CN117009345A - Verification method and device for data reporting function and electronic equipment - Google Patents

Verification method and device for data reporting function and electronic equipment Download PDF

Info

Publication number
CN117009345A
CN117009345A CN202211097865.5A CN202211097865A CN117009345A CN 117009345 A CN117009345 A CN 117009345A CN 202211097865 A CN202211097865 A CN 202211097865A CN 117009345 A CN117009345 A CN 117009345A
Authority
CN
China
Prior art keywords
verification
data
behavior
reporting
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202211097865.5A
Other languages
Chinese (zh)
Inventor
许教杰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202211097865.5A priority Critical patent/CN117009345A/en
Publication of CN117009345A publication Critical patent/CN117009345A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/22Indexing; Data structures therefor; Storage structures
    • G06F16/2228Indexing structures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F16/00Information retrieval; Database structures therefor; File system structures therefor
    • G06F16/20Information retrieval; Database structures therefor; File system structures therefor of structured data, e.g. relational data
    • G06F16/24Querying
    • G06F16/245Query processing
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Databases & Information Systems (AREA)
  • Data Mining & Analysis (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computational Linguistics (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The embodiment of the application provides a verification method and device for a data reporting function and electronic equipment, and relates to the technical field of verification of the data reporting function, wherein the verification method comprises the following steps: simulating the operation action of a user through a driving application program, and acquiring at least one behavior event for representing the behavior of the user; acquiring verification data for verifying the reported data of the application program; receiving the report data; and verifying the reporting value of each behavior event in the reporting data based on the verification value of each behavior event in the verification data to obtain a verification result of the data reporting function of the application program. The verification method provided by the embodiment of the application can realize the automatic verification of the data reporting function of the application program.

Description

Verification method and device for data reporting function and electronic equipment
Technical Field
The embodiment of the application relates to the technical field of verification of a data reporting function in the field of field data reporting, and in particular relates to a method and a device for verifying the data reporting function and electronic equipment.
Background
Verification of the data reporting function of the application program is a critical ring for product development, and the accuracy of the verification directly relates to core data statistics such as the daily active user number (Daily Active Users, DAU) and the like. However, in the development process, verification for the data reporting function generally triggers a scenario manually and verifies the reporting data sent by the application program after the scenario is triggered. However, too many scenarios to trigger can result in excessive verification costs.
However, the following problems exist with such a scheme for manually verifying the data reporting function of an application program product:
1. too many scenes to be triggered can result in excessive verification costs.
2. In the subsequent maintenance of the application program, if the requirement of the application program is changed, the data reporting function of the application program needs to be checked again manually, otherwise, errors of the data reporting function possibly exist, if some important reporting data related to modeling of an algorithm and the like are reported, incorrect recommendation can be brought, serious influence is generated, and user experience is reduced.
3. And after the application program product is online, the data reporting function of the application program product is not subjected to multi-disc detection. Namely, the data reporting function is in a forgotten state, and the data reporting function cannot be detected again. However, when the application program product is on line, there may be a problem in the data reporting function, for example, a bug (bug) may occur in the data reporting function due to other staff modifying the code by mistake.
4. The time for finding and repairing the problems is too lag and passive, and the reported data of the external network is always in an inaccurate state during the repair of the data reporting function, thereby increasing the operation difficulty of the application program product.
Disclosure of Invention
The embodiment of the application provides a verification method and device for a data reporting function and electronic equipment, which can realize automatic verification of the data reporting function of an application program, further can reduce the verification cost of the data reporting function of the application program, improve user experience, and are also beneficial to detecting a double disc of the data reporting function of an application program product after online and timely repairing the problem related to the data reporting function.
In a first aspect, an embodiment of the present application provides a method for checking a data reporting function, including:
simulating the operation action of a user through a driving application program, and acquiring at least one behavior event for representing the behavior of the user;
acquiring verification data for verifying the reported data of the application program;
receiving the report data;
and verifying the reporting value of each behavior event in the reporting data based on the verification value of each behavior event in the verification data to obtain a verification result of the data reporting function of the application program.
In a second aspect, an embodiment of the present application provides a verification apparatus for a data reporting function, configured to execute the method in the first aspect or each implementation manner thereof.
In particular, the electronic device comprises functional modules for performing the method of the first aspect or implementations thereof described above.
In one implementation, the verification device may include a processing unit for performing functions related to information processing. For example, the processing unit may be a processor. In another implementation, the verification device may include a transmitting unit and/or a receiving unit. The transmitting unit is configured to perform a function related to transmission, and the receiving unit is configured to perform a function related to reception. For example, the transmitting unit may be a transmitter or a transmitter and the receiving unit may be a receiver or a receiver. For another example, the electronic device is a communication chip, the sending unit may be an input circuit or an interface of the communication chip, and the sending unit may be an output circuit or an interface of the communication chip.
In a third aspect, an embodiment of the present application provides an electronic device, including:
a processor adapted to implement computer instructions; the method comprises the steps of,
a computer readable storage medium storing computer instructions adapted to be loaded by a processor and to perform the method of the first aspect described above.
In a fourth aspect, embodiments of the present application provide a computer readable storage medium storing computer instructions that, when read and executed by a processor of a computer device, cause the computer device to perform the method of the first aspect described above.
In a fifth aspect, embodiments of the present application provide a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. The processor of the computer device reads the computer instructions from the computer readable storage medium, and the processor executes the computer instructions, so that the computer device performs the method of the first aspect described above.
In the embodiment of the application, the operation action of a user is simulated through a driving application program, and at least one behavior event for representing the behavior of the user is obtained; based on the above, not only the verification data for verifying the report data of the application program can be obtained; the application program can be triggered to report the reported data; furthermore, the verification value of each behavior event in the verification data can be verified based on the verification value of each behavior event in the reporting data, so that the verification result of the data reporting function of the application program is obtained, the automatic verification of the data reporting function of the application program is realized, further, the verification cost of the data reporting function of the application program can be reduced, the user experience is improved, the repeated disc detection of the data reporting function of the application program product after being on line is facilitated, and the problems related to the data reporting function can be timely found and repaired.
Drawings
Fig. 1 is an example of a system framework provided by an embodiment of the present application.
Fig. 2 is a schematic flowchart of a verification method of a data reporting function provided by an embodiment of the present application.
FIG. 3 is a schematic diagram of a resident interface displaying verification results according to an embodiment of the present application.
FIG. 4 is another schematic flow chart of a verification method provided by an embodiment of the present application.
Fig. 5 is a schematic block diagram of a verification device provided in an embodiment of the present application.
Fig. 6 is a schematic block diagram of an electronic device provided by an embodiment of the present application.
Detailed Description
The scheme provided by the application can relate to the technical field of block chains.
Blockchains are novel application modes of computer technologies such as distributed data storage, point-to-point transmission, consensus mechanisms, encryption algorithms, and the like. The Blockchain (Blockchain), which is essentially a decentralised database, is a string of data blocks that are generated by cryptographic means in association, each data block containing a batch of information of network transactions for verifying the validity of the information (anti-counterfeiting) and generating the next block. The blockchain may include a blockchain underlying platform, a platform product services layer, and an application services layer.
The blockchain underlying platform may include processing modules for user management, basic services, smart contracts, operations, and the like.
The user management module is responsible for identity information management of all blockchain participants, including maintenance of public and private key generation (account management), key management, maintenance of corresponding relation between the real identity of the user and the blockchain address (authority management) and the like, and under the condition of authorization, supervision and audit of transaction conditions of certain real identities, and provision of rule configuration (wind control audit) of risk control; the basic service module is deployed on all block chain node devices, is used for verifying the validity of a service request, recording the service request on a storage after the effective request is identified, for a new service request, the basic service firstly analyzes interface adaptation and authenticates the interface adaptation, encrypts service information (identification management) through an identification algorithm, and transmits the encrypted service information to a shared account book (network communication) in a complete and consistent manner, and records and stores the service information; the intelligent contract module is responsible for registering and issuing contracts, triggering contracts and executing contracts, a developer can define contract logic through a certain programming language, issue the contract logic to a blockchain (contract registering), invoke keys or other event triggering execution according to the logic of contract clauses to complete the contract logic, and simultaneously provide a function of registering contract upgrading; the operation module is mainly responsible for deployment in the product release process, modification of configuration, contract setting, cloud adaptation and visual output of real-time states in product operation, for example: alarms, detecting network conditions, detecting node device health status, etc.
The platform product service layer provides basic capabilities and implementation frameworks of typical applications, and developers can complete the blockchain implementation of business logic based on the basic capabilities and the characteristics of the superposition business.
The application service layer provides the application service based on the block chain scheme to the business participants for use.
More specifically, the scheme provided by the embodiment of the application is suitable for the technical field of application service of the block chain. In combination with the technical field of verification of the data reporting function in the field of field data reporting, the block chain technology can be utilized to realize the application of verification of the data reporting function, transmission of verification results, storage of the verification results and the like.
The scheme provided by the application can relate to cloud technology.
Cloud computing (closed computing) refers to the delivery and usage mode of an IT infrastructure, meaning that required resources are obtained in an on-demand, easily scalable manner through a network; generalized cloud computing refers to the delivery and usage patterns of services, meaning that the required services are obtained in an on-demand, easily scalable manner over a network. Such services may be IT, software, internet related, or other services. Cloud Computing is a product of fusion of traditional computer and network technology developments such as Grid Computing (Grid Computing), distributed Computing (Distributed Computing), parallel Computing (Parallel Computing), utility Computing (Utility Computing), network storage (Network Storage Technologies), virtualization (Virtualization), load balancing (Load balancing), and the like.
With the development of the internet, real-time data flow and diversification of connected devices, and the promotion of demands of search services, social networks, mobile commerce, open collaboration and the like, cloud computing is rapidly developed. Unlike the previous parallel distributed computing, the generation of cloud computing will promote the revolutionary transformation of the whole internet mode and enterprise management mode in concept.
In combination with the technical field of verification of the data reporting function in the field of field data reporting, the data reporting function can be verified by utilizing a cloud terminal technology, the verification result is transmitted by utilizing a cloud communication technology, the verification result is stored by utilizing a cloud storage technology, and the like.
The technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application.
Fig. 1 is an example of a system framework 100 provided by an embodiment of the present application.
The system framework 100 may be an application system, and embodiments of the present application are not limited to a particular type of application. The system frame 100 includes: a terminal 110 and a verification device 120.
The terminal 110 may be at least one of a smart phone, a game console, a desktop computer, a tablet computer, an electronic book reader, an MP4 player, and a laptop portable computer. Terminal 110 may be a client that installs and runs applications. The application program may be any one of an online video program, a short video program, a picture sharing program, a sound social program, a cartoon program, a wallpaper program, a news pushing program, a supply and demand information pushing program, an academic communication program, a technical communication program, a policy communication program, a program containing a comment mechanism, a program containing a view publishing mechanism, and a knowledge sharing program. The terminals 110 may be terminals used by users, respectively, and user accounts are logged in an application running in the terminals 110.
The verification device 120 may be at least one of a server, a plurality of servers, a cloud computing platform, and a virtualization center. Verification device 120 is used to provide background services for applications, such as terminal 110 and applications on terminal 110. Optionally, the verification device 120 takes over primary computing effort, and the terminal 110 takes over secondary computing effort; alternatively, the verification device 120 takes on secondary computing effort and the terminal 110 takes on primary computing effort; alternatively, a distributed computing architecture is used between the terminal 110 and the verification device 120 for collaborative computing.
Optionally, taking the system framework 100 as an example of a web browsing system, the verification device 120 is configured to obtain report data (such as service data) of an application program installed on the terminal 110, obtain, based on the verification device 120, verification data for verifying the report data of the application program installed on the terminal 110, and verify, based on the obtained verification data, the report data of the application program installed on the terminal 110, thereby implementing verification of a data reporting function of the terminal 110.
Verification of the data reporting function of the application program is a critical ring for product development, and the accuracy of the verification directly relates to core data statistics such as the daily active user number (Daily Active Users, DAU) and the like. However, in the development process, verification for the data reporting function generally triggers a scenario manually and verifies the reporting data sent by the application program after the scenario is triggered. The flow is generally as follows: after the development of the application program product is finished, a data reporting function is added, then the product or a data checking staff checks the data reporting function, namely, a scene is manually triggered and the reported data is checked, if the data reporting function has a defect or an error, the product or the data checking staff sends back to the developer, and the developer checks (check) and repairs the data until the check passes. Therefore, the application program product can receive the report data of the external network product after being on line.
However, the following problems exist with such a scheme for manually verifying the data reporting function of an application program product:
1. too many scenes to be triggered can result in excessive verification costs.
2. In the subsequent maintenance of the application program, if the requirement of the application program is changed, the data reporting function of the application program needs to be checked again manually, otherwise, errors of the data reporting function possibly exist, if some important reporting data related to modeling of an algorithm and the like are reported, incorrect recommendation can be brought, serious influence is generated, and user experience is reduced.
3. After the application program product is on line, the data reporting function is not subjected to multi-disc detection, namely, the data reporting function is in a forgotten state, and the data reporting function is not subjected to detection again and the like. However, when the application program product is on line, there may be a problem in the data reporting function, for example, a bug (bug) may occur in the data reporting function due to other staff modifying the code by mistake.
4. The problem discovery and repair path for the data reporting function is typically: if obvious abnormality is found when the core data of the external network is counted, the abnormal state is fed back to the product and the developer to check the data reporting function, and after the problem is found, the developer repairs the data and issues the latest version after repair. However, this can lead to excessive lag in the time to find and repair problems, as well as excessive passivity; in addition, during the repair of the data reporting function, the reported data of the external network is always in an inaccurate state, so that the operation difficulty of an application program product is increased.
In view of this, the embodiment of the application provides a verification method and device for a data reporting function and an electronic device, which can realize automatic verification of the data reporting function of an application program, further, can reduce the verification cost of the data reporting function of the application program and improve the user experience, and is also beneficial to detecting the multiple disks of the data reporting function of an application program product after online and timely repairing the problems related to the data reporting function. Specifically, the automatic verification of the data reporting function of the application program is realized by running a driving example (i.e., an automatic or pipelined manner), wherein the driving example corresponds to a test example for simulating the operation action of the user.
Fig. 2 shows a schematic flow chart of a verification method 200 of a data reporting function according to an embodiment of the application, which verification method 200 may be performed by any electronic device having data processing capabilities. For example, the electronic device may be implemented as a server. The server may be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server providing cloud services, a cloud database, cloud computing, cloud functions, cloud storage, network services, cloud communication, middleware services, domain name services, security services, basic cloud computing services such as big data and an artificial intelligent platform, and the server may be directly or indirectly connected through a wired or wireless communication mode. For convenience of description, the verification method 200 will be exemplarily described below by taking a verification device as an example.
As shown in fig. 2, the verification method 200 may include:
s210, the verification device simulates operation actions of a user through a driving application program, and obtains at least one behavior event used for representing the behavior of the user.
Illustratively, the verification device may be used to drive the application program to perform an operational action that simulates a user. For example, a verification device may be used to drive an application to automatically perform a slide the action of the display interface or a partial region in the display interface. After the application program automatically performs the operation action of the simulation user, at least one behavioral event for characterizing the user's behavior may be triggered.
Notably, a single operational action for simulating a user may trigger one or more behavioral events that may be used to characterize the user's behavior. For example, taking a single user action for simulating a user as a simulated user sliding display interface or a partial region of a display interface, the action events triggered by the action actions may include exposure action events characterized by exposure, and may also include video play duration action events characterized by video play duration. In other alternative embodiments, the behavior events related to the embodiments of the present application may be replaced with parameters that can be used to characterize the behavior of the user, for example, the play duration behavior event may be replaced with a play duration that can be used to characterize the behavior of the user to watch the video.
S220, receiving the report data of the application program and obtaining verification data for verifying the report data.
The reported data may be, for example, data reported for the at least one behavioral event. For example, when the action simulated by the verification device is a short video sliding action, the at least one action event may include an exposure action event and a play duration action event, and correspondingly, the report data may include: the exposure, video playing time length and the like.
The reported data may include, for example, real data.
Wherein the real data includes information about the user and data about the object for which the simulated operation action is directed.
Taking the simulated operation action as an example of simulating the operation action of the user sliding the display interface or a partial region in the display interface, the reported data may include the relevant information of the user and the relevant information of the sliding display interface or the partial region in the display interface. Optionally, the related information of the user may include information such as an account number, an avatar, and the like of the user. The relevant information of the sliding display interface or the partial area in the display interface includes, but is not limited to: the content displayed in the display interface, the identification of the partial area, the content displayed in the partial area, and the like. Wherein, the content in the display interface or the content displayed in the partial area is uniquely identified by information such as resource identification.
Taking the simulated operation action as an example of the operation action of simulating the user to slide the short video, the report data may include the related information of the user and the related information of the content of the short video.
For example, when the reported data includes real data and the real data includes related information of the user, the authorization of the user needs to be acquired in advance. I.e., the application or the verification device takes the authorization of the user, can acquire the relevant information of the user through acquisition, and adds the data to the report data and reports the data to the verification device.
Illustratively, the verification device may acquire the reported data using hook interception techniques. The data may be intercepted, for example, by intercepting an application program interface (Application Programming Interface, API) and the intercepted data may be used as reporting data.
The verification data may be, for example, data for verifying the reported value of the at least one behavioral event. For example, when the action simulated by the verification device is a short video sliding action, the at least one action event may include an exposure action event and a play duration action event, and correspondingly, the verification data may include: the verification values of exposure, video playing time length and the like.
For example, the data for verifying the reported value of the at least one behavioral event may be analog data.
In other words, the verification device can construct a driving example through the simulation data of each behavior event so as to simulate the operation action of the user. For example, when the action simulated by the verification device is a short video sliding action, the verification device can construct a driving example by using the simulation data of the video playing time event and the exposure event so as to realize the short video sliding action of the simulation user; the verification data may include analog data of the video playback duration event and analog data of the exposure event at this time.
The verification data may include, for example, authenticity data.
Wherein the real data includes information about the user and data about the object for which the simulated operation action is directed.
Taking the simulated operation action as an example of simulating the operation action of the user sliding the display interface or a partial region in the display interface, the verification data may include the relevant information of the user and the relevant information of the sliding display interface or the partial region in the display interface. Optionally, the related information of the user may include information such as an account number, an avatar, and the like of the user. Optionally, the sliding display interface or the related information of the partial area in the display interface includes, but is not limited to: the content displayed in the display interface, the identification of the partial area, the content displayed in the partial area, and the like. Wherein, the content in the display interface or the content displayed in the partial area is uniquely identified by information such as resource identification.
Taking the simulated operation action as an example of the operation action of simulating the user to slide the short video, the verification data may include the related information of the user and the related information of the content of the short video.
Illustratively, when the verification data includes real data and the real data includes related information of the user, the authorization of the user needs to be acquired in advance. That is, after the verification device takes the authorization of the user, the verification device can acquire the relevant information of the user through acquisition and uses the relevant information as verification data to verify the relevant information of the user in the report data sent by the application program.
S230, the verification device verifies the reported values of all the behavior events in the reported data based on the verification values of all the behavior events in the verification data, and a verification result of the data reporting function of the application program is obtained.
Illustratively, the verification value of each behavior event is used to verify the reported value of each behavior event.
Taking the behavior event as a video playing time event as an example, the reported value of the video playing time event is a value reported for the video playing time event, the verification value of the video playing time event is a numerical value for verifying the report of the video playing time event. For example, the value reported for the video playback duration event may be a value in seconds, and the check value for the video playback duration event may also be a value in seconds.
For example, a single action for simulating a user may trigger one or more behavioral events, where each behavioral event corresponds to a reported value and a verification value.
Taking the simulated operation action of the user as the simulated operation action of the user sliding display interface or the partial region in the display interface as an example, the triggered behavior event can comprise an exposure behavior event for representing exposure and can also comprise a video playing duration behavior event for representing video playing duration. Based on the above, the verification device can obtain the verification value of the video playing time event and the verification value of the exposure event generated by random sliding every time the application program executes the simulation operation, and after the report value of the video playing time event and the report value of the exposure event are obtained, the report value of the video playing time event can be verified by the verification value of the video playing time event, and the report value of the exposure event can be verified by the verification value of the exposure event, so that a verification result can be obtained.
The verification device may use a cloud computing service provided by the cloud server to verify the reported value of each behavior event in the reported data based on the verification value of each behavior event in the verification data, so as to obtain a verification result of the data reporting function of the application program.
In the embodiment of the application, the operation action of a user is simulated through a driving application program, and at least one behavior event for representing the behavior of the user is obtained; based on the above, not only the verification data for verifying the report data of the application program can be obtained; the application program can be triggered to report the reported data; furthermore, the verification value of each behavior event in the verification data can be based on the verification value of each behavior event in the verification data, so as to obtain the verification result of the data reporting function of the application program, thereby realizing the automatic verification of the data reporting function of the application program, and further obtaining the following beneficial effects:
1. before each product application is applied or released, the automatic calibration and verification of the data reporting function of the application program are realized in a mode of overdriving the application program, so that the manual triggering scene type calibration of the data reporting function of the application program before each version release is avoided, a large amount of manpower is released, and the calibration cost is reduced.
2. In the subsequent maintenance of the application program, even if the need of modification is needed, the automatic calibration and verification of the data reporting function of the application program can be realized by driving the application program.
3. After the application program product is on line, the data reporting function of the application program product can be subjected to multiple disc detection in a mode of driving the application program. Namely, the data reporting function is in a multiple disc detection state. Therefore, after the application program product is online, even if the problem occurs in the data reporting function, for example, other staff incorrectly modifies codes to cause loopholes (bugs) and the like in the data reporting function, the problem can be found through the multi-disk detection.
4. The method has the advantages that the repeated disc detection is carried out on the data reporting function of the application program in a mode of driving the application program, problems can be found out in time and the problems can be repaired, and therefore the operation difficulty of an application program product is reduced.
In summary, the verification method for the data reporting function provided by the embodiment of the application not only can reduce the verification cost of the data reporting function of the application program and promote the user experience, but also is beneficial to the multiple disk detection of the data reporting function of the application program product after online and the timely repair of the problems related to the data reporting function.
In some embodiments, if the reported data includes: at least one reporting running water, wherein the reporting running water corresponds to a reporting object identifier for uniquely identifying a reporting object, and the reporting running water corresponds to a reporting behavior identifier for uniquely identifying a behavior event, and the reporting value of the behavior event identified by the reporting behavior identifier; the verification data includes: at least one check object identifier for uniquely identifying at least one check object, a check behavior identifier for uniquely identifying a behavior event corresponding to each check object identifier in the at least one check object identifier, and a check value of the behavior event identified by the check behavior identifier; wherein, the S230 may include: the verification device verifies the reported values in each reported stream based on the first verification value in the verification data to obtain a verification result; the verification object identifier of the first verification value is the reporting object identifier corresponding to each reporting running water, and the verification behavior identifier of the first verification value is the reporting behavior identifier corresponding to each reporting running water. That is, the verification device may verify the reported values in the reporting flows based on the verification value that the verification object identifier in the verification data is the reporting object identifier corresponding to the reporting flows and the verification behavior identifier is the reporting behavior identifier corresponding to the reporting flows, so as to obtain the verification result.
In other words, the at least one reporting pipeline may be data reported for the same simulated operation action, and each reporting pipeline may be a triplet composed of a reporting object identifier, a reporting behavior identifier, and a reporting value.
Illustratively, each of the at least one reporting stream may be for a different object, that is, the reporting data may include: the same simulated operational action triggers the reporting of values of one or more behavioral events for different objects. Similarly, the verification data includes data for the same simulated operational action, e.g., the same simulated operational action may be for one or more behavioral events under different objects, and the reporting data includes verification values for the one or more behavioral events triggered by the same simulated operational action for different objects.
Or, each report value in the report data is associated with a report object identifier and a report behavior identifier. The report object identifiers associated with the report values of one or more behavior events triggered by the same simulated operation action are different for different objects, and the report object identifiers associated with the report values of one or more behavior events triggered by the same simulated operation action are the same for the same object. For different behavior events, the reporting value and the associated reporting behavior identifier are different, and for the same behavior event, the reporting value and the associated reporting behavior identifier are the same. Similarly, each check value in the check data is associated with a check object identifier and a check behavior identifier. The verification object identifiers associated with the verification values of one or more behavior events triggered by the same simulated operation action are different for different objects, and the verification object identifiers associated with the report values of one or more behavior events triggered by the same simulated operation action are the same for the same object. For different behavior events, the verification value and the associated verification behavior identification are different, and for the same behavior event, the verification value and the associated verification behavior identification are the same.
Of course, in other alternative embodiments, if the verification device is capable of driving the application program to perform a plurality of operation actions simulating the user, each reported value in the reported data and each verification value in the verification data need to be associated with a driving identifier, where the driving identifier is used for uniquely identifying the driving or code of the application program.
The report data may be a reported action event queue, and the verification data may be implemented as an acquired action event queue, based on which the verification device may verify the report value in each report flow based on the verification value of the action event in which the verification object identifier is the report object identifier corresponding to each report flow and the verification action identifier is the report action identifier corresponding to each report flow in the acquired action event queue, to obtain the verification result.
In some embodiments, if the report data further includes a report element identifier for the unique identifier element corresponding to the report behavior identifier, the check data further includes a check element identifier for the unique identifier element corresponding to the check behavior identifier; the check element identifier of the first check value is a reporting element identifier corresponding to each reporting pipeline. That is, the verification device may verify the report value in each report flow based on the verification value in the verification data, where the verification object identifier is the report object identifier corresponding to each report flow, the verification behavior identifier is the report behavior identifier corresponding to each report flow, and the verification element identifier is the report element identifier corresponding to each report flow, to obtain the verification result.
The verification device may verify the reporting value in each reporting flow to obtain the verification result based on the obtained reporting object identifier of the reporting event queue, the verification behavior identifier being a verification value of an element of the reporting element identifier corresponding to each reporting flow under the action event of the reporting object identifier corresponding to each reporting flow.
In some embodiments, the S210 may include:
driving the application program to execute the operation action of the user through at least one driving use case to acquire at least one behavior event; the at least one behavior event includes behavior events corresponding to each driving example in the at least one driving example.
For example, the verification device may store a code or a driver simulating the operation action of the user, and further, when the verification device runs the driver or the code simulating the operation action of the user, the verification device may implement the driving application to execute the operation action of the user. For example, when the verification device stores a code or a driver simulating the operation of the user sliding display interface or the partial region in the display interface, the verification device can implement the action of automatically executing the sliding display interface or the partial region in the display interface by running the driver or the code simulating the operation of the user sliding display interface or the partial region in the display interface. After the application program automatically performs the operation action of the simulated user, at least one behavior event for representing the behavior of the user can be triggered.
In some embodiments, the at least one driving instance comprises at least one of the following driving instances: the page starting driving example is used for driving the application program to simulate the operation actions of starting and logging in the application program by the user; the automatic sliding driving use case is used for driving the application program to execute the sliding operation action of simulating the user after watching the display interface or the display area for a preset time period; a view display driving use case for driving the application program to simulate the operation actions of partial views in the user display page or hidden views in the page; the view click driving use case is used for driving the application program to simulate the click operation action clicked by the user.
By way of example, the page launch driver may be used to automatically launch a particular page, and further can be used for checking the reported data such as login pages, login information and the like.
By way of example only, and in an illustrative, the automatic sliding driving example can be used for driving the application program to randomly execute and simulate the sliding operation action of the user after watching the display interface or the display area for a preset time period. For example, the auto-slide driving example can drive the video to automatically switch continuously without manually sliding the video, wherein the time interval of the auto-switch is a customizable random time value.
For example, the view display driving example may be used to automatically display a part of the view or the hidden view in a specific page, for example, the hidden view may be a view hidden by a button, so as to verify the reported data such as exposure of the part of the view or the hidden view.
For example, the view click driving example can be used for automatically triggering a clicking event of an area or a button in a specific page, and verification of reported data such as the number of clicks can be achieved.
It is noted that the object for which the at least one driving use case is directed is not particularly limited.
For example, the object targeted by the at least one driving case may be the whole display interface, or may be a partial area in the whole display interface.
For another example, the object to which the at least one driving example is directed may be a feed object, and the feed object may be any one of a plurality of objects that can be continuous. The feed object may include a feed video, a feed picture, and a feed text paragraph. For example, the feed video may be a short video or a short video with a link inserted. The inserted links can be used for collecting clues, can be used for application promotion, can be used for obtaining newly-added and active users for application programs, and can be used for promoting off-line stores to cover potential users around the stores. As another example, the feed video may be promotional short video content, the promotion short video content supports a plurality of modes such as a recommended channel vertical screen display mode, a native mode or a single page mode and the like. For another example, the feed video may be a promotion live broadcast room, where the promotion live broadcast room is a live broadcast room, and real-time content in the live broadcast room is directly displayed to a user group, so that the user may brush on an information stream page and directly click a screen to enter the live broadcast room.
In some embodiments, the S230 may include:
and the verification device obtains the verification result based on errors between the verification value of each behavior event and the reported value of each behavior event.
The verification device may determine, by comparing the verification value of each behavior event with the report value of each behavior event, a difference value or a ratio between the verification value of each behavior event and the report value of each behavior event as an error between the verification value of each behavior event and the report value of each behavior event, and further obtain the verification result based on the error between the verification value of each behavior event and the report value of each behavior event.
In some embodiments, the S230 may include:
if the error between the verification value of each behavior event and the reporting value of each behavior event is in the allowable range, determining that the verification of the reporting value of each behavior event is successful, wherein the verification result is that the data reporting function of the application program is normal; otherwise, determining that the verification of the reporting value of each behavior event fails, wherein the verification result is the abnormal data reporting function of the application program; if the reported value of each behavior event is determined to be successfully checked, removing the reported data from the reported value of each behavior event, and updating the number of the behavior events which are successfully checked; otherwise, removing the reported data from the reported values of the behavior events, and adding the behavior events to a verification failure list; wherein the verification result comprises the number of the behavior events which are successfully verified and the verification failure list.
The allowed range may be a range set by a user or a predefined range, for example.
Of course, in other alternative embodiments, the reported value of each behavior event in the reported data may be checked in other manners based on the check value of each behavior event in the check data, and a check result of the data reporting function of the application program may be obtained. For example, if the error between the verification value of each behavior event and the reporting value of each behavior event is smaller than a preset threshold, determining that the verification of the reporting value of each behavior event is successful, where the verification result is that the data reporting function of the application program is normal; otherwise, determining that the verification of the reporting value of each behavior event fails, wherein the verification result is the abnormal data reporting function of the application program; if the reported value of each behavior event is determined to be successfully checked, removing the reported data from the reported value of each behavior event, and updating the number of the behavior events which are successfully checked; otherwise, removing the reported data from the reported values of the behavior events, and adding the behavior events to a verification failure list; wherein the verification result comprises the number of the behavior events which are successfully verified and the verification failure list.
The verification result may also include, for example, the total report count, the verification failure count, and the success rate for each driving case. In addition, for each behavior event under each driving case, the meaning of each behavior event, the number of reporting of each behavior event, the number of verification failures of each behavior event, and the success rate of each behavior event may also be displayed.
In some embodiments, the method 200 may further comprise:
the verification device displays the verification result.
For example, the verification device may display the verification result in real time.
In the embodiment, in the process of checking the data reporting function of the application program, the checking device collects and counts the checking results and displays the checking results on the page of the testing machine in real time, so that the checking staff can conveniently check the real-time results in real time.
In some embodiments, the method 200 may further comprise:
and the verification device displays the verification result on a resident interface of the application program.
For example, the verification device may display the verification result in real-time on the resident interface.
FIG. 3 is a schematic diagram of a resident interface displaying verification results according to an embodiment of the present application.
As shown in fig. 3, the resident interface of the application may be an interface for displaying a video or a page, and the verification result may be displayed on the resident interface, where the verification result may include the total report number, the verification failure number, and the success rate under each driving use case. In addition, for each behavior event under each driving case, the meaning of each behavior event, the number of reporting of each behavior event, the number of verification failures of each behavior event, and the success rate of each behavior event may also be displayed. In addition, the resident interface may also display a button for ending verification by clicking, so that the tester ends verification of the data reporting function of the application program.
In some embodiments, the method 200 may further comprise:
the verification device stores the verification result in the database.
The verification device stores the verification result in the database after the verification of the data reporting function of the application program is completed. For example, after the verification device completes verification of the data reporting function of the application program, the verification result is stored in the cloud database.
In some embodiments, the method 200 may further comprise:
the verification device pushes the verification result to the research personnel of the application program.
The verification device automatically pushes the verification result to a developer after the verification of the data reporting function of the application program is completed, so that the developer can check whether an error exists or not and repair the data in time under the condition of the error. For example, after the verification device finishes verification of the data reporting function of the application program, the verification result can be automatically pushed to the research and development personnel through mails, voices and even an instant messaging platform. For another example, after the verification device finishes the verification of the data reporting function of the application program, the verification result can be automatically pushed to the research and development personnel through cloud communication.
FIG. 4 is another schematic flow chart of a verification method provided by an embodiment of the present application.
As shown in fig. 4, after receiving the start command, the verification device executes each driving example in the driving example list, including but not limited to a page start driving example, an auto-slide driving example, a view display driving example, and a view click driving example.
Taking an automatic sliding driving example as an example in the process of acquiring verification data by a verification device, the automatic sliding driving example slides to the next feed after passing through random time delay each time, and verification values aiming at exposure behavior events and play duration behavior events can be collected after each sliding; and then, the verification device collects verification values of the exposure behavior event and the play duration behavior event into a verification queue to form verification data. Wherein the check queue is a key-value Map set, and the key value is the identification ID of the object to which the behavior event belongs feed (i.e., object identification) for uniquely identifying the feed, under the same feed, the check values of the exposure behavior event and the play duration behavior event triggered by the automatic sliding driving use case are in the value corresponding to the same feed, the value is also a Map set in a key-value form, and the key value is the identification ID of the behavior event action I.e., behavior identification, for uniquely identifying a behavior event, value is a check value of the key-identified behavior event.
Taking an automatic sliding driving example as an example in the process of acquiring reported data by a verification device, the automatic sliding driving example slides to the next feed after each random time delay, and an application program can be triggered to report a reporting value of the application program aiming at an exposure behavior event and a playing duration behavior event after each sliding; and then, the verification device collects the report values of the exposure behavior event and the play duration behavior event into a report queue to form report data. Wherein, a behavior event can be used as a reporting flow in a reporting queue. The report queue is a key-value Map set, and the key value is the identification ID of the object to which the reported behavior event belongs feed (namely object identification) for uniquely identifying a feed, wherein the reported values of the exposure behavior event and the play time duration behavior event triggered by the automatic sliding driving use case are in the value corresponding to the same feed, the value is also a key-value form Map set, and the key value is the identification ID of the reported behavior event action (i.e. behavior identification) for uniquely identifying a behavior event, value being a key label Reporting values of identified behavioral events. In one specific implementation, the verification device may collect the reported data through a hook interception technique.
For the process that the verification device verifies the reported data based on the verification data, the verification device can verify the reported flow in the report queue in an asynchronous thread mode, namely, only if the reported flow still exists in the report queue, one reported flow is taken out for verification. Thread synchronization differs from asynchronization mainly in whether a request needs to be waited for return or not after being sent, and for thread synchronization, the next request can be sent continuously after waiting for return, while thread asynchronization is that no need to wait for return, and the next request can be sent at any time after sending one request.
Taking an automatic sliding driving example as an example, after a verification device takes out one reporting pipeline from a reporting pipeline queue, the verification device obtains the ID of the reporting pipeline from the reporting pipeline feed And ID action Reporting the ID of the flowing water through the strip feed And ID action The ID of the report stream with the object identification as the strip can be found in the check data feed And the behavior mark is the reported flow ID of the strip action The verification device can find the ID of the object mark reported to the stream line in the verification data feed And the behavior mark is the reported flow ID of the strip action The verification device verifies whether the verification value of the behavior event of the video playing duration is consistent with the verification value of the behavior event of the reporting duration or is within an allowable error range or not, and if so, the verification is passed, at the moment, the reporting value of the reporting stream can be removed from a reporting queue, the memory is prevented from being occupied continuously and cumulatively, and the number of the successfully verified video playing duration behavior events is updated; otherwise, the verification is not passed, at this time, the reporting stream can be removed from the reporting queue, so as to avoid the continuous accumulation and occupation of the memory, and the reporting stream is added to the verification failure list.
After the reported data is checked based on the check data, a check result can be obtained based on the number of behavior events which are successfully checked and the check failure list, and the check result is displayed on a constant interface in real time. For example, the verification device may display the verification result in real-time on the resident interface. Optionally, the verification result may also be reported to the database, and stored in the database. For example, after the verification device completes verification of the data reporting function of the application program, the verification device stores the verification result into the database. Optionally, the verification result may also be pushed to a developer. For example, after the verification device finishes the verification of the data reporting function of the application program, the verification result is automatically pushed to the research personnel, so that the research personnel can check whether the error exists or not and repair the error in time. For example, after the verification device finishes verification of the data reporting function of the application program, the verification result can be automatically pushed to the research and development personnel through mails, voices and even an instant messaging platform.
In this embodiment, by the automatic operation of each driving example, the manpower can be completely released, and the need of testing to manually detect whether some critical reporting has problems (possibly, the reporting capability is affected due to the existence of loopholes in the reporting function itself or the addition of modification functions by other developers) before each recovery or version sending is avoided, so that the manpower cost is greatly saved. Meanwhile, the stability of data reporting is guaranteed, the problem of reporting is found to move forward, the problem that a data checker only finds abnormality when reporting data of an external network is counted is avoided, a developer is pushed to self-check and repair the problem, the problem of the data reporting function can be found timely and repaired, and further the problem that the reporting error causes the construction of an algorithm model and the error assessment brought by a recommendation system can be avoided, so that the loss caused to the operation and maintenance of a product can be reduced.
Of course, in other alternative embodiments, similar automatic reporting data verification may be performed on the external network user, for example, the application program of the external network user may be triggered to perform the simulated user operation, so as to implement verification of the data reporting function of the application program of the external network user. During verification, the verification is counted in real time, and meanwhile, a verification result is sent to a developer of the product, so that whether a problem occurs in a reporting system of an external network user is known in real time, and therefore, the data reporting function can be guaranteed to normally operate through verification before version sending and on-line real-time verification and double insurance verification.
The preferred embodiments of the present application have been described in detail above with reference to the accompanying drawings, but the present application is not limited to the specific details of the above embodiments, and various simple modifications can be made to the technical solution of the present application within the scope of the technical concept of the present application, and all the simple modifications belong to the protection scope of the present application. For example, the specific features described in the above embodiments may be combined in any suitable manner, and in order to avoid unnecessary repetition, various possible combinations are not described further. As another example, any combination of the various embodiments of the present application may be made without departing from the spirit of the present application, which should also be regarded as the disclosure of the present application.
It should be further understood that, in the various method embodiments of the present application, the sequence numbers of the foregoing processes do not mean the order of execution, and the order of execution of the processes should be determined by the functions and internal logic of the processes, and should not constitute any limitation on the implementation process of the embodiments of the present application.
The method provided by the embodiment of the application is described above, and the device provided by the embodiment of the application is described below.
Fig. 5 is a schematic block diagram of a verification apparatus 300 for a data reporting function according to an embodiment of the present application.
As shown in fig. 5, the verification apparatus 300 may include:
a first obtaining unit 310, configured to simulate an operation action of a user through a driving application program, and obtain at least one behavior event for characterizing a behavior of the user;
a receiving unit 320, configured to receive report data of the application program;
a second obtaining unit 330, configured to obtain verification data for verifying the reported data;
and the verification unit 340 is configured to verify the reported values of the behavior events in the reported data based on the verification values of the behavior events in the verification data, so as to obtain a verification result of the data reporting function of the application program.
In some embodiments, if the reported data includes: at least one reporting running water, wherein the reporting running water corresponds to a reporting object identifier for uniquely identifying a reporting object, and the reporting running water corresponds to a reporting behavior identifier for uniquely identifying a behavior event, and the reporting value of the behavior event identified by the reporting behavior identifier; the verification data includes: at least one check object identifier for uniquely identifying at least one check object, a check behavior identifier for uniquely identifying a behavior event corresponding to each check object identifier in the at least one check object identifier, and a check value of the behavior event identified by the check behavior identifier;
The verification unit 340 is specifically configured to:
based on a first check value in the check data, checking the report value in each report flow to obtain the check result; the verification object identifier of the first verification value is the reporting object identifier corresponding to each reporting running water, and the verification behavior identifier of the first verification value is the reporting behavior identifier corresponding to each reporting running water.
In some embodiments, if the report data further includes a report element identifier for the unique identifier element corresponding to the report behavior identifier, the check data further includes a check element identifier for the unique identifier element corresponding to the check behavior identifier; the check element identifier of the first check value is the reporting element identifier corresponding to each reporting pipeline.
In some embodiments, the first obtaining unit 310 is specifically configured to:
driving the application program to execute the operation action of the user through at least one driving use case to acquire at least one behavior event;
the at least one behavior event includes behavior events corresponding to each driving example in the at least one driving example.
In some embodiments, the at least one driving instance comprises at least one of the following driving instances: the page starting driving example is used for driving the application program to simulate the operation actions of starting and logging in the application program by the user; the automatic sliding driving use case is used for driving the application program to execute the sliding operation action of simulating the user after watching the display interface or the display area for a preset time period; a view display driving use case for driving the application program to simulate the operation actions of partial views in the user display page or hidden views in the page; the view click driving use case is used for driving the application program to simulate the click operation action clicked by the user.
In some embodiments, the verification unit 340 is specifically configured to:
and obtaining the verification result based on errors between the verification value of each behavior event and the reported value of each behavior event.
In some embodiments, the verification unit 340 is specifically configured to:
if the error between the verification value of each behavior event and the reporting value of each behavior event is in the allowable range, determining that the verification of the reporting value of each behavior event is successful, wherein the verification result is that the data reporting function of the application program is normal; otherwise, determining that the verification of the reporting value of each behavior event fails, wherein the verification result is the abnormal data reporting function of the application program;
if the reported value of each behavior event is determined to be successfully checked, removing the reported data from the reported value of each behavior event, and updating the number of the behavior events which are successfully checked; otherwise, removing the reported data from the reported values of the behavior events, and adding the behavior events to a verification failure list;
wherein the verification result comprises the number of the behavior events which are successfully verified and the verification failure list.
In some embodiments, the verification unit 340 is further configured to:
Displaying the verification result on the resident interface of the application program, or
Storing the verification result to a database; or (b)
Pushing the verification result to the research personnel of the application program.
It should be understood that apparatus embodiments and method embodiments may correspond with each other and that similar descriptions may refer to the method embodiments. To avoid repetition, no further description is provided here. Specifically, the verification apparatus 300 may correspond to a corresponding main body in the method 200 for executing the embodiment of the present application, and each unit in the verification apparatus 300 is for implementing a corresponding flow in the method 200, and for brevity, will not be described herein again.
It should also be understood that each unit in the verification device 300 according to the embodiment of the present application may be formed by combining one or several other units separately or all, or some (some) of the units may be formed by splitting one or several units with smaller functions, which may achieve the same operation without affecting the implementation of the technical effects of the embodiment of the present application. The above units are divided based on logic functions, and in practical applications, the functions of one unit may be implemented by a plurality of units, or the functions of a plurality of units may be implemented by one unit. In other embodiments of the present application, the verification device 300 may also include other units, and in practical applications, these functions may also be implemented with assistance from other units, and may be implemented by cooperation of multiple units. According to another embodiment of the present application, the verification apparatus 300 related to the embodiment of the present application may be constructed by running a computer program (including a program code) capable of executing each step involved in the corresponding method on a general-purpose computing device of a general-purpose computer including a processing element such as a Central Processing Unit (CPU), a random access storage medium (RAM), a read only storage medium (ROM), and the like, and the storage element, and implementing the method provided by the embodiment of the present application. The computer program may be recorded on a computer readable storage medium, and loaded into an electronic device and executed therein to implement a corresponding method of an embodiment of the present application.
In other words, the units referred to above may be implemented in hardware, or may be implemented by instructions in software, or may be implemented in a combination of hardware and software. Specifically, each step of the method embodiment in the embodiment of the present application may be implemented by an integrated logic circuit of hardware in a processor and/or an instruction in software form, and the steps of the method disclosed in connection with the embodiment of the present application may be directly implemented as a hardware decoding processor or implemented by a combination of hardware and software in the decoding processor. Alternatively, the software may reside in a well-established storage medium in the art such as random access memory, flash memory, read-only memory, programmable read-only memory, electrically erasable programmable memory, registers, and the like. The storage medium is located in a memory, and the processor reads information in the memory, and in combination with hardware, performs the steps in the above method embodiments.
Fig. 6 is a schematic structural diagram of an electronic device 400 provided in an embodiment of the present application.
As shown in fig. 6, the electronic device 400 includes at least a processor 410 and a computer-readable storage medium 420. Wherein the processor 410 and the computer-readable storage medium 420 may be connected by a bus or other means. The computer readable storage medium 420 is for storing a computer program 421, the computer program 421 including computer instructions, and the processor 410 is for executing the computer instructions stored by the computer readable storage medium 420. Processor 410 is a computing core and a control core of electronic device 400 that are adapted to implement one or more computer instructions, in particular to load and execute one or more computer instructions to implement a corresponding method flow or a corresponding function.
As an example, the processor 410 may also be referred to as a central processing unit (Central Processing Unit, CPU). The processor 410 may include, but is not limited to: a general purpose processor, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), field programmable gate array (Field Programmable Gate Array, FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like.
By way of example, computer readable storage medium 420 may be high speed RAM memory or Non-volatile memory (Non-VolatileMemorye), such as at least one magnetic disk memory; alternatively to this, the method may comprise, but may also be at least one computer-readable storage medium located remotely from the aforementioned processor 410. In particular, computer-readable storage media 420 includes, but is not limited to: volatile memory and/or nonvolatile memory. The nonvolatile Memory may be a Read-Only Memory (ROM), a Programmable ROM (PROM), an Erasable PROM (EPROM), an Electrically Erasable EPROM (EEPROM), or a flash Memory. The volatile memory may be random access memory (Random Access Memory, RAM) which acts as an external cache. By way of example, and not limitation, many forms of RAM are available, such as Static RAM (SRAM), dynamic RAM (DRAM), synchronous DRAM (SDRAM), double Data Rate SDRAM (Double Data Rate SDRAM), enhanced SDRAM (ESDRAM), synchronous Link DRAM (SLDRAM), and Direct memory bus RAM (DR RAM).
As shown in fig. 6, the electronic device 400 may also include a transceiver 430.
The processor 410 may control the transceiver 430 to communicate with other devices, and in particular, may send information or data to other devices or receive information or data sent by other devices. Transceiver 430 may include a transmitter and a receiver. Transceiver 430 may further include antennas, the number of which may be one or more.
It will be appreciated that the various components in the communication device 400 are connected by a bus system that includes, in addition to a data bus, a power bus, a control bus, and a status signal bus. It is noted that the electronic device 400 may be any electronic device having data processing capabilities; the computer readable storage medium 420 has stored therein computer instructions; computer instructions stored in computer readable storage medium 420 are loaded and executed by processor 410 to implement the corresponding steps in the verification method provided by embodiments of the present application; in particular, the computer instructions in the computer-readable storage medium 420 are loaded by the processor 410 and perform the corresponding steps, and are not repeated here.
According to another aspect of the present application, the embodiment of the present application further provides a computer-readable storage medium (Memory), which is a Memory device in the electronic device 400, for storing programs and data. Such as computer readable storage medium 420. It is understood that the computer readable storage medium 420 herein may include both built-in storage media in the electronic device 400, but may also include extended storage media supported by electronic device 400. The computer-readable storage medium provides storage space that stores an operating system of the electronic device 400. Also stored in this memory space are one or more computer instructions, which may be one or more computer programs 421 (including program code), adapted to be loaded and executed by the processor 410.
According to another aspect of the application, embodiments of the application also provide a computer program product or computer program comprising computer instructions stored in a computer readable storage medium. Such as computer program 421. At this time, the data processing apparatus 400 may be a computer, and the processor 410 reads the computer instructions from the computer-readable storage medium 420, and the processor 410 executes the computer instructions so that the computer performs the various methods provided in the above-described various alternatives. In other words, when implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, runs the processes of, or implements the functions of, embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a computer network, or other programmable apparatus. The computer instructions may be stored in a computer-readable storage medium or transmitted from one computer-readable storage medium to another computer-readable storage medium, for example, from one website, computer, server, or data center by wired (e.g., coaxial cable, fiber optic, digital subscriber line (digital subscriber line, DSL)) or wireless (e.g., infrared, wireless, microwave, etc.) means.
Those of ordinary skill in the art will appreciate that the elements and process steps of the examples described in connection with the embodiments disclosed herein may be implemented as electronic hardware, or as a combination of computer software and electronic hardware. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
Finally, it should be noted that the above is only a specific embodiment of the present application, but the scope of the present application is not limited thereto, and any person skilled in the art can easily think about the changes or substitutions within the technical scope of the present application, and the changes or substitutions are all covered by the scope of the present application. Thus, the first and second substrates are bonded together, the protection scope of the application is subject to the protection scope of the claims.

Claims (19)

1. The verification method of the data reporting function is characterized by comprising the following steps:
the operation actions of the user are simulated by the driving application program, obtaining at least one behavioral event for characterizing the behavior of the user;
Receiving the report data of the application program and acquiring verification data for verifying the report data;
and verifying the reported values of all the behavior events in the reported data based on the verification values of all the behavior events in the verification data to obtain a verification result of the data reporting function of the application program.
2. The method of claim 1, wherein if the reporting data comprises: at least one reporting running water, wherein reporting object identifiers for reporting objects with unique identifiers corresponding to each reporting running water in the at least one reporting running water, reporting behavior identifiers for reporting behavior events with unique identifiers corresponding to each reporting running water, and reporting values of the behavior events identified by the reporting behavior identifiers; the verification data includes: at least one check object identifier for uniquely identifying at least one check object, a check behavior identifier for uniquely identifying a behavior event corresponding to each check object identifier in the at least one check object identifier, and a check value of the behavior event identified by the check behavior identifier;
the verifying the reporting value of each behavior event in the reporting data based on the verification value of each behavior event in the verification data to obtain a verification result of the data reporting function of the application program, including:
Based on a first check value in the check data, checking the report value in each report flow to obtain the check result; the verification object identifier of the first verification value is a reporting object identifier corresponding to each reporting running water, and the verification behavior identifier of the first verification value is a reporting behavior identifier corresponding to each reporting running water.
3. The method of claim 2, wherein if the report data further includes a report element identifier for a unique identifier element corresponding to the report behavior identifier, the check data further includes a check element identifier for a unique identifier element corresponding to the check behavior identifier; and the check element identifiers of the first check value are report element identifiers corresponding to the report running water.
4. The method of claim 1, wherein the simulating, by the driver application, the user's operational actions, obtaining at least one behavioral event characterizing the user's behavior, comprises:
driving the application program to simulate the operation action of the user through at least one driving use case, and acquiring the at least one behavior event;
Wherein the at least one behavioral event includes a behavioral event corresponding to each of the at least one driving use-case.
5. The method of claim 4, wherein the at least one driving instance comprises at least one of the following driving instances: the page starting driving example is used for driving the application program to simulate the operation actions of starting and logging in the application program by the user; the automatic sliding driving use case is used for driving the application program to simulate the sliding operation action of the user after watching the display interface or the display area for a preset period of time; a view display driving use case for driving the application program to simulate the operation actions of partial views in the user display page or hidden views in the page; and the view click driving use case is used for driving the application program to simulate the click operation action clicked by the user.
6. The method according to any one of claims 1 to 5, wherein the verifying the reported value of each behavior event in the reported data based on the verification value of each behavior event in the verification data to obtain a verification result of the data reporting function of the application program includes:
And obtaining the verification result based on errors between the verification value of each behavior event and the reported value of each behavior event.
7. The method of claim 6, wherein the obtaining the verification result based on the error between the verification value of each behavior event and the reported value of each behavior event comprises:
if the error between the verification value of each behavior event and the reporting value of each behavior event is in the allowable range, determining that the verification of the reporting value of each behavior event is successful, wherein the verification result is that the data reporting function of the application program is normal; otherwise, determining that the verification of the reporting value of each behavior event fails, wherein the verification result is the abnormal data reporting function of the application program;
if the reported value of each behavior event is determined to be successfully checked, removing the reported data from the reported value of each behavior event, and updating the number of the behavior events which are successfully checked; otherwise, removing the reported value of each behavior event from the reported data, and adding each behavior event to a verification failure list;
Wherein the verification result comprises the number of behavior events which are successfully verified and the verification failure list.
8. The method according to any one of claims 1 to 5, further comprising:
displaying the verification result on a resident interface of the application program; or (b)
Storing the verification result to a database; or (b)
Pushing the verification result to the research personnel of the application program.
9. A verification device for a data reporting function, comprising:
the first acquisition unit is used for simulating the operation action of a user through a driving application program and acquiring at least one behavior event used for representing the behavior of the user;
the receiving unit is used for receiving the report data of the application program;
the second acquisition unit is used for acquiring verification data for verifying the reported data;
and the verification unit is used for verifying the reported values of all the behavior events in the reported data based on the verification values of all the behavior events in the verification data to obtain a verification result of the data reporting function of the application program.
10. The verification device of claim 9, wherein if the reported data comprises: at least one reporting running water, wherein reporting object identifiers for reporting objects with unique identifiers corresponding to each reporting running water in the at least one reporting running water, reporting behavior identifiers for reporting behavior events with unique identifiers corresponding to each reporting running water, and reporting values of the behavior events identified by the reporting behavior identifiers; the verification data includes: at least one check object identifier for uniquely identifying at least one check object, a check behavior identifier for uniquely identifying a behavior event corresponding to each check object identifier in the at least one check object identifier, and a check value of the behavior event identified by the check behavior identifier;
Wherein, the verification unit is specifically configured to:
based on a first check value in the check data, checking the report value in each report flow to obtain the check result; the verification object identifier of the first verification value is a reporting object identifier corresponding to each reporting running water, and the verification behavior identifier of the first verification value is a reporting behavior identifier corresponding to each reporting running water.
11. The verification device of claim 10, wherein if the report data further includes a report element identifier for a unique identifier element corresponding to the report action identifier, the verification data further includes a verification element identifier for a unique identifier element corresponding to the verification action identifier; and the check element identifiers of the first check value are report element identifiers corresponding to the report running water.
12. The verification device of claim 9, wherein the first obtaining unit is specifically configured to:
driving the application program to simulate the operation action of the user through at least one driving use case, and acquiring the at least one behavior event;
wherein the at least one behavioral event includes a behavioral event corresponding to each of the at least one driving use-case.
13. The verification device of claim 12, wherein the at least one driving instance comprises at least one of: the page starting driving example is used for driving the application program to simulate the operation actions of starting and logging in the application program by the user; the automatic sliding driving use case is used for driving the application program to simulate the sliding operation action of the user after watching the display interface or the display area for a preset period of time; a view display driving use case for driving the application program to simulate the operation actions of partial views in the user display page or hidden views in the page; and the view click driving use case is used for driving the application program to simulate the click operation action clicked by the user.
14. The checking device according to any one of claims 9 to 13, characterized in that said checking unit is specifically configured to:
and obtaining the verification result based on errors between the verification value of each behavior event and the reported value of each behavior event.
15. The checking device according to claim 14, wherein the checking unit is specifically configured to:
if the error between the verification value of each behavior event and the reporting value of each behavior event is in the allowable range, determining that the verification of the reporting value of each behavior event is successful, wherein the verification result is that the data reporting function of the application program is normal; otherwise, determining that the verification of the reporting value of each behavior event fails, wherein the verification result is the abnormal data reporting function of the application program;
If the reported value of each behavior event is determined to be successfully checked, removing the reported data from the reported value of each behavior event, and updating the number of the behavior events which are successfully checked; otherwise, removing the reported value of each behavior event from the reported data, and adding each behavior event to a verification failure list;
wherein the verification result comprises the number of behavior events which are successfully verified and the verification failure list.
16. The verification device of any one of claims 9 to 13, wherein the verification unit is further configured to:
displaying the verification result on a resident interface of the application program; or (b)
Storing the verification result to a database; or (b)
Pushing the verification result to the research personnel of the application program.
17. An electronic device, comprising:
a processor adapted to execute a computer program;
a computer readable storage medium having stored therein a computer program which, when executed by the processor, implements the method of any of claims 1 to 8.
18. A computer readable storage medium storing a computer program for causing a computer to perform the method of any one of claims 1 to 8.
19. A computer program product comprising computer programs/instructions which, when executed by a processor, implement the method of any of claims 1 to 8.
CN202211097865.5A 2022-09-08 2022-09-08 Verification method and device for data reporting function and electronic equipment Pending CN117009345A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202211097865.5A CN117009345A (en) 2022-09-08 2022-09-08 Verification method and device for data reporting function and electronic equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202211097865.5A CN117009345A (en) 2022-09-08 2022-09-08 Verification method and device for data reporting function and electronic equipment

Publications (1)

Publication Number Publication Date
CN117009345A true CN117009345A (en) 2023-11-07

Family

ID=88573358

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202211097865.5A Pending CN117009345A (en) 2022-09-08 2022-09-08 Verification method and device for data reporting function and electronic equipment

Country Status (1)

Country Link
CN (1) CN117009345A (en)

Similar Documents

Publication Publication Date Title
US11798028B2 (en) Systems and methods for monitoring malicious software engaging in online advertising fraud or other form of deceit
CN104363264B (en) The SDK access systems by all kinds of means of mobile terminal software
CN112073269B (en) Block chain network testing method, device, server and storage medium
JP2021501935A (en) Computer-implemented systems and methods for linking blockchain to a set of digital twins
CN108536521B (en) Simulation platform-based offline environment checking method and device
CN111782551B (en) Test method and device for block chain item and computer equipment
CN101013968A (en) Automated interface testing framework
CN112187585A (en) Network protocol testing method and device
CN111949531B (en) Block chain network testing method, device, medium and electronic equipment
CN110838067B (en) Real estate transaction data processing method, device, server and storage medium
CN112148573A (en) Method and device for recording and playing back webpage operation process
CN110808839B (en) Processing method, device, equipment and medium for block chain abnormal data
CN116155771A (en) Network anomaly test method, device, equipment, storage medium and program
CN112202647B (en) Test method, device and test equipment in block chain network
CN111694743A (en) Service system detection method and device
US10079738B1 (en) Using a network crawler to test objects of a network document
CN115730935A (en) Data processing method, device and equipment based on block chain and readable storage medium
CN111917729B (en) Dynamic injection test method and device and related equipment
CN110858211B (en) Data storage method, device and system and storage medium
CN112015715A (en) Industrial Internet data management service testing method and system
CN111786991B (en) Block chain-based platform authentication login method and related device
CN117009345A (en) Verification method and device for data reporting function and electronic equipment
CN110134558A (en) A kind of detection method and device of server
CN113127325B (en) Method and device for processing problem order and storage medium
CN108021508A (en) A kind of computer software product quality control management system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination