CN113965781B - Wind control strategy execution method and device - Google Patents

Wind control strategy execution method and device Download PDF

Info

Publication number
CN113965781B
CN113965781B CN202010705851.1A CN202010705851A CN113965781B CN 113965781 B CN113965781 B CN 113965781B CN 202010705851 A CN202010705851 A CN 202010705851A CN 113965781 B CN113965781 B CN 113965781B
Authority
CN
China
Prior art keywords
wind control
data source
control strategy
function
function execution
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202010705851.1A
Other languages
Chinese (zh)
Other versions
CN113965781A (en
Inventor
周志刚
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Dongchu Intelligent Technology Shanghai Co ltd
Original Assignee
Dongchu Intelligent Technology Shanghai Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Dongchu Intelligent Technology Shanghai Co ltd filed Critical Dongchu Intelligent Technology Shanghai Co ltd
Priority to CN202010705851.1A priority Critical patent/CN113965781B/en
Publication of CN113965781A publication Critical patent/CN113965781A/en
Application granted granted Critical
Publication of CN113965781B publication Critical patent/CN113965781B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25891Management of end-user data being end-user preferences
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/90Details of database functions independent of the retrieved data types
    • G06F16/95Retrieval from the web
    • G06F16/958Organisation or management of web site content, e.g. publishing, maintaining pages or automatic linking
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/20Servers specifically adapted for the distribution of content, e.g. VOD servers; Operations thereof
    • H04N21/25Management operations performed by the server for facilitating the content distribution or administrating data related to end-users or client devices, e.g. end-user or client device authentication, learning user preferences for recommending movies
    • H04N21/258Client or end-user data management, e.g. managing client capabilities, user preferences or demographics, processing of multiple end-users preferences to derive collaborative data
    • H04N21/25866Management of end-user data
    • H04N21/25875Management of end-user data involving end-user authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/45Management operations performed by the client for facilitating the reception of or the interaction with the content or administrating data related to the end-user or to the client device itself, e.g. learning user preferences for recommending movies, resolving scheduling conflicts
    • H04N21/466Learning process for intelligent management, e.g. learning user preferences for recommending movies
    • H04N21/4667Processing of monitored end-user data, e.g. trend analysis based on the log file of viewer selections
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D10/00Energy efficient computing, e.g. low power processors, power management or thermal management

Landscapes

  • Engineering & Computer Science (AREA)
  • Databases & Information Systems (AREA)
  • Multimedia (AREA)
  • Signal Processing (AREA)
  • Computer Graphics (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Data Mining & Analysis (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The invention relates to the technical field of information processing, in particular to a method and a device for executing a wind control strategy, wherein the method comprises the following steps: acquiring a function execution array; when a data source uploaded by a client is received, judging whether the data source is abnormal or not; if the abnormality exists, marking the data source as a first mark, wherein the first mark occupies one bit; traversing a function execution body in the function execution array, and judging whether data sources required by each first wind control strategy are marked as first identifiers or not; if yes, punishing the client according to the function executing body of the first wind control strategy; and adding a function execution body of a second wind control strategy in the function execution array according to the first user instruction, and returning to acquire the function execution array. The method and the device for decoupling the execution of the data sources and the wind control strategies can quickly judge whether the wind control strategies can be executed or not only according to the marks of the data sources required by each wind control strategy, so that the wind control strategies can be executed immediately when the wind control strategies can be executed, and the method and the device are more efficient and convenient.

