HK40085243A - Data processing method, device, computer readable medium and electronic equipment - Google Patents
Data processing method, device, computer readable medium and electronic equipment Download PDFInfo
- Publication number
- HK40085243A HK40085243A HK42023073773.6A HK42023073773A HK40085243A HK 40085243 A HK40085243 A HK 40085243A HK 42023073773 A HK42023073773 A HK 42023073773A HK 40085243 A HK40085243 A HK 40085243A
- Authority
- HK
- Hong Kong
- Prior art keywords
- information extraction
- link
- application program
- extraction link
- information
- Prior art date
Links
Description
Technical Field
The present invention relates to the field of software development technologies, and in particular, to a data processing method, a data processing device, a computer readable medium, and an electronic device.
Background
At present, problems or loopholes can be inevitably caused by application programs on various terminal devices, so that not only can the use experience of a user be influenced, but also threat can be caused to information security, and therefore, the problems caused when the user uses the application programs need to be timely checked. At present, the general scheme for checking the problems of the application program is that the application program directly reports the log, so that the user log can be fished, and then a developer analyzes the log and locates the problems. However, whether the user problem can be finally located depends on whether the developer has actively added the log code of the print-related information in the application. If the log printed information is not full in some scenes, the problem of the user is difficult or even impossible to locate.
Disclosure of Invention
The embodiment of the application provides a data processing method, a data processing device, a computer readable medium and electronic equipment, and further can improve the accuracy, flexibility and efficiency of acquiring information in an application program at least to a certain extent.
Other features and advantages of the present application will be apparent from the following detailed description, or may be learned in part by the practice of the application.
According to an aspect of an embodiment of the present application, there is provided a data processing method, including: acquiring an information extraction link through a session entry in an application program, wherein the information extraction link is from the opposite end which establishes session connection with a terminal where the application program is located; responding to the received analysis operation instruction, analyzing the information extraction link in the application program to extract an information extraction instruction in the information extraction link; executing the information extraction instruction in the application program to generate an information extraction result; and reporting the information extraction result through the session entry in the application program.
According to an aspect of embodiments of the present application, there is provided a data processing apparatus, the apparatus comprising: the information extraction link is from the opposite end which establishes session connection with the terminal where the application program is located; the analysis unit is used for responding to the received analysis operation instruction, analyzing the information extraction link in the application program so as to extract the information extraction instruction in the information extraction link; the result generating unit is used for executing the information extraction instruction in the application program and generating an information extraction result; and the reporting unit is used for reporting the information extraction result through the session entry in the application program.
In some embodiments of the present application, based on the foregoing scheme, the information extraction link is generated by encrypting according to an asymmetric encryption algorithm, and the parsing unit is configured to: decrypting the information extraction link through the application program to obtain a decryption result; and extracting the information extraction instruction in the information extraction link from the decryption result.
In some embodiments of the present application, based on the foregoing solution, before decrypting the information extraction link by the application program, the parsing unit is further configured to: and carrying out validity verification on the information extraction link, wherein in the case that the information extraction link passes the validity verification, the step of decrypting the information extraction link through the application program is executed.
In some embodiments of the present application, based on the foregoing solution, the parsing unit is configured to: judging whether the information extraction link contains preset mark information or not; and determining that the information extraction link is legal according to the preset mark information contained in the information extraction link.
In some embodiments of the present application, based on the foregoing solution, the parsing unit is further configured to: judging whether the receiving time of the analysis operation instruction is within a legal period corresponding to the information extraction link; and determining that the information extraction link is legal according to the fact that the receiving time of the analysis operation instruction is within the legal period corresponding to the information extraction link.
In some embodiments of the present application, based on the foregoing solution, before extracting the information extraction instruction in the information extraction link from the decryption result, the parsing unit is further configured to: extracting the identification information in the information extraction link from the decryption result, wherein the identification information comprises at least one of the following: object identification of the application and version number of the application; and carrying out identity verification according to the identity information, wherein under the condition that the identity information passes the identity verification, the step of extracting the information extraction instruction in the information extraction link from the decryption result is carried out.
In some embodiments of the present application, based on the foregoing solution, the parsing unit is configured to: responding to the received analysis operation instruction, displaying a popup window in the application program, and inquiring whether the object allows information extraction or not through the popup window; and according to the received instruction for allowing information extraction, analyzing the information extraction link in the application program.
In some embodiments of the present application, the information extraction link is generated by script based on the foregoing scheme.
According to an aspect of the embodiments of the present application, there is provided a computer readable medium having stored thereon a computer program which, when executed by a processor, implements a data processing method as described in the above embodiments.
According to an aspect of an embodiment of the present application, there is provided an electronic device including: one or more processors; and a storage means for storing one or more programs which, when executed by the one or more processors, cause the one or more processors to implement the data processing method as described in the above embodiments.
According to an aspect of embodiments of the present application, there is provided a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer-readable storage medium, and the processor executes the computer instructions so that the computer device performs the data processing method as described in the above embodiments.
