备及存储介质
CN113923002B (zh) * 2021-09-29 2024-04-19 山石网科通信技术股份有限公司 计算机网络入侵防御方法、装置、存储介质及处理器

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN104615596A (zh) * 2013-11-04 2015-05-13 腾讯科技(深圳)有限公司 历史记录信息的清除方法及浏览器
US9531829B1 (en) * 2013-11-01 2016-12-27 Instart Logic, Inc. Smart hierarchical cache using HTML5 storage APIs
CN106383748A (zh) * 2016-09-05 2017-02-08 Tcl集团股份有限公司 一种基于云服务的存储空间清理方法及系统
CN110688307A (zh) * 2019-09-09 2020-01-14 平安普惠企业管理有限公司 JavaScript代码检测方法、装置、设备和存储介质
CN111897813A (zh) * 2020-07-08 2020-11-06 苏宁金融科技(南京)有限公司 针对数据库资源的流控方法及装置
CN112540811A (zh) * 2020-12-15 2021-03-23 平安科技(深圳)有限公司 缓存数据的检测方法、装置、计算机设备和存储介质

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014110281A1 (fr) * 2013-01-11 2014-07-17 Db Networks, Inc. Systèmes et procédés permettant de détecter et d'atténuer des menaces contre un système de stockage de données structuré
CN107168872B (zh) * 2017-05-11 2020-09-11 网易(杭州)网络有限公司 代码检查的方法、装置、存储介质和处理器
CN108647156A (zh) * 2018-04-10 2018-10-12 平安科技(深圳)有限公司 缓存清理方法、装置、计算机装置及存储介质
CN111176754B (zh) * 2019-12-25 2023-11-10 北京蓝亚盒子科技有限公司 Html5应用运行方法、装置、运行器及计算机可读存储介质
CN111752975A (zh) * 2020-05-28 2020-10-09 中国平安财产保险股份有限公司 基于Redis的数据加载方法、装置、计算机设备和存储介质
CN111563216B (zh) * 2020-07-16 2020-11-06 平安国际智慧城市科技股份有限公司 本地数据缓存方法、装置及相关设备
CN112035496A (zh) * 2020-08-28 2020-12-04 平安科技(深圳)有限公司 一种数据处理方法、相关设备及计算机可读存储介质

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9531829B1 (en) * 2013-11-01 2016-12-27 Instart Logic, Inc. Smart hierarchical cache using HTML5 storage APIs
CN104615596A (zh) * 2013-11-04 2015-05-13 腾讯科技(深圳)有限公司 历史记录信息的清除方法及浏览器
CN106383748A (zh) * 2016-09-05 2017-02-08 Tcl集团股份有限公司 一种基于云服务的存储空间清理方法及系统
CN110688307A (zh) * 2019-09-09 2020-01-14 平安普惠企业管理有限公司 JavaScript代码检测方法、装置、设备和存储介质
CN111897813A (zh) * 2020-07-08 2020-11-06 苏宁金融科技(南京)有限公司 针对数据库资源的流控方法及装置
CN112540811A (zh) * 2020-12-15 2021-03-23 平安科技(深圳)有限公司 缓存数据的检测方法、装置、计算机设备和存储介质

Cited By (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115599711A (zh) * 2022-11-30 2023-01-13 苏州浪潮智能科技有限公司(Cn) 缓存数据处理方法、系统、装置、设备及计算机存储介质
CN115599711B (zh) * 2022-11-30 2023-03-10 苏州浪潮智能科技有限公司 缓存数据处理方法、系统、装置、设备及计算机存储介质
CN116016261A (zh) * 2022-12-26 2023-04-25 广州市保伦电子有限公司 一种系统运维方法、装置及设备
CN116016261B (zh) * 2022-12-26 2024-05-14 广东保伦电子股份有限公司 一种系统运维方法、装置及设备
CN116112561A (zh) * 2023-02-14 2023-05-12 江西数字网联信息安全技术有限公司 基于web浏览器缓存的3d车联网可视化管理方法及系统
CN116112561B (zh) * 2023-02-14 2024-02-09 江西数字网联信息安全技术有限公司 基于web浏览器缓存的3d车联网可视化管理方法及系统
CN117390072A (zh) * 2023-12-07 2024-01-12 深圳市云希谷科技有限公司 一种嵌入式系统中提高网络请求速度的方法
CN117390072B (zh) * 2023-12-07 2024-03-26 深圳市云希谷科技有限公司 一种嵌入式系统中提高网络请求速度的方法

Also Published As

Publication number Publication date
CN112540811A (zh) 2021-03-23
CN112540811B (zh) 2022-03-18

Similar Documents

Publication Publication Date Title
WO2022126984A1 (fr) Procédé et appareil de détection de données de mémoire cache, dispositif informatique et support de stockage
US11238069B2 (en) Transforming a data stream into structured data
CN108984155B (zh) 数据处理流程设定方法和装置
CN111026779B (zh) 一种基于Flink SQL的数据处理方法、装置、存储介质
CN106293891B (zh) 多维投资指标监督方法
CN110704290A (zh) 日志分析方法及装置
US9930113B2 (en) Data retrieval via a telecommunication network
WO2022053163A1 (fr) Détection d'anomalie de trace distribuée avec apprentissage profond à base d'auto-attention
CN114385763A (zh) 数据血缘分析方法、装置、系统及可读存储介质
US11182386B2 (en) Offloading statistics collection
CN107330031B (zh) 一种数据存储的方法、装置及电子设备
CN112613176A (zh) 慢sql语句预测方法及系统
CN113190237B (zh) 数据处理方法、系统和装置
CN115658635A (zh) 日志分析方法及装置
CN111767288B (zh) 一种项目申报数据处理方法及装置
US20140136274A1 (en) Providing multiple level process intelligence and the ability to transition between levels
US20210360005A1 (en) Inferring watchpoints for understandable taint reports
CN112435151A (zh) 一种基于关联分析的政务信息数据处理方法及系统
EP2990960A1 (fr) Extraction de données par l'intermédiaire d'un réseau de télécommunication
CN114157515B (zh) 一种基于响应式的网络流量高速分析方法及系统
US11327938B2 (en) Method to improve prediction accuracy of business data with enhanced data filtering and data reduction mechanism
US11822459B2 (en) Automated function category detection
CN117971908A (zh) 数据实时入湖方法、装置、电子设备及存储介质
CN116955406A (zh) Sql语句生成方法、装置、电子设备及存储介质
US9600505B2 (en) Code optimization based on customer logs

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 21904923

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 21904923

Country of ref document: EP

Kind code of ref document: A1