Description

Wind control strategy execution method and device
Technical Field
The invention relates to the technical field of information processing, in particular to a method and a device for executing a wind control strategy.
Background
As more and more people enter the live platform to browse and watch, a batch of stolen and brushed false clients appear, and the benefits of the live platform and common users are violated.
For a live broadcast platform, when a stolen and brushed false client is identified in real time, the number of data sources to be identified is very large, and the final punishment measures are executed, and the punishment measures of the server are continuously emphasized along with the stolen and brushed action of the server.
Disclosure of Invention
The invention aims to provide a method and a device for executing a wind control strategy, which are used for solving the problem of low execution efficiency of the wind control strategy in the prior art.
The embodiment of the invention provides the following scheme:
according to a first aspect of the present invention, an embodiment of the present invention provides a method for executing a wind control policy, including:
Acquiring a function execution array, wherein the function execution array comprises at least one function execution body of a first wind control strategy;
when a data source uploaded by a client is received, judging whether the data source is abnormal or not;
if the data source is abnormal, marking the data source as a first mark, wherein the first mark occupies one bit;
traversing a function execution body in the function execution array, and judging whether data sources required by each first wind control strategy are marked as the first identifications or not;
if all the data sources required by the first wind control strategy are marked as the first identifier, punishing the client according to a function executing body of the first wind control strategy;
and adding a function execution body of a second wind control strategy in the function execution array according to the first user instruction, and returning to the step of acquiring the function execution array.
Preferably, before the acquiring the function execution array, the method further includes:
acquiring a plurality of data source types and the effectiveness degree of each data source type;
sorting the plurality of data source types in the order of the effectiveness level from low to high;
Defining a plurality of wind control strategies and the number of data sources required by each wind control strategy;
taking the data source types sequenced in the number of the data sources as an enumeration variable, and setting the enumeration variable as the data source type required by the wind control strategy;
setting function executives of the plurality of wind control strategies based on the data source types required by the wind control strategies;
and selecting at least one function executing body of the wind control strategy from the function executing bodies of the wind control strategies according to a second user instruction to create a function executing array.
Preferably, after said defining a plurality of wind control strategies and the number of data sources required for each of said wind control strategies, the method further comprises:
writing a character output interface for each data source type, and recording the character output interfaces through a member variable bit set < SIZE > source array, wherein source is the data source, and SIZE is the number of the data sources;
when receiving a data source uploaded by a client, judging whether the data source is abnormal or not, wherein the judging comprises the following steps:
and when the data source uploaded by the client is received, calling the character output interface through the bit set < SIZE > source array to judge whether the data source is abnormal or not.
Preferably, the traversing the function executor in the function execution array determines whether the data source required by each of the first wind control policies is marked as the first identifier, including:
traversing a function executor in the function execution array by for (auto & f: funs { f ();) funs being the function executor, f () being the first wind control strategy;
for each of the first air control policies, passing if (source.all ()) { f ()) in the bitset < SIZE > source array; and judging whether all data sources required by the first wind control strategy are marked as the first identification, wherein source is the data source.
Preferably, after the plurality of data source types are ordered in the order from low to high of the validity degree, the method further includes:
and assigning a score to each data source type through an array SourceEnumArra [ ], and checking whether the ordering result of the plurality of data source types is correct or not according to the score.
Preferably, after said defining a plurality of wind control strategies and the number of data sources required for each of said wind control strategies, the method further comprises:
acquiring the wind control grade of each wind control strategy;
Acquiring any two wind control strategies, wherein the any two wind control strategies comprise: a high-level strategy with higher wind control level and a low-level strategy with lower wind control level;
checking whether the number of data sources of the high-level policy is greater than the number of data sources of the low-level policy.
Preferably, the function execution array is: vector < Function () > funs, wherein vector is a container for storing the Function executor, function is the Function executor, void is the type of the Function executor, and funs is the name of the Function executor;
the first wind control strategy is: punishcontrol < SourceEnum, SIZE > push, wherein push is a control variable, sourceEnum is the enumeration variable, SIZE is the number of data sources required by the first wind control strategy, and push is the first wind control strategy.
According to a second aspect of the present invention, there is provided a wind control strategy execution device, comprising:
the function acquisition module is used for acquiring a function execution array, wherein the function execution array comprises at least one function execution body of a first wind control strategy;
the first judging module is used for judging whether the data source is abnormal or not when the data source uploaded by the client is received;
The marking module is used for marking the data source as a first mark if the data source is abnormal, and the first mark occupies one bit;
the second judging module is used for traversing the function executors in the function execution array and judging whether the data source required by each first wind control strategy is marked as the first identifier or not;
the execution module is used for punishing the client according to a function execution body of the first wind control strategy if all data sources required by the first wind control strategy are marked as the first identifier;
and the strategy adding module is used for adding a function executing body of the second wind control strategy in the function executing array according to the first user instruction.
According to a third aspect of the present invention there is provided a computer readable storage medium having stored thereon a computer program which when executed by a processor performs any of the method steps as in the first aspect of the present invention.
According to a fourth aspect of the present invention there is provided a server comprising a memory, a processor and a computer program stored on the memory and executable on the processor, the processor implementing any of the method steps as in the first aspect of the present invention when the program is executed.
Compared with the prior art, the invention has the following advantages and beneficial effects:
the method comprises the steps of obtaining a function execution array, wherein the function execution array comprises at least one function execution body of a first wind control strategy; when a data source uploaded by a client is received, judging whether the data source is abnormal or not; if the data source is abnormal, marking the data source as a first mark, wherein the first mark occupies one bit; traversing a function execution body in the function execution array, and judging whether data sources required by each first wind control strategy are marked as the first identifications or not; if all the data sources required by the first wind control strategy are marked as the first identifier, punishing the client according to a function executing body of the first wind control strategy; and adding a function execution body of a second wind control strategy in the function execution array according to the first user instruction, and returning to the step of acquiring the function execution array. Compared with the prior art that each wind control strategy is coupled with a corresponding data source, each data source needs to be acquired, whether each data source meets the conditions or not is judged, and the wind control strategy can be executed when each data source meets the conditions.