In the technical solutions provided in some embodiments of the present application, after determining the type of information to be extracted, only a corresponding information extraction link needs to be provided to an application program, the application program may respond according to an parsing operation, and automatically extract an information collection instruction from the information extraction link, and may also complete information extraction by executing the information extraction instruction, and finally may report an information extraction result through the application program. Therefore, the information required in the application program can be quickly acquired according to the problems reflected by the user, the accuracy, flexibility and efficiency of acquiring the information are improved, and the efficiency and accuracy of positioning the problems in the application program can be further improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the application.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the application and together with the description, serve to explain the principles of the application. It is apparent that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained from these drawings without inventive effort for a person of ordinary skill in the art. In the drawings:
FIG. 1 shows a schematic diagram of an exemplary system architecture to which the technical solutions of embodiments of the present application may be applied;
FIG. 2 illustrates a flow chart of a data processing method according to one embodiment of the present application;
FIG. 3 illustrates a flow chart for parsing an information extraction link in an application according to one embodiment of the present application;
FIG. 4 illustrates a flow chart for verifying the validity of an information extraction link according to one embodiment of the present application;
FIG. 5 illustrates a flow chart for verifying the validity of an information extraction link according to another embodiment of the present application;
FIG. 6 illustrates a flow chart of parsing information extraction links in an application in response to parsing operation instructions according to one embodiment of the present application;
FIG. 7 illustrates a schematic diagram of acquiring information extraction links through a session portal in an application according to one embodiment of the present application;
FIG. 8 illustrates a schematic diagram of displaying a popup in an application in accordance with one embodiment of the present application;
FIG. 9 illustrates a schematic diagram of reporting information extraction results through a session portal in an application according to one embodiment of the present application;
FIG. 10 illustrates an overall flow diagram of a data processing method according to one embodiment of the present application;
FIG. 11 illustrates a block diagram of a data processing apparatus according to one embodiment of the present application;
fig. 12 shows a schematic diagram of a computer system suitable for use in implementing the electronic device of the embodiments of the present application.
Detailed Description
Example embodiments will now be described more fully with reference to the accompanying drawings. However, the exemplary embodiments may be embodied in many forms and should not be construed as limited to the examples set forth herein; rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the concept of the example embodiments to those skilled in the art.
Furthermore, the described features, structures, or characteristics may be combined in any suitable manner in one or more embodiments. In the following description, numerous specific details are provided to give a thorough understanding of embodiments of the present application. One skilled in the relevant art will recognize, however, that the aspects of the application can be practiced without one or more of the specific details, or with other methods, components, devices, steps, etc. In other instances, well-known methods, devices, implementations, or operations are not shown or described in detail to avoid obscuring aspects of the application.
The block diagrams depicted in the figures are merely functional entities and do not necessarily correspond to physically separate entities. That is, the functional entities may be implemented in software, or in one or more hardware modules or integrated circuits, or in different networks and/or processor devices and/or microcontroller devices.
The flow diagrams depicted in the figures are exemplary only, and do not necessarily include all of the elements and operations/steps, nor must they be performed in the order described. For example, some operations/steps may be decomposed, and some operations/steps may be combined or partially combined, so that the order of actual execution may be changed according to actual situations.
At present, even after an application program is on line and delivered to a user for use, there is inevitably a certain problem or Bug.
In the related art, information generated in the use process of an application program is mainly acquired in a log mode, the information is reported to a developer, and problems of the application program are analyzed according to the information. Therefore, it is necessary to set a log code for printing the related information in advance in the application program. Once the log code in the application program is irrelevant to the position where the problem occurs, that is, the position where the problem occurs cannot be located according to the information acquired by the existing log code in the application program, the problem is difficult to locate, or even cannot be located.
Therefore, the embodiment of the application firstly provides a data processing method, which can overcome the defects of the scheme at least to a certain extent and can accurately and efficiently acquire various information about the application program.
Fig. 1 shows a schematic diagram of an exemplary system architecture to which the technical solutions of the embodiments of the present application may be applied. As shown in fig. 1, the system architecture may include a first terminal 101, a network 102, a server 103, and a second terminal 104, where the first terminal 101 and the second terminal 104 may each communicate with the server 103 through the network 102. The first terminal 101 and the second terminal 104 are both deployed with application programs, which exist in the form of clients, and the server 103 is provided with a server of the application programs, so that the first terminal 101 and the second terminal 104 can establish communication connection via the network 102 and the server 103; the application program of the first terminal 101 and the application program of the second terminal 104 may be the same version of the application program or different versions of the application program. The process of implementing data processing using the system architecture shown in fig. 1 is as follows: first, a developer generates an information extraction link through a script on the first terminal 101, the script being written according to the type of the extracted information; next, the developer inputs the information extraction link in the application program of the first terminal 101, and transmits the information extraction link to the application program of the second terminal 104 via the network 102 and the server 103 through the application program; then, after the user of the second terminal 104 clicks the information extraction link in the application program, the application program may parse the information extraction link and extract an information extraction instruction contained therein; finally, the application program of the second terminal 104 may execute the information extraction instruction, extract the corresponding information from the application program, and report the information as the information extraction result to the application program of the first terminal 101 through the network 102 and the server 103, so that the developer may obtain the information obtained by the application program of the second terminal 104.
In some embodiments of the present application, the information extraction link acquired by the application program of the second terminal 104 is obtained through encryption, and the application program of the second terminal 104 needs to perform decryption processing when parsing the information extraction link.
In some embodiments of the present application, after the acquired information extraction link, the application program of the second terminal 104 further performs a validity check on the information extraction link, and only if the validity check is passed, performs the information extraction operation.
In some embodiments of the present application, after the user of the second terminal 104 clicks the information extraction link in the application program, the application program of the second terminal 104 further displays a popup window, where the popup window is used to receive an instruction whether to allow information extraction; after the application program of the second terminal 104 receives the instruction for allowing information extraction through the pop-up window, the application program of the second terminal 104 performs information extraction based on the information extraction link.
