[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

CN110908818A - Verification method, device, equipment and storage medium - Google Patents

Verification method, device, equipment and storage medium Download PDF

Info

Publication number
CN110908818A
CN110908818A CN201911204696.9A CN201911204696A CN110908818A CN 110908818 A CN110908818 A CN 110908818A CN 201911204696 A CN201911204696 A CN 201911204696A CN 110908818 A CN110908818 A CN 110908818A
Authority
CN
China
Prior art keywords
protocol
target
verification
verification result
custom
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911204696.9A
Other languages
Chinese (zh)
Other versions
CN110908818B (en
Inventor
蔡云星
方俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai United Imaging Healthcare Co Ltd
Original Assignee
Shanghai United Imaging Healthcare Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai United Imaging Healthcare Co Ltd filed Critical Shanghai United Imaging Healthcare Co Ltd
Priority to CN201911204696.9A priority Critical patent/CN110908818B/en
Publication of CN110908818A publication Critical patent/CN110908818A/en
Application granted granted Critical
Publication of CN110908818B publication Critical patent/CN110908818B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/006Identification

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the invention discloses a verification method, a verification device, verification equipment and a storage medium, wherein the verification method comprises the following steps: after the system version is updated, acquiring an updated target custom protocol; verifying the correctness of the target custom protocol to obtain a verification result; and determining verification display content according to the verification result, and displaying the verification display content. The technical scheme of the embodiment of the invention can help the verifier to simply and conveniently verify the correctness of the upgraded custom protocol, thereby improving the working efficiency of the verifier.

Description

Verification method, device, equipment and storage medium
Technical Field
The embodiment of the invention relates to the technical field of computers, in particular to a verification method, a verification device, verification equipment and a storage medium.
Background
The operation of any device requires a series of parameters to support, the collection of which are collectively referred to as a protocol. For example, the medical imaging device needs to support each scanning protocol for acquisition and reconstruction, and these protocols can support a user to make a custom protocol that meets the use habit of the user on the basis of a factory protocol.
After the software version of the device is upgraded, because the new version software adds a new function, the protocol parameters in the original self-defined protocol also need to be upgraded correspondingly so as to be capable of directly running on the new software version. However, due to the uncertainty of the protocol parameter modification in the custom protocol, after the upgrade, a situation that the corresponding function cannot be executed may occur, so that after the upgrade, a service engineer is required to scan all the custom protocols one by one, and the manual scanning mode one by one is very inefficient.
Disclosure of Invention
The invention provides a verification method, a verification device, verification equipment and a storage medium, which can help a verifier to simply and conveniently verify the correctness of a user-defined protocol after being upgraded, and improve the working efficiency of the verifier.
In a first aspect, an embodiment of the present invention provides a verification method, where the method includes:
after the system version is updated, acquiring an updated target custom protocol;
verifying the correctness of the target custom protocol to obtain a verification result;
and determining verification display content according to the verification result, and displaying the verification display content.
In a second aspect, an embodiment of the present invention further provides an authentication apparatus, where the apparatus includes:
the target custom protocol acquisition module is used for acquiring an updated target custom protocol after the system version is updated;
the verification result acquisition module is used for verifying the correctness of the target custom protocol to obtain a verification result;
and the verification display content verification module is used for determining verification display content according to the verification result and displaying the verification display content.
In a third aspect, an embodiment of the present invention further provides a computer device, where the computer device includes:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement a method of authentication as in any embodiment of the invention.
In a fourth aspect, the embodiment of the present invention further provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the authentication method according to any embodiment of the present invention.
According to the embodiment of the invention, after the system version is updated, the updated target custom protocol is obtained; verifying the correctness of the target custom protocol to obtain a verification result; the verification display content is determined according to the verification result, and is displayed, so that the verification personnel can be helped to simply and conveniently verify the correctness of the upgraded custom protocol, and the working efficiency of the verification personnel is improved.
Drawings
In order to more clearly illustrate the embodiments of the present invention or the technical solutions in the prior art, a brief description will be given below of the drawings required for the embodiments or the technical solutions in the prior art, and it is obvious that the drawings in the following description are some embodiments of the present invention, and for those skilled in the art, other drawings can be obtained according to these drawings without creative efforts.
FIG. 1 is a flow chart of a verification method according to a first embodiment of the invention;
FIG. 2 is a flow chart of a verification method in a second embodiment of the invention;
fig. 3 is a schematic structural diagram of an authentication apparatus according to a third embodiment of the present invention;
fig. 4 is a schematic structural diagram of a computer device in the fourth embodiment of the present invention.
Detailed Description
The present invention will be described in further detail with reference to the accompanying drawings and examples. It is to be understood that the specific embodiments described herein are merely illustrative of the invention and are not limiting of the invention. It should be further noted that, for the convenience of description, only some of the structures related to the present invention are shown in the drawings, not all of the structures.
Example one
Fig. 1 is a flowchart of a verification method according to an embodiment of the present invention, where the method is applicable to a case where verification of an updated self-protocol is required after a system version is updated, and the method may be executed by a verification apparatus, which may be implemented in software and/or hardware, and may be configured in a computer device. As shown in fig. 1, the method of this embodiment specifically includes:
and S110, after the system version is updated, acquiring the updated target custom protocol.
A prerequisite for a device to function properly and perform the corresponding functions is the need for a series of system parameter support, and the collection of these system parameters may be collectively referred to as a system protocol. Before the device leaves the factory, besides the preset system protocol, some default factory protocols exist, and if a user does not want to use the default factory protocol, the user can set a custom protocol which accords with the use habit of the user on the basis of the default factory protocol on the basis of the preset system protocol. The custom protocol may include a combination of custom parameters and corresponding custom parameter values, and it is understood that each custom parameter value is within a corresponding parameter value range defined by the system protocol.
For example, if the apparatus is a medical imaging apparatus, the corresponding system parameters may include acquisition parameters and reconstruction parameters, and for CT, the system parameters may include layer thickness, layer spacing, scan start position, scan end position, and the like, and for PET/CT, the system parameters may include parameters specific to PET, such as attenuation correction, reconstruction start bed, reconstruction end bed, and the like, in addition to all parameters of CT (such as layer thickness, layer spacing, scan start position, scan end position, and the like).
After the device leaves the factory, in order to ensure that the performance of the device can meet the increasing demand of the user, it is preferable that the version of the system of the device is updated (or upgraded). The update of the system version can cause the update of the system parameters, and the custom protocol is set based on the system parameters, so that the custom protocol can be updated along with the update of the system version in the updating process.
In this embodiment, after detecting that the system version is updated, the updated target custom protocol may be automatically obtained from the storage location of the custom protocol, or the updated target custom protocol may be obtained from the storage location of the custom protocol after receiving a request for obtaining the custom protocol triggered by a user. The target custom protocol may be all custom protocols stored in the device, or may be a part of all custom protocols (on the premise that other custom protocols are known to be correct). For example, if the device is a medical imaging device, the target customized protocol may include an acquisition customized protocol, a reconstruction customized protocol, and the like.
And S120, verifying the correctness of the target custom protocol to obtain a verification result.
Generally, the updated custom protocol can be directly run on the updated system, but due to the diversity of the custom protocol parameters, errors may occur after updating some parameters (for example, some parameters are not upgraded successfully, etc.), so that the device cannot execute corresponding functions according to the updated custom protocol. Therefore, the correctness of the target custom protocol needs to be verified. The verification result may include that the target custom protocol is correct or the target custom protocol is incorrect.
For example, errors that may occur after a part of the parameters are updated may include that the custom protocol is not modified (i.e., the custom protocol fails to be updated), the modified custom protocol is not supported by system hardware, two or more incompatible parameters exist in the modified custom protocol, and although the modified custom protocol itself has no problem, the modified custom protocol may affect parameter values of its associated protocol parameters, so that the parameter values of the associated protocol parameters exceed at least one of the preset ranges.
Preferably, whether the device can execute the corresponding function can be determined through actual operation, and whether the target custom protocol is correct is verified. Specifically, if it is determined that the device can execute the corresponding function, the verification result is that the target custom protocol is correct, and if it is determined that the device cannot execute the corresponding function, the verification result is that the target custom protocol is incorrect. The method can also verify the correctness of the target self-defined protocol by determining whether the corresponding preset plan operation flow in the system can be normally executed, specifically, if the preset plan operation flow is determined to be normally executed, the verification result is that the target self-defined protocol is correct, and if the preset plan operation flow is determined not to be normally executed, the verification result is that the target self-defined protocol is wrong.
And S130, determining verification display content according to the verification result, and displaying the verification display content.
The verification display content may be set according to actual needs, and is not particularly limited herein. For example, the verification display content may be an error protocol list of target custom protocols whose verification results are errors; or a correct protocol list and an error protocol list of the target self-defined protocol with correct verification results; or the first total number of target self-defined protocols with wrong verification results and a wrong protocol list; the second total number of target custom protocols, the correct protocol list, the first total number and the error protocol list which are verified to be correct can also be used. Or the error protocol list and the error parameters in each custom protocol; but also a list of error protocols, error parameters in each custom protocol and a correct recommended range for the error parameters. It will be appreciated that the validation display content may also include factors that cause errors in the custom protocol.
In the verification method provided by the embodiment, after the system version is updated, the updated target custom protocol is obtained; verifying the correctness of the target custom protocol to obtain a verification result; the verification display content is determined according to the verification result, and is displayed, so that the verification personnel can be helped to simply and conveniently verify the correctness of the upgraded custom protocol, and the working efficiency of the verification personnel is improved.
On the basis of the above embodiments, further, after the system version is updated, a protocol verification request is obtained; correspondingly, the step of obtaining the custom protocol group comprises the step of obtaining the custom protocol group according to the protocol verification request. The protocol verification request can be preferably triggered by a user pressing a key on the device interactive interface, or triggered by the user touching the key on the device interactive interface, or triggered by the user inputting a preset instruction through the interactive interface.
On the basis of the foregoing embodiments, further, before updating the system version, it is preferable that a factor that may cause an error in the custom protocol is determined according to a characteristic of the protocol (for example, an association relationship existing between parameters, etc.), a correct parameter value is determined based on the error factor, and the parameter value is assigned to a corresponding parameter in the protocol, or a mapping relationship between the protocol before upgrading and the protocol after upgrading may be preset, and after it is determined that the custom protocol may have an error, the protocol that may have an error is mapped to the correct protocol according to the mapping relationship between the protocols.
Example two
Fig. 2 is a flowchart of a verification method according to a second embodiment of the present invention. On the basis of the foregoing embodiments, the present embodiment may select to verify the correctness of the target custom protocol to obtain a verification result, including:
based on the target self-defining protocol, pre-executing a preset plan operation flow corresponding to the target self-defining protocol;
if the plan operation flow is successfully pre-executed, determining that the target custom protocol is correct;
and if the plan operation flow fails to be pre-executed, determining that the target custom protocol is wrong.
And the verification result comprises wrong protocol parameters and recommended value ranges of the wrong protocol parameters, and if the plan operation process fails to be executed in advance, the method further comprises the following steps:
and determining the wrong protocol parameter in the target custom protocol, and determining the recommended value range of the wrong protocol parameter.
And determining verification display content according to the verification result, comprising:
determining a first number of first target self-defined protocols, a second number of second target self-defined protocols, the first target self-defined protocol list, the second target self-defined protocol list, error protocol parameters corresponding to the second target self-defined protocol list and recommended value ranges of the error protocol parameters according to the verification result;
the first target self-defined protocol is a target self-defined protocol which is verified to be correct, and the second target self-defined protocol is a target self-defined protocol which is verified to be wrong.
As shown in fig. 2, the method of this embodiment specifically includes:
and S210, after the system version is updated, acquiring the updated target custom protocol.
And S220, pre-executing a preset plan operation flow corresponding to the target custom protocol based on the target custom protocol, if the pre-execution is successful, executing S230, and if the execution is failed, executing S240.
And S230, determining that the verification result is that the target custom protocol is correct.
And S240, determining that the verification result is the target custom protocol error.
The plan operation flow is different from the actual operation flow, the device does not need to actually execute the operation, and whether the device can execute the corresponding operation according to the updated target custom protocol can be verified through pre-execution. Specifically, the target custom protocol may be substituted into the plan operation flow, and if the plan operation flow can be executed successfully in advance, the verification result is determined to be that the target custom protocol is correct, and if the plan operation flow fails in advance, the verification result is determined to be that the target custom protocol is wrong.
Taking a device as a medical imaging device as an example, a plan operation flow (the preset plan operation flow may include an acquisition plan operation flow and a reconstruction plan operation flow) is preset in the medical imaging device, the system issues the obtained target self-defined protocol to a system controller in the medical imaging device, the system controller performs pre-execution on the plan operation flow by using the target self-defined protocol, if the pre-execution is successful, the verification result is determined to be that the corresponding target self-defined protocol is correct, and if the pre-execution is failed, the verification result is determined to be that the corresponding target self-defined protocol is wrong.
And S250, if the plan operation flow fails to execute in advance, determining an error protocol parameter in the target user-defined protocol, and determining a recommended value range of the error protocol parameter, wherein correspondingly, the verification result also comprises the error protocol parameter and the recommended value range of the error protocol parameter.
If the plan operation flow fails to execute in advance, a corresponding target self-defined protocol error can be determined, and on the basis of determining the corresponding target self-defined protocol error, the target self-defined protocol with the error can be sent to a protocol compiler so as to determine the protocol parameter with the error. After determining the protocol parameter with the error, the recommended value range of the protocol parameter with the error may be determined based on the corresponding updated value range of the system parameter. It can be understood that the recommended value range may be a general value range, or may be a value range that conforms to the personal usage habit of the user (the determination of the value range may be determined by analyzing the historical usage data of the user and combining the system parameters).
It can be understood that, after determining the recommended value range of the error protocol parameter, preferably, the error protocol parameter may also be modified according to the recommended value range.
S260, determining a first number of first target self-defined protocols, a second number of second target self-defined protocols, a first target self-defined protocol list, a second target self-defined protocol list, error protocol parameters corresponding to the first target self-defined protocol list and recommended value ranges of the error protocol parameters according to the verification result;
the first target self-defined protocol is a target self-defined protocol with wrong verification, and the second target self-defined protocol is a target self-defined protocol with correct verification.
After determining the wrong protocol parameters and the recommended value ranges of the wrong protocol parameters in the target custom protocol, preferably, the verification display content may be determined to include the first number of the custom protocols that are verified incorrectly, the second number of the custom protocols that are verified correctly, the custom protocol list that is verified incorrectly, the custom protocol list that is verified correctly, and the wrong protocol parameters and the recommended value ranges of the wrong protocol parameters corresponding to the custom protocol list that is verified incorrectly.
In the verification method provided by the embodiment, after the system version is updated, the updated target custom protocol is obtained; based on the target user-defined protocol, pre-executing a preset plan operation flow corresponding to the target user-defined protocol; if the plan operation flow is successfully pre-executed, determining that the verification result is that the target custom protocol is correct; if the plan operation flow fails to execute in advance, determining that the verification result is a target custom protocol error; if the plan operation flow fails to execute in advance, determining an error protocol parameter in the target user-defined protocol, and determining a recommended value range of the error protocol parameter, wherein correspondingly, the verification result also comprises the error protocol parameter and the recommended value range of the error protocol parameter; determining a first number of first target self-defined protocols, a second number of second target self-defined protocols, a first target self-defined protocol list, a second target self-defined protocol list, error protocol parameters corresponding to the second target self-defined protocol list and recommended value ranges of the error protocol parameters according to the verification result; the first target custom protocol is a target custom protocol for verifying correctness, the second target custom protocol is a target custom protocol for verifying errors, and the method helps a verifier to verify the correctness of the upgraded custom protocol simply and conveniently, improves the working efficiency of the verifier, and can also determine specific error parameters and the recommended value range of the parameters.
On the basis of the foregoing embodiments, further, the verification result further includes a pre-execution failure factor, and if the planned operation flow fails to be pre-executed, the method further includes:
determining a pre-execution failure factor for the pre-execution failure of the planning operation flow;
the pre-execution failure factors comprise at least one of upgrading failure of the target self-defining protocol, protocol parameters which cannot be supported by system hardware performance are included in the target self-defining protocol, protocol parameters which cannot be mutually compatible are included in the target self-defining protocol, and protocol parameters which can enable the associated protocol parameters to exceed a preset range are included in the target self-defining protocol.
The uncertainty of updating the custom protocol parameter modification may include that the custom protocol is not modified (i.e., the custom protocol update fails), the modified custom protocol is not supported by system hardware, two or more incompatible parameters exist in the modified custom protocol, and although the modified custom protocol itself has no problem, the modified custom protocol may affect the parameter value of the associated protocol parameter, so that the parameter value of the associated protocol parameter exceeds at least one of the preset ranges. Correspondingly, the pre-execution failure factor may include at least one of a failure of updating the target custom protocol, a failure of including a protocol parameter that cannot be supported by system hardware performance in the target custom protocol, a failure of including a protocol parameter that cannot be compatible with each other in the target custom protocol, and a failure of including a protocol parameter that can make an associated protocol parameter exceed a preset range in the target custom protocol.
The pre-execution failure factor may be determined according to a preset failure factor determination rule after determining the error protocol parameter by the protocol compiler. The failure factor determination rule corresponds to the pre-execution failure factor, and illustratively, if the pre-execution failure factor is that the target custom protocol fails to be updated, the failure factor determination rule may compare the target custom protocol with the original custom protocol, if the target custom protocol is the same as the original custom protocol, the target custom protocol may be determined to fail to be updated, otherwise, the target custom protocol is successfully updated; in addition, for the situation, the update of the target self-defined protocol can be determined according to the protocol version number, if the protocol version number of the target self-defined protocol is different from the upgraded protocol version number, the update of the target self-defined protocol can be determined to be failed, and if not, the update of the target self-defined protocol is successful. The modified custom protocol is not supported by system hardware, two or more incompatible parameters exist in the modified custom protocol, and although the modified custom protocol has no problem, the modified custom protocol can influence the parameter values of the associated protocol parameters, so that the parameter values of the associated protocol parameters exceed the preset range under three conditions, and the system log can be obtained, and the corresponding content in the system log can be analyzed and determined.
EXAMPLE III
Fig. 3 is a schematic structural diagram of an authentication apparatus in a third embodiment of the present invention. As shown in fig. 3, the apparatus of the present embodiment includes:
a target custom protocol obtaining module 310, configured to obtain an updated target custom protocol after the system version is updated;
the verification result obtaining module 320 is configured to verify the correctness of the target custom protocol to obtain a verification result;
and the verification display content display module 330 is configured to determine verification display content according to the verification result, and display the verification display content.
In the verification device provided by this embodiment, after the system version is updated, the target custom protocol is acquired by using the target custom protocol acquisition module; verifying the correctness of the target custom protocol by using a verification result acquisition module to obtain a verification result; the verification display content is determined by the verification display content verification module according to the verification result, and the verification display content is displayed, so that the verification personnel can be helped to simply and conveniently verify the correctness of the upgraded custom protocol, and the working efficiency of the verification personnel is improved.
On the basis of the above technical solutions, optionally, the verification result obtaining module 320 may be specifically configured to:
based on the target user-defined protocol, pre-executing a preset plan operation flow corresponding to the target user-defined protocol;
if the plan operation flow is successfully pre-executed, determining that the verification result is that the target custom protocol is correct;
and if the plan operation flow fails to execute in advance, determining that the verification result is a target custom protocol error.
On the basis of the above technical solutions, optionally, the verification result further includes a pre-execution failure factor, and the verification apparatus further includes:
the pre-execution failure factor determining module is used for determining a pre-execution failure factor of the plan operation flow, if the plan operation flow fails to be pre-executed;
the pre-execution failure factors comprise at least one of upgrading failure of the target self-defining protocol, protocol parameters which cannot be supported by system hardware performance are included in the target self-defining protocol, protocol parameters which cannot be mutually compatible are included in the target self-defining protocol, and protocol parameters which can enable the associated protocol parameters to exceed a preset range are included in the target self-defining protocol.
On the basis of the above technical solutions, optionally, the verification result further includes an incorrect protocol parameter and a recommended value range of the incorrect protocol parameter, and the verification apparatus may further include:
and the error protocol parameter determining module is used for determining the error protocol parameter in the target custom protocol and determining the recommended value range of the error protocol parameter if the plan operation flow fails to execute in advance.
On the basis of the foregoing technical solutions, optionally, the verification display content display module 330 may specifically include:
determining a first number of first target self-defined protocols, a second number of second target self-defined protocols, a first target self-defined protocol list, a second target self-defined protocol list, error protocol parameters corresponding to the second target self-defined protocol list and recommended value ranges of the error protocol parameters according to the verification result;
the first target self-defined protocol is a target self-defined protocol which is verified to be correct, and the second target self-defined protocol is a target self-defined protocol which is verified to be wrong.
On the basis of the above technical solutions, optionally, the verification apparatus may be applied to a medical imaging device.
On the basis of the above technical solutions, optionally, the verification apparatus may further include a protocol verification request obtaining module, configured to obtain the protocol verification request after the system version is updated;
accordingly, the target custom protocol obtaining module 310 may be specifically configured to:
and acquiring the updated target custom protocol group according to the protocol verification request.
The verification device provided by the embodiment of the invention can execute the verification method provided by any embodiment of the invention, and has corresponding functional modules and beneficial effects of the execution method.
Example four
Fig. 4 is a schematic structural diagram of a computer device according to a fourth embodiment of the present invention. FIG. 4 illustrates a block diagram of an exemplary computer device 412 suitable for use in implementing embodiments of the present invention. The computer device 412 shown in FIG. 4 is only one example and should not impose any limitations on the functionality or scope of use of embodiments of the present invention.
As shown in FIG. 4, computer device 412 is in the form of a general purpose computing device. Components of computer device 412 may include, but are not limited to: one or more processors 416, a memory 428, and a bus 418 that couples the various system components (including the memory 428 and the processors 416).
Bus 418 represents one or more of any of several types of bus structures, including a memory bus or memory controller, a peripheral bus, an accelerated graphics port, and a processor or local bus using any of a variety of bus architectures. By way of example, such architectures include, but are not limited to, Industry Standard Architecture (ISA) bus, micro-channel architecture (MAC) bus, enhanced ISA bus, Video Electronics Standards Association (VESA) local bus, and Peripheral Component Interconnect (PCI) bus.
Computer device 412 typically includes a variety of computer system readable media. Such media can be any available media that is accessible by computer device 412 and includes both volatile and nonvolatile media, removable and non-removable media.
Memory 428 can include computer system readable media in the form of volatile memory, such as Random Access Memory (RAM)430 and/or cache memory 432. The computer device 412 may further include other removable/non-removable, volatile/nonvolatile computer system storage media. By way of example only, storage 434 may be used to read from and write to non-removable, nonvolatile magnetic media (not shown in FIG. 4, and commonly referred to as a "hard drive"). Although not shown in FIG. 4, a magnetic disk drive for reading from and writing to a removable, nonvolatile magnetic disk (e.g., a "floppy disk") and an optical disk drive for reading from or writing to a removable, nonvolatile optical disk (e.g., a CD-ROM, DVD-ROM, or other optical media) may be provided. In these cases, each drive may be connected to bus 418 by one or more data media interfaces. Memory 428 can include at least one program product having a set (e.g., at least one) of program modules that are configured to carry out the functions of embodiments of the invention.
A program/utility 440 having a set (at least one) of program modules 442 may be stored, for instance, in memory 428, such program modules 442 including, but not limited to, an operating system, one or more application programs, other program modules, and program data, each of which examples or some combination thereof may comprise an implementation of a network environment. The program modules 442 generally perform the functions and/or methodologies of the described embodiments of the invention.
The computer device 412 may also communicate with one or more external devices 414 (e.g., keyboard, pointing device, display 424, etc., where the display 424 may be configurable or not as desired), one or more devices that enable a user to interact with the computer device 412, and/or any devices (e.g., network card, modem, etc.) that enable the computer device 412 to communicate with one or more other computing devices. Such communication may occur via input/output (I/O) interfaces 422. Also, computer device 412 may communicate with one or more networks (e.g., a Local Area Network (LAN), a Wide Area Network (WAN) and/or a public network, such as the Internet) through network adapter 420. As shown, network adapter 420 communicates with the other modules of computer device 412 over bus 418. It should be appreciated that although not shown in FIG. 4, other hardware and/or software modules may be used in conjunction with the computer device 412, including but not limited to: microcode, device drivers, redundant processing units, external disk drive arrays, RAID systems, tape drives, and data backup storage, among others.
The processor 416 executes various functional applications and data processing, such as implementing authentication methods provided by embodiments of the present invention, by executing programs stored in the memory 428.
EXAMPLE five
An embodiment of the present invention provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a verification method provided in an embodiment of the present invention, where the computer program includes:
after the system version is updated, acquiring an updated target custom protocol;
verifying the correctness of the target custom protocol to obtain a verification result;
and determining verification display content according to the verification result, and displaying the verification display content.
Of course, the computer-readable storage medium provided in the embodiments of the present invention, on which the computer program is stored, is not limited to performing the method operations described above, and may also perform related operations in the computer device based authentication method provided in any embodiments of the present invention.
Computer storage media for embodiments of the invention may employ any combination of one or more computer-readable media. The computer readable medium may be a computer readable signal medium or a computer readable storage medium. A computer readable storage medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, or device, or any combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), an optical fiber, a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this document, a computer readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
A computer readable signal medium may include a propagated data signal with computer readable program code embodied therein, for example, in baseband or as part of a carrier wave. Such a propagated data signal may take many forms, including, but not limited to, electro-magnetic, optical, or any suitable combination thereof. A computer readable signal medium may also be any computer readable medium that is not a computer readable storage medium and that can communicate, propagate, or transport a program for use by or in connection with an instruction execution system, apparatus, or device.
Program code embodied on a computer readable medium may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, RF, etc., or any suitable combination of the foregoing.
Computer program code for carrying out operations for aspects of the present invention may be written in any combination of one or more programming languages, including an object oriented programming language such as Java, Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider).
It is to be noted that the foregoing is only illustrative of the preferred embodiments of the present invention and the technical principles employed. It will be understood by those skilled in the art that the present invention is not limited to the particular embodiments described herein, but is capable of various obvious changes, rearrangements and substitutions as will now become apparent to those skilled in the art without departing from the scope of the invention. Therefore, although the present invention has been described in greater detail by the above embodiments, the present invention is not limited to the above embodiments, and may include other equivalent embodiments without departing from the spirit of the present invention, and the scope of the present invention is determined by the scope of the appended claims.

Claims (10)

1. A method of authentication, comprising:
after the system version is updated, acquiring an updated target custom protocol;
verifying the correctness of the target custom protocol to obtain a verification result;
and determining verification display content according to the verification result, and displaying the verification display content.
2. The method of claim 1, wherein the verifying the correctness of the target custom protocol to obtain a verification result comprises:
based on the target self-defining protocol, pre-executing a preset plan operation flow corresponding to the target self-defining protocol;
if the plan operation flow is successfully pre-executed, determining that the verification result is that the target custom protocol is correct;
and if the plan operation flow fails to be pre-executed, determining that the verification result is a target custom protocol error.
3. The method of claim 2, wherein the verification result further includes a pre-execution failure factor, and if the planned operational flow fails to pre-execute, the method further comprises:
determining a pre-execution failure factor of the plan operation flow pre-execution failure;
the pre-execution failure factor comprises at least one of update failure of the target self-defining protocol, protocol parameters which cannot be supported by system hardware performance in the target self-defining protocol, protocol parameters which cannot be mutually compatible in the target self-defining protocol and protocol parameters which can enable associated protocol parameters to exceed a preset range in the target self-defining protocol.
4. The method of claim 2, wherein the verification result further includes an incorrect protocol parameter and a recommended value range of the incorrect protocol parameter, and if the planned operation flow fails to be pre-executed, the method further includes:
and determining the wrong protocol parameter in the target custom protocol, and determining the recommended value range of the wrong protocol parameter.
5. The method of claim 4, wherein determining the verification display content according to the verification result comprises:
determining a first number of first target self-defined protocols, a second number of second target self-defined protocols, the first target self-defined protocol list, the second target self-defined protocol list, and wrong protocol parameters and recommended value ranges of the wrong protocol parameters corresponding to the second target self-defined protocol list according to the verification result;
the first target self-defined protocol is a target self-defined protocol with wrong verification, and the second target self-defined protocol is a target self-defined protocol with correct verification.
6. The method of claim 1, wherein the method is applied to a medical imaging device.
7. The method of claim 1, further comprising, after a system version update:
acquiring a protocol verification request;
correspondingly, obtaining the updated target custom protocol group includes:
and acquiring the updated target custom protocol group according to the protocol verification request.
8. An authentication apparatus, comprising:
the target custom protocol acquisition module is used for acquiring an updated target custom protocol after the system version is updated;
the verification result acquisition module is used for verifying the correctness of the target custom protocol to obtain a verification result;
and the verification display content display module is used for determining verification display content according to the verification result and displaying the verification display content.
9. A computer device, the device comprising:
one or more processors;
a storage device for storing one or more programs,
when executed by the one or more processors, cause the one or more processors to implement the authentication method of any one of claims 1-7.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the authentication method according to any one of claims 1 to 7.
CN201911204696.9A 2019-11-29 2019-11-29 Verification method, device, equipment and storage medium Active CN110908818B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911204696.9A CN110908818B (en) 2019-11-29 2019-11-29 Verification method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201911204696.9A CN110908818B (en) 2019-11-29 2019-11-29 Verification method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110908818A true CN110908818A (en) 2020-03-24
CN110908818B CN110908818B (en) 2024-06-07

Family

ID=69820794

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201911204696.9A Active CN110908818B (en) 2019-11-29 2019-11-29 Verification method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN110908818B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112767332A (en) * 2021-01-08 2021-05-07 心医国际数字医疗系统(大连)有限公司 Blood vessel region judgment method and system based on CTA image

Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6272469B1 (en) * 1998-11-25 2001-08-07 Ge Medical Systems Global Technology Company, Llc Imaging system protocol handling method and apparatus
US20090113413A1 (en) * 2007-10-24 2009-04-30 Michael Reinz Offline Upgrades
CN103605505A (en) * 2013-10-11 2014-02-26 索尔思光电(成都)有限公司 Sharing method of software configuration files
US20160036858A1 (en) * 2014-08-04 2016-02-04 International Business Machines Corporation Server validation with dynamic assembly of scripts
US20170060560A1 (en) * 2015-08-26 2017-03-02 Bank Of America Corporation Software and associated hardware regression and compatiblity testing system
CN109325091A (en) * 2018-10-30 2019-02-12 百度在线网络技术(北京)有限公司 Update method, device, equipment and the medium of points of interest attribute information
CN110083375A (en) * 2019-03-27 2019-08-02 珠海全志科技股份有限公司 A kind of equipment room interaction carries out the method and device of OTA upgrading
CN110232969A (en) * 2019-06-06 2019-09-13 武汉联影医疗科技有限公司 Medical image is uploaded to the method, apparatus, terminal and storage medium of Cloud Server

Patent Citations (8)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US6272469B1 (en) * 1998-11-25 2001-08-07 Ge Medical Systems Global Technology Company, Llc Imaging system protocol handling method and apparatus
US20090113413A1 (en) * 2007-10-24 2009-04-30 Michael Reinz Offline Upgrades
CN103605505A (en) * 2013-10-11 2014-02-26 索尔思光电(成都)有限公司 Sharing method of software configuration files
US20160036858A1 (en) * 2014-08-04 2016-02-04 International Business Machines Corporation Server validation with dynamic assembly of scripts
US20170060560A1 (en) * 2015-08-26 2017-03-02 Bank Of America Corporation Software and associated hardware regression and compatiblity testing system
CN109325091A (en) * 2018-10-30 2019-02-12 百度在线网络技术(北京)有限公司 Update method, device, equipment and the medium of points of interest attribute information
CN110083375A (en) * 2019-03-27 2019-08-02 珠海全志科技股份有限公司 A kind of equipment room interaction carries out the method and device of OTA upgrading
CN110232969A (en) * 2019-06-06 2019-09-13 武汉联影医疗科技有限公司 Medical image is uploaded to the method, apparatus, terminal and storage medium of Cloud Server

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112767332A (en) * 2021-01-08 2021-05-07 心医国际数字医疗系统(大连)有限公司 Blood vessel region judgment method and system based on CTA image
CN112767332B (en) * 2021-01-08 2024-05-17 心医国际数字医疗系统(大连)有限公司 Blood vessel region judging method and system based on CTA image

Also Published As

Publication number Publication date
CN110908818B (en) 2024-06-07

Similar Documents

Publication Publication Date Title
CN108319575B (en) Page component checking method, device, server and storage medium
US9262208B2 (en) Automated, controlled distribution and execution of commands and scripts
CN110580244A (en) file processing method and device, server and storage medium
CN110928559B (en) Data burning method and device, electronic equipment and storage medium
US20100077257A1 (en) Methods for disaster recoverability testing and validation
CN107577175A (en) MCU method for upgrading software, system and the storage device of vehicle-mounted multimedia equipment
CN111813428A (en) Method and device for upgrading terminal firmware, electronic equipment and storage medium
CN110989926A (en) Fault disk slot positioning method and device and electronic equipment
CN111796978B (en) Interface detection method, device, system, equipment and storage medium
CN110716960B (en) Database query method, device, equipment and storage medium
CN110659210A (en) Information acquisition method and device, electronic equipment and storage medium
CN113384896B (en) Resource packaging method, device, equipment and medium based on Unity
CN111694684B (en) Abnormal construction method and device of storage device, electronic device and storage medium
CN111818145A (en) File transmission method, device, system, equipment and storage medium
CN110908818B (en) Verification method, device, equipment and storage medium
CN118151977B (en) Firmware upgrading method and system of controller chip
CN111708681B (en) Log processing method, device, equipment and storage medium
CN112988192A (en) Version updating method and device, electronic equipment and storage medium
CN110134423B (en) Firmware updating method and device and computer readable storage medium
US9208046B2 (en) Method and system for optimizing testing efforts in system of systems testing
CN110958243A (en) Network vulnerability submitting method and device, storage medium and electronic equipment
CN111258618A (en) File configuration method and device, computer equipment and storage medium
CN114253642B (en) System information processing method, device, electronic equipment and medium
CN111741046B (en) Data reporting method, data acquisition method, device, equipment and medium
CN110888665B (en) Method, device, equipment and storage medium for submitting changed content

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 201807 Shanghai City, north of the city of Jiading District Road No. 2258

Applicant after: Shanghai Lianying Medical Technology Co.,Ltd.

Address before: 201807 Shanghai City, north of the city of Jiading District Road No. 2258

Applicant before: SHANGHAI UNITED IMAGING HEALTHCARE Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
TG01 Patent term adjustment
TG01 Patent term adjustment