CN108255723A - For the method and apparatus and computer readable storage medium of software detection - Google Patents

For the method and apparatus and computer readable storage medium of software detection Download PDF

Info

Publication number
CN108255723A
CN108255723A CN201810037230.3A CN201810037230A CN108255723A CN 108255723 A CN108255723 A CN 108255723A CN 201810037230 A CN201810037230 A CN 201810037230A CN 108255723 A CN108255723 A CN 108255723A
Authority
CN
China
Prior art keywords
software
virtual machine
detection tool
software detection
run
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201810037230.3A
Other languages
Chinese (zh)
Other versions
CN108255723B (en
Inventor
马宁
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhongke Soft Evaluation Technology (beijing) Co Ltd
Original Assignee
Zhongke Soft Evaluation Technology (beijing) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhongke Soft Evaluation Technology (beijing) Co Ltd filed Critical Zhongke Soft Evaluation Technology (beijing) Co Ltd
Priority to CN201810037230.3A priority Critical patent/CN108255723B/en
Publication of CN108255723A publication Critical patent/CN108255723A/en
Application granted granted Critical
Publication of CN108255723B publication Critical patent/CN108255723B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3664Environments for testing or debugging software
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/44Arrangements for executing specific programs
    • G06F9/455Emulation; Interpretation; Software simulation, e.g. virtualisation or emulation of application or operating system execution engines
    • G06F9/45533Hypervisors; Virtual machine monitors
    • G06F9/45558Hypervisor-specific management and integration aspects
    • G06F2009/45579I/O management, e.g. providing access to device drivers or storage

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Quality & Reliability (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of software detecting method, including:Step S11 runs the virtual machine being packaged to the running environment of software detection tool so as to be formed;Step S12 is detected software under testing using the software detection tool in virtual machine;Wherein, the running environment of the software detection tool includes the related data needed for operating system, the program code of the software detection tool and the operation software detection tool.The invention also discloses a kind of software detection device corresponding with the above method and computer readable storage mediums.It is an advantage of the current invention that software detection tool developer had not only been facilitated to protect software detection tool, but also software users is facilitated to carry out software detection and examination.

Description

For the method and apparatus and computer readable storage medium of software detection
Technical field
The invention belongs to data confidentiality fields, and in particular to a kind of software detecting method, software detection device and computer Readable storage medium storing program for executing.
Background technology
With the development of computer and network technologies, the degree of industrial automation is higher and higher, soft by being run in terminal Part is more and more so as to fulfill the situation of specific production purpose.
As shown in Figure 1, at present, many software users B are there are software use demand, but its own does not have software Development ability.At this point, software users B would generally entrust multiple software developer C as its software of the exploitation with predetermined function.When When software developer C is by the Software Delivery finished is developed to software users B, software users B needs to be detected software, with true Whether the fixed software meets predetermined design requirement.When the scheduled design requirement of the Software-Coincidence, software users B can just be tested Receive the software;Otherwise, software users B will notify software developer C to modify the software.
In order to be detected to the software, software users B would generally buy profession at software detection tool developer A Software detection tool, be detected using software detection tool come the software delivered software developer C.Software detection tool It is a kind of professional software, it can assist software detection personnel to complete the detection work in a certain type or a certain field, judge Software under testing whether meet predetermined design requirement, and point out software under testing there are the problem of.
And for software detection tool developer A, the development cost of software detection tool is typically very high, In order to protect the fruits of mental labor of oneself, software detection tool developer A needs to prevent the code of software detection tool from revealing, Software detection tool is protected.
The method for preventing the code of software detection tool from revealing being currently known is as follows:Software detection tool developer A exists After installing " softdog " additional on software detection tool, then software detection tool is supplied to software users B, contained in the softdog Not reproducible hardware information, for certification user identity.Once software users B runs the software on a certain hardware device Detection instrument, software detection tool are bound with the hardware device, it is impossible to be run on other hardware devices again.
The above method has the following problems:
1. when software developer C have it is multiple, i.e. when software users B entrusts multiple software developer C as oneself exploitation software, software User B needs to be detected the software that multiple software developer C are developed.At this point, software users B can select to work in one's own side Runs software detection instrument on the first hardware device M1 in place is detected the software under testing of software developer C exploitations.It adopts In this way, for theoretically, software users B can be detected all software developer C software under testing developed.But It is, in fact, since this can cause the code of software under testing to be retained on the first hardware device M1, and software developer C is same Sample wish protect software under testing, it is undesirable to software under testing code leakage, therefore, they would generally refuse this software detection and Examination mode.Therefore, this mode is not easy to software users B and carries out software detection and examination.
2. software users B can also select to run on the second hardware device M2 of the workplace of software developer C soft Part detection instrument, software detection tool will be bound with the second hardware device M2.A software developer C exploitation can only be detected in this way Software, for other software developer C exploitation software, also need to buy software detection tool again, to other software develop It is run on other hardware devices of the workplace of person C.Which not only improves the costs that software users B is paid(It need to repeatedly buy Software detection tool), but also the code of software detection tool may be caused to be retained on the second hardware device M2, cause software The code leakage of detection instrument;
3. software detection tool developer A is actually that software detection tool is " permanent to use on a hardware device Power " is supplied to software users B, and price is usually higher.
Invention content
The object of the present invention is to provide a kind of software detecting method and device and a kind of corresponding computer-readable storages Medium the advantage is that:Not only software detection tool was protected convenient for software detection tool developer, but also convenient for software users Software detection and examination are carried out using software detection tool.
In a first aspect, the present invention provides a kind of software detecting method, including:
Step S11 runs the virtual machine being packaged to the running environment of software detection tool so as to be formed;
Step S12 is detected software under testing using the software detection tool in virtual machine;
Wherein, the running environment of the software detection tool include operating system, the software detection tool program code and Run the related data needed for the software detection tool.
Preferably, it is further comprising the steps of before step S11:
Start the virtual machine, the virtual machine provides first interface after start-up;
The input authentication code in first interface;
The virtual machine receives the authentication code, and it is authenticated, if certification success, virtual machine bring into operation;Otherwise, The virtual machine is not run.
Preferably, the authentication code is generated by server, and is sent to user terminal from server;
The authentication code is obtained from user terminal, and the authentication code is inputted in first interface.
Preferably, the step of server generation authentication code is:
Server generates virtual machine operating instruction, signs to the virtual machine operating instruction, so as to generate the authentication code.
Preferably, the virtual machine operating instruction includes the run the period of virtual machine, and virtual machine receives the certification After code, the signature is authenticated, if certification passes through, virtual machine is only run in the run the period.
Preferably, the related data includes code detection specification.
Preferably, the virtual machine provides second interface, for receiving software under testing.
Second aspect, the present invention provide a kind of software detection device, including:
Component is run, for running virtual machine, the virtual machine is packaged by the running environment to software detection tool So as to what is formed;
Detection part, for being detected using the software detection tool in virtual machine to software under testing;
Wherein, the running environment of the software detection tool include operating system, the software detection tool program code and Run the related data needed for the software detection tool.
The third aspect, the present invention provide a kind of software detection device, including processor, memory and are stored in memory Computer program that is upper and can running on a processor, which is characterized in that the processor performs real during the computer program Existing preceding method.