It should be understood that the number of terminals, networks and servers in fig. 1 is merely illustrative. There may be any number of terminals, networks, and servers, as desired for implementation. For example, the server 103 may be a server cluster formed by a plurality of servers.
It should be noted that fig. 1 illustrates only one embodiment of the present application. Although in the scheme of the embodiment of fig. 1, the terminal that generates the information extraction link and the terminal that sends the information extraction link are the same terminal, in other embodiments of the present application, the two may be different terminals, for example, the information extraction link may be generated by one terminal first and then sent to the first terminal 101; although in the solution of the embodiment of fig. 1, the first terminal 101 that sends the information extraction link and the second terminal 104 that receives the information extraction link are the same type of terminal, i.e. are both smartphones, in other embodiments of the present application, they may be different types of terminals, such as the first terminal 101 may also be a desktop computer; although in the solution of the embodiment of fig. 1, only the information extraction link is finally sent to the application program of one terminal, in other embodiments of the present application, the information extraction link may also be sent to the application programs of multiple terminals at the same time, so as to implement information extraction for multiple application programs. The embodiments of the present application should not be limited in any way, nor should the scope of protection of the present application be limited in any way.
It is easy to understand that the data processing method provided in the embodiments of the present application is generally executed by the terminal device, and accordingly, the data processing apparatus is generally disposed in the terminal device. However, in other embodiments of the present application, the server may also have a similar function as the terminal device, so as to execute the data processing scheme provided in the embodiments of the present application.
Therefore, the embodiment of the application can be applied to a terminal or a server. The server may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing cloud services, cloud databases, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, CDNs, basic cloud computing services such as big data and artificial intelligent platforms. The terminal may be, but is not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, a smart speaker, a smart watch, etc. The terminal and the server may be directly or indirectly connected through wired or wireless communication, which is not limited herein.
In some embodiments of the present application, the information extracted for an application is stored and managed in a blockchain.
Blockchains are novel application modes of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanisms, encryption algorithms, and the like. The Blockchain (Blockchain), which is essentially a decentralised database, is a string of data blocks that are generated by cryptographic means in association, each data block containing a batch of information of network transactions for verifying the validity of the information (anti-counterfeiting) and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer.
The blockchain underlying platform may include processing modules for user management, basic services, smart contracts, operation monitoring, and the like. The user management module is responsible for identity information management of all blockchain participants, including maintenance of public and private key generation (account management), key management, maintenance of corresponding relation between the real identity of the user and the blockchain address (authority management) and the like, and under the condition of authorization, supervision and audit of transaction conditions of certain real identities, and provision of rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain node devices, is used for verifying the validity of a service request, recording the service request on a storage after the effective request is identified, for a new service request, the basic service firstly analyzes interface adaptation and authenticates the interface adaptation, encrypts service information (identification management) through an identification algorithm, and transmits the encrypted service information to a shared account book (network communication) in a complete and consistent manner, and records and stores the service information; the intelligent contract module is responsible for registering and issuing contracts, triggering contracts and executing contracts, a developer can define contract logic through a certain programming language, issue the contract logic to a blockchain (contract registering), invoke keys or other event triggering execution according to the logic of contract clauses to complete the contract logic, and simultaneously provide a function of registering contract upgrading; the operation monitoring module is mainly responsible for deployment in the product release process, modification of configuration, contract setting, cloud adaptation and visual output of real-time states in product operation, for example: alarms, monitoring network conditions, monitoring node device health status, etc.
The platform product service layer provides basic capabilities and implementation frameworks of typical applications, and developers can complete the blockchain implementation of business logic based on the basic capabilities and the characteristics of the superposition business. The application service layer provides the application service based on the block chain scheme to the business participants for use.
The implementation details of the technical solutions of the embodiments of the present application are described in detail below:
fig. 2 shows a flow chart of a data processing method according to an embodiment of the present application, which may be performed by any terminal or device capable of deploying an application, which may be logically performed by the application itself, i.e. the corresponding functional modules may be embedded in the application to perform the data processing method. Referring to fig. 2, the data processing method at least includes the following steps:
in step 210, a link is extracted by retrieving information through a session portal in the application.
The information extraction link comes from the opposite end that established a session connection with the terminal where the application is located.
The application program herein may be various programs that require information extraction, may have a user interaction interface, and may be various types of software. For example, the system can be instant messaging software such as WeChat, enterprise WeChat, QQ and the like, shopping software, video software and the like. Corresponding application programs are deployed on the opposite ends of the session connection established with the terminal where the application programs are located. For example, the application program is an enterprise WeChat App, the enterprise WeChat App is also installed on the opposite end, and a friend relationship or a group chat relationship is established between accounts registered by the enterprise WeChat App on the two terminals, so that an information extraction link can be obtained by a conversation way through a conversation entrance, that is, the information extraction link can be obtained by a conversation chat way.
Specifically, a developer can send an information extraction link to a WeChat App on a user smart phone through a chat frame in the WeChat App on the smart phone, so that the WeChat App on the user smart phone can be used as an application program needing to extract information to obtain the information extraction link. Of course, since the application program similar to the WeChat is multi-terminal converged, for example, the WeChat has a PC terminal, the information extraction link can also be sent to the application program needing to extract information by the application program on the personal computer.
In one embodiment of the present application, the information extraction links are generated by script.
For example, a developer may first use a personal computer to run a script, and then generate an information extraction link, then send the information extraction link to the smart phone of the developer by means of mail, and finally send the information extraction link to the application program of the user with a problem in program running through the application program (such as WeChat) on the smart phone of the developer. In addition, as described above, since the application program such as the WeChat has the PC side, for such application program, after the information extraction link is generated by the personal computer running script, the developer can directly copy the information extraction link to the application program on the personal computer and directly transmit to the application program of the user through the application program.
