CN110618943A - Security service test method and device, electronic equipment and readable storage medium - Google Patents

Security service test method and device, electronic equipment and readable storage medium Download PDF

Info

Publication number
CN110618943A
CN110618943A CN201910891121.2A CN201910891121A CN110618943A CN 110618943 A CN110618943 A CN 110618943A CN 201910891121 A CN201910891121 A CN 201910891121A CN 110618943 A CN110618943 A CN 110618943A
Authority
CN
China
Prior art keywords
security
service
security services
services
interaction
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910891121.2A
Other languages
Chinese (zh)
Other versions
CN110618943B (en
Inventor
汪俊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing Unisinsight Technology Co Ltd
Original Assignee
Chongqing Unisinsight Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing Unisinsight Technology Co Ltd filed Critical Chongqing Unisinsight Technology Co Ltd
Priority to CN201910891121.2A priority Critical patent/CN110618943B/en
Publication of CN110618943A publication Critical patent/CN110618943A/en
Application granted granted Critical
Publication of CN110618943B publication Critical patent/CN110618943B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3664Environments for testing or debugging software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Storage Device Security (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application provides a security service testing method, a security service testing device, an electronic device and a readable storage medium, and relates to the technical field of security, wherein a plurality of security services to be tested are configured, the plurality of security services are deployed by using obtained configuration parameters, so that a testing environment is generated, and then based on the testing environment, interaction among different security services in the plurality of security services is automatically tested.

Description

Security service test method and device, electronic equipment and readable storage medium
Technical Field
The application relates to the technical field of security, in particular to a security service testing method and device, electronic equipment and a readable storage medium.
Background
The traditional security products are generally strong in independence, so that the test work aiming at the security products is generally to test a single product, and the automatic test aiming at the security products is also generally to the interface automatic test, UI automatic test and the like of the single product.
With the upgrading of the architecture of security products and the promotion of containerization and micro-service, more and more security products are available, including front-end IPC (IP CAMERA), video management service, intelligent analysis service, comprehensive application service, video cloud storage service and the like.
However, the successful test for a single product cannot ensure that the service flow of the overall scheme can be successfully operated after being deployed online, and generally, a tester needs to manually test the interaction between different services; however, with the implementation of an agile development mode, the iteration speed of the security product is increased, the existing test scheme can consume a large amount of labor cost to test the security product, the efficiency is low, and the test cost is high.
Disclosure of Invention
The application aims to provide a security service testing method and device, electronic equipment and a readable storage medium, which can improve the testing efficiency of security service and reduce the testing cost.
In order to achieve the above purpose, the embodiments of the present application employ the following technical solutions:
in a first aspect, an embodiment of the present application provides a security service testing method, where the method includes:
configuring a plurality of security services to be tested, wherein each security service is a security function realization unit, and the plurality of security services are mutually matched to realize the security function;
deploying the plurality of security services by using the obtained configuration parameters to generate a test environment;
and testing the interaction among different security services in the plurality of security services based on the test environment.
In a second aspect, an embodiment of the present application provides a security service testing device, the device includes:
the system comprises a deployment module, a monitoring module and a monitoring module, wherein the deployment module is used for configuring a plurality of security services to be tested, each security service is an implementation unit of a security function, and the plurality of security services are mutually matched to implement the security function;
the deployment module is further used for deploying the plurality of security services by using the obtained configuration parameters to generate a test environment;
and the test module is used for testing the interaction among different security services in the plurality of security services based on the test environment.
In a third aspect, an embodiment of the present application provides an electronic device, which includes a memory for storing one or more programs; a processor; when the one or more programs are executed by the processor, the security service testing method is realized.
In a fourth aspect, an embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements the security service testing method described above.
According to the security service testing method, the security service testing device, the electronic equipment and the readable storage medium, the multiple security services to be tested are configured, the multiple security services are deployed by utilizing the obtained configuration parameters, a testing environment is generated, and then interaction among different security services in the multiple security services is automatically tested based on the testing environment.
In order to make the aforementioned objects, features and advantages of the present application more comprehensible, preferred embodiments accompanied with figures are described in detail below.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are required to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present application and therefore should not be considered as limiting the scope, and it will be apparent to those skilled in the art that other related drawings can be obtained from the drawings without inventive effort.
Fig. 1 shows a schematic structural block diagram of an electronic device provided in an embodiment of the present application;
FIG. 2 is a schematic flow chart of a security service testing method provided by the embodiment of the present application;
FIG. 3 illustrates a schematic diagram of a test environment according to an embodiment of the present application;
FIG. 4 shows a schematic flow diagram of the substeps of S205 of FIG. 2;
FIG. 5 shows a schematic flow diagram of the substeps of S205-1 in FIG. 4;
FIG. 6 shows a schematic flow diagram of the substeps of S205-2 in FIG. 4;
FIG. 7 shows a schematic flow diagram of the substeps of S205-3 in FIG. 4;
fig. 8 shows a schematic flowchart of a security service testing apparatus provided in an embodiment of the present application.
In the figure: 100-an electronic device; 101-a memory; 102-a processor; 103-a communication interface; 300-a security service testing device; 301-deployment module; 302-test module.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures. Meanwhile, in the description of the present application, the terms "first", "second", and the like are used only for distinguishing the description, and are not to be construed as indicating or implying relative importance.
It is noted that, herein, relational terms such as first and second, and the like may be used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Also, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
At present, a test scheme for security products generally comprises the steps of submitting a compiled version package to a tester after the product development is finished, and manually deploying a test environment by the tester; after the test environment deployment is completed, all the test points are manually traversed, and then the security product is tested.
However, with the application of the micro-service architecture and the containerization technology in the security field, the implementation of a security function often depends on the mutual cooperation of a plurality of security services, and each security service is an implementation unit of the security function, so that the number of security services related in the security field is gradually increased.
In addition, the prompt development mode is promoted in the security field, the security product is generally decomposed into a plurality of sub-services during development, the iteration updating speed of each sub-service is accelerated, the existing security service test scheme consumes a large amount of labor cost to perform manual work, the efficiency is low, and the test cost is high.
Therefore, based on the above defects, a possible implementation manner provided by the embodiment of the present application is as follows: the method comprises the steps of configuring a plurality of security services to be tested, deploying the plurality of security services by using obtained configuration parameters to generate a test environment, and automatically testing interaction among different security services in the plurality of security services based on the test environment.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the features of the embodiments can be combined with each other without conflict.
Referring to fig. 1, fig. 1 shows a schematic block diagram of an electronic device 100 according to an embodiment of the present disclosure. The electronic device 100 includes a memory 101, a processor 102, and a communication interface 103, the memory 101, the processor 102, and the communication interface 103 being electrically connected to each other, directly or indirectly, to enable transmission or interaction of data. For example, the components may be electrically connected to each other via one or more communication buses or signal lines.
The memory 101 may be used to store software programs and modules, such as program instructions/modules corresponding to the security service testing device 300 provided in the embodiment of the present application, and the processor 102 executes the software programs and modules stored in the memory 101, so as to execute various functional applications and data processing. The communication interface 103 may be used for communicating signaling or data with other node devices.
The Memory 101 may be, but is not limited to, a Random Access Memory (RAM), a Read Only Memory (ROM), a Programmable Read-Only Memory (PROM), an Erasable Read-Only Memory (EPROM), an electrically Erasable Programmable Read-Only Memory (EEPROM), and the like.
The processor 102 may be an integrated circuit chip having signal processing capabilities. The processor 102 may be a general-purpose processor, including a Central Processing Unit (CPU), a Network Processor (NP), and the like; but also Digital Signal Processors (DSPs), Application Specific Integrated Circuits (ASICs), Field Programmable Gate Arrays (FPGAs) or other Programmable logic devices, discrete Gate or transistor logic devices, discrete hardware components.
It will be appreciated that the configuration shown in FIG. 1 is merely illustrative and that electronic device 100 may include more or fewer components than shown in FIG. 1 or have a different configuration than shown in FIG. 1. The components shown in fig. 1 may be implemented in hardware, software, or a combination thereof.
The following describes an exemplary security service testing method provided by the embodiment of the present application, with the electronic device 100 shown in fig. 1 as an exemplary execution subject.
Referring to fig. 2, fig. 2 shows a schematic flowchart of a security service testing method provided in the embodiment of the present application, which may include the following steps:
s201, configuring a plurality of security services to be tested;
s203, deploying a plurality of security services by using the obtained configuration parameters to generate a test environment;
s205, testing the interaction among different security services in the plurality of security services based on the testing environment.
In the embodiment of the application, a plurality of security services which need to be mutually matched to realize the security function can be uniformly tested based on the purpose of realizing one security function, wherein each security service in the plurality of security services is a realization unit of the security function.
For example, in the test environment as shown in fig. 3, an application service, a view management service, a big data service, a view analysis service, and a public service cooperating with each other may be used as a plurality of security services to be tested.
Then, the obtained configuration parameters, such as software packages required by each service or code paths of the software packages, may be deployed in, for example, a container, and hardware devices required for testing, such as monitoring devices, a spliced screen, alarm devices, access control devices, and the like, may be configured to generate a test environment.
Next, in the test environment, the interaction between different security services in the multiple security services is automatically tested, for example, in the test environment shown in fig. 3, whether the interaction between any two of the application service, the view management service, the big data service, the view analysis service, and the public service is normal or not is tested, whether the interaction between each service and the access device is normal or not is tested, and the like.
Based on the design, the security service testing method provided by the embodiment of the application generates a testing environment by configuring a plurality of security services to be tested and deploying the plurality of security services by using the obtained configuration parameters, and then automatically tests the interaction among different security services in the plurality of security services based on the testing environment.
In order to implement S205, please refer to fig. 4, fig. 4 shows a schematic flowchart of sub-steps of S205 in fig. 2, and as a possible implementation, S205 may include the following sub-steps:
s205-1, testing whether each security service in the plurality of security services is normally interacted with the access equipment in the testing environment;
s205-2, testing whether database interaction among different security services in the plurality of security services is normal;
s205-3, testing whether interface interaction among different security services in the plurality of security services is normal;
s205-4, whether each security service in the plurality of security services comprises an error log is checked.
In the embodiment of the application, when the interaction among different security services is tested, the test can be carried out from multiple aspects such as access equipment interaction, database interaction, interface interaction and the like.
For example, in the application scenario shown in fig. 3, it may be tested whether the interaction between each of the application service, the view management service, the big data service, the view analysis service, and the public service and the access device (such as a monitoring device, an alarm device, or a door access device) is normal; testing whether the interaction of the application service, the view management service, the big data service, the view analysis service and the public service is normal, such as testing to add data, delete data, modify data, search data and the like; and can test the interface response between each security service shown in fig. 3; logs of test application services, view management services, big data services, view analysis services, and public services may also be examined to determine if there are error logs.
When testing whether each security service interacts with the access device normally, taking any one of the multiple security services as a target security service as an example, please refer to fig. 5 as a possible implementation manner, where fig. 5 shows a schematic flowchart of the substep of S205-1 in fig. 4, which may include the following substeps:
s205-1a, testing whether the access equipment successfully registers the target security service; if the registration is successful, executing S205-1 b; if the registration fails, executing S205-1 c;
s205-1b, determining that the interaction between the target security service and the access equipment is normal;
s205-1c, determining that the interaction between the target security service and the access equipment is abnormal.
Taking the monitoring device in fig. 3 as an access device and the view management service as a target security service as an example, the monitoring device may request registration from the view management service in combination with a corresponding protocol; then the electronic device can perform packet capturing analysis on the registration message, and if the registration message has a message of registration failure or the view management service does not respond to the registration request of the monitoring device, the electronic device determines that the interaction between the monitoring device and the view management service is abnormal; and if the registration message is a message of successful registration, the electronic equipment determines that the interaction between the monitoring equipment and the view management service is normal.
Similarly, the interactive test of other security services and the access device may refer to the corresponding test mode, which is not described herein again in this embodiment of the application.
It should be noted that the plurality of security services at least include a first security service and a second security service, that is, at least include two security services; for example, in the schematic diagram shown in fig. 3, a total of five security services are included.
To this end, when testing whether database interaction between different security services is normal, as a possible implementation manner, please refer to fig. 6, fig. 6 shows a schematic flowchart of the sub-step of S205-2 in fig. 4, which may include the following sub-steps:
s205-2a, the first security service processes the obtained analysis task and stores a processing result corresponding to the analysis task in a database of the first security service;
s205-2b, the second security service queries the database of the first security service to obtain a processing result, and stores the processing result in the database of the second security service;
s205-2c, checking whether the respective databases of the first security service and the second security service both store processing results; if so, executing S205-2 d; if not, executing S205-2 e;
s205-2d, determining that the interaction of databases among different security services in the plurality of security services is normal;
s205-2e, determining that the interaction of the databases among different security services in the plurality of security services is abnormal.
Taking the application service in fig. 3 as the first security service and the view analysis service as the second security service as an example, when S205-2 is executed, an analysis task may be configured through a script and issued to the application service, the application service processes the analysis task, and a processing result of the analysis task is stored in a database of the application service; meanwhile, the view analysis service inquires a database of the application service and stores the processing result of the analysis task in the database of the view analysis service; then the electronic equipment checks databases of the application service and the view analysis service, determines whether the databases of the application service and the view analysis service both contain processing results corresponding to the analysis task, and if the processing results are stored, determines that the databases of the application service and the view analysis service are normal in interaction; and if one of the data is not stored, determining that the database interaction of the application service and the database interaction of the view analysis service are abnormal.
In addition, when testing whether the interface interaction between different security services is normal, as a possible implementation manner, please refer to fig. 7, fig. 7 shows a schematic flowchart of the sub-step of S205-3 in fig. 4, which may include the following sub-steps:
s205-3a, the first security service calls a set interface to send a set service request to the second security service;
s205-3b, the second security service responds to the service request and calls a set interface to feed back service resources corresponding to the service request to the first security service;
s205-3c, checking whether the service resource corresponds to the service request; if so, executing S205-3 d; if not, executing S205-3 e;
s205-3d, determining that the interaction of interfaces among different security services in the plurality of security services is normal;
s205-3e, determining that the interaction of the interfaces among different security services in the plurality of security services is abnormal.
The following takes the interface interaction among the application service, the view analysis service, and the view management service in fig. 3, which are three security services in total, as an example, and a specific sub-step flow of S205-3 is schematically described.
The application service can issue a service request to the view analysis service through the Restful interface; then the view analysis service issues the service request to the view management service through a Restful interface; then the view management service processes the service flow to obtain a service resource corresponding to the service request, and sends the service resource to the view analysis service through a Restful interface, and the view analysis service sends the service resource to the application service through the Restful interface; finally, the electronic equipment checks whether the business resources received by the application service correspond to the issued business requests or not, and if so, the normal interaction of the interfaces among the application service, the view analysis service and the view management service is determined; if not, determining that the interface interaction among the application service, the view analysis service and the view management service is abnormal.
In addition, when S205-4 is executed, as a possible implementation manner, the electronic device may check logs recorded by each security service, and if the log is found to have identification information representing an error, such as "error", it is determined that a plurality of security services to be tested include an error log, and the test fails; and if the log of all the security services does not have the identification information representing the errors, determining that the test is successful.
In addition, after the test is finished, a corresponding test report can be generated; in addition, in order to facilitate the testers to learn the test result as soon as possible, the generated test report or the test result can be fed back to the relevant testers by binding the corresponding mailbox address or nailing account number and the like.
It should be noted that S205-1, S205-2, S205-3, and S205-4 are parallel 4 steps, and there is no necessary sequential execution order between the 4 steps.
Based on the same inventive concept as the security service testing method, please refer to fig. 8, and fig. 8 shows a schematic flowchart of a security service testing apparatus 300 provided in the embodiment of the present application, which includes a deployment module 301 and a testing module 302. Wherein:
the deployment module 301 is configured to configure a plurality of security services to be tested, where each security service is an implementation unit of a security function, and the plurality of security services are mutually matched to implement the security function;
the deployment module 301 is further configured to deploy the plurality of security services by using the obtained configuration parameters, and generate a test environment;
the testing module 302 is configured to test interactions among different security services of the plurality of security services based on the testing environment.
Optionally, as a possible implementation manner, when testing the interaction between different security services in the multiple security services based on the test environment, the testing module 302 is specifically configured to:
testing whether each security service in the plurality of security services is normally interacted with the access equipment in the testing environment;
testing whether database interaction among different security services in a plurality of security services is normal;
testing whether interface interaction among different security services in a plurality of security services is normal;
and checking whether each security service in the plurality of security services contains an error log.
Optionally, as a possible implementation manner, when testing whether each security service in the multiple security services interacts with the access device in the test environment normally, the testing module 302 is specifically configured to:
testing whether the access equipment successfully registers the target security service;
if the registration is successful, determining that the interaction between the target security service and the access equipment is normal;
and if the registration fails, determining that the interaction between the target security service and the access equipment is abnormal, wherein the target security service is any one of the plurality of security services.
Optionally, as a possible implementation manner, the plurality of security services includes a first security service and a second security service;
when testing whether database interaction between different security services in a plurality of security services is normal, the testing module 302 is specifically configured to:
the first security service processes the obtained analysis task and stores a processing result corresponding to the analysis task in a database of the first security service;
the second security service queries the database of the first security service to obtain a processing result, and stores the processing result in the database of the second security service;
checking whether the respective databases of the first security service and the second security service both store processing results; if the data is stored, determining that the interaction of the databases among different security services in the plurality of security services is normal; and if the first security service and/or the second security service do not store the processing result, determining that the interaction of the databases among different security services in the plurality of security services is abnormal.
Optionally, as a possible implementation manner, the plurality of security services includes a first security service and a second security service;
when testing whether interface interaction between different security services in a plurality of security services is normal, the testing module 302 is specifically configured to:
the first security service calls a set interface to send a set service request to the second security service;
the second security service responds to the service request and calls a set interface to feed back service resources corresponding to the service request to the first security service;
checking whether the service resource corresponds to the service request; if so, determining that the interaction of interfaces among different security services in the plurality of security services is normal; and if not, the interaction of the interfaces among different security services in the plurality of security services is abnormal.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus and method may be implemented in other ways. The apparatus embodiments described above are merely illustrative and, for example, the flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of apparatus, methods and computer program products according to embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s).
It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved.
It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, the functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: u disk, removable hard disk, read only memory, random access memory, magnetic or optical disk, etc. for storing program codes.
To sum up, according to the security service testing method, the security service testing device, the electronic device and the readable storage medium provided by the embodiment of the application, the plurality of security services to be tested are configured, and the plurality of security services are deployed by using the obtained configuration parameters, so that a testing environment is generated, and further, based on the testing environment, the interaction among different security services in the plurality of security services is automatically tested.
The above description is only a preferred embodiment of the present application and is not intended to limit the present application, and various modifications and changes may be made by those skilled in the art. Any modification, equivalent replacement, improvement and the like made within the spirit and principle of the present application shall be included in the protection scope of the present application.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (12)

1. A security service testing method is characterized by comprising the following steps:
configuring a plurality of security services to be tested, wherein each security service is a security function realization unit, and the plurality of security services are mutually matched to realize the security function;
deploying the plurality of security services by using the obtained configuration parameters to generate a test environment;
and testing the interaction among different security services in the plurality of security services based on the test environment.
2. The method of claim 1, wherein the step of testing interactions between different ones of the plurality of security services based on the testing environment comprises:
testing whether each security service in the plurality of security services is normally interacted with the access equipment in the test environment;
testing whether the database interaction among different security services in the plurality of security services is normal;
testing whether interface interaction among different security services in the plurality of security services is normal;
and checking whether each security service in the plurality of security services contains an error log.
3. The method of claim 2, wherein the step of testing whether each of the plurality of security services interacts normally with the access device in the test environment comprises:
testing whether the access equipment is successfully registered with the target security service;
if the registration is successful, determining that the interaction between the target security service and the access equipment is normal;
and if the registration fails, determining that the interaction between the target security service and the access equipment is abnormal, wherein the target security service is any one of the plurality of security services.
4. The method of claim 2, wherein the plurality of security services includes a first security service and a second security service;
the step of testing whether the interaction of the databases among different security services in the plurality of security services is normal comprises the following steps:
the first security service processes the obtained analysis task and stores a processing result corresponding to the analysis task in a database of the first security service;
the second security service queries the database of the first security service to obtain the processing result, and stores the processing result in the database of the second security service;
checking whether the processing results are stored in respective databases of the first security service and the second security service; if the data is stored, determining that the interaction of the databases among different security services in the plurality of security services is normal; and if the first security service and/or the second security service do not store the processing result, determining that the interaction of the databases among different security services in the plurality of security services is abnormal.
5. The method of claim 2, wherein the plurality of security services includes a first security service and a second security service;
the step of testing whether the interface interaction among different security services in the plurality of security services is normal comprises the following steps:
the first security service calls a set interface to send a set service request to the second security service;
the second security service responds to the service request and calls the set interface to feed back service resources corresponding to the service request to the first security service;
checking whether the service resource corresponds to the service request; if so, determining that the interaction of interfaces among different security services in the plurality of security services is normal; and if not, the interaction of the interfaces among different security services in the plurality of security services is abnormal.
6. A security service testing device, the device comprising:
the system comprises a deployment module, a monitoring module and a monitoring module, wherein the deployment module is used for configuring a plurality of security services to be tested, each security service is an implementation unit of a security function, and the plurality of security services are mutually matched to implement the security function;
the deployment module is further used for deploying the plurality of security services by using the obtained configuration parameters to generate a test environment;
and the test module is used for testing the interaction among different security services in the plurality of security services based on the test environment.
7. The apparatus of claim 6, wherein the testing module, when testing interactions among different security services of the plurality of security services based on the testing environment, is specifically configured to:
testing whether each security service in the plurality of security services is normally interacted with the access equipment in the test environment;
testing whether the database interaction among different security services in the plurality of security services is normal;
testing whether interface interaction among different security services in the plurality of security services is normal;
and checking whether each security service in the plurality of security services contains an error log.
8. The apparatus of claim 7, wherein the testing module, when testing whether each of the plurality of security services interacts with the access device in the test environment normally, is specifically configured to:
testing whether the access equipment is successfully registered with the target security service;
if the registration is successful, determining that the interaction between the target security service and the access equipment is normal;
and if the registration fails, determining that the interaction between the target security service and the access equipment is abnormal, wherein the target security service is any one of the plurality of security services.
9. The apparatus of claim 7, wherein the plurality of security services includes a first security service and a second security service;
the test module is used for testing whether the interaction of the databases among different security services in the plurality of security services is normal or not, and is specifically used for:
the first security service processes the obtained analysis task and stores a processing result corresponding to the analysis task in a database of the first security service;
the second security service queries the database of the first security service to obtain the processing result, and stores the processing result in the database of the second security service;
checking whether the processing results are stored in respective databases of the first security service and the second security service; if the data is stored, determining that the interaction of the databases among different security services in the plurality of security services is normal; and if the first security service and/or the second security service do not store the processing result, determining that the interaction of the databases among different security services in the plurality of security services is abnormal.
10. The apparatus of claim 7, wherein the plurality of security services includes a first security service and a second security service;
the test module is in testing whether the interface interaction between different security services among a plurality of security services is normal, specifically is used for:
the first security service calls a set interface to send a set service request to the second security service;
the second security service responds to the service request and calls the set interface to feed back service resources corresponding to the service request to the first security service;
checking whether the service resource corresponds to the service request; if so, determining that the interaction of interfaces among different security services in the plurality of security services is normal; and if not, the interaction of the interfaces among different security services in the plurality of security services is abnormal.
11. An electronic device, comprising:
a memory for storing one or more programs;
a processor;
the one or more programs, when executed by the processor, implement the method of any of claims 1-5.
12. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-5.
CN201910891121.2A 2019-09-20 2019-09-20 Security service test method and device, electronic equipment and readable storage medium Active CN110618943B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910891121.2A CN110618943B (en) 2019-09-20 2019-09-20 Security service test method and device, electronic equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910891121.2A CN110618943B (en) 2019-09-20 2019-09-20 Security service test method and device, electronic equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN110618943A true CN110618943A (en) 2019-12-27
CN110618943B CN110618943B (en) 2022-08-19

Family

ID=68923557

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910891121.2A Active CN110618943B (en) 2019-09-20 2019-09-20 Security service test method and device, electronic equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN110618943B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112181533A (en) * 2020-10-16 2021-01-05 富盛科技股份有限公司 Method and system for automatically deploying security server

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102300118A (en) * 2011-09-06 2011-12-28 博威科技(深圳)有限公司 Testing system and testing method for monitoring system
CN107465656A (en) * 2017-06-14 2017-12-12 广州宏和网络科技有限公司 A kind of safety monitoring big data processing method and system based on cloud computing
US20190007550A1 (en) * 2017-07-03 2019-01-03 Cyara Solutions Pty Ltd System and method for integrated cx-ax contact center testing
CN109406951A (en) * 2018-12-21 2019-03-01 云南电网有限责任公司电力科学研究院 A kind of remote feeder automatization test system
CN109828927A (en) * 2019-01-31 2019-05-31 北京三快在线科技有限公司 A kind of method, apparatus of integration testing, equipment and storage medium
CN110162462A (en) * 2019-04-16 2019-08-23 深圳壹账通智能科技有限公司 Test method, system and the computer equipment of face identification system based on scene

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102300118A (en) * 2011-09-06 2011-12-28 博威科技(深圳)有限公司 Testing system and testing method for monitoring system
CN107465656A (en) * 2017-06-14 2017-12-12 广州宏和网络科技有限公司 A kind of safety monitoring big data processing method and system based on cloud computing
US20190007550A1 (en) * 2017-07-03 2019-01-03 Cyara Solutions Pty Ltd System and method for integrated cx-ax contact center testing
CN109406951A (en) * 2018-12-21 2019-03-01 云南电网有限责任公司电力科学研究院 A kind of remote feeder automatization test system
CN109828927A (en) * 2019-01-31 2019-05-31 北京三快在线科技有限公司 A kind of method, apparatus of integration testing, equipment and storage medium
CN110162462A (en) * 2019-04-16 2019-08-23 深圳壹账通智能科技有限公司 Test method, system and the computer equipment of face identification system based on scene

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
P. NYRKOV ANATOLIY等: "Aggregation process for implementation of application security management based on risk assessment", 《2018 IEEE CONFERENCE OF RUSSIAN YOUNG RESEARCHERS IN ELECTRICAL AND ELECTRONIC ENGINEERING (EICONRUS)》 *
肖遒: "基于STM32的家居安防系统设计与测试", 《CNKI优秀硕士学位论文全文库 工程科技Ⅱ辑》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112181533A (en) * 2020-10-16 2021-01-05 富盛科技股份有限公司 Method and system for automatically deploying security server

Also Published As

Publication number Publication date
CN110618943B (en) 2022-08-19

Similar Documents

Publication Publication Date Title
CN108415832B (en) Interface automation test method, device, equipment and storage medium
CN111897724B (en) Automatic testing method and device suitable for cloud platform
CN107241315B (en) Access method and device of bank gateway interface and computer readable storage medium
CN111177003A (en) Test method, device, system, electronic equipment and storage medium
CN109995612B (en) Service inspection method and device and electronic equipment
CN110851471A (en) Distributed log data processing method, device and system
CN114064208A (en) Method and device for detecting application service state, electronic equipment and storage medium
CN103617118A (en) Method, device and system for uniformly processing test results
CN115904959A (en) Software integration and deployment method and software development management system
CN112650688A (en) Automated regression testing method, associated device and computer program product
CN110618943B (en) Security service test method and device, electronic equipment and readable storage medium
CN114528201A (en) Abnormal code positioning method, device, equipment and medium
CN111767218B (en) Automatic test method, equipment and storage medium for continuous integration
CN116599881A (en) Cloud platform tenant modeling test method, device, equipment and storage medium
CN111240981A (en) Interface testing method, system and platform
CN116431522A (en) Automatic test method and system for low-code object storage gateway
CN112131127B (en) Interface testing method, device and system and electronic equipment
CN111367796B (en) Application program debugging method and device
CN112286792A (en) Interface testing method, device, equipment and storage medium
CN114356344A (en) Application deployment method and device, electronic equipment and storage medium
CN114024735B (en) Multi-task parallel feature library testing method and device
CN115545677B (en) Online process specification detection method and system based on automatic case execution condition
CN114812695B (en) Product testing method and device, computer equipment and storage medium
KR102111392B1 (en) Test unified administration system and Controlling Method for the Same
CN114416585A (en) Automatic testing method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant