Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It is to be understood that such description is merely illustrative and not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. Moreover, in the following description, descriptions of well-known structures and techniques are omitted so as to not unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and the like, as used herein, specify the presence of stated features, operations, and/or components, but do not preclude the presence or addition of one or more other features, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It is noted that the terms used herein should be interpreted as having a meaning that is consistent with the context of this specification and should not be interpreted in an idealized or overly formal sense.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a construction is intended in the sense one having skill in the art would understand the convention (e.g., "a system having at least one of A, B and C" would include but not be limited to systems that have a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
Some block diagrams and/or flow diagrams are shown in the figures. It will be understood that some blocks of the block diagrams and/or flowchart illustrations, or combinations thereof, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable asset information verification apparatus such that the instructions, which execute via the processor, create means for implementing the functions/acts specified in the block diagrams and/or flowchart block or blocks. The techniques of this disclosure may be implemented in hardware and/or software (including firmware, microcode, etc.). In addition, the techniques of this disclosure may take the form of a computer program product on a computer-readable storage medium having instructions stored thereon for use by or in connection with an instruction execution system.
The embodiment of the disclosure provides an asset information verification method and a verification device capable of applying the method. The method comprises the steps of firstly, responding to a received asset verification command, obtaining real-time asset information and asset information to be verified of a data center asset, then, comparing the real-time asset information and the asset information to be verified according to a preset management script to obtain a first verification result based on asset address characteristics, wherein an asset address comprises a physical address and/or a network address, and finally, generating asset change information according to the first verification result and updating the asset information to be verified based on the asset change information.
Fig. 1 schematically shows a system architecture of an asset information verification method and apparatus according to an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of a system architecture to which the embodiments of the present disclosure may be applied to help those skilled in the art understand the technical content of the present disclosure, and does not mean that the embodiments of the present disclosure may not be applied to other devices, systems, environments or scenarios.
As shown in fig. 1, the system architecture 100 may include a monitoring platform 101, a network management platform 102, an asset management platform 103, and a network 104, wherein the network 104 is a medium for providing communication links between the monitoring platform 101, the network management platform 102, and the asset management platform 103. Network 104 may include various connection types, such as wired, wireless communication links, or fiber optic cables, to name a few. The monitoring platform 101, the network management platform 102 and the asset management platform 103 may be independent physical servers, may also be a server cluster or distributed system formed by a plurality of physical servers, and may also be cloud servers providing basic cloud computing services such as cloud services, cloud computing, network services, middleware services and the like.
Firstly, the network management platform 102 responds to a received asset verification instruction, calls the monitoring platform 101 to obtain real-time asset information of a data center asset and obtain asset information to be verified from the asset management platform 103, then the network management platform 102 compares the real-time asset information with the asset information to be verified according to a preset management script to obtain a first verification result based on asset address characteristics, wherein an asset address comprises a physical address and/or a network address, and finally the asset management platform 103 generates asset change information according to the first verification result and updates the asset information to be verified based on the asset change information.
It should be noted that the asset information verification method and apparatus of the embodiments of the present disclosure may be used in the financial field, and may also be used in any field other than the financial field. The present disclosure will be described in detail below with reference to the drawings and specific embodiments.
Fig. 2 schematically illustrates a flow chart of an asset information verification method according to an embodiment of the present disclosure, and as shown in fig. 2, the method 200 may include operations S210 to S230.
In operation S210, real-time asset information and asset information to be verified of the data center asset are acquired in response to the received asset verification instruction.
Next, in operation S220, the real-time asset information and the asset information to be verified are compared according to a preset management script to obtain a first verification result based on asset address characteristics, where the asset address includes a physical address and/or a network address.
Next, in operation S230, asset transition information is generated according to the first verification result, and the asset information to be verified is updated based on the asset transition information.
The following describes in detail the specific flow of each step of the asset information verification method according to the present embodiment.
In operation S210, real-time asset information and asset information to be verified of the data center asset are acquired in response to the received asset verification instruction.
In this embodiment, specifically, the network management platform calls the monitoring platform to obtain real-time asset information of the data center asset in response to the received asset verification instruction. For example, a collection module of the monitoring platform is called to collect Address Resolution Protocol (ARP) data of the whole network, so as to obtain real-time asset information of the asset of the data center. In addition, the network management platform can call the asset information to be verified as the verification target from the asset management platform, and the asset information to be verified can be the asset registration information stored in the asset management platform. In practical application, the asset inventory is periodically worked, and the periodic characteristic of the asset inventory causes that the asset registration information stored in the asset management platform may have the problems of obvious hysteresis and poor accuracy. Because, in order to improve the asset management efficiency of enterprises and the asset management effect, the asset registration information needs to be updated in real time, at regular time and under fixed conditions.
Data center assets may include fixed assets, which may include, for example, office computers, video conferencing equipment, network equipment, security equipment, IT equipment, etc., which may include, for example, switches, firewalls, etc., and non-fixed assets, which may include, for example, servers, storage devices, etc. The non-fixed assets may include, for example, various types of software authorizations.
The asset information may include, for example, asset number, asset type, asset location, asset serial number, asset principal, MAC Address (Media Access Control Address), IP Address (Internet Protocol Address), IP of the uplink switch, name of the uplink switch, port of the uplink switch, name of the data center, cabinet number, U bit of the cabinet, and the like.
Next, in operation S220, the real-time asset information and the asset information to be verified are compared according to a preset management script to obtain a first verification result based on asset address characteristics, where the asset address includes a physical address and/or a network address.
In this embodiment, specifically, according to a preset management script, the real-time asset information of the data center asset and the asset information to be verified are compared, whether asset information change exists in the data center asset is judged, and a first verification result based on the asset address feature is obtained. The asset address includes a physical address, which may include information such as a data center name, a cabinet number, a cabinet U bit, an upper switch IP, an upper switch name, an upper switch port, and/or a network address, which may include information such as a MAC address, an IP address, and/or the like.
The first verification result based on the asset address characteristics can reflect information such as asset calling, asset output and storage, asset position, asset use condition and the like of the assets of the data center. And under the condition that the first verification result indicates that the asset information to be verified is inconsistent with the real-time asset information, generating asset transition information based on the first verification result, and pushing the asset transition information to an asset management person for confirmation and revision.
Next, in operation S230, asset transition information is generated according to the first verification result, and the asset information to be verified is updated based on the asset transition information.
In this embodiment, specifically, asset transition information is generated according to the first verification result, and the asset transition information is pushed to the asset management platform, so that a responsible person of the asset management platform updates the asset information to be verified based on the asset transition information, for example, the asset registration information is updated according to the asset transition information.
According to the embodiment of the disclosure, the real-time asset information and the asset information to be verified of the data center asset are obtained in response to the received asset verification instruction; comparing the real-time asset information with asset information to be verified according to a preset management script to obtain a first verification result based on asset address characteristics, wherein the asset address comprises a physical address and/or a network address; and generating asset change information according to the first verification result, and updating the asset information to be verified based on the asset change information. The design effectively solves the problem of information synchronization lag existing among different platforms in the related technology, realizes real-time verification and updating of asset information of a data center through a cross-platform data communication mode, reduces the lag of account data relative to business change, greatly reduces the probability of production configuration misoperation caused by data lag, and effectively reduces the extra workload generated by data lag when an asset manager checks quarterly/semiannually assets.
Fig. 3 schematically illustrates a flowchart of another asset information verification method according to an embodiment of the present disclosure, and as shown in fig. 3, operation S220 may include operations S310 to S330.
In operation S310, according to the preset management script, the network address is used as a first matching feature to perform matching processing on the real-time asset information and the asset registration information, so as to form a first intermediate asset report.
Next, in operation S320, matching processing is performed on the first intermediate asset report and the confirmed asset attribute report with the asset topology as a second matching feature, so as to form a second intermediate asset report.
Next, in operation S330, a matching process is performed on the second intermediate asset report and the asset registration information with the physical address as a third matching feature, so as to obtain a first verification result based on the physical address of the asset.
The following describes in detail the specific flow of each step of the asset information verification method according to the present embodiment.
In operation S310, according to the preset management script, the network address is used as a first matching feature to perform matching processing on the real-time asset information and the asset registration information, so as to form a first intermediate asset report.
In the present embodiment, in particular, fig. 4 to 7 schematically show an information report diagram for asset information verification according to an embodiment of the present disclosure. Fig. 4 schematically shows an asset registration information report a to be verified, fig. 5 schematically shows a first intermediate asset report B formed by matching real-time asset information with asset registration information, fig. 6 schematically shows a second intermediate asset report C formed by matching a confirmed asset attribute report with the first intermediate asset report, and fig. 7 schematically shows an asset entry information report D when a data center asset is purchased and warehoused.
And after the network management platform obtains the asset verification instruction, calling the monitoring platform to acquire real-time asset information of the assets in the data center to obtain a real-time asset information report. And performing matching processing on the real-time asset information report and the asset registration information report (for example, the report a in fig. 4) by taking the network address as a first matching feature to obtain a first intermediate asset report (for example, the report B in fig. 5), wherein the network address may be a MAC address.
Next, in operation S320, matching processing is performed on the first intermediate asset report and the confirmed asset attribute report with the asset topology as a second matching feature, so as to form a second intermediate asset report.
In this embodiment, specifically, the topology of the assets is represented by the IP of the upper switch and the port of the upper switch associated with the assets of the data center, and the preset asset planning report forms a confirmed asset attribute report form. Therefore, with the upper switch IP and the upper switch port as the second matching feature, the matching process for the first intermediate asset report (e.g., report B in fig. 5) and the asset planning report is performed, and the second intermediate asset report (e.g., report C in fig. 6) is formed.
Next, in operation S330, a matching process is performed on the second intermediate asset report and the asset registration information with the physical address as a third matching feature, so as to obtain a first verification result based on the physical address of the asset.
In this embodiment, the physical address of the data center asset is specifically represented by a data center tag, an enclosure tag and an enclosure arrangement position, wherein the data center tag may include a data center name, the enclosure tag may include an enclosure number, and the enclosure arrangement position may be indicated by an enclosure U bit. And matching the second intermediate asset report (for example, the report C in FIG. 6) and the asset registration information (for example, the report A in FIG. 4) by taking the field combination feature formed by the data center tag, the cabinet tag and the cabinet layout position as a third matching feature, so as to obtain a first verification result based on the asset physical address.
In addition, the IP address can also be used as a fourth matching feature, and matching processing is performed on the first intermediate asset report (for example, report B in fig. 5) and the asset registration information (for example, report a in fig. 4), so as to obtain a first verification result based on the asset network address. A first verification result for the asset registration information is formed based on the first verification result of the asset physical address and the asset network address. And under the condition that the first verification result indicates that the asset registration information is different from the real-time asset information, updating the asset registration information according to the asset information change condition so as to ensure the timeliness and the accuracy of the asset registration information.
Further, asset entry information associated with the asset identification can be acquired according to the asset identification recorded in the asset registration information; comparing the asset entry information with the updated asset registration information to obtain a second verification result based on the asset address characteristics; and generating and outputting an asset change log according to the second verification result. Specifically, the asset entry information may be information entered when the data center asset is purchased for warehousing (e.g., report D in fig. 7). The asset address comprises a physical address and/or a network address, and the second verification result based on the asset address characteristic indicates the asset change condition of the data center asset from the procurement warehouse-in. And generating and outputting an asset change log based on the second check result so that asset management personnel can master asset change conditions in time, the hysteresis of the ledger data relative to service change is reduced, and the probability of production configuration misoperation caused by data hysteresis is reduced.
The real-time asset information may include a real-time image of the data center asset, and the asset to be verified information may include preset configuration information of the data center asset. As an optional mode, performing identification processing on the real-time image to obtain real-time configuration information of the data center assets; comparing the real-time configuration information with preset configuration information to obtain a third verification result based on the asset configuration characteristics; and performing asset configuration transaction alarm according to the third verification result.
Specifically, the real-time images in the real-time asset information are identified and processed, and the occupation state in at least one designated area in the data center assets is determined, for example, the occupation states of different U bits in the cabinet are determined, so as to obtain the real-time configuration information of the data center assets. And comparing the real-time configuration information with preset configuration information, determining the configuration information change condition of the assets of the data center, and realizing asset configuration transaction alarm to asset management personnel.
Fig. 8 schematically shows a flowchart of asset information verification according to an embodiment of the present disclosure, and as shown in fig. 8, the flowchart 800 includes operations S801 to S812.
In operation S801, an asset information verification task is triggered. The triggering mode for the verification task may include, for example, work order flow triggering, manager operation triggering, execution timing task triggering, and the like.
Next, in operation S802, a monitoring platform is invoked to collect real-time asset information.
Next, in operation S803, the asset information (a table) to be verified is read from the asset management platform.
Next, in operation S804, the real-time asset information is matched with asset information to be verified (a table) to form a first intermediate asset report (B table).
Next, the first intermediate asset report (B-table) is matched with the confirmed asset attribute information to form a second intermediate asset report (C-table) in operation S805.
Next, in operation S806, the second intermediate asset report (C table) is matched with the asset information to be verified (a table), so as to obtain a first verification result.
In case the verification result is abnormal, operation S807 is performed, and an alarm is pushed to the asset manager to confirm the data.
Next, in operation S808, the data is updated by the asset management platform, resulting in an updated a-table, and after the data update is completed, operation S801 is re-executed to trigger the asset information verification task again.
Next, in operation S809, the asset entry information (D-table) is read from the asset management platform.
Next, in operation S810, the updated a table is compared with the asset entry information (D table).
Next, in operation S811, in the case where the verification results do not coincide, an asset transition log is generated.
Next, in operation S812, the asset transition log is stored by the asset management platform.
FIG. 9 schematically illustrates a block diagram of an asset information verification system, in accordance with an embodiment of the present disclosure.
As shown in fig. 9, the system 900 includes a monitoring platform 901, a network management platform 902, and an asset management platform 903.
The network management platform 902 is used for responding to the received asset verification instruction, calling the monitoring platform 901 to acquire real-time asset information of the data center asset, and acquiring asset information to be verified from the asset management platform 903; the network management platform 902 is further configured to compare the real-time asset information with asset information to be verified according to a preset management script to obtain a first verification result based on asset address characteristics, where the asset address includes a physical address and/or a network address; the asset management platform 903 is configured to generate asset transition information according to the first verification result, and update asset information to be verified based on the asset transition information.
FIG. 10 schematically illustrates a block diagram of an asset information verification device, in accordance with an embodiment of the present disclosure.
As shown in fig. 10, the apparatus 1000 includes an acquisition module 1001, a first processing module 1002, and a second processing module 1003.
The acquisition module 1001 is used for responding to the received asset verification instruction and acquiring real-time asset information of the data center asset and asset information to be verified; the first processing module 1002 is configured to compare the real-time asset information with asset information to be verified according to a preset management script, and obtain a first verification result based on asset address characteristics, where an asset address includes a physical address and/or a network address; the second processing module 1003 is configured to generate asset transition information according to the first verification result, and update the asset information to be verified based on the asset transition information.
According to the embodiment of the disclosure, the real-time asset information and the asset information to be verified of the data center asset are obtained in response to the received asset verification instruction; comparing the real-time asset information with asset information to be verified according to a preset management script to obtain a first verification result based on asset address characteristics, wherein the asset address comprises a physical address and/or a network address; and generating asset change information according to the first verification result, and updating the asset information to be verified based on the asset change information. The design effectively solves the problem of information synchronization lag existing among different platforms in the related technology, realizes real-time verification and updating of asset information of a data center through a cross-platform data communication mode, reduces the lag of account data relative to business change, greatly reduces the probability of production configuration misoperation caused by data lag, and effectively reduces the extra workload generated by data lag when an asset manager checks quarterly/semiannually assets.
Optionally, the asset information to be verified comprises asset registration information; the first processing module includes: the first processing submodule is used for carrying out matching processing aiming at the real-time asset information and the asset registration information by taking the network address as a first matching characteristic according to a preset management script to form a first intermediate asset report; the second processing submodule is used for carrying out matching processing aiming at the first intermediate asset report and the confirmed asset attribute report by taking the asset topology as a second matching characteristic to form a second intermediate asset report; and the third processing submodule is used for performing matching processing aiming at the second intermediate asset report and the asset registration information by taking the physical address as a third matching characteristic to obtain a first verification result based on the asset physical address.
Optionally, an uplink switch IP and an uplink switch port which are associated with the data center assets are used for representing asset topology, and a preset asset planning report forms form a confirmed asset attribute report form; the second processing submodule includes: and the first processing unit is used for performing matching processing aiming at the first intermediate asset report and the asset planning report by taking the upper connection switch IP and the upper connection switch port as second matching characteristics to form a second intermediate asset report.
Optionally, characterizing the physical address by a data center tag, a cabinet tag, and a cabinet layout position associated with the data center asset; the third processing submodule includes: and the second processing unit is used for performing matching processing aiming at the second intermediate asset report and the asset registration information by taking the field combination characteristics formed by the data center label, the cabinet label and the cabinet layout position as third matching characteristics to obtain a first verification result based on the asset physical address.
Optionally, the first processing module further includes: and the fourth processing submodule is used for performing matching processing aiming at the first intermediate asset report and the asset registration information by taking the IP address as a fourth matching characteristic to obtain a first verification result based on the asset network address.
Optionally, the apparatus further includes a third processing module, configured to, after the asset registration information is updated, obtain, according to the asset identifier recorded in the asset registration information, asset entry information associated with the asset identifier; comparing the asset entry information with the updated asset registration information to obtain a second verification result based on the asset address characteristics; and generating and outputting an asset change log according to the second verification result.
Optionally, the real-time asset information includes a real-time image of the data center asset, the asset information to be verified includes preset configuration information of the data center asset, and the apparatus further includes: the fourth processing module is used for identifying and processing the real-time image to obtain real-time configuration information of the data center assets; comparing the real-time configuration information with preset configuration information to obtain a third verification result based on the asset configuration characteristics; and performing asset configuration transaction alarm according to the third verification result.
It should be noted that, in the embodiments of the present disclosure, the implementation of the apparatus portion is the same as or similar to the implementation of the method portion, and is not described herein again.
Any of the modules according to embodiments of the present disclosure, or at least part of the functionality of any of them, may be implemented in one module. Any one or more of the modules according to the embodiments of the present disclosure may be implemented by being split into a plurality of modules. Any one or more of the modules according to the embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented in any other reasonable manner of hardware or firmware by integrating or packaging the circuit, or in any one of three implementations, or in any suitable combination of any of the software, hardware, and firmware. Or one or more of the modules according to embodiments of the disclosure, may be implemented at least partly as computer program modules which, when executed, may perform corresponding functions.
For example, any plurality of the obtaining module 1001, the first processing module 1002 and the second processing module 1003 may be combined and implemented in one module, or any one of the modules may be split into a plurality of modules. Alternatively, at least part of the functionality of one or more of these modules may be combined with at least part of the functionality of the other modules and implemented in one module. According to an embodiment of the present disclosure, at least one of the obtaining module 1001, the first processing module 1002 and the second processing module 1003 may be implemented at least partially as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system on a chip, a system on a substrate, a system on a package, an Application Specific Integrated Circuit (ASIC), or may be implemented by hardware or firmware in any other reasonable manner of integrating or packaging a circuit, or may be implemented by any one of or a suitable combination of software, hardware and the same. At least one of the obtaining module 1001, the first processing module 1002 and the second processing module 1003 may be at least partly implemented as a computer program module, which when executed may perform a corresponding function.
Fig. 11 schematically shows a block diagram of an electronic device 1100 adapted to implement a processing method and a processing arrangement according to an embodiment of the disclosure. The electronic device 1100 shown in fig. 11 is only an example and should not bring any limitations to the function and scope of use of the embodiments of the present disclosure.
As shown in fig. 11, an electronic device 1100 according to an embodiment of the present disclosure includes a processor 1101, which can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM)1102 or a program loaded from a storage section 1108 into a Random Access Memory (RAM) 1103. The processor 1101 may comprise, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or associated chipset, and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), among others. The processor 1101 may also include on-board memory for caching purposes. The processor 1101 may comprise a single processing unit or a plurality of processing units for performing the different actions of the method flows according to the embodiments of the present disclosure.
In the RAM 1103, various programs and data necessary for the operation of the electronic device 1100 are stored. The processor 1101, the ROM 1102, and the RAM 1103 are connected to each other by a bus 1104. The processor 1101 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM 1102 and/or the RAM 1103. It is to be noted that the programs may also be stored in one or more memories other than the ROM 1102 and the RAM 1103. The processor 1101 may also perform various operations of the method flows according to the embodiments of the present disclosure by executing programs stored in the one or more memories.
Electronic device 1100 may also include input/output (I/O) interface 1105, input/output (I/O) interface 1105 also connected to bus 1104, according to an embodiment of the disclosure. Electronic device 1100 may also include one or more of the following components connected to I/O interface 1105: an input portion 1106 including a keyboard, mouse, and the like; an output portion 1107 including a signal output unit such as a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and a speaker; a storage section 1108 including a hard disk and the like; and a communication section 1109 including a network interface card such as a LAN card, a modem, or the like. The communication section 1109 performs communication processing via a network such as the internet. A driver 1110 is also connected to the I/O interface 1105 as necessary. A removable medium 1111 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 1110 as necessary, so that a computer program read out therefrom is mounted into the storage section 1108 as necessary.
According to embodiments of the present disclosure, method flows according to embodiments of the present disclosure may be implemented as computer software programs. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable storage medium, the computer program containing program code for performing the method illustrated by the flow chart. In such an embodiment, the computer program may be downloaded and installed from a network through the communication portion 1109 and/or installed from the removable medium 1111. The computer program, when executed by the processor 1101, performs the above-described functions defined in the system of the embodiment of the present disclosure. The systems, devices, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
The present disclosure also provides a computer-readable storage medium, which may be contained in the apparatus/device/system described in the above embodiments; or may exist separately and not be assembled into the device/apparatus/system. The computer-readable storage medium carries one or more programs which, when executed, implement the method according to an embodiment of the disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium, which may include, for example but is not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the present disclosure, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device. For example, according to embodiments of the present disclosure, a computer-readable storage medium may include the ROM 1102 and/or the RAM 1103 and/or one or more memories other than the ROM 1102 and the RAM 1103 described above.
Embodiments of the present disclosure also include a computer program product comprising a computer program containing program code for performing the method provided by the embodiments of the present disclosure, when the computer program product runs on an electronic device, the program code is configured to enable the electronic device to implement the method for detecting a file upload vulnerability provided by the embodiments of the present disclosure.
The computer program, when executed by the processor 1101, performs the above-described functions defined in the system/apparatus of the embodiments of the present disclosure. The systems, apparatuses, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the present disclosure.
In one embodiment, the computer program may be hosted on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted in the form of a signal on a network medium, distributed, downloaded and installed via the communication part 1109, and/or installed from the removable medium 1111. The computer program containing program code may be transmitted using any suitable network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
In accordance with embodiments of the present disclosure, program code for executing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, these computer programs may be implemented using high level procedural and/or object oriented programming languages, and/or assembly/machine languages. The programming language includes, but is not limited to, programming languages such as Java, C + +, python, the "C" language, or the like. The program code may execute entirely on the user computing device, partly on the user device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of a remote computing device, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., through the internet using an internet service provider).
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The embodiments of the present disclosure have been described above. However, these examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Various alternatives and modifications can be devised by those skilled in the art without departing from the scope of the present disclosure, and such alternatives and modifications are intended to be within the scope of the present disclosure.