In one embodiment of the present application, the information extraction link is generated by other applications that are capable of communicating with the application.
For example, a functional module capable of generating an information extraction link can be embedded in a WeChat App of a developer, and when information extraction needs to be performed on WeChat Apps used by other users, the WeChat App of the developer can generate the information extraction link and send the information extraction link to the WeChat Apps used by the users.
In step 220, the information extraction link is parsed in the application in response to the received parsing operation instruction to extract information extraction instructions in the information extraction link.
For example, the application program obtains the information extraction link through the session entry, and after the user of the application program clicks the information extraction link in the interface of the session entry, the application program can receive the analysis operation instruction.
FIG. 3 illustrates a flow chart for parsing an information extraction link in an application according to one embodiment of the present application. In the embodiment of fig. 3, the information extraction links are cryptographically generated according to an asymmetric encryption algorithm. Referring to fig. 3, the process of parsing the information extraction link in the application program may include the steps of:
In step 310, the information extraction link is decrypted by the application to obtain a decrypted result.
Since the information extraction link is generated by encryption, decryption is required to obtain the effective information in the information extraction link when the information extraction link is parsed.
The asymmetric encryption algorithm may, for example, be an RSA encryption algorithm, which is established based on an RSA public key cryptosystem, which is a cryptosystem that uses different encryption keys and decryption keys, and "deriving the decryption key from the known encryption key is computationally infeasible".
In the case where the information extraction link is generated by an asymmetric encryption algorithm, the generation process thereof requires encryption using an RSA public key, and the application program requires decryption of the information extraction link using an RSA private key.
Although in the embodiments of the present application, the information extraction link is generated by an asymmetric encryption algorithm, in other embodiments, the information extraction link may also be generated by other encryption algorithms.
In step 320, information extraction instructions in the information extraction link are extracted from the decryption result.
The decryption result contains the effective information in the information extraction link, and thus the information extraction instruction can be acquired from the decryption result.
In the embodiment of the application, the information extraction link is generated by adopting the asymmetric encryption algorithm with higher security, so that the transmission security of the information extraction link is ensured, and the risks of tool leakage and malicious cracking are reduced.
As described above, the information extraction link may be generated by another application program capable of communicating with the application program, or may be generated by a script. The encryption process for encrypting by using the asymmetric encryption algorithm when the information extraction link is generated may be implemented by other application programs or by script.
In one embodiment of the present application, before decrypting the information extraction link by the application, the method further includes, before obtaining the decryption result: and verifying the validity of the information extraction link, wherein in the case that the information extraction link passes the validity verification, the step of decrypting the information extraction link by the application program is performed.
The information extraction link not only can include information extraction instructions, but also can include other information; the validity check of the information extraction link may be performed in a variety of ways, as will be described in detail below.
In the embodiment of the application, the information extraction link is subjected to the validity check before the information is extracted according to the information extraction link, and the information extraction is performed only under the condition that the information extraction link passes the validity check, so that the safety of the information extraction is ensured.
In one embodiment of the present application, the method further comprises: and under the condition that the information extraction link fails to pass the validity check, carrying out error reporting reminding in the application program.
FIG. 4 illustrates a flow chart for verifying the validity of an information extraction link according to one embodiment of the present application. As shown in fig. 4, the method comprises the following steps:
in step 410, it is determined whether the information extraction link includes preset flag information.
The preset mark information can be set arbitrarily according to the project needs. The information extraction link may include an encrypted portion and an unencrypted portion, where the unencrypted portion may be preset tag information, and the encrypted portion may be obtained by encrypting by an asymmetric encryption algorithm.
For example, in the application scenario of enterprise WeChat, the preset mark information may be wxdiag, which is set by a URL schema mechanism, and through which a specific function of an application program may be accessed.
In step 420, the information extraction link is determined to be legal according to the preset flag information contained in the information extraction link.
Legal information extraction links contain preset mark information. In the embodiment of the application, the possibility of misoperation of information extraction is greatly reduced by checking the preset mark information before the information extraction.
Fig. 5 illustrates a flow chart for verifying the validity of an information extraction link according to another embodiment of the present application. As shown in fig. 5, the validity check of the information extraction link may further include the steps of:
in step 510, it is determined whether the receiving time of the parsing operation instruction is within a legal period corresponding to the information extraction link.
Specifically, a corresponding legal term may be set for each information extraction link, and the legal terms corresponding to each information extraction link may be the same or different.
For example, the legal period corresponding to all the information extraction links may be set to be 2021, 1, or the whole day, i.e., information extraction may be performed in a concentrated manner on this day. When the information extraction link is obtained from other application programs of the same type, the legal period corresponding to the information extraction link can be set according to the time when the information extraction link is sent by other application programs. For example, when a developer sends an information extraction link to an enterprise WeChat App (used by a general user) requiring information extraction by using the enterprise WeChat App, the server may acquire the sending time of the information extraction link, and the corresponding legal period of the information extraction link may be one hour after the sending time, and the receiving time of the analysis operation instruction may be compared with the sending time of the information extraction link in the server or the enterprise WeChat App requiring information extraction, and if the receiving time of the analysis operation instruction is more than one hour from the sending time of the information extraction link, it may be determined that the receiving time of the analysis operation instruction is not within the corresponding legal period of the information extraction link.
In step 520, the information extraction link is determined to be legal according to the fact that the receiving time of the parsing operation instruction is within the legal period corresponding to the information extraction link.
In the embodiment of the application, each information extraction link has a corresponding legal period, and only if the information extraction link is within the legal period, information extraction can be performed according to the information extraction link, so that the abuse of the information extraction function is avoided, the risk of information leakage is reduced, and the safety of information extraction is improved.
In one embodiment of the present application, before extracting the information extraction instruction in the information extraction link from the decryption result, the method further includes: extracting the identification information in the information extraction link from the decryption result, wherein the identification information comprises at least one of the following: object identification of the application and version number of the application; and carrying out identity verification according to the identity information, wherein under the condition that the identity information passes the identity verification, the step of extracting the information extraction instruction in the information extraction link from the decryption result is carried out.
The object identification may be a user identification. The identity information in the information extraction link can be compared with the identity information corresponding to the application program to judge that the identity information in the information extraction link passes identity verification, and the identity information corresponding to the application program can be obtained from the local of the equipment where the application program is located or can be obtained from a server.
In the embodiment of the application, the identity information is checked before the information extraction instruction is extracted and the information is extracted, so that the information extraction is allowed only when the identity information passes the identity check, and only the appointed user and the appointed version of the application program can use the information extraction link to extract the information, thereby limiting the application range of the information extraction link, avoiding the misuse of the information extraction link to a great extent and further improving the safety of the information extraction.
In one embodiment of the present application, the method further comprises: and under the condition that the identity information does not pass the identity verification, carrying out error reporting reminding in the application program.
The constitution of the information extraction link will be described in detail below.
As described above, the information extraction link is an encrypted link, which may be generated by a shell script, for example, by writing a file named diagutel.sh, which is a script file for generating the information extraction link, and the unencrypted information extraction link generated by the script may be "diagutel.sh [ action ] [ vid ] [ App version number ] [ optional parameter ]", where the action, vid, app version number, and optional parameters are all provided parameters, and the diagutel.sh generates the information extraction link according to these parameters. The content generated by the diagutil.sh according to the parameter of the action is an information extraction instruction, the vid is an object identifier, the user vid which can use the information extraction link is specified, the App version number is the version number of the application program, and the version number can be set to be three-section version numbers, such as 2.1.3; the optional parameters are parameters that part of the command supports delivery.
The diaguteil.sh can generate an encrypted link according to one or more actions in the action list, and the functions of each action in the action list and the way of generating the encrypted link corresponding to each action through the diaguteil.sh script file are as follows:
1. kvs systemconfig: and reading a kv (key-value pair) configuration value issued to the terminal by the background.
Encrypted link generation example: diagnuteil.sh KVSystemConfig 1688851823364405 3.0.40 xxxxx.
2. PBSystemConfig: a certain field in the pb (Protocol Buffers) protocol issued in the background is read.
Encrypted link generation example: diagnuteil.sh PBSystemConfig 1688851823364405 3.0.40 xxxxx.
3. DBExe: an sql statement is executed.
Encrypted link generation example: diagnuteil.sh DBExe 1688851823364405 3.0.40 select count (x) from MESSAGE I info.db.
4. CopyAndSendDB: the specified database is copied and sent.
Encrypted link generation example: diagnuteil.sh copyAndSendDB 1688851823364405 3.0.40 Message/info.db.
5. SendLog: and sending the log.
Encrypted link generation example: diagnuteil.sh SendLog 1688851823364405 3.0.40.
6. Native debug: and executing the shell script.
Encrypted link generation example:
diagutil.sh NativeDebug 1688851823364405 3.1.0 native:shellsh=sh\&cmd=ls/sdcard。
Therefore, the information extraction link can realize information extraction by checking KV values issued by a background and PB fields configured by a system, running an sql statement operation database, copying the database, sending a log file, executing a section of shell script and the like.
In some embodiments of the present application, a plurality of user identities or group identifiers corresponding to the plurality of user identities may be set in the information extraction link to achieve the purpose of providing information extraction links for application programs of a plurality of users in batches.
With continued reference to fig. 2, in step 230, an information extraction instruction is executed in the application program to generate an information extraction result.
The application program can acquire corresponding information by running the information extraction instruction and output a corresponding information extraction result.
In some embodiments of the present application, the method further comprises: judging whether the information extraction instruction is legal or not, wherein the step of executing the information extraction instruction in the application program is executed under the condition that the information extraction instruction is legal.
Specifically, an instruction library may be preset, where a preset legal information extraction instruction is included, and whether the information extraction instruction is legal may be determined by searching in the instruction library and determining whether the information extraction instruction is included in the instruction library.
In step 240, the information extraction results are reported through a session portal in the application.
The information extraction results may be reported in a variety of ways.
In one embodiment of the present application, reporting, by an application, a result of information extraction includes: packaging the information extraction result into an information extraction file; and reporting the information extraction file through the application program.
Specifically, the information extraction file may be reported through a session portal (e.g., chat box) in the application program, so that a person (e.g., developer) who has established a session with the user may obtain the information extraction file through the session. The method has the advantages that convenience in acquiring information extraction results by a developer can be remarkably improved, and therefore the problem can be rapidly located.
In other embodiments of the present application, since the information extraction result often exists in text form, the information extraction result may be directly reported through a session entry in the application.
In one embodiment of the present application, obtaining an information extraction link by an application includes: acquiring information extraction links through a session entry in an application program; reporting the information extraction result by the application program, including: and reporting the information extraction result through a session entry in the application program.
The session portal may be a single session portal or a group session portal. As described above, the chat frame of WeChat and enterprise WeChat is a session entry, on one hand, the chat frame can directly obtain information extraction link from developer, and on the other hand, the chat frame can return information extraction result to developer.
In the embodiment of the application, the information extraction link is acquired through the session entrance and the information extraction result is reported, so that a developer can acquire the extracted information more timely, and the information acquisition efficiency is improved.
FIG. 6 illustrates a flow chart of parsing information extraction links in an application in response to parsing operation instructions according to one embodiment of the present application. As shown in fig. 6, the method comprises the following steps:
in step 610, in response to receiving the parsing operation instruction, a pop is displayed in the application program to inquire whether the object allows extraction of information through the pop.
The object here may be a user. The popup may display the word "allow information extraction" and display the "yes" and "no" buttons, through which the user is asked whether information extraction is allowed.
In step 620, the information extraction link is parsed in the application in accordance with receiving an instruction that allows information to be extracted.
When the user clicks the "yes" button, the application receives an instruction to allow information to be extracted.
In the embodiment of the application, the user agreement is required to be sign before information extraction is carried out, so that the privacy security of the user is effectively protected.
In one embodiment of the present application, reporting, by an application, a result of information extraction includes: displaying a popup window in the application program so as to inquire whether the user reports the popup window; and reporting the information extraction result through the application program according to the received reporting instruction.
In the embodiment of the application, the user agreement is required to be sign before the information extraction result is reported, so that the privacy safety of the user is further protected.
FIG. 7 illustrates a schematic diagram of acquiring information extraction links through a session portal in an application according to one embodiment of the present application; FIG. 8 illustrates a schematic diagram of displaying a popup in an application in accordance with one embodiment of the present application; fig. 9 shows a schematic diagram of reporting information extraction results through a session portal in an application according to one embodiment of the present application. Next, a process of performing data processing based on the information extraction link will be described with reference to fig. 7 to 9.
Referring to fig. 7, one user in the group chat sends an information extraction link to the group chat through the application program, and the application programs of the other users in the group chat can acquire the information extraction link. Referring to fig. 8 again, after the user clicks the information extraction link received through the group chat in the application program, the application program displays a popup window to inquire the user to view or send the extracted information, and finally, after the user clicks the send, the application program extracts the information and sends the information extraction result to other users such as developers in the group chat in a file mode.
FIG. 10 shows an overall flow diagram of a data processing method according to one embodiment of the present application. The overall scheme of the embodiment of the present application is described below with reference to fig. 10: first, the user clicks the link; then, the application program judges the link and determines whether wxdiag prefix is needed, if not, the error is reported; if yes, judging whether overtime exists, if yes, reporting errors, and if not, decrypting by using an RSA private key; then checking information such as vid, version number and the like; then judging whether the verification is correct, if not, reporting errors, and if so, extracting command words and parameters, wherein the command words are the information extraction instructions; then, judging whether the command word is legal or not, if not, reporting an error, and if so, executing the command; and finally, outputting a result.
In summary, according to the data processing method provided in the embodiment of the present application, after determining the type of information to be extracted, only the application program needs to be provided with the corresponding information extraction link, and the application program may respond according to the parsing operation, automatically extract the information extraction instruction from the information extraction link, and may also complete information extraction by executing the information extraction instruction, and finally may report the information extraction result through the application program. Therefore, the information required in the application program can be quickly acquired according to the problems reflected by the user, the accuracy, flexibility and efficiency of acquiring the information are improved, and the efficiency and accuracy of positioning the problems in the application program can be further improved.
The following describes an embodiment of an apparatus of the present application, which may be used to perform the data processing method in the above embodiment of the present application. For details not disclosed in the embodiments of the apparatus of the present application, please refer to the embodiments of the data processing method described in the present application.
FIG. 11 illustrates a block diagram of a data processing apparatus according to one embodiment of the present application.
Referring to fig. 11, a data processing apparatus 1100 according to an embodiment of the present application includes: acquisition unit 1110, parsing unit 1120, result generation unit 1130, and reporting unit 1140. The acquiring unit 1110 is configured to acquire an information extraction link through a session entry in an application, where the information extraction link is from an opposite end that establishes a session connection with a terminal where the application is located; the method comprises the steps of carrying out a first treatment on the surface of the The parsing unit 1120 is configured to parse the information extraction link in the application program in response to the received parsing operation instruction, so as to extract an information extraction instruction in the information extraction link; the result generating unit 1130 is configured to execute the information extraction instruction in the application program, and generate an information extraction result; the reporting unit 1140 is configured to report the information extraction result through the session entry in the application.
In some embodiments of the present application, based on the foregoing scheme, the information extraction link is generated by encrypting according to an asymmetric encryption algorithm, and the parsing unit 1120 is configured to: decrypting the information extraction link through the application program to obtain a decryption result; and extracting the information extraction instruction in the information extraction link from the decryption result.
In some embodiments of the present application, based on the foregoing solution, before decrypting the information extraction link by the application program, the parsing unit 1120 is further configured to: and carrying out validity verification on the information extraction link, wherein in the case that the information extraction link passes the validity verification, the step of decrypting the information extraction link through the application program is executed.
In some embodiments of the present application, based on the foregoing scheme, the parsing unit 1120 is configured to: judging whether the information extraction link contains preset mark information or not; and determining that the information extraction link is legal according to the preset mark information contained in the information extraction link.
