Disclosure of Invention
The invention aims to provide a problem positioning method, electronic equipment and storage medium based on webpage watermarking, which are used for solving the problems that in the prior art, customer service needs to spend a great deal of time for communication when receiving information fed back by a user, so that problems and positioning problems can be found, the communication cost is too high, and the communication efficiency and accuracy are low.
In order to achieve one of the above objects, an embodiment of the present invention provides a problem positioning method based on web page watermarking, the method including: acquiring user information and generating an encryption string; generating an encrypted watermark formed by the encrypted string on a web page when the web page is designed; analyzing the webpage problem picture obtained through feedback, obtaining the encrypted watermark and decoding the encrypted watermark to obtain watermark information; and positioning the problem based on the log according to the information of the encrypted watermark.
As a further improvement of the present invention, the method further comprises: the specific steps of obtaining the user information and generating the encryption string comprise: obtaining user information by using a browser interface; the user information is encrypted according to the AES encryption algorithm to form an encrypted string.
As a further improvement of the present invention, the method further comprises: the user information includes a user identification, device information, and a network environment.
As a further improvement of the present invention, the method further comprises: the encrypted watermark is an invisible encrypted watermark.
As a further improvement of the present invention, the method further comprises: the specific steps of analyzing the webpage problem picture obtained by feedback comprise: acquiring picture data uploaded by a user; drawing a picture based on a draw lmage method and acquiring RGB color information of the picture through an application platform based on the draw lmage method; and inverting the RGB color information of the picture by the power operation of the RGB color information of the picture to obtain the visible encrypted watermark.
As a further improvement of the present invention, the method further comprises: the decoding the encrypted watermark to obtain watermark information includes: watermark information is obtained according to an AES decryption algorithm.
As a further improvement of the present invention, the method further comprises: the problem of locating the information based on the encrypted watermark in the log comprises the following steps: acquiring information of the encrypted watermark; and acquiring network information of the user equipment in the log according to the information of the encrypted watermark, and reproducing the problem according to the network information to realize the positioning problem.
As a further improvement of the present invention, the method further comprises: the network information comprises network request data of a user, parameters carried by the request data and network request times.
The invention also provides an electronic device comprising a memory and a processor, the electronic device further comprising: the memory stores a computer program executable on the processor, which when executed implements the steps of the web page watermark-based problem location method as described in any of the above.
The present invention also provides a storage medium storing a computer program which, when executed by a processor, implements the steps of a method for problem localization based on web page watermarks as described in any of the above.
Compared with the prior art, the invention has the following beneficial effects: the detailed information on the current webpage of the user can be accurately obtained through encryption and decryption, the problems encountered on the current webpage of the user can be recovered and the problems can be positioned according to the detailed information, so that the cost of communication with the user is saved on one hand, and on the other hand, the problems can be more accurately positioned through the information and the data directly; and the encryption and decryption modes are both at customer service ends, so that user operation is not needed, better use experience is provided for users, and the problem solving efficiency is greatly improved.
Detailed Description
The present invention will be described in detail below with reference to specific embodiments shown in the drawings. These embodiments are not intended to limit the invention and structural, methodological, or functional modifications of these embodiments that may be made by one of ordinary skill in the art are included within the scope of the invention.
As shown in fig. 1, in an embodiment of the present invention, a problem positioning method based on web page watermarking is provided. The positioning method can be realized based on canvas tools in H5 design webpages, wherein the H5 design webpages are webpage pages developed based on an HTML5 technology. Specifically, the problem positioning method based on the webpage watermark comprises the following steps:
s1: user information is acquired and an encrypted string is generated.
S2: an encrypted watermark formed by the encrypted string is generated on the web page when the web page is designed.
S3: analyzing the webpage problem picture obtained through feedback, obtaining the encrypted watermark and decoding the encrypted watermark to obtain watermark information.
S4: and positioning the problem based on the log according to the information of the encrypted watermark.
Therefore, detailed information on the current webpage of the user can be accurately obtained in an encryption and decryption mode, problems encountered on the current webpage of the user can be recovered and the problems can be positioned according to the detailed information, so that on one hand, the cost of communication with the user is saved, and on the other hand, the problems can be more accurately positioned by directly using the information and the data; and the encryption and decryption modes are both at customer service ends, so that user operation is not needed, better use experience is provided for users, and the problem solving efficiency is greatly improved.
The user information may be understood to include a user identifier, device information and a network environment, where the user identifier is a user ID.
It should be noted that, in this embodiment, only the user information includes the user identifier, the device information, and the network environment, but not only the user identifier, the device information, and the network environment.
It should be noted that, the above information is generated into an encryption string and an encryption watermark is formed on a webpage by a canvas, and when a problem occurs on the webpage of the user, the user information can be obtained based on analyzing the encryption watermark.
Decrypting to obtain watermark information, wherein the watermark information comprises user information, and user equipment and network environment can be identified through the user information; the service condition of the user side is obtained according to the equipment of the user and the network environment, so that the staff can conveniently locate the problem based on the detailed information obtained from the log.
In one embodiment, the use condition of the user terminal is network information, and the network information of the current device is quickly obtained according to the user information, namely the data of the device and the network environment; the detailed information can be obtained from the log system according to the network information so as to analyze and locate the problems encountered by the user, thereby being convenient for better solving.
The staff can avoid communicating with the user by directly obtaining the network information, so that the communication time is reduced, the solution speed is increased, and the problem can be quickly solved based on the own experience of the staff through the network information.
In one embodiment of the present invention, the encrypted watermark is a invisible encrypted watermark.
The invisible encrypted watermark can enable a user to use normally, and the watermark is prevented from affecting the use experience of the user.
In one embodiment of the present invention, the specific steps of obtaining user information and generating an encrypted string include:
and acquiring user information by using a browser interface.
The user information is encrypted according to the AES encryption algorithm to form an encrypted string.
The browser interface, namely the browser API, can quickly access information of the user equipment by staff through the browser API, so that a request of a third party is avoided in the transferring process, the API interface provides a uniform mode to acquire data, standardization and consistency of the data are ensured, and format and structure differences possibly brought by different data sources are eliminated; and the capability of accessing data is provided in a programmed mode, which means that the interfaces can be called by other third-party applications or systems without manual operation, thereby simplifying the flow of data processing, reducing the risk of processing errors and greatly improving the working efficiency.
The AES encryption algorithm supports the key lengths of 128 bits, 192 bits and 256 bits, and the longer the key length is, the higher the encryption strength is, so that brute force cracking and other attacks can be effectively resisted; the AES encryption algorithm adopts a highly complex algorithm, and multiple operations such as byte replacement, row shift, column confusion and the like are adopted, so that an attacker can hardly find an effective attack path; the AES encryption algorithm has good randomness and diffusion, and can resist differential cryptanalysis and other cryptanalysis attacks.
As shown in fig. 2, in an embodiment of the present invention, the specific steps of parsing the web page problem picture obtained by feedback include:
s3.1: acquiring picture data uploaded by a user;
s3.2: drawing a picture based on a draw lmage method and acquiring RGB color information of the picture through an application platform based on the draw lmage method;
s3.3: and inverting the RGB color information of the picture by the power operation of the RGB color information of the picture to obtain the visible encrypted watermark.
Through the scheme, the picture uploaded by the user can be analyzed at the customer service end, so that the invisible watermark is changed into the visible watermark, and the visible watermark can be identified, so that the use experience is not affected when the user uses the picture, and the watermark can be displayed as required after the user feedback problem. And the color operation is directly carried out on the picture, the color of the watermark is directly focused, and the focus on the color of other parts in the picture is eliminated, so that the interference information of other colors is greatly solved.
The drawmage method is a drawing method in a canvas tool, and can draw a local picture or a network picture to be converted into an object of the canvas tool so as to operate the canvas to operate the picture.
The application platform based on the drawmage method can be an H5 design web page; specifically, drawing is performed in an H5 design webpage by adopting a draw method in a canvas tool so as to draw a local image or a network image to form a canvas object, and further, RGB colors of the image can be obtained by adopting the canvas in the H5 design webpage and the RGB colors are subjected to power operation so as to obtain the encrypted watermark.
Specifically, the RGB color information exponentiation of the picture is specifically 0.2 th exponentiation, so that the RGB color information of the picture is inverted to display the watermark.
In one embodiment of the present invention, the decoding the encrypted watermark to obtain watermark information includes: watermark information is obtained according to an AES decryption algorithm.
The AES decryption algorithm corresponds to the AES encryption algorithm, so that more accurate related information can be decrypted more quickly.
In an embodiment of the present invention, the locating the problem in the log based on the information of the encrypted watermark includes:
acquiring information of the encrypted watermark;
and acquiring network information of the user equipment in the log according to the information of the encrypted watermark, and reproducing the problem according to the network information to realize the positioning problem.
Staff can obtain the information of the encrypted watermark in the fed-back webpage picture, then the network information of the user is obtained from the log according to the information, and the problem of the user side can be reproduced based on the network information, so that the problem can be rapidly positioned, the problem can be rapidly solved by the staff, and the customer service side can directly analyze the watermark between the problem, so that the time cost of communication with the user is saved, and the method is rapid and efficient.
The network information comprises relevant information such as network requests of users, parameters carried by the requests, the number of network requests and the like. The positioning problem can be understood as a problem generated by a worker who can find and clearly know the user side.
The network information comprises network request data of a user, parameters carried by the request data and network request times.
It should be noted that, in this embodiment, only the network information includes the network request data of the user, the parameter carried by the request data, and the number of network requests, but not only the network request data of the user, the parameter carried by the request data, and the number of network requests.
In one embodiment of the present invention, there is also provided an electronic device including a memory and a processor; a computer program executable on the processor is stored in the memory, and the steps in the problem positioning method based on web page watermark in any of the above embodiments are implemented when the program is executed on the processor.
In one embodiment of the present invention, there is also provided a storage medium storing a computer program. The steps in the method for positioning a problem based on a web watermark according to any of the embodiments described above are implemented when the computer program is executed by a processor.
In summary, the invention mainly adopts the method that the encryption watermark is arranged on the webpage, and can be an invisible encryption watermark; the encrypted watermark includes user information; when a user feeds back a problem, a picture of a problem page is taken, a customer service side worker analyzes the picture of the problem page to display an invisible watermark, decrypts the information of the watermark through a decryption means corresponding to the encryption means to obtain user information, obtains detailed content from a log according to the decrypted information, and reproduces the generated problem according to the detailed content.
Therefore, the problems encountered by the user during webpage browsing can be directly captured and fed back to the customer service end, detailed communication with staff is not needed, the communication cost of the two parties is saved, and meanwhile, the problem of error positioning caused by communication direction deviation due to non-professionality of the user is avoided; the staff can search the detailed information in the log according to the information in the watermark, so that the problems can be accurately reproduced and positioned. The efficiency and the accuracy of the staff in solving the problems are further improved, the encryption watermark confidentiality is good, and the user experience is not affected when the user uses the encryption watermark.
It will be clear to those skilled in the art that, for convenience and brevity of description, specific working procedures of the above-described system, system and module may refer to corresponding procedures in the foregoing method embodiments, which are not described herein again.
In the several embodiments provided in this application, it should be understood that the disclosed systems, and methods may be implemented in other ways. For example, the system embodiments described above are merely illustrative, e.g., the division of the modules is merely a logical function division, and there may be additional divisions when actually implemented, e.g., multiple modules or components may be combined or integrated into another system, or some features may be omitted or not performed. Alternatively, the coupling or direct coupling or communication connection shown or discussed with respect to each other may be through some interface, indirect coupling or communication connection of systems or modules, electrical, mechanical, or other form. The modules described as separate components may or may not be physically separate, and components shown as modules may or may not be physical modules, i.e., may be located in one place, or may be distributed over a plurality of network modules. Some or all of the modules may be selected according to actual needs to achieve the purpose of the embodiment.
In addition, each functional module in each embodiment of the present application may be integrated into one processing module, or each module may exist alone physically, or 2 or more modules may be integrated into one module. The integrated modules may be implemented in hardware or in hardware plus software functional modules. The integrated modules, which are implemented in the form of software functional modules, may be stored in a computer readable storage medium. The software functional modules described above are stored in a storage medium and include instructions for causing a computer system (which may be a personal computer, a server, or a network system, etc.) or processor (processor) to perform some of the steps of the methods described in the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory (ROM), a random access Memory (Random Access Memory, RAM), a magnetic disk, or an optical disk, or other various media capable of storing program codes.
Finally, it should be noted that: the above embodiments are only for illustrating the technical solution of the present application, and are not limiting thereof; although the present application has been described in detail with reference to the foregoing embodiments, it should be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the corresponding technical solutions.