Drawings
In order to more clearly illustrate the embodiments of the present description or the technical solutions in the prior art, the drawings that are required for the embodiments will be briefly described below, and it is apparent that the drawings in the following description are only some embodiments of the present description, and other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic flow chart of a method for executing a wind control strategy according to an embodiment of the present invention;
FIG. 2 is a schematic structural diagram of a device for executing a wind control strategy according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a computer-readable storage medium according to an embodiment of the present invention;
fig. 4 is a schematic structural diagram of a server according to an embodiment of the present invention.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the drawings in the embodiments of the present invention, and it is apparent that the described embodiments are only some embodiments of the present invention, but not all embodiments, and all other embodiments obtained by those skilled in the art based on the embodiments of the present invention are within the scope of protection of the embodiments of the present invention.
First embodiment
Referring to fig. 1, fig. 1 is a flow chart of a method for executing a wind control strategy according to an embodiment of the invention.
In this embodiment, the method for executing the wind control policy is applied to a server, and the method includes:
step S10: and obtaining a function execution array, wherein the function execution array comprises at least one function execution body of a first wind control strategy.
The purpose of this step is: and acquiring a function execution array for later execution of the wind control strategy by a function execution body in the function execution array.
The execution subject of the embodiment is the server, specifically, the wind control server. The wind control strategy is a punishment measure implemented on the false client, for example, the wind control strategy such as taking a user off line, preventing the user from sending a barrage, blocking the user for one day, blocking an account and the like is implemented, and the function implementation body of the wind control strategy is a trunk implementation statement of a wind control strategy function and is used for implementing the wind control strategy. The function execution array comprises at least one function execution body of a first wind control strategy, so that when the condition is met, the function execution body of the at least one first wind control strategy can execute the first wind control strategy.
The function execution array is as follows: vector < Function () > funs, wherein vector is a container for storing the Function executor, function is the Function executor, void is the type of the Function executor, and funs is the name of the Function executor; when a function execution array is designed so as to meet the requirement of our data source, the function execution array can execute various punishment measures, and various execution strategies such as blocking account numbers, preventing login, adding account numbers to a blacklist, deducting account numbers and the like can be continuously increased. Therefore, the dynamic array can enable the caller to add various wind control strategies at will.
In a possible embodiment, before the step S10, the method further includes: acquiring a plurality of data source types and the effectiveness degree of each data source type; sorting the plurality of data source types in the order of the effectiveness level from low to high; defining a plurality of wind control strategies and the number of data sources required by each wind control strategy; taking the data source types sequenced in the number of the data sources as an enumeration variable, and setting the enumeration variable as the data source type required by the wind control strategy; setting function executives of the plurality of wind control strategies based on the data source types required by the wind control strategies; and selecting at least one function executing body of the wind control strategy from the function executing bodies of the wind control strategies according to a second user instruction to create a function executing array.
The function execution array needs to be set before the array penalty client is executed by the function.
Firstly, acquiring a plurality of data source types and the effectiveness degree of each data source type, and sequencing the plurality of data source types according to the order of the effectiveness degree from low to high; the data source type comprises a client equipment identification number, a password, a verification code, login time, login address and other types, the validity is determined by the severity of the data source type on the theft and brushing behavior, the higher the validity of the data source type with the theft and brushing behavior can be described, for example, the validity of the password is higher than the validity of the client equipment identification number, the validity of the client equipment identification number is higher than the validity of the login time, and the sequencing result of the data source type is that: login time, login address, client device identification number, authentication code, and password.
And secondly, defining a plurality of wind control strategies and the number of data sources required by each wind control strategy, for example, defining the wind control strategies such as taking a user off line, not letting the user send a barrage, blocking one day of the user, blocking account numbers and the like, and defining the number of data sources required by taking the user off line as 2, the number of data sources required by letting the user send the barrage as 3, the number of data sources required by blocking one day of the user as 4 and the number of data sources required by blocking account numbers as 5. Taking the data source types sequenced in the number of the data sources as an enumeration variable, and setting the enumeration variable as the data source type required by the wind control strategy; for example, the first 2 data source types "login time and login address" are used as a first enumeration type, the first enumeration type is set as a data source type required by "log off the user," the first 3 data source types "login time, login address and client device identification number" are used as a second enumeration type, the second enumeration type is set as a data source type required by "do not let the user send a bullet screen," and all 5 data source types are used as data source types required by "forbidden account". Only one data source type is required to be set, and then when the data source type required by the wind control strategy is defined, the data sources can be multiplexed, for example, the wind control strategy with the number of the data sources being 5 can multiplex the first 3 data sources of the wind control strategy with the number of the data sources being 3, and by multiplexing the data source types, the occupied amount of the memory space is reduced, and the setting efficiency of the wind control strategy is improved.
In a specific implementation, in order to identify a false client, some anti-cheating Software development kits (Software DevelopmentKit, SDK) are installed on the client to continuously collect data and report the data to a server for identification. The data sources required by each wind control strategy are designed into an enumeration variable, so that when the wind control strategy is executed, whether all the data sources are abnormal or not can be judged, and the wind control strategy can be executed only if the data sources are abnormal. For example, one of the types of data sources required for a wind control strategy is:
enum class SourceEnum since there is only one per data source type, we enumerate the data source types using enumeration variables while the enumeration variables occupy less data volume and the value of the enumeration type is unique, different enumeration type values.
Source_name=1, and the nickname of the user has a score of 1.
Source_ip, user's ip, will automatically increment to 2.
Source device, the user's device information, will automatically increment to 3.
Source_check1, the client's detection verifies Algorithm 1, which automatically increments to 4.
Source_check2, the client's detection verifies algorithm 2, which automatically increases to a value of 5.
Source_End, set an End, facilitates our subsequent automation.