In some embodiments of the present application, based on the foregoing scheme, the parsing unit 1120 is further configured to: judging whether the receiving time of the analysis operation instruction is within a legal period corresponding to the information extraction link; and determining that the information extraction link is legal according to the fact that the receiving time of the analysis operation instruction is within the legal period corresponding to the information extraction link.
In some embodiments of the present application, based on the foregoing solution, before extracting the information extraction instruction in the information extraction link from the decryption result, the parsing unit 1120 is further configured to: extracting the identification information in the information extraction link from the decryption result, wherein the identification information comprises at least one of the following: object identification of the application and version number of the application; and carrying out identity verification according to the identity information, wherein under the condition that the identity information passes the identity verification, the step of extracting the information extraction instruction in the information extraction link from the decryption result is carried out.
In some embodiments of the present application, based on the foregoing scheme, the parsing unit 1120 is configured to: responding to the received analysis operation instruction, displaying a popup window in the application program, and inquiring whether the object allows information extraction or not through the popup window; and according to the received instruction for allowing information extraction, analyzing the information extraction link in the application program.
In some embodiments of the present application, the information extraction link is generated by script based on the foregoing scheme.
Fig. 12 shows a schematic diagram of a computer system suitable for use in implementing the electronic device of the embodiments of the present application.
It should be noted that, the computer system 1200 of the electronic device shown in fig. 12 is only an example, and should not impose any limitation on the functions and the application scope of the embodiments of the present application.
As shown in fig. 12, the computer system 1200 includes a central processing unit (Central Processing Unit, CPU) 1201 which can perform various appropriate actions and processes, such as performing the methods described in the above embodiments, according to a program stored in a Read-Only Memory (ROM) 1202 or a program loaded from a storage section 1208 into a random access Memory (Random Access Memory, RAM) 1203. In the RAM 1203, various programs and data required for the system operation are also stored. The CPU 1201, ROM 1202, and RAM 1203 are connected to each other through a bus 1204. An Input/Output (I/O) interface 1205 is also connected to bus 1204.
The following components are connected to the I/O interface 1205: an input section 1206 including a keyboard, a mouse, and the like; an output portion 1207 including a Cathode Ray Tube (CRT), a liquid crystal display (Liquid Crystal Display, LCD), and a speaker, etc.; a storage section 1208 including a hard disk or the like; and a communication section 1209 including a network interface card such as a LAN (Local Area Network ) card, a modem, or the like. The communication section 1209 performs communication processing via a network such as the internet. The drive 1210 is also connected to the I/O interface 1205 as needed. A removable medium 1211 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is installed as needed on the drive 1210 so that a computer program read out therefrom is installed into the storage section 1208 as needed.
In particular, according to embodiments of the present application, the processes described above with reference to flowcharts may be implemented as computer software programs. For example, embodiments of the present application include a computer program product comprising a computer program embodied on a computer readable medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program can be downloaded and installed from a network via the communication portion 1209, and/or installed from the removable media 1211. When executed by a Central Processing Unit (CPU) 1201, performs the various functions defined in the system of the present application.
It should be noted that, the computer readable medium shown in the embodiments of the present application may be a computer readable signal medium or a computer readable storage medium, or any combination of the two. The computer readable storage medium can be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or a combination of any of the foregoing. More specific examples of the computer-readable storage medium may include, but are not limited to: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-Only Memory (ROM), an erasable programmable read-Only Memory (Erasable Programmable Read Only Memory, EPROM), flash Memory, an optical fiber, a portable compact disc read-Only Memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. In the present application, however, a computer-readable signal medium may include a data signal propagated in baseband or as part of a carrier wave, with computer-readable program code embodied therein. Such a propagated data signal may take any of a variety of forms, including, but not limited to, electro-magnetic, optical, or any suitable combination of the foregoing. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device. Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present application. Where each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The units involved in the embodiments of the present application may be implemented by means of software, or may be implemented by means of hardware, and the described units may also be provided in a processor. Wherein the names of the units do not constitute a limitation of the units themselves in some cases.
As an aspect, the present application also provides a computer-readable medium that may be contained in the electronic device described in the above embodiment; or may exist alone without being incorporated into the electronic device. The computer-readable medium carries one or more programs which, when executed by the electronic device, cause the electronic device to implement the methods described in the above embodiments.
It should be noted that although in the above detailed description several modules or units of a device for action execution are mentioned, such a division is not mandatory. Indeed, the features and functions of two or more modules or units described above may be embodied in one module or unit, in accordance with embodiments of the present application. Conversely, the features and functions of one module or unit described above may be further divided into a plurality of modules or units to be embodied.
From the above description of embodiments, those skilled in the art will readily appreciate that the example embodiments described herein may be implemented in software, or may be implemented in software in combination with the necessary hardware. Thus, the technical solution according to the embodiments of the present application may be embodied in the form of a software product, which may be stored in a non-volatile storage medium (may be a CD-ROM, a usb disk, a mobile hard disk, etc.) or on a network, and includes several instructions to cause a computing device (may be a personal computer, a server, a touch terminal, or a network device, etc.) to perform the method according to the embodiments of the present application.
Other embodiments of the present application will be apparent to those skilled in the art from consideration of the specification and practice of the embodiments disclosed herein. This application is intended to cover any variations, uses, or adaptations of the application following, in general, the principles of the application and including such departures from the present disclosure as come within known or customary practice within the art to which the application pertains.
It is to be understood that the present application is not limited to the precise arrangements and instrumentalities shown in the drawings, which have been described above, and that various modifications and changes may be effected without departing from the scope thereof. The scope of the application is limited only by the appended claims.
Claims (11)
1. A method of data processing, the method comprising:
acquiring an information extraction link through a session entry in an application program, wherein the information extraction link is from the opposite end which establishes session connection with a terminal where the application program is located;
responding to the received analysis operation instruction, analyzing the information extraction link in the application program to extract an information extraction instruction in the information extraction link;
executing the information extraction instruction in the application program to generate an information extraction result;
And reporting the information extraction result through the session entry in the application program.
2. The data processing method according to claim 1, wherein the information extraction link is generated by encrypting according to an asymmetric encryption algorithm, and the parsing the information extraction link in the application program to extract information extraction instructions in the information extraction link includes:
decrypting the information extraction link through the application program to obtain a decryption result;
and extracting the information extraction instruction in the information extraction link from the decryption result.
3. The data processing method according to claim 2, wherein before decrypting the information extraction link by the application program, the method further comprises, before obtaining a decryption result:
and carrying out validity verification on the information extraction link, wherein in the case that the information extraction link passes the validity verification, the step of decrypting the information extraction link through the application program is executed.
4. A data processing method according to claim 3, wherein said verifying the validity of said information extraction link comprises:
Judging whether the information extraction link contains preset mark information or not;
and determining that the information extraction link is legal according to the preset mark information contained in the information extraction link.
5. The data processing method according to claim 4, wherein the verifying the validity of the information extraction link further comprises:
judging whether the receiving time of the analysis operation instruction is within a legal period corresponding to the information extraction link;
and determining that the information extraction link is legal according to the fact that the receiving time of the analysis operation instruction is within the legal period corresponding to the information extraction link.
6. The data processing method according to claim 4 or 5, wherein before extracting the information extraction instruction in the information extraction link from the decryption result, the method further comprises:
extracting the identification information in the information extraction link from the decryption result, wherein the identification information comprises at least one of the following: object identification of the application and version number of the application;
and carrying out identity verification according to the identity information, wherein under the condition that the identity information passes the identity verification, the step of extracting the information extraction instruction in the information extraction link from the decryption result is carried out.
7. The data processing method according to claim 1, wherein parsing the information extraction link in the application program in response to the received parsing operation instruction includes:
responding to the received analysis operation instruction, displaying a popup window in the application program, and inquiring whether the object allows information extraction or not through the popup window;
and according to the received instruction for allowing information extraction, analyzing the information extraction link in the application program.
8. The data processing method of claim 1, wherein the information extraction link is generated by a script.
9. A data processing apparatus, the apparatus comprising:
the information extraction link is from the opposite end which establishes session connection with the terminal where the application program is located;
the analysis unit is used for responding to the received analysis operation instruction, analyzing the information extraction link in the application program so as to extract the information extraction instruction in the information extraction link;
the result generating unit is used for executing the information extraction instruction in the application program and generating an information extraction result;
And the reporting unit is used for reporting the information extraction result through the session entry in the application program.
10. A computer readable medium on which a computer program is stored, characterized in that the computer program, when being executed by a processor, implements the data processing method according to any one of claims 1 to 8.
11. An electronic device, comprising:
one or more processors;
storage means for storing one or more programs which when executed by the one or more processors cause the one or more processors to implement the data processing method of any of claims 1 to 8.
Publications (1)
| Publication Number | Publication Date |
|---|---|
| HK40085243A true HK40085243A (en) | 2023-08-04 |
Family
ID=
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11627054B1 (en) | Methods and systems to manage data objects in a cloud computing environment | |
| US11283596B2 (en) | API request and response balancing and control on blockchain | |
| US8245037B1 (en) | Encryption key management | |
| CN112217835B (en) | Message data processing method and device, server and terminal equipment | |
| CN112765245A (en) | Electronic government affair big data processing platform | |
| US8848922B1 (en) | Distributed encryption key management | |
| CN111639914A (en) | Blockchain case information management method, device, electronic device and storage medium | |
| CN113079164B (en) | Remote control method and device for bastion machine resources, storage medium and terminal equipment | |
| US20220086131A1 (en) | Multi-factor authentication for non-internet applications | |
| CN114257436B (en) | Access security management method and system suitable for fort machine, electronic equipment and readable storage medium | |
| CN112150299B (en) | Annuity data processing method, annuity data processing device, medium and electronic equipment | |
| CN115203712A (en) | Database auditing method and device based on cloud access security agent | |
| CN114553570B (en) | Method, device, electronic equipment and storage medium for generating token | |
| CN113961468B (en) | Digital certificate injection methods, apparatus, equipment, media, and program products used for U-shield testing | |
| US8819815B1 (en) | Method and system for distributing and tracking information | |
| HK40085243A (en) | Data processing method, device, computer readable medium and electronic equipment | |
| CN108052842B (en) | Signature data storage and verification method and device | |
| CN115994043A (en) | Data processing method, device, computer readable medium and electronic equipment | |
| US12086264B1 (en) | Software risk assessment | |
| CN118827182B (en) | Service processing method, device, electronic equipment and computer readable medium | |
| CN117914549B (en) | Double-factor login authentication method and device for one-way communication of adjacent network | |
| Sapkota | A Framework of DevSecOps for Software Development Teams | |
| CN116010998B (en) | Block chain-based data format verification and hosting method and device and electronic equipment | |
| US20250355783A1 (en) | Cross-tenancy data and processing controls for facilitating synchronous versus asynchronous code interrogation | |
| CN121502742A (en) | Equipment management methods, devices, electronic equipment, software products and storage media |