CN108255723A - For the method and apparatus and computer readable storage medium of software detection - Google Patents
For the method and apparatus and computer readable storage medium of software detection Download PDFInfo
- Publication number
- CN108255723A CN108255723A CN201810037230.3A CN201810037230A CN108255723A CN 108255723 A CN108255723 A CN 108255723A CN 201810037230 A CN201810037230 A CN 201810037230A CN 108255723 A CN108255723 A CN 108255723A
- Authority
- CN
- China
- Prior art keywords
- software
- virtual machine
- detection tool
- software detection
- run
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3664—Environments for testing or debugging software
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/44—Program or device authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F9/00—Arrangements for program control, e.g. control units
- G06F9/06—Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
- G06F9/44—Arrangements for executing specific programs
- G06F9/455—Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
- G06F9/45533—Hypervisors; Virtual machine monitors
- G06F9/45558—Hypervisor-specific management and integration aspects
- G06F2009/45579—I/O management, e.g. providing access to device drivers or storage
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Quality & Reliability (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a kind of software detecting method, including:Step S11 runs the virtual machine being packaged to the running environment of software detection tool so as to be formed;Step S12 is detected software under testing using the software detection tool in virtual machine;Wherein, the running environment of the software detection tool includes the related data needed for operating system, the program code of the software detection tool and the operation software detection tool.The invention also discloses a kind of software detection device corresponding with the above method and computer readable storage mediums.It is an advantage of the current invention that software detection tool developer had not only been facilitated to protect software detection tool, but also software users is facilitated to carry out software detection and examination.
Description
Technical field
The invention belongs to data confidentiality fields, and in particular to a kind of software detecting method, software detection device and computer
Readable storage medium storing program for executing.
Background technology
With the development of computer and network technologies, the degree of industrial automation is higher and higher, soft by being run in terminal
Part is more and more so as to fulfill the situation of specific production purpose.
As shown in Figure 1, at present, many software users B are there are software use demand, but its own does not have software
Development ability.At this point, software users B would generally entrust multiple software developer C as its software of the exploitation with predetermined function.When
When software developer C is by the Software Delivery finished is developed to software users B, software users B needs to be detected software, with true
Whether the fixed software meets predetermined design requirement.When the scheduled design requirement of the Software-Coincidence, software users B can just be tested
Receive the software;Otherwise, software users B will notify software developer C to modify the software.
In order to be detected to the software, software users B would generally buy profession at software detection tool developer A
Software detection tool, be detected using software detection tool come the software delivered software developer C.Software detection tool
It is a kind of professional software, it can assist software detection personnel to complete the detection work in a certain type or a certain field, judge
Software under testing whether meet predetermined design requirement, and point out software under testing there are the problem of.
And for software detection tool developer A, the development cost of software detection tool is typically very high,
In order to protect the fruits of mental labor of oneself, software detection tool developer A needs to prevent the code of software detection tool from revealing,
Software detection tool is protected.
The method for preventing the code of software detection tool from revealing being currently known is as follows:Software detection tool developer A exists
After installing " softdog " additional on software detection tool, then software detection tool is supplied to software users B, contained in the softdog
Not reproducible hardware information, for certification user identity.Once software users B runs the software on a certain hardware device
Detection instrument, software detection tool are bound with the hardware device, it is impossible to be run on other hardware devices again.
The above method has the following problems:
1. when software developer C have it is multiple, i.e. when software users B entrusts multiple software developer C as oneself exploitation software, software
User B needs to be detected the software that multiple software developer C are developed.At this point, software users B can select to work in one's own side
Runs software detection instrument on the first hardware device M1 in place is detected the software under testing of software developer C exploitations.It adopts
In this way, for theoretically, software users B can be detected all software developer C software under testing developed.But
It is, in fact, since this can cause the code of software under testing to be retained on the first hardware device M1, and software developer C is same
Sample wish protect software under testing, it is undesirable to software under testing code leakage, therefore, they would generally refuse this software detection and
Examination mode.Therefore, this mode is not easy to software users B and carries out software detection and examination.
2. software users B can also select to run on the second hardware device M2 of the workplace of software developer C soft
Part detection instrument, software detection tool will be bound with the second hardware device M2.A software developer C exploitation can only be detected in this way
Software, for other software developer C exploitation software, also need to buy software detection tool again, to other software develop
It is run on other hardware devices of the workplace of person C.Which not only improves the costs that software users B is paid(It need to repeatedly buy
Software detection tool), but also the code of software detection tool may be caused to be retained on the second hardware device M2, cause software
The code leakage of detection instrument;
3. software detection tool developer A is actually that software detection tool is " permanent to use on a hardware device
Power " is supplied to software users B, and price is usually higher.
Invention content
The object of the present invention is to provide a kind of software detecting method and device and a kind of corresponding computer-readable storages
Medium the advantage is that:Not only software detection tool was protected convenient for software detection tool developer, but also convenient for software users
Software detection and examination are carried out using software detection tool.
In a first aspect, the present invention provides a kind of software detecting method, including:
Step S11 runs the virtual machine being packaged to the running environment of software detection tool so as to be formed;
Step S12 is detected software under testing using the software detection tool in virtual machine;
Wherein, the running environment of the software detection tool include operating system, the software detection tool program code and
Run the related data needed for the software detection tool.
Preferably, it is further comprising the steps of before step S11:
Start the virtual machine, the virtual machine provides first interface after start-up;
The input authentication code in first interface;
The virtual machine receives the authentication code, and it is authenticated, if certification success, virtual machine bring into operation;Otherwise,
The virtual machine is not run.
Preferably, the authentication code is generated by server, and is sent to user terminal from server;
The authentication code is obtained from user terminal, and the authentication code is inputted in first interface.
Preferably, the step of server generation authentication code is:
Server generates virtual machine operating instruction, signs to the virtual machine operating instruction, so as to generate the authentication code.
Preferably, the virtual machine operating instruction includes the run the period of virtual machine, and virtual machine receives the certification
After code, the signature is authenticated, if certification passes through, virtual machine is only run in the run the period.
Preferably, the related data includes code detection specification.
Preferably, the virtual machine provides second interface, for receiving software under testing.
Second aspect, the present invention provide a kind of software detection device, including:
Component is run, for running virtual machine, the virtual machine is packaged by the running environment to software detection tool
So as to what is formed;
Detection part, for being detected using the software detection tool in virtual machine to software under testing;
Wherein, the running environment of the software detection tool include operating system, the software detection tool program code and
Run the related data needed for the software detection tool.
The third aspect, the present invention provide a kind of software detection device, including processor, memory and are stored in memory
Computer program that is upper and can running on a processor, which is characterized in that the processor performs real during the computer program
Existing preceding method.
Fourth aspect, the present invention provide a kind of computer readable storage medium, are stored thereon with computer program, the calculating
Machine program realizes preceding method when being executed by processor.
The invention has the advantages that:
(1)Software detection tool is protected convenient for software detection tool developer;
(2)Convenient for software users software detection and examination are carried out using software detection tool;
(3)Reduce the use price of software detection tool.
Description of the drawings
Fig. 1 is the process schematic that software users are detected software and check and accept in the prior art;
Fig. 2 is the process schematic that software tool developer is packaged software detection tool in the present invention;
Fig. 3 is the overall schematic of the software detection process in the present invention;
Fig. 4 is the flow diagram of the software detecting method in the present invention;
Fig. 5 is the structure diagram of the software detection device in the present invention.
Specific embodiment
Below in conjunction with specific embodiment and Figure of description, the present invention is described in further detail.
Virtual machine(Virtual Machine, VM)It is to be simulated by software, there is complete hardware system, fortune
Complete computer of the row in a completely isolated environment.Virtually by generating the new virtual mirror of existing operating system
Picture, so as to have and real system(Such as Windows, Linux)Duplicate function, therefore, virtual machine is actually
It is exactly an independent virtual system, all operations all carry out inside the independent virtual system, can carry out software peace
The operations such as dress, data preserve, setting independent table, without generating any influence to real system.
After being packaged using virtual machine to the whole service environment of software detection tool, hard disk mirror-image is just presented as one
A file that can not be cracked, this can improve the overall security of software detection tool.
As shown in Fig. 2, the running environment of software detection tool is encapsulated as void by software detection tool developer A on the whole
Plan machine, wherein the running tool is including being used for the operating system of runs software detection instrument, the program generation of software detection tool
Related data needed for code and runs software detection instrument;Then, virtual machine can be supplied to soft by software detection tool developer A
Part user B;When software users B needs to carry out software detection and check and accept, the software detection tool in virtual machine is run, to be measured
Software is detected.
As shown in figure 3, in the present embodiment, the overall flow of software detection process is as follows:
Step S301, software users B obtain virtual machine at Software Testing Tool developer A, and are obtained at software developer C
Software under testing.
Software detection tool developer A is packaged the running environment of software detection tool, so as to form virtual machine, with
Afterwards, virtual machine is supplied to software users B by software detection tool developer A.Software users B is without installation, as long as running this
Virtual machine just can obtain whole service environment, facilitate software users B using software detection tool, improve they use it is soft
Part detection instrument carries out the wish of software detection tool.
The running environment of the software detection tool includes the operating system, described for running the software detection tool
Related data needed for the program code of software detection tool and the operation software detection tool;The related data includes generation
Code inspection criterion, for example, being enumerated based on general drawback(CWE, Common Weakness Enumeration)Code detection rule
Model and/or based on open web application item security(OWASP, Open Web Application Security
Project)The code detection specification of the security breaches of publication.
Virtual machine can be supplied to software users B by software detection tool developer A in several ways, such as:(1)It will
Virtual machine may be stored on the computer-readable medium, then computer-readable medium is supplied to software users B, wherein, the calculating
Machine readable storage medium storing program for executing can be but not limited to:Random access memory(RAM), read-only memory(ROM), erasable programmable
Read-only memory(EPROM), compact disc read-only memory(CD-ROM), it is one or more in hard disk etc..(2)It is transmitted by file
Agreement(FTP), Dropbox the modes such as share, virtual machine is supplied to software users B.
Software developer C is entrusted by software users B, for software of the software users B exploitations with predetermined function, works as software
When exploitation finishes, Software Delivery is given to software users B.And software users B needs are detected the software, judge that the software is
It is no to meet scheduled design requirement, such as, if having predetermined function, overall operation whether safety etc..At this point, the software is claimed
For " software under testing ".
Step S302, starts the virtual machine, and the virtual machine provides first interface.
Software users B runs the virtual machine on the second hardware device M2 of the workplace of software developer C, works as void
When plan machine is run, virtual machine not yet starts, but is to provide first interface, such as first with visible user interface connects
Mouthful, the first interface is used to provide the entrance for input authentication code to software users B.
The second hardware device M2 includes that any equipment of virtual machine and software detection tool can be run, including general
Computer, special purpose computer, computer network or other equipment.
Due to the use of virtual machine encapsulation technology, software detection tool need not be bound with hardware device, but can be in office
It is run on meaning hardware device, so as to which software users B can carry software detection tool to arbitrary site, use software detection
Tool carries out software detection and examination.
Step S303, the input authentication code in first interface, and authentication code is authenticated.
The authentication code is generated by server, and the user terminal of software users B is sent to from server.The clothes
Business device is safeguarded by software detection tool developer A.The user terminal can be laptop, tablet computer, mobile phone
Portable terminals are waited, wired mode can be passed through(Such as coaxial cable, optical fiber, digital user wire DSL)Or wireless mode, with
Server communicates.For example, when software users B needs to be carried out software detection using software detection tool and checked and accepted, it can be with
By the wechat public platform of user terminal access homepage of server or software detection tool developer A, certification is sent to server
Code obtains request.
After server receives the authentication code acquisition request, corresponding virtual machine operating instruction, the virtual machine are generated
It can include the run the period of virtual machine in operating instruction;Then, server signs to virtual machine operating instruction, so as to raw
Into authentication code, that is, the authentication code includes two parts, and a part is the plaintext of virtual machine operating instruction, and another part is with private
The abstract of the encrypted virtual machine operating instruction of key;Finally, the authentication code is sent to the user terminal by server.Specifically
Ground, the server can pass through Email, instant messaging(QQ, wechat)Etc. modes, the authentication code is sent to described
Terminal.
It is to ensure that the integrality of information transmission and the identity of sender are recognized to the purpose that virtual machine operating instruction is signed
Card.Signature process is as follows:Server transports the private key encryption of the summary info server of virtual machine operating instruction with virtual machine
The plaintext of row instruction together, forms authentication code.When server signs to virtual machine operating instruction, known label may be used
Name algorithm, such as RSA Algorithm etc..
The length of the virtual machine run the period can be set, such as 1 hour by software detection tool developer A, and 2
Hour etc..
The authentication code that user terminal receives is input in first interface by software users B, virtual machine be based on authentication code into
Row signature authentication is authenticated the signature using public key, to judge whether the virtual machine operating instruction is by servicing
What device was sent out.
Since software users B is to receive authentication code by user terminal, virtual machine is only needed without networking with server
User terminal is networked with server.So as to when the workplace of software developer C is some special, inconvenient networkings
Place or for information safety protection without the place of networking, can also this authentication code be used to receive mode.
Software users B can not run virtual machine, also can not just run void when not obtaining authentication code that server is signed and issued
Software detection tool in plan machine, this, which allows for software users B, can not arbitrarily replicate the code of software detection tool, so as to just
Software detection tool is protected in software detection tool developer A.
Step S304, virtual machine judge whether certification succeeds.
If certification success, jumps to step 305, otherwise, jumps to step 307.
Step 305, virtual machine brings into operation, and provides second interface, for receiving software under testing.
The second interface can be a visual user interface, be treated for being provided to software users B for inputting
Survey the entrance of software.
Step S306, receives software under testing, and runs software detection instrument is detected software under testing.
After virtual machine receives software under testing, software users B can examine software under testing with runs software detection instrument
It surveys, and output software testing result.If software detection result represents that software under testing meets design requirement, software users B can
To check and accept the software;Otherwise, software detection result comprising software under testing there are the problem of, software detection result is returned into software
Developer C modifies to the software by software developer C.
Step 307, if authentification failure, virtual machine is not run, and software users B can not runs software detection instrument.
Embodiment of above has the following advantages:
1. software users B without on the first hardware device M1 of the workplace of software users B runs software detection instrument, and
It is the runs software detection instrument on the second hardware device M2 of the workplace of software developer C, due to software detection tool
It is encapsulated in virtual machine, the code of software detection tool will not be retained on the second hardware device M2, and code will not occur
Leakage problem;When there are during multiple software developer C, since software detection tool is used without being bound with certain hardware device,
When software users B needs to detect the software of multiple software developer C delivery, multiple copies of virtual machine can be replicated, respectively
It is used in the workplace of multiple software developer C, as long as obtaining multiple authentication codes.This software detection and examination side
Formula had not only facilitated software users B using software detection tool, but also can be so that the code of software detection tool is not replicated and steals
It takes.
2. it could only be run in the run the period comprising virtual machine run the period, virtual machine in authentication code, thus, software
Detection instrument developer A is supplied to the disposable power of software users B, actually software detection tool(Disposably
license), compared to the permanent right to use provided when being encrypted using softdog mode(Permanent license)For,
The less expensive of disposable power reduces the production cost of software users B.
As shown in figure 4, based on the software detection process shown in Fig. 3, the present embodiment provides a kind of software detecting method, packets
It includes:
Step S11 runs the virtual machine being packaged to the running environment of software detection tool so as to be formed;
Step S12 is detected software under testing using the software detection tool in virtual machine;
Wherein, the running environment of the software detection tool include operating system, the software detection tool program code and
Run the related data needed for the software detection tool.
As shown in figure 5, the present embodiment also provides a kind of software detection device, the software detection can be used to fill for software users B
It puts to carry out software detection and examination.
The software detection device includes:
Component is run, for running virtual machine, the virtual machine is packaged by the running environment to software detection tool
So as to what is formed;
Detection part, for being detected using the software detection tool in virtual machine to software under testing;
Wherein, the running environment of the software detection tool include operating system, the software detection tool program code and
Run the related data needed for the software detection tool.
Software detection device provided in this embodiment is only carried out with the division of above-mentioned each function module for example, practical
In, above-mentioned function can be integrated in a function module as needed and is completed, alternatively, by above-mentioned function distribution to not
With function module complete, that is, the internal structure of device is divided into different function modules, it is described above complete to complete
Portion or partial function, the present invention are not especially limited this.
The present embodiment also provides a kind of device for software detection, including processor, memory and is stored in storage
On device and the computer program that can run on a processor, which is characterized in that when the processor performs the computer program
Realize preceding method.
The present embodiment also provides a kind of computer readable storage medium, is stored thereon with computer program, the computer journey
Preceding method is realized when sequence is executed by processor.
Various pieces are described using progressive mode in the present invention, same or similar portion between each embodiment
Divide cross-reference, what each embodiment introduced is difference from other examples.Implement especially for device
For example, since it is substantially similar to embodiment of the method, so describing fairly simple, related part can be found in embodiment of the method
Partial explanation.
This specific embodiment is only explanation of the invention, is not limitation of the present invention, people in the art
Member can as needed make the present embodiment the modification of no creative contribution after this specification is read, but as long as at this
It is all protected in the right of invention by Patent Law.
Claims (10)
1. a kind of software detecting method, including:
Step S11 runs the virtual machine being packaged to the running environment of software detection tool so as to be formed;
Step S12 is detected software under testing using the software detection tool in virtual machine;
Wherein, the running environment of the software detection tool include operating system, the software detection tool program code and
Run the related data needed for the software detection tool.
2. software detecting method according to claim 1, it is characterised in that:Before step S11, following step is further included
Suddenly:
Start the virtual machine, the virtual machine provides first interface after start-up;
The input authentication code in first interface;
The virtual machine receives the authentication code, and it is authenticated, if certification success, virtual machine bring into operation;Otherwise,
The virtual machine is not run.
3. software detecting method according to claim 2, it is characterised in that:
The authentication code is generated by server, and is sent to user terminal from server;
The authentication code is obtained from user terminal, and the authentication code is inputted in first interface.
4. according to one of them described software detecting method of claim 3, which is characterized in that server generates the authentication code
The step of be:
Server generates virtual machine operating instruction, signs to the virtual machine operating instruction, so as to generate the authentication code.
5. software detecting method according to claim 4, it is characterised in that:
The virtual machine operating instruction includes the run the period of virtual machine, after virtual machine receives the authentication code, to described
Signature is authenticated, if certification passes through, virtual machine is only run in the run the period.
6. according to the software detecting method described in one of claim 1-5, it is characterised in that:The related data includes generation
Code inspection criterion.
7. according to the software detecting method described in one of claim 1-5, it is characterised in that:The virtual machine provides second
Interface, for receiving software under testing.
8. a kind of software detection device, including:
Component is run, for running virtual machine, the virtual machine is packaged by the running environment to software detection tool
So as to what is formed;
Detection part, for being detected using the software detection tool in virtual machine to software under testing;
Wherein, the running environment of the software detection tool include operating system, the software detection tool program code and
Run the related data needed for the software detection tool.
9. a kind of software detection device, can be run on a memory and on a processor including processor, memory and storage
Computer program, which is characterized in that the processor realizes one of claim 1-7 when performing the computer program
The method.
10. a kind of computer readable storage medium, is stored thereon with computer program, when which is executed by processor
Realize the method described in one of claim 1-7.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810037230.3A CN108255723B (en) | 2018-01-15 | 2018-01-15 | Method and apparatus for software detection and computer readable storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201810037230.3A CN108255723B (en) | 2018-01-15 | 2018-01-15 | Method and apparatus for software detection and computer readable storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN108255723A true CN108255723A (en) | 2018-07-06 |
CN108255723B CN108255723B (en) | 2021-05-04 |
Family
ID=62726931
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201810037230.3A Expired - Fee Related CN108255723B (en) | 2018-01-15 | 2018-01-15 | Method and apparatus for software detection and computer readable storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN108255723B (en) |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103843303A (en) * | 2012-11-22 | 2014-06-04 | 华为技术有限公司 | Management control method, device and system for virtual machine |
CN105677556A (en) * | 2014-11-19 | 2016-06-15 | 国家电网公司 | System software test method and platform thereof for dispatching automated master station system |
US20170003994A1 (en) * | 2015-06-30 | 2017-01-05 | Microsoft Technology Licensing, Llc | Cloud virtual machine customization using extension framework |
-
2018
- 2018-01-15 CN CN201810037230.3A patent/CN108255723B/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103843303A (en) * | 2012-11-22 | 2014-06-04 | 华为技术有限公司 | Management control method, device and system for virtual machine |
CN105677556A (en) * | 2014-11-19 | 2016-06-15 | 国家电网公司 | System software test method and platform thereof for dispatching automated master station system |
US20170003994A1 (en) * | 2015-06-30 | 2017-01-05 | Microsoft Technology Licensing, Llc | Cloud virtual machine customization using extension framework |
Also Published As
Publication number | Publication date |
---|---|
CN108255723B (en) | 2021-05-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110493007B (en) | Block chain based information verification method, device, equipment and storage medium | |
CN107533501A (en) | Use block chain automated validation appliance integrality | |
CN113014539A (en) | Internet of things equipment safety protection system and method | |
TWI737172B (en) | Computer system, computer program product and computer implement method for incremental decryption and integrity verification of a secure operating system image | |
CN112699353B (en) | Financial information transmission method and financial information transmission system | |
CN107342966B (en) | Authority credentials distribution method and device | |
CN110011950A (en) | A kind of method for authenticating and device of video flowing address | |
EP3754562A1 (en) | Method, apparatus and system for performing machine learning by using data to be exchanged | |
CN109828924A (en) | Test method, device and calculating equipment and medium | |
CN111222181B (en) | AI model supervision method, system, server and storage medium | |
CN110113329A (en) | A kind of verification method and device of identifying code | |
CN112004201A (en) | Short message sending method and device and computer system | |
CN109818965B (en) | Personal identity verification device and method | |
CN103686711B (en) | Method for connecting network and electronic equipment | |
CN104965701B (en) | Obtain the method and device of application message | |
CN106209751A (en) | Service-oriented interface authentication method based on the operating system certificate of authority | |
CN109657170A (en) | Webpage loading method, device, computer equipment and storage medium | |
CN110022327B (en) | Short message authentication test method and device | |
CN107154930B (en) | Method and system for testing vulnerability | |
CN109547404A (en) | The acquisition methods and server of data | |
CN108255723A (en) | For the method and apparatus and computer readable storage medium of software detection | |
US11503058B2 (en) | Security server for dynamic verification of web content, end users remote device, system comprising said end users remote device and server, and method implemented by said system | |
CN112825093B (en) | Security baseline checking method, host, server, electronic device and storage medium | |
CN106648770A (en) | Generating method, loading method and device for application program installation package | |
CN110266695A (en) | Using the lottery data cochain method and its equipment of intelligent contract |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20210504 Termination date: 20220115 |