The same we can create multiple enumerated variables for multiple wind control strategies, each with different data source types designed into them.
Setting function executives of the plurality of wind control strategies based on the data source types required by the wind control strategies; and selecting at least one function execution body of the wind control strategy from the function execution bodies of the wind control strategies according to a second user instruction to create a function execution array, wherein the function execution bodies of the remaining unselected wind control strategies can be added into the function execution array at any subsequent moment according to the first user instruction.
In one possible implementation, after the defining the plurality of wind control strategies and the number of data sources required for each of the wind control strategies, the method further includes: writing a character output interface for each data source type, and recording the character output interfaces through a member variable bit set < SIZE > source array, wherein source is the data source, and SIZE is the number of the data sources; when receiving a data source uploaded by a client, judging whether the data source is abnormal or not, wherein the judging comprises the following steps: and when the data source uploaded by the client is received, calling the character output interface through the bit set < SIZE > source array to judge whether the data source is abnormal or not.
The member variable is a bit set < SIZE > source array and is used for storing the identification of the data source required by the wind control strategy, the member variable records the character number output interface of the data source, when the data source is received, the character number output interface is called to judge whether the data source is abnormal or not, and the identification is distributed to the data source according to the judging result and is stored in the bit set array. In particular, since the data source required by each wind control strategy is designed as an enumeration variable, and the stored data source identifier is a set < SIZE > array, the set < SIZE > array is accessed according to the shaping variable, and the enumeration variable needs to be converted into the shaping variable before the set < SIZE > array can be normally accessed. size_ t i =static_cast < size_t > (t); the enumerated type e is converted to a shaped type of i. Also we first perform a robustness test. static_transaction (i < SIZE, "data source type must be smaller than the total set SIZE").
In one possible embodiment, the method further comprises: and distributing the SIZE bit set < SIZE > of the bit for the air control strategy based on the template parameter SIZE, so that pre-distribution is advanced and efficiency is improved.
The character output interface is as follows:
In a possible implementation manner, after the sorting the plurality of data source types in the order from low to high according to the effectiveness degree, the method further includes: and assigning a score to each data source type through an array SourceEnumArra [ ], and checking whether the ordering result of the plurality of data source types is correct or not according to the score. Any wind control strategy is executed as high-risk operation, so that misoperation of a developer is avoided as far as possible technically, a certain rule is designed for data source and wind control strategy execution, intelligent and automatic detection can be realized, and low-level errors of the developer are avoided. Scoring the data Source types according to the validity of each data Source type, wherein a higher score indicates a higher validity of the data Source types, more reliable, wherein some general data Source types belong to low scores, such as user nicknames, and in a specific implementation, an array sourcenumra [ ] is defined such that sourcenumra [ i ] = score1, score2 … …, i is an arrangement sequence number of the data Source types, i ranges from 1 to source_end-1; a loop is written to traverse to assign values, the score of the first data source type is set to 1, and the score of each subsequent data source type is obtained by increasing the score of the first data source type. After assignment is completed, scores of two adjacent data source types are compared, in theory, sourceEnumArra [ i ] is less than or equal to SourceEnumArra [ i+1], if the scores of the two adjacent data source types meet the theory, ordering of the data source types is considered to be abnormal, otherwise ordering of the data source types is considered to be abnormal, whether ordering of the data source types is abnormal is automatically and efficiently checked by creating an array, checking is not required, and low-level errors of developers can be avoided.
In one possible implementation, after the defining the plurality of wind control strategies and the number of data sources required for each of the wind control strategies, the method further includes: acquiring the wind control grade of each wind control strategy; acquiring any two wind control strategies, wherein the any two wind control strategies comprise: a high-level strategy with higher wind control level and a low-level strategy with lower wind control level; checking whether the number of data sources of the high-level policy is greater than the number of data sources of the low-level policy.
Step S20: and when the data source uploaded by the client is received, judging whether the data source is abnormal or not.
The purpose of this step is: and processing the received data source in real time to improve the execution speed of the wind control strategy.
The mode of receiving the data source is specifically as follows: and the plurality of different servers receive the data sources uploaded by the clients and upload the data sources to the wind control server in real time. When the wind control server receives the data source, the wind control server judges whether the data source is abnormal or not, firstly, the data source type of the data source is identified, a preset data source corresponding to the data source type is obtained, secondly, the data source is compared with the preset data source, if the comparison result is that the data source is consistent with the preset data source, the data source is considered to be abnormal, and if the comparison result is that the data source is inconsistent with the preset data source, the data source is considered to be abnormal.
For example, when the data source type to which the data source belongs is identified as a login address, a preset login address corresponding to the login address is obtained, the preset login address is a user common login address or a login address preset by a user, the data source is compared with the preset login address, and if the data source is inconsistent with the preset login address, the data source is considered to be abnormal.
Step S30: if the data source is abnormal, the data source is marked as a first mark, and the first mark occupies one bit.
The purpose of this step is: the data source is decoupled from the wind control strategy, so that the data source is not required to be stored, and only the identification is required to be stored.
When the data source is abnormal as a judging result, the data source is marked as a first identifier, the data source is not required to be stored, and only the first identifier is required to be stored, so that the data source and the wind control strategy are decoupled, the executing logic of the wind control strategy is clearer, and whether the wind control strategy needs to be executed is judged only according to the first identifier, and whether the data source is abnormal or not is not required to be judged.
Each data source has 2 cases, or has abnormality or has no abnormality, in order to save the memory space occupied by data, each data source is marked by one bit, and the first identifier occupies one bit. When the data source is abnormal, source [ i ] =1, the data source is marked as a first identifier "1", when the data source is not abnormal, a static_aset (source [ i ] = =0, the data source is not set), the data source is marked as a second identifier "0", bit is the smallest unit, and the occupied memory space is the smallest, so that a large amount of memory is saved.
In one possible implementation manner, the first identifier is stored by adopting an enumeration variable in the embodiment, because both the enumeration variable and the integer type (int) use int to store corresponding values, the two can be mutually converted, and the wind control strategy of the embodiment only supports the enumeration variable, so in order to ensure the robustness and fault tolerance of the program, we need to use a static_assert (is_enum < T > (), "the template parameter T must be the enumeration variable") to check the data type of the incoming data source, and if the data source is not the enumeration variable, an error alarm is performed to prevent the error use. After the data sources are marked as the first identifier, whether the number of the data sources of the first wind control strategy is greater than 0 is judged through a static_event (SIZE >0, SIZE must be greater than 0), and if the number of the data sources of the first wind control strategy is not greater than 0, an error alarm is carried out.
