CN106301983A - A kind of website based on fictitious host computer detection method and device - Google Patents
A kind of website based on fictitious host computer detection method and device Download PDFInfo
- Publication number
- CN106301983A CN106301983A CN201510291107.0A CN201510291107A CN106301983A CN 106301983 A CN106301983 A CN 106301983A CN 201510291107 A CN201510291107 A CN 201510291107A CN 106301983 A CN106301983 A CN 106301983A
- Authority
- CN
- China
- Prior art keywords
- host computer
- fictitious host
- detection
- website
- domain name
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000001514 detection method Methods 0.000 title claims abstract description 207
- 238000012360 testing method Methods 0.000 claims abstract description 50
- 238000000034 method Methods 0.000 claims abstract description 39
- 230000006872 improvement Effects 0.000 claims description 24
- 238000013508 migration Methods 0.000 claims description 10
- 230000005012 migration Effects 0.000 claims description 10
- 238000004590 computer program Methods 0.000 claims description 8
- 238000013507 mapping Methods 0.000 claims description 8
- 238000011084 recovery Methods 0.000 claims description 7
- 230000007704 transition Effects 0.000 claims description 5
- 238000007689 inspection Methods 0.000 claims description 4
- 230000008569 process Effects 0.000 description 18
- 238000003860 storage Methods 0.000 description 9
- 230000002159 abnormal effect Effects 0.000 description 7
- 238000010586 diagram Methods 0.000 description 5
- 238000005516 engineering process Methods 0.000 description 5
- 230000008859 change Effects 0.000 description 4
- 238000004140 cleaning Methods 0.000 description 4
- 230000006870 function Effects 0.000 description 3
- 238000012544 monitoring process Methods 0.000 description 3
- 230000003287 optical effect Effects 0.000 description 3
- 238000012545 processing Methods 0.000 description 3
- 238000012546 transfer Methods 0.000 description 3
- 239000011800 void material Substances 0.000 description 3
- 230000009471 action Effects 0.000 description 2
- 230000008901 benefit Effects 0.000 description 2
- 238000004364 calculation method Methods 0.000 description 2
- 238000011835 investigation Methods 0.000 description 2
- 238000005457 optimization Methods 0.000 description 2
- 241001269238 Data Species 0.000 description 1
- 238000004458 analytical method Methods 0.000 description 1
- 230000003466 anti-cipated effect Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000007812 deficiency Effects 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 238000002955 isolation Methods 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L1/00—Arrangements for detecting or preventing errors in the information received
- H04L1/24—Testing correct operation
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer And Data Communications (AREA)
- Debugging And Monitoring (AREA)
Abstract
The embodiment of the present application provides a kind of website based on fictitious host computer detection method and device, and the method includes: receive the detection request of website;Described detection request includes the fictitious host computer mark carrying the fictitious host computer of described website;Described website is detected, to obtain testing result according to described fictitious host computer mark;Wherein, one or more during described detection at least includes fictitious host computer detection, the detection of website domain name, website status detection, network state detection, website applying detection.The embodiment of the present application achieves detection the most automatically, substantially increases the simplicity of detection, improves the efficiency of detection.
Description
Technical field
The application relates to detection technique field, particularly relates to a kind of website based on fictitious host computer detection side
Method and a kind of website based on fictitious host computer detection device.
Background technology
Along with the fast development of the network technology, a lot of enterprises, unit even individual sets up website on network,
Carry out informatization.
Owing to a lot of medium-sized and small enterprises do not possess enough website professionals, and, along with network is in enterprise
Effect in informatization is more obvious, and the demand of network application is also become increasingly complex by enterprise,
In this case, web hosting service provides a kind of effective way for setting up website.
In the running of website, more or less can encounter problems.And the use that empty machine host is built a station
For family, user website technical background is the weakest, when usual user website breaks down, all can only lead to
Cross professional technique support staff website is investigated.
And, professional and technical personnel typically requires and investigates the most one by one, then provides suggestion solution party
Case, detection process is the most loaded down with trivial details, time-consuming, and efficiency is the lowest.
Summary of the invention
In view of the above problems, it is proposed that the embodiment of the present application is to provide one to overcome the problems referred to above or extremely
Partially solve a kind of based on fictitious host computer the website detection method of the problems referred to above and corresponding one
Website based on fictitious host computer detection device.
In order to solve the problems referred to above, this application discloses a kind of website based on fictitious host computer detection method,
Including:
Receive the detection request of website;Described detection request includes carrying the fictitious host computer of described website
Fictitious host computer identifies;
Described website is detected, to obtain testing result according to described fictitious host computer mark;
Wherein, described detection at least include fictitious host computer detection, website domain name detection, website status detection,
One or more in network state detection, website applying detection.
Preferably, also include:
When described testing result meets default property value, generate website for described testing result and improve
Suggestion.
Preferably, described fictitious host computer mark includes the second level domain of described fictitious host computer.
Preferably, the detection of described fictitious host computer detection at least includes Expiration Date of fictitious host computer, virtual
The space of main frame, fictitious host computer data base in one or more;
Described website is detected, to obtain the step of testing result by described mark according to described fictitious host computer
Suddenly include:
Inquire about the information of fictitious host computer corresponding to described fictitious host computer mark;
Wherein, the information of described fictitious host computer at least includes following one or more:
The Expiration Date of fictitious host computer, the space of fictitious host computer, the data base of fictitious host computer.
Preferably, described website domain name detection detection at least include domain name binding, the domain name Expiration Date,
One or more in domain name mapping;
Described website is detected, to obtain the step of testing result by described mark according to described fictitious host computer
Suddenly include:
Judge that described fictitious host computer identifies whether the domain name binding with described website;
The most then inquire about the Expiration Date of domain name;
Whether detection domain name is resolved to the server belonging to described fictitious host computer.
Preferably, described website status detection detection at least include fictitious host computer close down, close down reason,
Fictitious host computer migrate, put on record in website, fictitious host computer back up, fictitious host computer recovery in one or more;
Described website is detected, to obtain the step of testing result by described mark according to described fictitious host computer
Suddenly include:
Inquire about whether fictitious host computer corresponding to described virtual identifying is closed down;The most then inquire about and to be closed down
Reason;
Inquire about whether fictitious host computer corresponding to described virtual identifying is in Data Migration state, data backup shape
State, data recover state;
Inquire about whether domain name corresponding to described virtual identifying puts on record successfully;The most then inquire about the access business that puts on record.
Preferably, described website is detected, to obtain detection by described mark according to described fictitious host computer
The step of result includes:
Inquire about the fictitious host computer that described fictitious host computer mark is corresponding;
Detect network information service state and/or the application pool state of described fictitious host computer, to obtain net
Network status information.
Preferably, during the detection of described website applying detection at least includes that homepage setting, data base connect
One or more;
Described website is detected, to obtain the step of testing result by described mark according to described fictitious host computer
Suddenly include:
Whether the fictitious host computer inquiring about described fictitious host computer mark corresponding arranges homepage;
Whether the data base inquiring about fictitious host computer corresponding to described fictitious host computer mark connects normally.
The embodiment of the present application also discloses a kind of website based on fictitious host computer detection device, including:
Detection request receives submodule, for receiving the detection request of website;Described detection request includes
Carry the fictitious host computer mark of the fictitious host computer of described website;
Website detection module, for detecting described website according to described fictitious host computer mark, to obtain
Obtain testing result;
Wherein, described detection at least include fictitious host computer detection, website domain name detection, website status detection,
One or more in network state detection, website applying detection.
Preferably, also include:
Suggestion generation module, for when described testing result meets default property value, for described inspection
Survey result and generate website recommendation on improvement.
Preferably, described fictitious host computer mark includes the second level domain of described fictitious host computer.
Preferably, the detection of described fictitious host computer detection at least includes Expiration Date of fictitious host computer, virtual
The space of main frame, fictitious host computer data base in one or more;
Described website detection module includes:
First inquiry submodule, for inquiring about the information of fictitious host computer corresponding to described fictitious host computer mark;
Wherein, the information of described fictitious host computer at least includes following one or more:
The Expiration Date of fictitious host computer, the space of fictitious host computer, the data base of fictitious host computer.
Preferably, described website domain name detection detection at least include domain name binding, the domain name Expiration Date,
One or more in domain name mapping;
Described website detection module includes:
First judges submodule, ties up for judging described fictitious host computer to identify whether with the domain name of described website
Fixed;The most then call the second inquiry submodule;
Second inquiry submodule, for inquiring about the Expiration Date of domain name;
First detection sub-module, for detecting whether domain name is resolved to the clothes belonging to described fictitious host computer
Business device.
Preferably, described website status detection detection at least include fictitious host computer close down, close down reason,
Fictitious host computer migrate, put on record in website, fictitious host computer back up, fictitious host computer recovery in one or more;
Described website detection module includes:
3rd inquiry submodule, for inquiring about whether fictitious host computer corresponding to described virtual identifying is closed down;
The most then call the 4th inquiry submodule;
4th inquiry submodule, the reason closed down for inquiry;
5th inquiry submodule, for inquiring about whether fictitious host computer corresponding to described virtual identifying is in data
Transition state, data backup status, data recover state;
6th inquiry submodule, for inquiring about whether domain name corresponding to described virtual identifying puts on record successfully;If
It is then to inquire about the access business that puts on record.
Preferably, described website detection module includes:
7th inquiry submodule, for inquiring about the fictitious host computer that described fictitious host computer mark is corresponding;
Second detection sub-module, for detecting network information service state and/or the application of described fictitious host computer
Program pond state, to obtain network state information.
Preferably, during the detection of described website applying detection at least includes that homepage setting, data base connect
One or more;
Described website detection module includes:
Whether the 8th inquiry submodule, arranged for the fictitious host computer inquiring about described fictitious host computer mark corresponding
Homepage;
9th inquiry submodule, for inquiring about the data base of fictitious host computer corresponding to described fictitious host computer mark
Whether connect normal.
The embodiment of the present application includes advantages below:
The embodiment of the present application provides fictitious host computer detection, website domain name for the website that fictitious host computer is carried
The multiple detection methods such as detection, website status detection, network state detection, website applying detection, it is achieved
The most automatically detection, substantially increases the simplicity of detection, improves the efficiency of detection.
The embodiment of the present application is for the result of detection, in conjunction with property value, it is provided that website recommendation on improvement, with auxiliary
Help user optimization website, thus reduce the generation frequency of website fault, when breaking down in website, it is achieved
The autonomous investigation of naive user, reduces the technical threshold of detection, further increases the efficiency of detection.
Accompanying drawing explanation
Fig. 1 is the steps flow chart of a kind of based on fictitious host computer the website detection method embodiment of the application
Figure;
Fig. 2 is the examples of interfaces figure before a kind of detection of the application;
Fig. 3 is a kind of examples of interfaces figure detecting process of the application;
Fig. 4 is a kind of examples of interfaces figure detecting end of the application;
Fig. 5 is the structured flowchart of a kind of based on fictitious host computer the website detection device embodiment of the application.
Detailed description of the invention
Understandable, below in conjunction with the accompanying drawings for enabling the above-mentioned purpose of the application, feature and advantage to become apparent from
With detailed description of the invention, the application is described in further detail.
With reference to Fig. 1, it is shown that a kind of based on fictitious host computer the website detection method embodiment of the application
Flow chart of steps, specifically may include steps of:
Step 101, receives the detection request of website;
It should be noted that fictitious host computer (Virtual Host/Virtual Server) be use special soft
Hardware technology, is divided into multiple logic storage units, Mei Gedan a real physics host computer
Unit does not all have physical entity, but each physical location can be at network as real physical host
Upper work, has single IP address (or the IP address shared) and complete server capability.
Even if in same hardware, same operating system, running the difference opened for multiple users
Server formula, it is also possible to do not interfere with each other.And each user have oneself a part of system resource (as
IP address, document memory space, internal memory, CPU time etc.).
It is completely independent between fictitious host computer, in the external world, each fictitious host computer and a single master
The performance of machine is identical.
So this Logical HEA being virtualized is referred to as " fictitious host computer " visually.
In the embodiment of the present application, can set up website on fictitious host computer, user can pass through client
Send the detection request of this website to the server belonging to fictitious host computer, with request, this website is examined
Survey.
Such as, user can be by clicking on " detection immediately " control of user interface as shown in Figure 2
Part sends detection request.
Wherein, described detection request can include the fictitious host computer mark carrying the fictitious host computer of described website
Know;Fictitious host computer mark can be the information that can represent a well-determined fictitious host computer.
In implementing, described fictitious host computer mark can include the second level domain of described fictitious host computer,
This second level domain can be web hosting service provider for convenience in the user of fictitious host computer to website
A kind of temporary domain name carrying out debugging and provide.
Such as, former domain name is " www.xxx.com ", then its second level domain can be " mail.xxx.com ".
Step 102, detects described website according to described fictitious host computer mark, to obtain detection knot
Really;
Wherein, described detection at least can include fictitious host computer detection, the detection of website domain name, website status
One or more in detection, network state detection, website applying detection.
Fictitious host computer detection can be the detection that the essential information to fictitious host computer is carried out;
Website domain name detection can be the detection that the information to website domain name is carried out;
Website status detection can be the detection that the running status to website is carried out;
Network state detection can be for the detection carrying out the network state of the server belonging to fictitious host computer;
Website applying detection can be the detection that the application to website is carried out.
Application the embodiment of the present application, as it is shown on figure 3, fictitious host computer detection, website domain can be carried out successively
Name detection, website status detection, network state detection, website applying detection.
It is, of course, also possible to use other orders to detect, this is not any limitation as by the embodiment of the present application.
In a preferred embodiment of the present application, the detection of described fictitious host computer detection at least can wrap
Include one or more in the data base of the Expiration Date of fictitious host computer, the space of fictitious host computer, fictitious host computer;
The most in the embodiment of the present application, step 102 can include following sub-step:
Sub-step S11, inquires about the information of fictitious host computer corresponding to described fictitious host computer mark;
Wherein, the information of described fictitious host computer at least includes following one or more:
The Expiration Date of fictitious host computer, the space of fictitious host computer, the data base of fictitious host computer.
In the embodiment of the present application, it is provided that an independent Host Management Console is (as independent of clothes
Program outside business device), the management for the fictitious host computer of user's offer of fictitious host computer controls.
By the Host Management Console independent at this, Expiration Date of fictitious host computer, virtual can be inquired
The space of main frame, the database testing result of fictitious host computer.
Wherein, user generally buys fictitious host computer, and to obtain useful life, this Expiration Date can be to use
The expiration time in time limit.
The space of fictitious host computer can include size and the service condition (such as usage amount, utilization rate) in space
Deng.
The data base of fictitious host computer can include that the size of data base and service condition are (such as usage amount, use
Rate) etc..
In a preferred embodiment of the present application, the detection of described website domain name detection at least can wrap
Include one or more in domain name binding, domain name Expiration Date, domain name mapping;The most in the embodiment of the present application,
Step 102 can include following sub-step:
Sub-step S21, it is judged that described fictitious host computer identifies whether the domain name binding with described website;If so,
Then perform sub-step S22;
In the embodiment of the present application, it is provided that an independent Host Management Console, for fictitious host computer
User provide fictitious host computer management control.
By the Host Management Console independent at this, fictitious host computer can be inquired about and identify whether and website
Domain name binding (testing result).
Sub-step S22, the Expiration Date of inquiry domain name;
In implementing, the Expiration Date of this domain name can be inquired about by calling the interface of Virtual network operator
(testing result).
Sub-step S23, whether detection domain name is resolved to the server belonging to described fictitious host computer.
Generally, each fictitious host computer does not has independent IP address, on each station server
An IP address shared by fictitious host computer.
In implementing, DNS (Domain Name System, domain name analysis system) can be passed through
Resolve the IP address of domain name association, then may determine that whether domain name is resolved to the service belonging to fictitious host computer
Device (testing result).
If this IP address is identical with the server belonging to fictitious host computer, then confirm that this domain name can be resolved to
Server belonging to fictitious host computer.
In a preferred embodiment of the present application, the detection of described website status detection at least can wrap
Include fictitious host computer close down, close down reason, fictitious host computer migrate, put on record in website, fictitious host computer back up, void
Intend one or more during main frame recovers;The most in the embodiment of the present application, step 102 can include as follows
Sub-step:
Sub-step S31, inquires about whether fictitious host computer corresponding to described virtual identifying is closed down;The most then
Perform sub-step S32;
Sub-step S32, the reason that inquiry is closed down;
In the embodiment of the present application, monitoring attributes alarming threshold value, statistics can be preset in Surveillance center
Cycle and the number of times upper limit, be monitored the service condition of fictitious host computer.
When the situation of monitoring meets default condition, fictitious host computer is closed down at punishment center.Then by punishment
Center can inquire about the reason (testing result) whether fictitious host computer is closed down and closed down.
The example of the preset attribute value that monitoring illustrates and closes down reason can be as shown in the table:
Sub-step S33, inquire about fictitious host computer corresponding to described virtual identifying whether be in Data Migration state,
Data backup status, data recover state;
In the embodiment of the present application, fictitious host computer data can be stored in state pool (memory headroom)
Transition state, data backup status, data recover state, then can be in state pool (memory headroom)
The storage Data Migration state of fictitious host computer, data backup status, data recover state (testing result).
Data Migration, can refer to that the data of fictitious host computer move to other positions from original position.
Data backup, can refer to back up the data of fictitious host computer.
Data are recovered, and can refer to that the data backed up from fictitious host computer carry out recovery operation.
Sub-step S34, inquires about whether domain name corresponding to described virtual identifying puts on record successfully;The most then hold
Row sub-step S35;
Sub-step S35, inquiry is put on record and is accessed business.
Application the embodiment of the present application, can call the inquiry service that relevant unit provides in advance, inquire about virtual
Whether the domain name of mark correspondence is put on record successfully and is put on record and access business.
Then directly can directly search from this locality whether domain name corresponding to virtual identifying puts on record successfully and put on record
Access business's (testing result).
In a preferred embodiment of the present application, step 102 can include following sub-step:
Sub-step S41, inquires about the fictitious host computer that described fictitious host computer mark is corresponding;
Sub-step S42, detects network information service state and/or the application pool shape of described fictitious host computer
State, to obtain network state information.
In the embodiment of the present application, can be by the detection fictitious host computer network information service (Internet
Information Services, IIS) state and application pool state, obtain network state information (inspection
Survey result).
When user attempts by HTTP (Hypertext transfer protocol, HTTP)
Or file transfer protocol (FTP) (File Transfer Protocol, FTP) accesses one and is currently running the network information
When servicing the content on the server (fictitious host computer) of (IIS), IIS returns one and represents this request
The digital code of state.This code may indicate that concrete request is the most successful, it is also possible to the request of announcement is lost
The exact cause lost.
Such as, digital code 500 can represent internal server error.
Under the progress of work isolation mode of the network information service (IIS), application program can be at shading ring
Running in border, specifically can create multiple application pool, each application pool can have different
One or more application programs can be linked to one or more progress of work set by configuration, and then will
Application program in application pool and other application programs are by progress of work boundary separates.
When application program in application pool makes a mistake, application error code can be returned.
Such as, event id is the application error code of 1001, can represent World Wide Web
The Inetinfo.exe process of Publishing service encounters a mistake, and is closed.This feelings
Condition makes World Wide Web Publishing service the accident of Inetinfo.exe process can not be detected
Terminate, therefore the change to configuration database will can not be detected as anticipated.
In a preferred embodiment of the present application, the detection of described website applying detection at least can wrap
Include one or more in homepage setting, data base's connection;The most in the embodiment of the present application, step 102
Can include following sub-step:
Sub-step S51, whether the fictitious host computer inquiring about described fictitious host computer mark corresponding arranges homepage;
Sub-step S52, whether the data base inquiring about fictitious host computer corresponding to described fictitious host computer mark connects
Normally.
In the embodiment of the present application, can detect whether to connect normal (detection knot by data base's off line
Really), whether detection fictitious host computer arranges homepage.
Wherein, off line, be for the current state of data base for, when a data base can not perform
During effective database manipulation, then it it is off-line state.
Certainly, above-mentioned detection method is intended only as example, when implementing the embodiment of the present application, and can basis
Practical situation arranges other detection methods, and this is not any limitation as by the embodiment of the present application.It addition, except upper
Stating outside detection method, those skilled in the art can also use other detection method according to actual needs, this
This is not any limitation as by application embodiment.
The embodiment of the present application provides fictitious host computer detection, website domain name for the website that fictitious host computer is carried
The multiple detection methods such as detection, website status detection, network state detection, website applying detection, it is achieved
The most automatically detection, substantially increases the simplicity of detection, improves the efficiency of detection.
In a preferred embodiment of the present application, the method can also comprise the steps:
Step 103, when described testing result meets default property value, raw for described testing result
Become website recommendation on improvement.
In the embodiment of the present application, property value can be pre-set for some testing result, this property value
May be used for characterizing detection go wrong, the situation such as fault, can improve.
In one embodiment, for the testing result of the Expiration Date of fictitious host computer, if the current date with
Date gap between the Expiration Date of fictitious host computer within the first default date gap scope (property value),
Such as 30 days, then can generate the prompting that expires of fictitious host computer, it is possible to offer continues to pay dues, and (website changes in link
Enter suggestion).
Such as, expiring of fictitious host computer prompts for " main frame will expire, the Expiration Date: * * ", or, " main
Machine has expired, the Expiration Date: * * ".
For the testing result in the space of fictitious host computer, if the utilization rate for the space of fictitious host computer exceedes
Preset the first utilization rate (property value), such as 95%, then can generate fictitious host computer cleaning space or
Upgrading website prompting, and upgrade link (website recommendation on improvement) is provided.
Such as, the cleaning space of fictitious host computer or upgrading website prompt for " main frame remaining space less than 5%,
Clear up space or upgrading website the most in time ".
For, the testing result of the data base of fictitious host computer, if the use of the data base for fictitious host computer
Rate exceedes default the second utilization rate (property value), such as 95%, then can generate the cleaning of fictitious host computer
Space or upgrading website prompting, it is possible to upgrade link (website recommendation on improvement) is provided.
Such as, cleaning space or the upgrading website of fictitious host computer prompts for " data base's remaining space deficiency
5%, clear up space or upgrading website the most in time ".
In another embodiment, the testing result of binding domain name for whether, if unbound domain name (belongs to
Property value), then can generate domain name binding information, it is possible to provide binding link (website changes
Enter suggestion).
Such as, the information of the domain name binding of fictitious host computer is " unbound website domain name, it is proposed that you are i.e.
Shi Jinhang domain name is bound ".
For the testing result of the Expiration Date of domain name, if the day between current date and the Expiration Date of domain name
Phase gap, within the second default date gap scope (property value), such as 30 days, then can generate territory
The prompting that expires of name, it is possible to the link (website recommendation on improvement) that continues to pay dues is provided.
Such as, expiring of domain name prompts for " website domain name will expire, the Expiration Date: * * ", or, " net
Domain name of standing has expired, the Expiration Date: * * ".
The testing result of server belonging to fictitious host computer whether it is resolved to for domain name, if the void of not being resolved to
Intend the server (property value) belonging to main frame, then can generate the incorrect information of parsing, and can
To provide the link (website recommendation on improvement) of domain name mapping.
Such as, resolving incorrect information is that " your domain name mapping is incorrect, please translate domain names into
To host ip: * * * .***.**.** ".
In another embodiment, whether closed down and closed down the testing result of reason for fictitious host computer,
If fictitious host computer is closed down (property value), then generate and close down and the information of reason, it is possible to
Offer processes the link (website recommendation on improvement) closed down.
Such as, close down and the information of reason is that " this main frame is closed down, and closes down reason: at display
Center is penalized to close down reason.”
For whether being in the testing result of Data Migration state, if fictitious host computer is in Data Migration state
(property value), then can generate host migration information (website recommendation on improvement).
Such as, host migration information is that " this main frame just in (in migration, in recovery), (moves
Move, recover) period, website cannot access ".
For whether being in the testing result of data backup status, if fictitious host computer is in data backup status
(property value), then can generate host backup information (website recommendation on improvement).
Such as, host backup information is " this main frame the most in the backup, during backup, it is proposed that you are not
Website is carried out write operation ".
For whether being in data and recover the testing result of state, if fictitious host computer is in data and recovers state
(property value), then can generate main frame and recover information (website recommendation on improvement).
Such as, main frame recovers information for " this main frame is recovering, during recovery, it is proposed that you are not
Website is carried out write operation ".
Whether putting on record successful testing result for domain name, if putting unsuccessfully (property value) on record, then can give birth to
Become failure information of putting on record, it is possible to provide the link (website recommendation on improvement) put on record.
Such as, failure information of putting on record is that " your domain name is not put on record, puts on record the most immediately, otherwise can lead
Cause your website cannot access ".
For the testing result accessing business of putting on record, if the access business that puts on record is non-designated access business's (attribute
Value), then can generate the access business specified and put on record information, it is possible to provide the access business specified standby
The link (website recommendation on improvement) of case.
Such as, it is intended that access business put on record information for " your main frame is not put on record at * *, the most first puts on record,
The website that otherwise can cause you cannot access ".
In another embodiment, for the testing result of network state information, if server connects abnormal
(property value), then can generate and connect abnormal information (website recommendation on improvement).
Such as, connecting abnormal information is " http connects abnormal, please contact ten thousand net contact staff ".
In another embodiment, for whether arranging the testing result of homepage, (belong to if homepage cannot be obtained
Property value), then can generate the prompting of homepage setup failed, it is possible to provide and the link (net of homepage study course is set
Stand recommendation on improvement).
Such as, homepage setup failed prompts for that " you are not provided with homepage temporarily, or homepage arranges wrong, please examine
The homepage files passe address looking into you is the most correct, and homepage file designation is the most correct.”
Normal testing result whether is connected for data base, if data base connects exception (property value),
Then can generate data base and connect abnormal prompt information, it is possible to the link of database problem answer is provided
(website recommendation on improvement).
Such as, data base connects abnormal prompt information is that " your database link exists abnormal, please check
Your database link string arranges the most correct ".
Certainly, above-mentioned website recommendation on improvement is intended only as example, when implementing the embodiment of the present application, permissible
Arranging other website recommendation on improvements according to practical situation, this is not any limitation as by the embodiment of the present application.It addition,
In addition to the recommendation on improvement of above-mentioned website, those skilled in the art can also use other net according to actual needs
Standing recommendation on improvement, this is not any limitation as by the embodiment of the present application.
As shown in Figure 4, when the tests are completed, testing result and website recommendation on improvement can be shown.
The embodiment of the present application is for the result of detection, in conjunction with property value, it is provided that website recommendation on improvement, with auxiliary
Help user optimization website, thus reduce the generation frequency of website fault, when breaking down in website, it is achieved
The autonomous investigation of naive user, reduces the technical threshold of detection, further increases the efficiency of detection.
It should be noted that for embodiment of the method, in order to be briefly described, therefore it is all expressed as one it be
The combination of actions of row, but those skilled in the art should know, and the embodiment of the present application is not by described
The restriction of sequence of movement because according to the embodiment of the present application, some step can use other orders or
Person is carried out simultaneously.Secondly, those skilled in the art also should know, embodiment described in this description
Belong to preferred embodiment, necessary to involved action not necessarily the embodiment of the present application.
With reference to Fig. 5, it is shown that a kind of based on fictitious host computer the website detection device embodiment of the application
Structured flowchart, specifically can include such as lower module:
Detection request receives submodule 501, for receiving the detection request of website;In described detection request
Fictitious host computer mark including the fictitious host computer carrying described website;
Website detection module 502, for described website being detected according to described fictitious host computer mark,
To obtain testing result;
Wherein, described detection at least include fictitious host computer detection, website domain name detection, website status detection,
One or more in network state detection, website applying detection.
In a preferred embodiment of the present application, this device can also include such as lower module:
Suggestion generation module, for when described testing result meets default property value, for described inspection
Survey result and generate website recommendation on improvement.
In implementing, described fictitious host computer mark can include the second level domain of described fictitious host computer.
In a preferred embodiment of the present application, the detection of described fictitious host computer detection at least can wrap
Include one or more in the data base of the Expiration Date of fictitious host computer, the space of fictitious host computer, fictitious host computer;
Described website detection module 502 can include following submodule:
First inquiry submodule, for inquiring about the information of fictitious host computer corresponding to described fictitious host computer mark;
Wherein, the information of described fictitious host computer at least includes following one or more:
The Expiration Date of fictitious host computer, the space of fictitious host computer, the data base of fictitious host computer.
In a preferred embodiment of the present application, the detection of described website domain name detection at least can wrap
Include one or more in domain name binding, domain name Expiration Date, domain name mapping;
Described website detection module 502 can include following submodule:
First judges submodule, ties up for judging described fictitious host computer to identify whether with the domain name of described website
Fixed;The most then call the second inquiry submodule;
Second inquiry submodule, for inquiring about the Expiration Date of domain name;
First detection sub-module, for detecting whether domain name is resolved to the clothes belonging to described fictitious host computer
Business device.
In a preferred embodiment of the present application, the detection of described website status detection at least can wrap
Include fictitious host computer close down, close down reason, fictitious host computer migrate, put on record in website, fictitious host computer back up, void
Intend one or more during main frame recovers;
Described website detection module 502 can include following submodule:
3rd inquiry submodule, for inquiring about whether fictitious host computer corresponding to described virtual identifying is closed down;
The most then call the 4th inquiry submodule;
4th inquiry submodule, the reason closed down for inquiry;
5th inquiry submodule, for inquiring about whether fictitious host computer corresponding to described virtual identifying is in data
Transition state, data backup status, data recover state;
6th inquiry submodule, for inquiring about whether domain name corresponding to described virtual identifying puts on record successfully;If
It is then to inquire about the access business that puts on record.
In a preferred embodiment of the present application, described website detection module 502 can include following son
Module:
7th inquiry submodule, for inquiring about the fictitious host computer that described fictitious host computer mark is corresponding;
Second detection sub-module, for detecting network information service state and/or the application of described fictitious host computer
Program pond state, to obtain network state information.
In a preferred embodiment of the present application, the detection of described website applying detection at least can wrap
Include one or more in homepage setting, data base's connection;
Described website detection module 502 can include following submodule:
Whether the 8th inquiry submodule, arranged for the fictitious host computer inquiring about described fictitious host computer mark corresponding
Homepage;
9th inquiry submodule, for inquiring about the data base of fictitious host computer corresponding to described fictitious host computer mark
Whether connect normal.
For device embodiment, due to itself and embodiment of the method basic simlarity, so the comparison described
Simply, relevant part sees the part of embodiment of the method and illustrates.
Each embodiment in this specification all uses the mode gone forward one by one to describe, and each embodiment stresses
Be all the difference with other embodiments, between each embodiment, identical similar part sees mutually
?.
Those skilled in the art are it should be appreciated that the embodiment of the embodiment of the present application can be provided as method, dress
Put or computer program.Therefore, the embodiment of the present application can use complete hardware embodiment, completely
Software implementation or the form of the embodiment in terms of combining software and hardware.And, the embodiment of the present application
Can use and can be situated between with storage at one or more computers wherein including computer usable program code
The upper computer journey implemented of matter (including but not limited to disk memory, CD-ROM, optical memory etc.)
The form of sequence product.
In a typical configuration, described computer equipment includes one or more processor
(CPU), input/output interface, network interface and internal memory.Internal memory potentially includes computer-readable medium
In volatile memory, the shape such as random access memory (RAM) and/or Nonvolatile memory
Formula, such as read only memory (ROM) or flash memory (flash RAM).Internal memory is computer-readable medium
Example.Computer-readable medium includes removable media permanent and non-permanent, removable and non-
Information storage can be realized by any method or technology.Information can be computer-readable instruction,
Data structure, the module of program or other data.The example of the storage medium of computer includes, but
Be not limited to phase transition internal memory (PRAM), static RAM (SRAM), dynamic random are deposited
Access to memory (DRAM), other kinds of random access memory (RAM), read only memory
(ROM), Electrically Erasable Read Only Memory (EEPROM), fast flash memory bank or other in
Deposit technology, read-only optical disc read only memory (CD-ROM), digital versatile disc (DVD) or other
Optical storage, magnetic cassette tape, tape magnetic rigid disk storage other magnetic storage apparatus or any its
His non-transmission medium, can be used for the information that storage can be accessed by a computing device.According to herein
Defining, computer-readable medium does not include the computer readable media (transitory media) of non-standing,
Data signal and carrier wave such as modulation.
The embodiment of the present application is with reference to the method according to the embodiment of the present application, terminal unit (system) and meter
The flow chart of calculation machine program product and/or block diagram describe.It should be understood that can be by computer program instructions
Each flow process in flowchart and/or block diagram and/or square frame and flow chart and/or square frame
Flow process in figure and/or the combination of square frame.Can provide these computer program instructions to general purpose computer,
The processor of special-purpose computer, Embedded Processor or other programmable data processing terminal equipment is to produce
One machine so that performed by the processor of computer or other programmable data processing terminal equipment
Instruction produce for realizing at one flow process of flow chart or multiple flow process and/or one square frame of block diagram or
The device of the function specified in multiple square frames.
These computer program instructions may be alternatively stored in and computer or other programmable datas can be guided to process
In the computer-readable memory that terminal unit works in a specific way so that be stored in this computer-readable
Instruction in memorizer produces the manufacture including command device, and this command device realizes flow chart one
The function specified in flow process or multiple flow process and/or one square frame of block diagram or multiple square frame.
These computer program instructions also can be loaded into computer or other programmable data processing terminals set
Standby upper so that on computer or other programmable terminal equipment, to perform sequence of operations step in terms of producing
The process that calculation machine realizes, thus the instruction performed on computer or other programmable terminal equipment provides and uses
In realizing in one flow process of flow chart or multiple flow process and/or one square frame of block diagram or multiple square frame
The step of the function specified.
Although having been described for the preferred embodiment of the embodiment of the present application, but those skilled in the art being once
Know basic creative concept, then these embodiments can be made other change and amendment.So,
Claims are intended to be construed to include preferred embodiment and fall into the institute of the embodiment of the present application scope
There are change and amendment.
Finally, in addition it is also necessary to explanation, in this article, the relational terms of such as first and second or the like
It is used merely to separate an entity or operation with another entity or operating space, and not necessarily requires
Or imply relation or the order that there is any this reality between these entities or operation.And, art
Language " includes ", " comprising " or its any other variant are intended to comprising of nonexcludability, so that
Process, method, article or terminal unit including a series of key elements not only include those key elements, and
Also include other key elements being not expressly set out, or also include for this process, method, article or
The key element that person's terminal unit is intrinsic.In the case of there is no more restriction, statement " include one
It is individual ... " key element that limits, it is not excluded that including the process of described key element, method, article or end
End equipment there is also other identical element.
Above to a kind of based on fictitious host computer website detection method provided herein and a kind of based on
The website detection device of fictitious host computer, is described in detail, and specific case used herein is to this Shen
Principle and embodiment please are set forth, and the explanation of above example is only intended to help and understands this Shen
Method please and core concept thereof;Simultaneously for one of ordinary skill in the art, according to the application's
Thought, the most all will change, in sum, and this specification
Content should not be construed as the restriction to the application.
Claims (16)
1. website based on a fictitious host computer detection method, it is characterised in that including:
Receive the detection request of website;Described detection request includes carrying the fictitious host computer of described website
Fictitious host computer identifies;
Described website is detected, to obtain testing result according to described fictitious host computer mark;
Wherein, described detection at least include fictitious host computer detection, website domain name detection, website status detection,
One or more in network state detection, website applying detection.
Method the most according to claim 1, it is characterised in that also include:
When described testing result meets default property value, generate website for described testing result and improve
Suggestion.
Method the most according to claim 1, it is characterised in that described fictitious host computer mark includes
The second level domain of described fictitious host computer.
4. according to the method described in claim 1 or 2 or 3, it is characterised in that described fictitious host computer
The detection of detection at least includes the Expiration Date of fictitious host computer, the space of fictitious host computer, the number of fictitious host computer
According to one or more in storehouse;
Described website is detected, to obtain the step of testing result by described mark according to described fictitious host computer
Suddenly include:
Inquire about the information of fictitious host computer corresponding to described fictitious host computer mark;
Wherein, the information of described fictitious host computer at least includes following one or more:
The Expiration Date of fictitious host computer, the space of fictitious host computer, the data base of fictitious host computer.
5. according to the method described in claim 1 or 2 or 3, it is characterised in that described website domain name
The detection of detection at least includes one or more in domain name binding, domain name Expiration Date, domain name mapping;
Described website is detected, to obtain the step of testing result by described mark according to described fictitious host computer
Suddenly include:
Judge that described fictitious host computer identifies whether the domain name binding with described website;
The most then inquire about the Expiration Date of domain name;
Whether detection domain name is resolved to the server belonging to described fictitious host computer.
6. according to the method described in claim 1 or 2 or 3, it is characterised in that described website status
Detection detection at least include fictitious host computer close down, close down reason, fictitious host computer migrate, website put on record,
One or more in fictitious host computer backup, fictitious host computer recovery;
Described website is detected, to obtain the step of testing result by described mark according to described fictitious host computer
Suddenly include:
Inquire about whether fictitious host computer corresponding to described virtual identifying is closed down;The most then inquire about and to be closed down
Reason;
Inquire about whether fictitious host computer corresponding to described virtual identifying is in Data Migration state, data backup shape
State, data recover state;
Inquire about whether domain name corresponding to described virtual identifying puts on record successfully;The most then inquire about the access business that puts on record.
7. according to the method described in claim 1 or 2 or 3, it is characterised in that described in described basis
Described website is detected by fictitious host computer mark, includes obtaining the step of testing result:
Inquire about the fictitious host computer that described fictitious host computer mark is corresponding;
Detect network information service state and/or the application pool state of described fictitious host computer, to obtain net
Network status information.
8. according to the method described in claim 1 or 2 or 3, it is characterised in that described website is applied
The detection of detection at least includes one or more in homepage setting, data base's connection;
Described website is detected, to obtain the step of testing result by described mark according to described fictitious host computer
Suddenly include:
Whether the fictitious host computer inquiring about described fictitious host computer mark corresponding arranges homepage;
Whether the data base inquiring about fictitious host computer corresponding to described fictitious host computer mark connects normally.
9. website based on a fictitious host computer detection device, it is characterised in that including:
Detection request receives submodule, for receiving the detection request of website;Described detection request includes
Carry the fictitious host computer mark of the fictitious host computer of described website;
Website detection module, for detecting described website according to described fictitious host computer mark, to obtain
Obtain testing result;
Wherein, described detection at least include fictitious host computer detection, website domain name detection, website status detection,
One or more in network state detection, website applying detection.
Device the most according to claim 9, it is characterised in that also include:
Suggestion generation module, for when described testing result meets default property value, for described inspection
Survey result and generate website recommendation on improvement.
11. devices according to claim 9, it is characterised in that described fictitious host computer mark includes
The second level domain of described fictitious host computer.
12. according to the device described in claim 9 or 10 or 11, it is characterised in that described virtual master
The detection of machine testing at least includes the Expiration Date of fictitious host computer, the space of fictitious host computer, fictitious host computer
One or more in data base;
Described website detection module includes:
First inquiry submodule, for inquiring about the information of fictitious host computer corresponding to described fictitious host computer mark;
Wherein, the information of described fictitious host computer at least includes following one or more:
The Expiration Date of fictitious host computer, the space of fictitious host computer, the data base of fictitious host computer.
13. according to the device described in claim 9 or 10 or 11, it is characterised in that described website domain
The detection of name detection at least includes one or more in domain name binding, domain name Expiration Date, domain name mapping;
Described website detection module includes:
First judges submodule, ties up for judging described fictitious host computer to identify whether with the domain name of described website
Fixed;The most then call the second inquiry submodule;
Second inquiry submodule, for inquiring about the Expiration Date of domain name;
First detection sub-module, for detecting whether domain name is resolved to the clothes belonging to described fictitious host computer
Business device.
14. according to the device described in claim 9 or 10 or 11, it is characterised in that described website shape
State detection detection at least include fictitious host computer close down, close down reason, fictitious host computer migrate, website standby
One or more in the backup of case, fictitious host computer, fictitious host computer recovery;
Described website detection module includes:
3rd inquiry submodule, for inquiring about whether fictitious host computer corresponding to described virtual identifying is closed down;
The most then call the 4th inquiry submodule;
4th inquiry submodule, the reason closed down for inquiry;
5th inquiry submodule, for inquiring about whether fictitious host computer corresponding to described virtual identifying is in data
Transition state, data backup status, data recover state;
6th inquiry submodule, for inquiring about whether domain name corresponding to described virtual identifying puts on record successfully;If
It is then to inquire about the access business that puts on record.
15. according to the device described in claim 9 or 10 or 11, it is characterised in that described website is examined
Survey module includes:
7th inquiry submodule, for inquiring about the fictitious host computer that described fictitious host computer mark is corresponding;
Second detection sub-module, for detecting network information service state and/or the application of described fictitious host computer
Program pond state, to obtain network state information.
16. according to the device described in claim 9 or 10 or 11, it is characterised in that described website should
One or more in homepage setting, data base's connection are at least included with the detection of detection;
Described website detection module includes:
Whether the 8th inquiry submodule, arranged for the fictitious host computer inquiring about described fictitious host computer mark corresponding
Homepage;
9th inquiry submodule, for inquiring about the data base of fictitious host computer corresponding to described fictitious host computer mark
Whether connect normal.
Priority Applications (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510291107.0A CN106301983A (en) | 2015-05-29 | 2015-05-29 | A kind of website based on fictitious host computer detection method and device |
| PCT/CN2016/080443 WO2016192492A1 (en) | 2015-05-29 | 2016-04-28 | Website detection method and device based on virtual host |
Applications Claiming Priority (1)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| CN201510291107.0A CN106301983A (en) | 2015-05-29 | 2015-05-29 | A kind of website based on fictitious host computer detection method and device |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| CN106301983A true CN106301983A (en) | 2017-01-04 |
Family
ID=57440139
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| CN201510291107.0A Pending CN106301983A (en) | 2015-05-29 | 2015-05-29 | A kind of website based on fictitious host computer detection method and device |
Country Status (2)
| Country | Link |
|---|---|
| CN (1) | CN106301983A (en) |
| WO (1) | WO2016192492A1 (en) |
Cited By (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107819890A (en) * | 2017-09-28 | 2018-03-20 | 安徽乐游网络科技有限公司 | A kind of domain name term of validity monitoring and alarm method |
| CN113572826A (en) * | 2021-07-12 | 2021-10-29 | 绿盟科技集团股份有限公司 | Equipment information binding method and system and electronic equipment |
| CN115412309A (en) * | 2022-08-09 | 2022-11-29 | 中国电信股份有限公司 | Detection method and device for unregistered website, electronic equipment and storage medium |
Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101605056A (en) * | 2009-06-16 | 2009-12-16 | 中兴通讯股份有限公司 | A J2EE server monitoring device and monitoring method using the device |
| CN103023726A (en) * | 2012-12-24 | 2013-04-03 | 云海创想信息技术(北京)有限公司 | Method and system for testing maximum mainframe connection number of network storage device |
| CN103186450A (en) * | 2011-12-28 | 2013-07-03 | 英业达集团(天津)电子技术有限公司 | Method and system for monitoring virtual resource consumption |
| CN103220298A (en) * | 2013-04-27 | 2013-07-24 | 西北工业大学 | Windows Virtual machine remote detecting method |
| CN103812715A (en) * | 2012-11-07 | 2014-05-21 | 江苏仕德伟网络科技股份有限公司 | Method for judging running state of website |
Family Cites Families (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| JP4910542B2 (en) * | 2006-07-27 | 2012-04-04 | 富士通株式会社 | SIP message delivery program |
| CN102984214B (en) * | 2012-11-08 | 2016-03-02 | 华为技术有限公司 | A kind of method and device realizing business migration in telecom cloud |
| CN103873447A (en) * | 2012-12-17 | 2014-06-18 | 华为技术有限公司 | Method, device and equipment for starting of virtual host |
| CN104915263B (en) * | 2015-06-30 | 2019-04-19 | 北京奇虎科技有限公司 | Process fault handling method and device based on container technology |
-
2015
- 2015-05-29 CN CN201510291107.0A patent/CN106301983A/en active Pending
-
2016
- 2016-04-28 WO PCT/CN2016/080443 patent/WO2016192492A1/en not_active Ceased
Patent Citations (5)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN101605056A (en) * | 2009-06-16 | 2009-12-16 | 中兴通讯股份有限公司 | A J2EE server monitoring device and monitoring method using the device |
| CN103186450A (en) * | 2011-12-28 | 2013-07-03 | 英业达集团(天津)电子技术有限公司 | Method and system for monitoring virtual resource consumption |
| CN103812715A (en) * | 2012-11-07 | 2014-05-21 | 江苏仕德伟网络科技股份有限公司 | Method for judging running state of website |
| CN103023726A (en) * | 2012-12-24 | 2013-04-03 | 云海创想信息技术(北京)有限公司 | Method and system for testing maximum mainframe connection number of network storage device |
| CN103220298A (en) * | 2013-04-27 | 2013-07-24 | 西北工业大学 | Windows Virtual machine remote detecting method |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| CN107819890A (en) * | 2017-09-28 | 2018-03-20 | 安徽乐游网络科技有限公司 | A kind of domain name term of validity monitoring and alarm method |
| CN113572826A (en) * | 2021-07-12 | 2021-10-29 | 绿盟科技集团股份有限公司 | Equipment information binding method and system and electronic equipment |
| CN113572826B (en) * | 2021-07-12 | 2023-09-26 | 绿盟科技集团股份有限公司 | Device information binding method and system and electronic device |
| CN115412309A (en) * | 2022-08-09 | 2022-11-29 | 中国电信股份有限公司 | Detection method and device for unregistered website, electronic equipment and storage medium |
Also Published As
| Publication number | Publication date |
|---|---|
| WO2016192492A1 (en) | 2016-12-08 |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US11269718B1 (en) | Root cause detection and corrective action diagnosis system | |
| US8813039B2 (en) | Method and system for software defect reporting | |
| US8898637B2 (en) | Bug clearing house | |
| CN103023710B (en) | A kind of safety test system and method | |
| US10210190B1 (en) | Roll back of scaled-out data | |
| CN111258832B (en) | Interface parameter verification method, device, equipment and medium | |
| US20220229657A1 (en) | Extensible resource compliance management | |
| US20210336838A1 (en) | Multi-tenant event sourcing and audit logging in a cloud-based computing infrastructure | |
| CN107704360A (en) | Processing method, equipment, server and the storage medium of monitoring data | |
| CN114650187A (en) | Abnormal access detection method and device, electronic equipment and storage medium | |
| CN104899016A (en) | Call stack relationship obtaining method and call stack relationship obtaining device | |
| CN107392028A (en) | The detection method and its detection means of sensitive information, storage medium, electronic equipment | |
| CN112187933A (en) | Method and system for monitoring services in multi-architecture cloud platform | |
| CN106301983A (en) | A kind of website based on fictitious host computer detection method and device | |
| CN117331804A (en) | Front-end page monitoring method and device, computer equipment and storage medium | |
| CN120762597A (en) | Automatic mounting method, device, equipment and medium based on cloud hard disk | |
| CN120560886A (en) | Front-end monitoring method, device, computer equipment, computer-readable storage medium, and computer program product | |
| CN116132250B (en) | Operation and maintenance system, method, storage medium, and electronic device | |
| US12282768B2 (en) | Automated developer configuration tool | |
| CN112579383A (en) | Method and device for simulating system fault | |
| CN117834265A (en) | Abnormal network request testing method and system | |
| CN117235107B (en) | Data access processing method and device, electronic equipment and storage medium | |
| CN113377633B (en) | External network data mapping method and related equipment based on user behavior backtracking | |
| CN112149106B (en) | Login method, device, equipment and medium of enterprise private applet | |
| CN119718293A (en) | Business process generation method, device, computer equipment and storage medium |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| C06 | Publication | ||
| PB01 | Publication | ||
| C10 | Entry into substantive examination | ||
| SE01 | Entry into force of request for substantive examination | ||
| WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20170104 |
|
| WD01 | Invention patent application deemed withdrawn after publication |