Fourth aspect, the present invention provide a kind of computer readable storage medium, are stored thereon with computer program, the calculating Machine program realizes preceding method when being executed by processor.
The invention has the advantages that:
(1)Software detection tool is protected convenient for software detection tool developer;
(2)Convenient for software users software detection and examination are carried out using software detection tool;
(3)Reduce the use price of software detection tool.
Description of the drawings
Fig. 1 is the process schematic that software users are detected software and check and accept in the prior art;
Fig. 2 is the process schematic that software tool developer is packaged software detection tool in the present invention;
Fig. 3 is the overall schematic of the software detection process in the present invention;
Fig. 4 is the flow diagram of the software detecting method in the present invention;
Fig. 5 is the structure diagram of the software detection device in the present invention.
Specific embodiment
Below in conjunction with specific embodiment and Figure of description, the present invention is described in further detail.
Virtual machine(Virtual Machine, VM)It is to be simulated by software, there is complete hardware system, fortune Complete computer of the row in a completely isolated environment.Virtually by generating the new virtual mirror of existing operating system Picture, so as to have and real system(Such as Windows, Linux)Duplicate function, therefore, virtual machine is actually It is exactly an independent virtual system, all operations all carry out inside the independent virtual system, can carry out software peace The operations such as dress, data preserve, setting independent table, without generating any influence to real system.
After being packaged using virtual machine to the whole service environment of software detection tool, hard disk mirror-image is just presented as one A file that can not be cracked, this can improve the overall security of software detection tool.
As shown in Fig. 2, the running environment of software detection tool is encapsulated as void by software detection tool developer A on the whole Plan machine, wherein the running tool is including being used for the operating system of runs software detection instrument, the program generation of software detection tool Related data needed for code and runs software detection instrument;Then, virtual machine can be supplied to soft by software detection tool developer A Part user B;When software users B needs to carry out software detection and check and accept, the software detection tool in virtual machine is run, to be measured Software is detected.
As shown in figure 3, in the present embodiment, the overall flow of software detection process is as follows:
Step S301, software users B obtain virtual machine at Software Testing Tool developer A, and are obtained at software developer C Software under testing.
Software detection tool developer A is packaged the running environment of software detection tool, so as to form virtual machine, with Afterwards, virtual machine is supplied to software users B by software detection tool developer A.Software users B is without installation, as long as running this Virtual machine just can obtain whole service environment, facilitate software users B using software detection tool, improve they use it is soft Part detection instrument carries out the wish of software detection tool.
The running environment of the software detection tool includes the operating system, described for running the software detection tool Related data needed for the program code of software detection tool and the operation software detection tool;The related data includes generation Code inspection criterion, for example, being enumerated based on general drawback(CWE, Common Weakness Enumeration)Code detection rule Model and/or based on open web application item security(OWASP, Open Web Application Security Project)The code detection specification of the security breaches of publication.
Virtual machine can be supplied to software users B by software detection tool developer A in several ways, such as:(1)It will Virtual machine may be stored on the computer-readable medium, then computer-readable medium is supplied to software users B, wherein, the calculating Machine readable storage medium storing program for executing can be but not limited to:Random access memory(RAM), read-only memory(ROM), erasable programmable Read-only memory(EPROM), compact disc read-only memory(CD-ROM), it is one or more in hard disk etc..(2)It is transmitted by file Agreement(FTP), Dropbox the modes such as share, virtual machine is supplied to software users B.
Software developer C is entrusted by software users B, for software of the software users B exploitations with predetermined function, works as software When exploitation finishes, Software Delivery is given to software users B.And software users B needs are detected the software, judge that the software is It is no to meet scheduled design requirement, such as, if having predetermined function, overall operation whether safety etc..At this point, the software is claimed For " software under testing ".
Step S302, starts the virtual machine, and the virtual machine provides first interface.
Software users B runs the virtual machine on the second hardware device M2 of the workplace of software developer C, works as void When plan machine is run, virtual machine not yet starts, but is to provide first interface, such as first with visible user interface connects Mouthful, the first interface is used to provide the entrance for input authentication code to software users B.
The second hardware device M2 includes that any equipment of virtual machine and software detection tool can be run, including general Computer, special purpose computer, computer network or other equipment.
Due to the use of virtual machine encapsulation technology, software detection tool need not be bound with hardware device, but can be in office It is run on meaning hardware device, so as to which software users B can carry software detection tool to arbitrary site, use software detection Tool carries out software detection and examination.
Step S303, the input authentication code in first interface, and authentication code is authenticated.
The authentication code is generated by server, and the user terminal of software users B is sent to from server.The clothes Business device is safeguarded by software detection tool developer A.The user terminal can be laptop, tablet computer, mobile phone Portable terminals are waited, wired mode can be passed through(Such as coaxial cable, optical fiber, digital user wire DSL)Or wireless mode, with Server communicates.For example, when software users B needs to be carried out software detection using software detection tool and checked and accepted, it can be with By the wechat public platform of user terminal access homepage of server or software detection tool developer A, certification is sent to server Code obtains request.
After server receives the authentication code acquisition request, corresponding virtual machine operating instruction, the virtual machine are generated It can include the run the period of virtual machine in operating instruction;Then, server signs to virtual machine operating instruction, so as to raw Into authentication code, that is, the authentication code includes two parts, and a part is the plaintext of virtual machine operating instruction, and another part is with private The abstract of the encrypted virtual machine operating instruction of key;Finally, the authentication code is sent to the user terminal by server.Specifically Ground, the server can pass through Email, instant messaging(QQ, wechat)Etc. modes, the authentication code is sent to described Terminal.
It is to ensure that the integrality of information transmission and the identity of sender are recognized to the purpose that virtual machine operating instruction is signed Card.Signature process is as follows:Server transports the private key encryption of the summary info server of virtual machine operating instruction with virtual machine The plaintext of row instruction together, forms authentication code.When server signs to virtual machine operating instruction, known label may be used Name algorithm, such as RSA Algorithm etc..
The length of the virtual machine run the period can be set, such as 1 hour by software detection tool developer A, and 2 Hour etc..
The authentication code that user terminal receives is input in first interface by software users B, virtual machine be based on authentication code into Row signature authentication is authenticated the signature using public key, to judge whether the virtual machine operating instruction is by servicing What device was sent out.
Since software users B is to receive authentication code by user terminal, virtual machine is only needed without networking with server User terminal is networked with server.So as to when the workplace of software developer C is some special, inconvenient networkings Place or for information safety protection without the place of networking, can also this authentication code be used to receive mode.
Software users B can not run virtual machine, also can not just run void when not obtaining authentication code that server is signed and issued Software detection tool in plan machine, this, which allows for software users B, can not arbitrarily replicate the code of software detection tool, so as to just Software detection tool is protected in software detection tool developer A.
Step S304, virtual machine judge whether certification succeeds.
If certification success, jumps to step 305, otherwise, jumps to step 307.
Step 305, virtual machine brings into operation, and provides second interface, for receiving software under testing.
The second interface can be a visual user interface, be treated for being provided to software users B for inputting Survey the entrance of software.
Step S306, receives software under testing, and runs software detection instrument is detected software under testing.
After virtual machine receives software under testing, software users B can examine software under testing with runs software detection instrument It surveys, and output software testing result.If software detection result represents that software under testing meets design requirement, software users B can To check and accept the software;Otherwise, software detection result comprising software under testing there are the problem of, software detection result is returned into software Developer C modifies to the software by software developer C.
Step 307, if authentification failure, virtual machine is not run, and software users B can not runs software detection instrument.
Embodiment of above has the following advantages:
1. software users B without on the first hardware device M1 of the workplace of software users B runs software detection instrument, and It is the runs software detection instrument on the second hardware device M2 of the workplace of software developer C, due to software detection tool It is encapsulated in virtual machine, the code of software detection tool will not be retained on the second hardware device M2, and code will not occur Leakage problem;When there are during multiple software developer C, since software detection tool is used without being bound with certain hardware device, When software users B needs to detect the software of multiple software developer C delivery, multiple copies of virtual machine can be replicated, respectively It is used in the workplace of multiple software developer C, as long as obtaining multiple authentication codes.This software detection and examination side Formula had not only facilitated software users B using software detection tool, but also can be so that the code of software detection tool is not replicated and steals It takes.
2. it could only be run in the run the period comprising virtual machine run the period, virtual machine in authentication code, thus, software Detection instrument developer A is supplied to the disposable power of software users B, actually software detection tool(Disposably license), compared to the permanent right to use provided when being encrypted using softdog mode(Permanent license)For, The less expensive of disposable power reduces the production cost of software users B.
As shown in figure 4, based on the software detection process shown in Fig. 3, the present embodiment provides a kind of software detecting method, packets It includes:
Step S11 runs the virtual machine being packaged to the running environment of software detection tool so as to be formed;
Step S12 is detected software under testing using the software detection tool in virtual machine;
Wherein, the running environment of the software detection tool include operating system, the software detection tool program code and Run the related data needed for the software detection tool.
As shown in figure 5, the present embodiment also provides a kind of software detection device, the software detection can be used to fill for software users B It puts to carry out software detection and examination.
The software detection device includes:
Component is run, for running virtual machine, the virtual machine is packaged by the running environment to software detection tool So as to what is formed;
Detection part, for being detected using the software detection tool in virtual machine to software under testing;
Wherein, the running environment of the software detection tool include operating system, the software detection tool program code and Run the related data needed for the software detection tool.
Software detection device provided in this embodiment is only carried out with the division of above-mentioned each function module for example, practical In, above-mentioned function can be integrated in a function module as needed and is completed, alternatively, by above-mentioned function distribution to not With function module complete, that is, the internal structure of device is divided into different function modules, it is described above complete to complete Portion or partial function, the present invention are not especially limited this.
The present embodiment also provides a kind of device for software detection, including processor, memory and is stored in storage On device and the computer program that can run on a processor, which is characterized in that when the processor performs the computer program Realize preceding method.
The present embodiment also provides a kind of computer readable storage medium, is stored thereon with computer program, the computer journey Preceding method is realized when sequence is executed by processor.
Various pieces are described using progressive mode in the present invention, same or similar portion between each embodiment Divide cross-reference, what each embodiment introduced is difference from other examples.Implement especially for device For example, since it is substantially similar to embodiment of the method, so describing fairly simple, related part can be found in embodiment of the method Partial explanation.
This specific embodiment is only explanation of the invention, is not limitation of the present invention, people in the art Member can as needed make the present embodiment the modification of no creative contribution after this specification is read, but as long as at this It is all protected in the right of invention by Patent Law.

Claims (10)

1. a kind of software detecting method, including:
Step S11 runs the virtual machine being packaged to the running environment of software detection tool so as to be formed;
Step S12 is detected software under testing using the software detection tool in virtual machine;
Wherein, the running environment of the software detection tool include operating system, the software detection tool program code and Run the related data needed for the software detection tool.
2. software detecting method according to claim 1, it is characterised in that:Before step S11, following step is further included Suddenly:
Start the virtual machine, the virtual machine provides first interface after start-up;
The input authentication code in first interface;
The virtual machine receives the authentication code, and it is authenticated, if certification success, virtual machine bring into operation;Otherwise, The virtual machine is not run.
3. software detecting method according to claim 2, it is characterised in that:
The authentication code is generated by server, and is sent to user terminal from server;
The authentication code is obtained from user terminal, and the authentication code is inputted in first interface.
4. according to one of them described software detecting method of claim 3, which is characterized in that server generates the authentication code The step of be:
Server generates virtual machine operating instruction, signs to the virtual machine operating instruction, so as to generate the authentication code.
5. software detecting method according to claim 4, it is characterised in that:
The virtual machine operating instruction includes the run the period of virtual machine, after virtual machine receives the authentication code, to described Signature is authenticated, if certification passes through, virtual machine is only run in the run the period.
6. according to the software detecting method described in one of claim 1-5, it is characterised in that:The related data includes generation Code inspection criterion.
7. according to the software detecting method described in one of claim 1-5, it is characterised in that:The virtual machine provides second Interface, for receiving software under testing.
8. a kind of software detection device, including:
Component is run, for running virtual machine, the virtual machine is packaged by the running environment to software detection tool So as to what is formed;
Detection part, for being detected using the software detection tool in virtual machine to software under testing;
Wherein, the running environment of the software detection tool include operating system, the software detection tool program code and Run the related data needed for the software detection tool.
9. a kind of software detection device, can be run on a memory and on a processor including processor, memory and storage Computer program, which is characterized in that the processor realizes one of claim 1-7 when performing the computer program The method.
10. a kind of computer readable storage medium, is stored thereon with computer program, when which is executed by processor Realize the method described in one of claim 1-7.
CN201810037230.3A 2018-01-15 2018-01-15 Method and apparatus for software detection and computer readable storage medium Expired - Fee Related CN108255723B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810037230.3A CN108255723B (en) 2018-01-15 2018-01-15 Method and apparatus for software detection and computer readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810037230.3A CN108255723B (en) 2018-01-15 2018-01-15 Method and apparatus for software detection and computer readable storage medium

Publications (2)

Publication Number Publication Date
CN108255723A true CN108255723A (en) 2018-07-06
CN108255723B CN108255723B (en) 2021-05-04

Family

ID=62726931

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810037230.3A Expired - Fee Related CN108255723B (en) 2018-01-15 2018-01-15 Method and apparatus for software detection and computer readable storage medium

Country Status (1)

Country Link
CN (1) CN108255723B (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103843303A (en) * 2012-11-22 2014-06-04 华为技术有限公司 Management control method, device and system for virtual machine
CN105677556A (en) * 2014-11-19 2016-06-15 国家电网公司 System software test method and platform thereof for dispatching automated master station system
US20170003994A1 (en) * 2015-06-30 2017-01-05 Microsoft Technology Licensing, Llc Cloud virtual machine customization using extension framework

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103843303A (en) * 2012-11-22 2014-06-04 华为技术有限公司 Management control method, device and system for virtual machine
CN105677556A (en) * 2014-11-19 2016-06-15 国家电网公司 System software test method and platform thereof for dispatching automated master station system
US20170003994A1 (en) * 2015-06-30 2017-01-05 Microsoft Technology Licensing, Llc Cloud virtual machine customization using extension framework

Also Published As

Publication number Publication date
CN108255723B (en) 2021-05-04

Similar Documents

Publication Publication Date Title
CN107533501A (en) Use block chain automated validation appliance integrality
CN109408250A (en) Call application programming interface API approach, device, electronic equipment
CN110011950A (en) A kind of method for authenticating and device of video flowing address
CN112699353B (en) Financial information transmission method and financial information transmission system
CN107196907A (en) A kind of guard method of Android SO files and device
CN109828924A (en) Test method, device and calculating equipment and medium
EP3754562A1 (en) Method, apparatus and system for performing machine learning by using data to be exchanged
CN109815659A (en) Safety certifying method, device, electronic equipment and storage medium based on WEB project
CN110505185A (en) Auth method, equipment and system
CN110113329A (en) A kind of verification method and device of identifying code
CN112004201A (en) Short message sending method and device and computer system
CN109818965B (en) Personal identity verification device and method
CN103686711B (en) Method for connecting network and electronic equipment
CN104965701B (en) Obtain the method and device of application message
CN106209751A (en) Service-oriented interface authentication method based on the operating system certificate of authority
CN111222181B (en) AI model supervision method, system, server and storage medium
CN110022327B (en) Short message authentication test method and device
CN107154930B (en) Method and system for testing vulnerability
CN109547404A (en) The acquisition methods and server of data
CN108255723A (en) For the method and apparatus and computer readable storage medium of software detection
CN112825093B (en) Security baseline checking method, host, server, electronic device and storage medium
CN106648770A (en) Generating method, loading method and device for application program installation package
CN110401674A (en) Data access method, device, system, electronic equipment and computer-readable medium
CN109933990A (en) Security breaches discovery method, apparatus and electronic equipment based on multi-mode matching
CN114598478B (en) Data encryption method, device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20210504

Termination date: 20220115