Step S40: and traversing the function execution bodies in the function execution array, and judging whether the data source required by each first wind control strategy is marked as the first identifier.
The purpose of this step is: and identifying whether the wind control strategy needs to be executed or not in time, and preparing for executing the wind control strategy.
Because of the need to create enumeration variables for multiple data source types of the wind control policies, our management class needs to support different enumeration variables, so a template class is designed to support management of data sources and judgment of data sources: template < typename T, size_t SIZE >; class punishControl { where we have 2 template parameters, one is the type typename T of enumeration variable described above, and the other is the number of data sources SIZE that the wind control strategy needs to satisfy.
After the data source is marked as the first identifier, the method traverses the function executor in the function execution array through for (auto & f: funs { f () }, funs is the function executor, f () is the first air control strategy, and for each first air control strategy, judging whether the data source required by the first air control strategy is marked as the first identifier in a bitset array through if (source. All ()), which is equivalent to judging whether the data source required by the first air control strategy is abnormal.
Step S50: and if all the data sources required by the first wind control strategy are marked as the first identifier, punishing the client according to the function executor of the first wind control strategy.
The purpose of this step is: when the data sources are marked as the first marks, the first wind control strategy is executed by the vertical horse, and the execution efficiency of the wind control strategy is improved.
If all the data sources required by the first wind control strategy are marked as the first identifier, the data sources required by the first wind control strategy are considered to be abnormal, and then the first wind control strategy is immediately executed through a function executing body of the first wind control strategy at the moment so as to realize punishment of the client. void exte (Function < void () > f) { this interface is to execute a specific wind control policy, and specific logic is in parameter f. Here, we also design a decoupling mode, and the specific logic is fully encapsulated into the function, so we only need to store the object f, and do not need to care what parameters are needed for f, how to execute, and only need the data source to meet the condition that the exception exists to execute.
Specifically, the first wind control strategy is: punishcontrol < SourceEnum, SIZE > push, wherein push is a control variable, sourceEnum is the enumeration variable, SIZE is the number of data sources required by the first wind control strategy, and push is the first wind control strategy; we have here created a specific object push of the wind control strategy based on the previous enumeration variable SourceEnum. If the SIZE is 5, the pushcontrol is less than sourceenum,5> push1, it is indicated that the first 5 data sources have anomalies to execute the corresponding wind control policy push1, and if the SIZE is 3, the pushcontrol is less than sourceenum,3> push2, it is indicated that the first 3 data sources have anomalies to execute the corresponding wind control policy push2. For example, if the user wants to execute a wind control strategy that prevents the user from logging in for 3 minutes, then a function executor that prevents logging in for 3 minutes would be created as follows: the Function < void () > f= [ ] { uid. Stoploginreq (3. 60; } pulsh 1.Excute (f); we can directly execute the excute (f) penalty logic without judging the data sources, the interface can judge whether all the data sources currently meet or not, and the data sources are executed immediately, if not, the data sources are put into an array, so that based on the previous design, a user can execute any wind control strategy to be executed at any moment without considering the problem of the data sources.
If the data sources required by the first wind control strategy are not all marked as the first identification, we put them into an array. Fuss. Displacement_back (move (f)); here we need to put it at the end of the wind control policy queue to guarantee the sequency of executing the wind control policies, while we need to use move function to shift the lifecycle of the f object into funs, thus releasing the f object once the funs has been executed. }
It should be noted that, in consideration of the execution performance, all the accesses of the punishControl object can be only single thread, and the simultaneous access of multiple threads is not supported, and if multiple threads are supported, the lock must be locked, so that the punishControl object does not manage the lock but is managed by the user, so that the purishcontrol object can exert the maximum performance.
Clear (); it is important that once the wind control strategy is implemented, the already implemented funs elements must be emptied, thereby preventing multiple penalties to the client. And the source of the data cannot be removed, because the source of the data is the condition satisfied by the data of the user, if the server performs all penalties and wants to add other penalties, the previous source of the data still exists or satisfies the condition, and the data can be performed again.
Step S60: and adding a function execution body of a second wind control strategy in the function execution array according to the first user instruction.
The purpose of this step is: and a function execution body of the second wind control strategy is added in the function execution array at any time, so that the flexibility of executing the wind control strategy is improved.
The function execution body of at least one first wind control strategy is originally stored in the function execution array, when the condition is met, the at least one first wind control strategy can be executed, when a user needs to add the wind control strategy, the function execution body of the wind control strategy can be continuously added in the function execution array, and therefore when a data source is met, multiple penalties can be executed for the client.
The technical scheme provided by the embodiment of the application has at least the following technical effects or advantages:
the embodiment obtains a function execution array, wherein the function execution array comprises at least one function execution body of a first wind control strategy; when a data source uploaded by a client is received, judging whether the data source is abnormal or not; if the data source is abnormal, marking the data source as a first mark, wherein the first mark occupies one bit; traversing a function execution body in the function execution array, and judging whether data sources required by each first wind control strategy are marked as the first identifications or not; if all the data sources required by the first wind control strategy are marked as the first identifier, punishing the client according to a function executing body of the first wind control strategy; and adding a function execution body of a second wind control strategy in the function execution array according to the first user instruction, and returning to the step of acquiring the function execution array. Compared with the prior art that each wind control strategy is coupled with a corresponding data source, each data source needs to be acquired, whether each data source meets the conditions or not is judged, and the wind control strategy can be executed when each data source meets the conditions.
Second embodiment
Based on the same inventive concept, as shown in fig. 2, an embodiment of the present invention further provides a wind control policy executing device, including:
the function obtaining module 10 is configured to obtain a function execution array, where the function execution array includes at least one function executor of a first wind control policy;
the first judging module 20 is configured to judge whether an abnormality exists in a data source uploaded by a client when the data source is received;
a marking module 30, configured to mark the data source as a first identifier if the data source is abnormal, where the first identifier occupies one bit;
a second judging module 40, configured to traverse the function executors in the function execution array, and judge whether the data source required by each of the first wind control policies is marked as the first identifier;
an execution module 50, configured to penalize the client according to a function executor of the first wind control policy if all data sources required by the first wind control policy are marked as the first identifier;
the policy adding module 60 is configured to add a function executor of the second wind control policy to the function execution array according to the first user instruction.
In one possible embodiment, the apparatus further comprises:
the function creation module is used for acquiring a plurality of data source types and the effectiveness degree of each data source type; sorting the plurality of data source types in the order of the effectiveness level from low to high; defining a plurality of wind control strategies and the number of data sources required by each wind control strategy; taking the data source types sequenced in the number of the data sources as an enumeration variable, and setting the enumeration variable as the data source type required by the wind control strategy; setting function executives of the plurality of wind control strategies based on the data source types required by the wind control strategies; and selecting at least one function executing body of the wind control strategy from the function executing bodies of the wind control strategies according to a second user instruction to create a function executing array.
In one possible embodiment, the apparatus further comprises:
the interface writing module is used for writing a character output interface for each data source type and recording the character output interfaces through a member variable bit set < SIZE > source array, wherein source is the data source, and SIZE is the number of the data sources;
The first judging module is specifically configured to, when receiving a data source uploaded by a client, invoke the character output interface through the bitset < SIZE > source array to judge whether the data source has an exception.
In one possible implementation manner, the second judging module is specifically configured to traverse a function execution body in the function execution array through for (auto & f: funs { f () }, funs is the function execution body, f () is the first air control policy, and for each first air control policy, judge whether data sources required by the first air control policy are all marked as the first identifier through if (source. All ()) { f () } in the bit set < SIZE > source array, where source is the data source.
In one possible embodiment, the apparatus further comprises:
and the checking module is used for assigning a score to each data source type through an array SourceEnumArra [ ], and checking whether the ordering result of the plurality of data source types is correct or not according to the score.
In a possible implementation manner, the checking module is further configured to obtain a wind control level of each wind control policy; acquiring any two wind control strategies, wherein the any two wind control strategies comprise: a high-level strategy with higher wind control level and a low-level strategy with lower wind control level; checking whether the number of data sources of the high-level policy is greater than the number of data sources of the low-level policy.
In one possible implementation, the function execution array is: vector < Function () > funs, wherein vector is a container for storing the Function executor, function is the Function executor, void is the type of the Function executor, and funs is the name of the Function executor;
the first wind control strategy is: punishcontrol < SourceEnum, SIZE > push, wherein push is a control variable, sourceEnum is the enumeration variable, SIZE is the number of data sources required by the first wind control strategy, and push is the first wind control strategy.
The technical scheme provided by the embodiment of the application has at least the following technical effects or advantages:
the embodiment obtains a function execution array, wherein the function execution array comprises at least one function execution body of a first wind control strategy; when a data source uploaded by a client is received, judging whether the data source is abnormal or not; if the data source is abnormal, marking the data source as a first mark, wherein the first mark occupies one bit; traversing a function execution body in the function execution array, and judging whether data sources required by each first wind control strategy are marked as the first identifications or not; if all the data sources required by the first wind control strategy are marked as the first identifier, punishing the client according to a function executing body of the first wind control strategy; and adding a function execution body of a second wind control strategy in the function execution array according to the first user instruction, and returning to the step of acquiring the function execution array. Compared with the prior art that each wind control strategy is coupled with a corresponding data source, each data source needs to be acquired, whether each data source meets the conditions or not is judged, and the wind control strategy can be executed when each data source meets the conditions.
Third embodiment
Based on the same inventive concept, as shown in fig. 3, an embodiment of the present invention further provides a computer-readable storage medium 300 having stored thereon a computer program 311, which program 311 when executed by a processor realizes the steps of:
acquiring a function execution array, wherein the function execution array comprises at least one function execution body of a first wind control strategy; when a data source uploaded by a client is received, judging whether the data source is abnormal or not; if the data source is abnormal, marking the data source as a first mark, wherein the first mark occupies one bit; traversing a function execution body in the function execution array, and judging whether data sources required by each first wind control strategy are marked as the first identifications or not; if all the data sources required by the first wind control strategy are marked as the first identifier, punishing the client according to a function executing body of the first wind control strategy; and adding a function execution body of a second wind control strategy in the function execution array according to the first user instruction, and returning to the step of acquiring the function execution array.
In a specific implementation, the computer program 311, when executed by a processor, may implement the method steps of any of the first implementation.
Fourth embodiment
Based on the same inventive concept, as shown in fig. 4, the embodiment of the present invention further provides a server 400, including a memory 410, a processor 420, and a computer program 411 stored in the memory 410 and executable on the processor 420, wherein the processor 420 implements the following steps when executing the program 411:
acquiring a function execution array, wherein the function execution array comprises at least one function execution body of a first wind control strategy; when a data source uploaded by a client is received, judging whether the data source is abnormal or not; if the data source is abnormal, marking the data source as a first mark, wherein the first mark occupies one bit; traversing a function execution body in the function execution array, and judging whether data sources required by each first wind control strategy are marked as the first identifications or not; if all the data sources required by the first wind control strategy are marked as the first identifier, punishing the client according to a function executing body of the first wind control strategy; and adding a function execution body of a second wind control strategy in the function execution array according to the first user instruction, and returning to the step of acquiring the function execution array.
In a specific implementation, the processor 420 may implement the method steps of any of the above first implementation when executing the computer program 411.
It will be appreciated by those skilled in the art that embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (modules, systems) and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including instruction means which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. It is therefore intended that the following claims be interpreted as including the preferred embodiments and all such alterations and modifications as fall within the scope of the invention.
It will be apparent to those skilled in the art that various modifications and variations can be made to the present invention without departing from the spirit or scope of the invention. Thus, it is intended that the present invention also include such modifications and alterations insofar as they come within the scope of the appended claims or the equivalents thereof.

Claims (9)

1. A method for executing a wind control strategy, which is applied to a server, the method comprising:
acquiring a plurality of data source types and the effectiveness degree of each data source type, wherein the effectiveness degree is determined by the severity degree of the data source type on the theft and brushing actions;
sorting the plurality of data source types in the order of the effectiveness level from low to high;
defining a plurality of wind control strategies and the number of data sources required by each wind control strategy;
taking the data source types sequenced in the number of the data sources as an enumeration variable, and setting the enumeration variable as the data source type required by the wind control strategy;
setting function executives of the plurality of wind control strategies based on the data source types required by the wind control strategies;
selecting at least one function execution body of the wind control strategy from the function execution bodies of the wind control strategies according to a second user instruction to create a function execution array;
Acquiring the function execution array, wherein the function execution array comprises at least one function execution body of a first wind control strategy;
when a data source uploaded by a client is received, judging whether the data source is abnormal or not;
if the data source is abnormal, marking the data source as a first mark, wherein the first mark occupies one bit;
traversing a function execution body in the function execution array, and judging whether data sources required by each first wind control strategy are marked as the first identifications or not;
if all the data sources required by the first wind control strategy are marked as the first identifier, punishing the client according to a function executing body of the first wind control strategy;
and adding a function execution body of a second wind control strategy in the function execution array according to the first user instruction, and returning to the step of acquiring the function execution array.
2. The method of claim 1, wherein after said defining a plurality of wind control strategies and the number of data sources required for each of said wind control strategies, said method further comprises:
writing a character output interface for each data source type, and recording the character output interfaces through a member variable bit set < SIZE > source array, wherein source is the data source, and SIZE is the number of the data sources;
When receiving a data source uploaded by a client, judging whether the data source is abnormal or not, wherein the judging comprises the following steps:
and when the data source uploaded by the client is received, calling the character output interface through the bit set < SIZE > source array to judge whether the data source is abnormal or not.
3. The method of claim 2, wherein traversing the function executives in the function execution array to determine whether the data source required for each of the first wind control policies is marked as the first identifier comprises:
traversing a function executor in the function execution array by for (auto & f: funs { f ();) funs being the function executor, f () being the first wind control strategy;
for each of the first air control policies, passing if (source.all ()) { f ()) in the bitset < SIZE > source array; and judging whether all data sources required by the first wind control strategy are marked as the first identification, wherein source is the data source.
4. The method of claim 1, wherein after said ordering of said plurality of data source types in said order of significance from low to high, said method further comprises:
And assigning a score to each data source type through an array SourceEnumArra [ ], and checking whether the ordering result of the plurality of data source types is correct or not according to the score.
5. The method of claim 4, wherein after said defining a plurality of wind control strategies and the number of data sources required for each of said wind control strategies, said method further comprises:
acquiring the wind control grade of each wind control strategy;
acquiring any two wind control strategies, wherein the any two wind control strategies comprise: a high-level strategy with higher wind control level and a low-level strategy with lower wind control level;
checking whether the number of data sources of the high-level policy is greater than the number of data sources of the low-level policy.
6. The method of claim 5, wherein the function execution array is: vector < Function () > funs, wherein vector is a container for storing the Function executor, function is the Function executor, void is the type of the Function executor, and funs is the name of the Function executor;
the first wind control strategy is: punishcontrol < SourceEnum, SIZE > push, wherein push is a control variable, sourceEnum is the enumeration variable, SIZE is the number of data sources required by the first wind control strategy, and push is the first wind control strategy.
7. A wind control strategy execution device, characterized by comprising:
the function acquisition module is used for acquiring a plurality of data source types and the effectiveness degree of each data source type, wherein the effectiveness degree is determined by the severity degree of the data source type on the robber brushing behavior, the plurality of data source types are ordered according to the effectiveness degree from low to high, a plurality of wind control strategies and the number of data sources required by each wind control strategy are defined, the data source types ordered in the number of the data sources are used as an enumeration variable, the enumeration variable is set as the data source type required by the wind control strategy, the function executors of the wind control strategies are set based on the data source types required by the wind control strategies, a function execution body creation function array of at least one wind control strategy is selected from the function executors of the wind control strategies according to a second user instruction, and the function execution array is acquired, wherein the function execution array comprises the function executors of at least one first wind control strategy;
the first judging module is used for judging whether the data source is abnormal or not when the data source uploaded by the client is received;
The marking module is used for marking the data source as a first mark if the data source is abnormal, and the first mark occupies one bit;
the second judging module is used for traversing the function executors in the function execution array and judging whether the data source required by each first wind control strategy is marked as the first identifier or not;
the execution module is used for punishing the client according to a function execution body of the first wind control strategy if all data sources required by the first wind control strategy are marked as the first identifier;
and the strategy adding module is used for adding a function executing body of the second wind control strategy in the function executing array according to the first user instruction.
8. A computer readable storage medium, on which a computer program is stored, characterized in that the program, when being executed by a processor, implements the method steps of any of claims 1-6.
9. A server comprising a memory, a processor and a computer program stored on the memory and executable on the processor, wherein the processor implements the method steps of any of claims 1-6 when the program is executed.
CN202010705851.1A 2020-07-21 2020-07-21 Wind control strategy execution method and device Active CN113965781B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202010705851.1A CN113965781B (en) 2020-07-21 2020-07-21 Wind control strategy execution method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202010705851.1A CN113965781B (en) 2020-07-21 2020-07-21 Wind control strategy execution method and device

Publications (2)

Publication Number Publication Date
CN113965781A CN113965781A (en) 2022-01-21
CN113965781B true CN113965781B (en) 2023-11-24

Family

ID=79459834

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202010705851.1A Active CN113965781B (en) 2020-07-21 2020-07-21 Wind control strategy execution method and device

Country Status (1)

Country Link
CN (1) CN113965781B (en)

Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014067439A1 (en) * 2012-10-29 2014-05-08 Tencent Technology (Shenzhen) Company Limited Method, system and device for monitorring data
US10015185B1 (en) * 2016-03-24 2018-07-03 EMC IP Holding Company LLC Risk score aggregation for automated detection of access anomalies in a computer network
CN108259979A (en) * 2018-04-13 2018-07-06 中山大学 A kind of cloud live streaming based on multiple data centers uploads optimization of rate method
CN108650526A (en) * 2018-05-18 2018-10-12 武汉斗鱼网络科技有限公司 A kind of recognition methods, computer equipment and storage medium
CN109299135A (en) * 2018-11-26 2019-02-01 平安科技(深圳)有限公司 Abnormal inquiry recognition methods, identification equipment and medium based on identification model
CN109472609A (en) * 2018-11-09 2019-03-15 阿里巴巴集团控股有限公司 A kind of air control method for determining reason and device
CN110232629A (en) * 2019-05-22 2019-09-13 深圳壹账通智能科技有限公司 Air control strategy method for early warning, device, computer equipment and storage medium
CN110348687A (en) * 2019-06-11 2019-10-18 五邑大学 Financial risks quantization method, device and storage medium based on risk partiality
CN110378780A (en) * 2019-06-17 2019-10-25 深圳壹账通智能科技有限公司 Air control strategy adjusting method, device, computer equipment and storage medium
WO2020042290A1 (en) * 2018-08-28 2020-03-05 卫盈联信息技术(深圳)有限公司 Risk management method, and apparatus and computer-readable storage medium
CN111191161A (en) * 2018-11-15 2020-05-22 武汉斗鱼网络科技有限公司 Page display method, storage medium, electronic device and system
US10679167B1 (en) * 2016-10-14 2020-06-09 Wells Fargo Bank, N.A. Policy exception risk determination engine with visual awareness guide

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6993751B2 (en) * 2001-05-14 2006-01-31 Microsoft Corporation Placing exception throwing instructions in compiled code

Patent Citations (12)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014067439A1 (en) * 2012-10-29 2014-05-08 Tencent Technology (Shenzhen) Company Limited Method, system and device for monitorring data
US10015185B1 (en) * 2016-03-24 2018-07-03 EMC IP Holding Company LLC Risk score aggregation for automated detection of access anomalies in a computer network
US10679167B1 (en) * 2016-10-14 2020-06-09 Wells Fargo Bank, N.A. Policy exception risk determination engine with visual awareness guide
CN108259979A (en) * 2018-04-13 2018-07-06 中山大学 A kind of cloud live streaming based on multiple data centers uploads optimization of rate method
CN108650526A (en) * 2018-05-18 2018-10-12 武汉斗鱼网络科技有限公司 A kind of recognition methods, computer equipment and storage medium
WO2020042290A1 (en) * 2018-08-28 2020-03-05 卫盈联信息技术(深圳)有限公司 Risk management method, and apparatus and computer-readable storage medium
CN109472609A (en) * 2018-11-09 2019-03-15 阿里巴巴集团控股有限公司 A kind of air control method for determining reason and device
CN111191161A (en) * 2018-11-15 2020-05-22 武汉斗鱼网络科技有限公司 Page display method, storage medium, electronic device and system
CN109299135A (en) * 2018-11-26 2019-02-01 平安科技(深圳)有限公司 Abnormal inquiry recognition methods, identification equipment and medium based on identification model
CN110232629A (en) * 2019-05-22 2019-09-13 深圳壹账通智能科技有限公司 Air control strategy method for early warning, device, computer equipment and storage medium
CN110348687A (en) * 2019-06-11 2019-10-18 五邑大学 Financial risks quantization method, device and storage medium based on risk partiality
CN110378780A (en) * 2019-06-17 2019-10-25 深圳壹账通智能科技有限公司 Air control strategy adjusting method, device, computer equipment and storage medium

Also Published As

Publication number Publication date
CN113965781A (en) 2022-01-21

Similar Documents

Publication Publication Date Title
CN113918270B (en) Cloud resource scheduling method and system based on Kubernetes
CN112527489B (en) Task scheduling method, device, equipment and computer readable storage medium
CN108710681B (en) File acquisition method, device, equipment and storage medium
RU2007143380A (en) UNIFORM AUTHORIZATION FOR HETEROGENEOUS APPLICATIONS
CN109274782A (en) A kind of method and device acquiring website data
CN112769871B (en) Cross-chain access control method and device
CN113419747B (en) Middleware deployment method, device, equipment and storage medium
CN110278192A (en) Method, apparatus, computer equipment and the readable storage medium storing program for executing of extranet access Intranet
CN111159520B (en) Sample identification method, device and safety emergency response system
CN111835790B (en) Risk identification method, device and system
CN114357498A (en) Data desensitization method and device
CN113656780A (en) Cross-link access control method and device
CN109902028A (en) Automated testing method, device, equipment and the storage medium of ACL characteristic
CN111314241B (en) Task scheduling method and scheduling system
CN113835844A (en) Management method and device of container cluster and cloud computing platform
CN113965781B (en) Wind control strategy execution method and device
CN107025129A (en) A kind of data processing method and device
CN112181599A (en) Model training method, device and storage medium
CN116628681A (en) Authority management method and system based on upper computer monitoring control software
CN105630577A (en) Virtual machine data exchange method and apparatus
CN113923260A (en) Method, device, terminal and storage medium for processing proxy environment
CN102752318B (en) Information security verification method and system based on internet
CN109408485B (en) Distributed lock implementation method and system
CN113468217A (en) Data query management method and device, computer equipment and readable storage medium
CN115437798A (en) Data processing method, device, equipment and medium for shared memory

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20231023

Address after: No.1 building and No.2 building, No.333, Haiyang 1st Road, Lingang New District, China (Shanghai) pilot Free Trade Zone, Pudong New Area, Shanghai

Applicant after: Dongchu Intelligent Technology (Shanghai) Co.,Ltd.

Address before: 430000 East Lake Development Zone, Wuhan City, Hubei Province, No. 1 Software Park East Road 4.1 Phase B1 Building 11 Building

Applicant before: WUHAN DOUYU NETWORK TECHNOLOGY Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant