CN108322436A - Verification method, device, computer equipment and the readable storage medium storing program for executing of network request - Google Patents

Verification method, device, computer equipment and the readable storage medium storing program for executing of network request Download PDF

Info

Publication number
CN108322436A
CN108322436A CN201711458481.0A CN201711458481A CN108322436A CN 108322436 A CN108322436 A CN 108322436A CN 201711458481 A CN201711458481 A CN 201711458481A CN 108322436 A CN108322436 A CN 108322436A
Authority
CN
China
Prior art keywords
network request
verified
network
objective browser
proxy server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711458481.0A
Other languages
Chinese (zh)
Other versions
CN108322436B (en
Inventor
蔡孙君
卞伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
NETWORK TECHNOLOGY (SHANGHAI) Co Ltd
Original Assignee
NETWORK TECHNOLOGY (SHANGHAI) Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by NETWORK TECHNOLOGY (SHANGHAI) Co Ltd filed Critical NETWORK TECHNOLOGY (SHANGHAI) Co Ltd
Priority to CN201711458481.0A priority Critical patent/CN108322436B/en
Publication of CN108322436A publication Critical patent/CN108322436A/en
Application granted granted Critical
Publication of CN108322436B publication Critical patent/CN108322436B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/02Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
    • H04L63/0227Filtering policies
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/50Network services
    • H04L67/56Provisioning of proxy services

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The invention discloses a kind of verification method of network request, device, computer equipment and readable storage medium storing program for executing, wherein method includes:Obtain the network request that objective browser is sent out;Network request is verified according to proof rule is preset;In the case where being verified, determine that the business item operation based on the objective browser corresponding to network request is correct;Method, apparatus, computer equipment and the readable storage medium storing program for executing of the present invention, the network request that objective browser is sent out is intercepted by proxy server, then network request verify rather than verify the response message of the network request by proof rule, whether the network articles based on objective browser can correctly be tested.Moreover, in the present embodiment, proxy server obtains network request automatically, and is verified to network request by proxy server, so the verification process is automatic, so, it also can effectively improve the testing efficiency to network articles.

Description

Verification method, device, computer equipment and the readable storage medium storing program for executing of network request
Technical field
The present invention relates to security technology area more particularly to a kind of verification method of network request, device, computer equipments And readable storage medium storing program for executing.
Background technology
With the rapid development of network technology, network articles iteration is frequent, and in the prior art to the test of network articles It is by manually carrying out test completion to the corresponding network request of network articles, this method is less efficient.
And the network articles automatic test in industry is by can only be to sending out the response message obtained after network request at present It is verified to complete the test to corresponding network project, such as:User interface interaction UI automations can be operated with analog subscriber, It is verified for the content of the page of feedback;Interface automation can be directed to and send out obtained feedback result after network request It is verified.UI automations and interface automation can not directly verify network request as a result,.Because of existing automation Testing scheme can only be verified to sending out the response message obtained after network request, and can not directly be tested network request Card, causes the testing efficiency of network articles still very low.
Invention content
It is a primary object of the present invention to propose a kind of verification method of network request, device, computer equipment and readable Storage medium, which overcome the network articles test effects caused by it can not directly be verified to network request in the prior art The low problem of rate.
According to an aspect of the invention, there is provided a kind of verification method of network request, is applied to proxy server, institute The method of stating includes:Obtain the network request that objective browser is sent out;The network request is tested according to proof rule is preset Card;In the case where being verified, the business item operation based on the objective browser corresponding to the network request is determined Correctly.
Optionally, the network request for obtaining objective browser and sending out, including:The objective browser is obtained to be based on certainly Dynamicization frame carries out the network request sent out when predetermined registration operation;The predetermined registration operation includes:Open the page, click option, sliding The page it is one or more.
Optionally, after the network request that sends out of acquisition objective browser and the foundation presets proof rule Before being verified to the network request, the method includes:It is configured in the proxy server and presets filtering rule;According to The network request is filtered according to the default filtering rule, to obtain network request to be verified.
Optionally, the default filtering rule includes target domain name and target component;It is described to be advised according to the default filtering Then the network request is filtered, obtains network request to be verified, including:According to the target domain name and target component It is matched with the domain name of network request and target component got;According to matching result, determine that corresponding network request is Network request to be verified.
Optionally, described that the network request is filtered according to the default filtering rule, obtain net to be verified After network request, before the default proof rule of the foundation verifies the network request, the method further includes:Storage The network request to be verified, for carrying out batch validation by the default proof rule.
Optionally, the default proof rule includes targeted parameter value;The foundation presets proof rule to the network Request is verified, including:Determine whether the parameter value of the network request to be verified is more than the targeted parameter value;If It is to determine that the business item operation based on the objective browser corresponding to the network request is correct;Otherwise, it determines the net The corresponding business item operation based on the objective browser of network request is incorrect.
According to the second aspect of the invention, a kind of verification device of network request is provided, proxy server is based on Side, described device include:Acquisition module, the network request sent out for obtaining objective browser;Authentication module, for according to pre- If proof rule verifies the network request;Determining module, in the case where being verified, determining the network The corresponding business item operation based on the objective browser of request is correct.
Optionally, the acquisition module is specifically used for:The objective browser is obtained to be preset based on automation framework The network request sent out when operation;The predetermined registration operation includes:It opens the page, click option, slide the one or more of the page.
Optionally, described device further includes:Filtering rule configuration module, for what is sent out in the acquisition objective browser After network request and the foundation is preset before proof rule verifies the network request, in the agency service It is configured in device and presets filtering rule;Filtering module, for being filtered to the network request according to the default filtering rule, Obtain network request to be verified.
Optionally, the default filtering rule includes target domain name and target component;The filtering module is specifically used for:According to It is matched with the domain name of network request and target component got according to the target domain name and target component;According to matching knot Fruit determines that corresponding network request is network request to be verified.
Optionally, described device further includes:Memory module is used for described according to the default filtering rule to the net Network request be filtered, after obtaining network request to be verified, the foundation preset proof rule to the network request into Before row verification, the network request to be verified is stored, for carrying out batch validation by the default proof rule.
According to the third aspect of the present invention, it provides a kind of computer equipment, including memory, processor and is stored in On the memory and the computer program that can run on the processor, the processor are realized when executing described program A kind of verification method for the network request stated.
According to the fourth aspect of the present invention, a kind of computer readable storage medium is provided, it is described computer-readable to deposit Storage media is stored with one or more program, and one or more of programs can be executed by one or more processor, To realize a kind of verification method of above-mentioned network request.
The present invention has the beneficial effect that:Verification method, device, the meter for a kind of network request that the embodiment of the present invention is provided Machine equipment and readable storage medium storing program for executing are calculated, directly the network request that objective browser is sent out is intercepted by proxy server, Then network request verify rather than verify the response message of the network request by proof rule, you can realize The business item based on objective browser corresponding to the network request is verified, it, also can be to being based on target browsing with regard to this Whether the network articles of device are correctly tested.To can effectively improve the testing efficiency to network articles.Moreover, at this In embodiment, proxy server obtains network request automatically, and is verified to network request by proxy server, so should Verification process is automatic, so, it also can effectively improve the testing efficiency to network articles.
Description of the drawings
Fig. 1 is a kind of flow diagram of the verification method of network request of first embodiment of the invention;
Fig. 2 is a kind of flow diagram of the verification method of network request of second embodiment of the invention;
Fig. 3 is a kind of flow diagram of the verification method of network request of third embodiment of the invention;
Fig. 4 is a kind of flow diagram of the verification method of network request of fourth embodiment of the invention;
Fig. 5 is a kind of flow diagram of the verification device of network request of fifth embodiment of the invention.
The object of the invention is realized, the embodiments will be further described with reference to the accompanying drawings for functional characteristics and advantage.
Specific implementation mode
It should be appreciated that the specific embodiments described herein are merely illustrative of the present invention, it is not intended to limit the present invention.
In subsequent description, using for indicating that the suffix of such as " module ", " component " or " unit " of element is only The explanation for being conducive to the present invention, itself does not have a specific meaning.Therefore, " module ", " component " or " unit " can mix Ground uses.
Embodiment to facilitate the understanding of the present invention carries out the implementation process of the present invention below by several specific embodiments Detailed elaboration.
First embodiment of the invention provides a kind of verification method of network request, is applied to proxy server side, should Method includes:Obtain the network request that objective browser is sent out;The network request is verified according to proof rule is preset, The default proof rule includes in verifying domain name, verification service parameter and the corresponding certificate parameter value of the verification service parameter It is one or more;In the case where being verified, the industry based on the objective browser corresponding to the network request is determined Business project operation is correct.
In the present embodiment, the network request that objective browser is sent out is intercepted by proxy server, is then led to It crosses proof rule directly network request verify rather than verify the response message of the network request, you can realization pair The business item based on objective browser corresponding to the network request is verified, also can be to being based on objective browser with regard to this Network articles whether correctly tested, to, can effectively improve the testing efficiency to network articles.Moreover, in this reality It applies in example, proxy server obtains network request automatically, and is verified to network request by proxy server, so this is tested Card process is automatic, so, it also can effectively improve the testing efficiency to network articles.
It is worth noting that, in the prior art, being needed before the charge of target webpage through the net to target webpage The response message of network request is verified so that it is determined that going out the corresponding charge item of response message.And in the present embodiment, Ke Yizhi It connects and the network request is verified, and can determine the charge item in network request whereby, be greatly improved to charge item Confirm efficiency.
Specifically, Fig. 1 is a kind of flow diagram of the verification method of network request of first embodiment of the invention, according to Fig. 1 Shown, first embodiment of the invention provides a kind of verification method of network request, is applied to proxy server side, this method Including:
S1:Obtain the network request that objective browser is sent out;
In the present embodiment, it needs first to start proxy server localhost, and the Open Access Journals on the proxy server Port.When operating objective browser, proxy server can intercept the network request that objective browser is sent out user, block The network request cut enters proxy server through the port, and whereby, proxy server obtains network request.Wherein, agency service The unlatching of device and by proxy server to network request realize intercept belong to the prior art, do not do in the present embodiment superfluous It states.
Specifically, the network request sent out for the objective browser obtained optionally obtains the objective browser base The network request sent out when automation framework carries out predetermined registration operation;The predetermined registration operation includes:Open the page, click option, Slide the one or more of the page.
Specifically, it need to carry out objective browser operation ability so that objective browser sends out network request.In this reality It applies in example, can be that practical operation objective browser sends out network request, can also be clear to target by UI automatization simulations Device of looking at carries out predetermined registration operation to send out network request, i.e., drives objective browser to carry out predetermined registration operation by automation framework.Its In, automation framework can be the automation framework selenium that increases income.
After objective browser sends out network request, the network request is intercepted by proxy server realization.Pass through UI automations carry out simulated operation to objective browser and send out network request to proxy server.
S2:The network request is verified according to proof rule is preset;
Proxy server needs to verify these network requests according to proof rule after obtaining network request. In the present embodiment, which is configured in advance in the proxy server, is not defined to the type of proof rule, root The different content that can be asked different network requests and consolidated network according to different proof rules is verified, moreover, Configured proof rule can also be deleted in proxy server.
Optionally, in the present embodiment, proof rule includes verifying domain name, verification service parameter and its corresponding verification ginseng It is one or more in numerical value.Such as:Network request is verified according to the certificate parameter value preset in proof rule, i.e.,:It is logical The parameter value and the magnitude relationship of certificate parameter value for crossing comparing cell request verify the network request to realize.
S3:In the case where being verified, the business based on the objective browser corresponding to the network request is determined Project operation is correct.
Proxy server is verified result after being verified to network request.If the verification result is characterized as to this Network request is verified, and determines that the business item based on the objective browser corresponding to the network request is run just Really, that is, determine that the network articles operation based on the objective browser is correct.
In the present embodiment, not to the traffic item based on the objective browser corresponding to verification result and network request Relationship between mesh is defined, and whether only need as needed can be according to verification result by can be to corresponding to network request Based on the objective browser business item operation whether correctly verified.
It is worth noting that, in the present embodiment, can also obtain what objective browser was generated according to current page operation Network request.Such as:Target webpage is equipped with advertisement, and when target pages slide into the advertisement exposure, proxy server will be received The network request that advertising items on to objective browser generate, to obtain the light exposure of the advertisement, in order to charge.
In the present embodiment, the network request that objective browser is sent out is intercepted by proxy server, is then led to It crosses proof rule network request verify rather than verify the response message of the network request, you can realize to the net The corresponding business item based on objective browser of network request is verified, also can be to the net based on objective browser with regard to this Whether network project is correctly tested.Moreover, in the present embodiment, proxy server obtains network request automatically, and by generation Reason server verifies network request, so the verification process is automatic, so, also can effectively it improve to network item Purpose testing efficiency.
It is worth noting that, in the prior art, being needed before the charge of target webpage through the net to target webpage The response message of network request is verified so that it is determined that going out the corresponding charge item of response message.And in the present embodiment, Ke Yizhi It connects and the network request is verified, and can determine the charge item in network request whereby, be greatly improved to charge item Confirm efficiency.
Fig. 2 is a kind of flow diagram of the verification method of network request of second embodiment of the invention, according to Fig.2, this Invention second embodiment provides a kind of verification method of network request, is applied to proxy server side, and this method includes:
S1:Obtain the network request that objective browser is sent out;
S2:The network request is verified according to proof rule is preset;
S3:In the case where being verified, the business based on the objective browser corresponding to the network request is determined Project operation is correct.
After step S1 and before step S2, the verification method of the present embodiment further includes:
S11:It is configured in the proxy server and presets filtering rule;
S12:The network request is filtered according to the default filtering rule, is asked with the network for obtaining to be verified It asks.
It is worth noting that:Step S11 can also be completed before step S1.
Specifically, step S11 is specially to configure to preset filtering rule in proxy server, for the default filtering rule Then, it is a kind of filtering file, specifically, the filtering file, which is agency, automatically configures PAC files, agency is taken by the PAC The network request that business device is got is filtered, to obtain network request to be verified.
Wherein, each PAC files include the function of a JavaScript form.It includes one that the function, which returns to one, The character string of a or multiple access rules.User agent is applicable in one according to these rules and specifically acts on behalf of itself or directly visit It asks.When a proxy server cannot respond to, multiple access rules provide other standby access methods.Browser Before accessing other pages, this PAC file is accessed first.URL in PAC files may be manual configuration, it is also possible to It is to be automatically configured by the network agent self-discovery protocol Web Proxy Autodiscovery Protocol of webpage.
Optionally, the default filtering rule includes target domain name and target component;Under the premise of herein, step S12's is another A kind of realization method is:
It is matched with the domain name of network request and target component got according to the target domain name and target component; According to matching result, the network request that corresponding network request is to be verified is determined.
Specifically, in the present embodiment, which includes target domain name and target component, i.e., in PAC files It is stored with target domain name and target component.Then, proxy server parses the network request got, obtains the network The domain name and parameter of request.Foundation target domain name and target component and the domain name in the network request got and parameter progress again Matching.In the present embodiment, matching result is not defined, such as:In some scenes, in the network request got Domain name is identical as aiming field name, and parameter is differed with target component, then obtains the network request, and the network request is to wait for The network request of verification.
Optionally, in the present embodiment, network request to be verified domain name and parameter need respectively with target domain name and Target component is identical.
I.e.:After obtaining network request, needs to be filtered the network request, obtain network to be verified after filtering Request is the object verified according to the default proof rule.It through the embodiment of the present invention, can be to the net that gets Network request is screened, to obtain the network request of meet demand.
Fig. 3 is a kind of flow diagram of the verification method of network request of third embodiment of the invention, according to Fig.3, this Invention 3rd embodiment provides a kind of verification method of network request, is applied to proxy server side, and this method includes:
S1:Obtain the network request that objective browser is sent out;
S2:The network request is verified according to proof rule is preset;
S3:In the case where being verified, the business based on the objective browser corresponding to the network request is determined Project operation is correct.
After step S1 and before step S2, the verification method of the present embodiment further includes:
S11:It is configured in the proxy server and presets filtering rule;
S12:The network request is filtered according to the default filtering rule, is asked with the network for obtaining to be verified It asks.
It is worth noting that:Step S11 can also be completed before step S1.
Specifically, step S11 is specially to configure to preset filtering rule in proxy server, for the default filtering rule Then, be PAC files, for being filtered to network request, proxy server is got by the PAC network request into Row filtering, to obtain network request to be verified.
Optionally, the default filtering rule includes target domain name and target component;Under the premise of herein, step S12's is another A kind of realization method is:
It is matched with the domain name of network request and target component got according to the target domain name and target component; According to matching result, determine that corresponding network request is network request to be verified.
Optionally, between step 12 and step 2, the verification method of the network request further includes:
S13:The network request to be verified is stored, for carrying out batch validation by the default proof rule.
Specifically, after filtering is completed, needs to store network request to be verified, one or more can be obtained whereby Network request to be verified.With regard to this, so that it may with being verified to network request to be verified for batch, to can also criticize The business item based on objective browser corresponding to network request to be verified of amount is verified, you can with treating for batch The corresponding network articles based on objective browser of network request of verification are verified, and with regard to this, can effectively improve verification effect Rate.
Fig. 4 is a kind of flow diagram of the verification method of network request of fourth embodiment of the invention, according to Fig.4, this Invention fourth embodiment provides a kind of verification method of network request, is applied to proxy server side, and this method includes:
S1:Obtain the network request that objective browser is sent out;
S2:The network request is verified according to proof rule is preset;
S3:In the case where being verified, the business based on the objective browser corresponding to the network request is determined Project operation is correct.
After step S1 and before step S2, the verification method of the present embodiment further includes:
S11:It is configured in the proxy server and presets filtering rule;
S12:The network request is filtered according to the default filtering rule, is asked with the network for obtaining to be verified It asks.
It is worth noting that:Step S11 can also be completed before step S1.
Specifically, step S11 is specially to configure to preset filtering rule in proxy server, for the default filtering rule Then, be PAC files, for being filtered to network request, proxy server is got by the PAC network request into Row filtering, to obtain network request to be verified.
Optionally, the default filtering rule includes target domain name and target component;Under the premise of herein, step S12's is another A kind of realization method is:
It is matched with the domain name of network request and target component got according to the target domain name and target component; According to matching result, determine that corresponding network request is network request to be verified.
Optionally, the network request to be verified is stored, for carrying out batch validation by the default proof rule.
Optionally, the default proof rule includes targeted parameter value;Under the premise of herein, a kind of realization method of step S2 For:
The foundation is preset proof rule and is verified to the network request, including:
Determine whether the parameter value of the network request to be verified is more than the targeted parameter value;
If so, determining that the business item operation based on the objective browser corresponding to the network request is correct;Otherwise, Determine that the business item operation based on the objective browser corresponding to the network request is incorrect.
In the present embodiment, the network request that objective browser is sent out is intercepted by proxy server, is then led to It crosses proof rule network request verify rather than verify the response message of the network request, you can realize to the net The corresponding business item based on objective browser of network request is verified, also can be to the net based on objective browser with regard to this Whether network project is correctly tested.Moreover, in the present embodiment, proxy server obtains network request automatically, and by generation Reason server verifies network request, so the verification process is automatic, so, also can effectively it improve to network item Purpose testing efficiency.
It is worth noting that, in the prior art, being needed before the charge of target webpage through the net to target webpage The response message of network request is verified so that it is determined that going out the corresponding charge item of response message.And in the present embodiment, Ke Yizhi It connects and the network request is verified, and can determine the charge item in network request whereby, be greatly improved to charge item Confirm efficiency.
Fig. 5 is a kind of flow diagram of the verification device of network request of fifth embodiment of the invention, according to Fig.5, this It invents the 5th embodiment and provides a kind of verification device of network request, be based on proxy server side, described device includes:It obtains Modulus block 10, the network request sent out for obtaining objective browser;Authentication module 11 presets proof rule to institute for foundation Network request is stated to be verified;Determining module 12, in the case where being verified, determining corresponding to the network request Business item operation based on the objective browser is correct.
Optionally, the acquisition module 10 is specifically used for:It obtains the objective browser and is based on automation framework progress in advance If the network request sent out when operation;The predetermined registration operation includes:Open the page, click option, the one kind or more for sliding the page Kind.
Optionally, described device further includes:Filtering rule configuration module, for what is sent out in the acquisition objective browser After network request and the foundation is preset before proof rule verifies the network request, in the agency service It is configured in device and presets filtering rule;Filtering module, for being filtered to the network request according to the default filtering rule, To obtain network request to be verified.
Optionally, the default filtering rule includes target domain name and target component;The filtering module is specifically used for:According to It is matched with the domain name of network request and target component got according to the target domain name and target component;According to matching knot Fruit determines that corresponding network request is network request to be verified.
Optionally, described device further includes:Memory module is used for described according to the default filtering rule to the net Network request be filtered, after obtaining network request to be verified, the foundation preset proof rule to the network request into Before row verification, the network request to be verified is stored, for carrying out batch validation by the default proof rule.
Optionally, the default proof rule includes targeted parameter value;The authentication module 11 is specifically used for:Described in determination Whether the parameter value of network request to be verified is more than the targeted parameter value;If so, determining corresponding to the network request Business item operation based on the objective browser is correct;Otherwise, it determines clear based on the target corresponding to the network request Look at device business item operation it is incorrect.
Sixth embodiment of the invention provides a kind of computer equipment, including memory, processor and is stored in described deposit On reservoir and the computer program that can run on the processor, the processor realize above-mentioned one when executing described program The verification method of kind network request.
Since a kind of verification method of network request being described in detail in first to fourth embodiment, so The implementation process of this method is not carried out repeating elaboration in the present embodiment.
Seventh embodiment of the invention provides a kind of computer readable storage medium, which is characterized in that the computer can It reads storage medium and is stored with one or more program, one or more of programs can be held by one or more processor Row, to realize a kind of verification method of above-mentioned network request.
Since a kind of verification method of network request being described in detail in first to fourth embodiment, so The implementation process of this method is not carried out repeating elaboration in the present embodiment.
It should be noted that herein, the terms "include", "comprise" or its any other variant are intended to non-row His property includes, so that process, method, article or device including a series of elements include not only those elements, and And further include other elements that are not explicitly listed, or further include for this process, method, article or device institute it is intrinsic Element.In the absence of more restrictions, the element limited by sentence "including a ...", it is not excluded that including this There is also other identical elements in the process of element, method, article or device.
The embodiments of the present invention are for illustration only, can not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be understood that above-described embodiment side Method can add the mode of required general hardware platform to realize by software, naturally it is also possible to by hardware, but in many cases The former is more preferably embodiment.Based on this understanding, technical scheme of the present invention substantially in other words does the prior art Going out the part of contribution can be expressed in the form of software products, which is stored in a storage medium In (such as ROM/RAM, magnetic disc, CD), including some instructions are used so that a station terminal (can be mobile phone, computer, service Device, air conditioner or network equipment etc.) execute method described in each embodiment of the present invention.
The embodiment of the present invention is described with above attached drawing, but the invention is not limited in above-mentioned specific Embodiment, the above mentioned embodiment is only schematical, rather than restrictive, those skilled in the art Under the inspiration of the present invention, without breaking away from the scope protected by the purposes and claims of the present invention, it can also make very much Form, all of these belong to the protection of the present invention.

Claims (9)

1. a kind of verification method of network request is applied to proxy server, which is characterized in that the method includes:
Obtain the network request that objective browser is sent out;
The network request is verified according to proof rule is preset;
In the case where being verified, the business item operation based on the objective browser corresponding to the network request is determined Correctly.
2. according to the method described in claim 1, it is characterized in that, the network request for obtaining objective browser and sending out, packet It includes:
Obtain the network request sent out when the objective browser carries out predetermined registration operation based on automation framework;The predetermined registration operation Including:It opens the page, click option, slide the one or more of the page.
3. according to the method described in claim 1, it is characterized in that, the network request that sends out of acquisition objective browser it Afterwards and the foundation is preset before proof rule verifies the network request, the method includes:
It is configured in the proxy server and presets filtering rule;
The network request is filtered according to the default filtering rule, obtains network request to be verified.
4. according to the method described in claim 3, it is characterized in that, the default filtering rule includes target domain name and target ginseng Number;
It is described that the network request is filtered according to the default filtering rule, network request to be verified is obtained, including:
It is matched with the domain name of network request and target component got according to the target domain name and target component;
According to matching result, determine that corresponding network request is network request to be verified.
5. according to the method described in claim 3, it is characterized in that, described ask the network according to the default filtering rule It asks and is filtered, after obtaining network request to be verified, the foundation is preset proof rule and tested the network request Before card, the method further includes:
The network request to be verified is stored, for carrying out batch validation by the default proof rule.
6. according to the method described in claim 3, it is characterized in that, the default proof rule includes targeted parameter value;
The foundation is preset proof rule and is verified to the network request, including:
Determine whether the parameter value of the network request to be verified is more than the targeted parameter value;
If so, determining that the business item operation based on the objective browser corresponding to the network request is correct;Otherwise, it determines The business item operation based on the objective browser corresponding to the network request is incorrect.
7. a kind of verification device of network request, it is applied to proxy server, which is characterized in that described device includes:
Acquisition module, the network request sent out for obtaining objective browser;
Authentication module, for being verified to the network request according to default proof rule;
Determining module, in the case where being verified, determine corresponding to the network request based on the objective browser Business item operation it is correct.
8. a kind of computer equipment, which is characterized in that including memory, processor and be stored on the memory and can be in institute The computer program run on processor is stated, the processor realizes any one of claim 1 to 6 institute when executing described program A kind of verification method for the network request stated.
9. a kind of computer readable storage medium, which is characterized in that the computer-readable recording medium storage there are one or Multiple programs, one or more of programs can be executed by one or more processor, to realize in claim 1 to 6 A kind of verification method of network request of any one of them.
CN201711458481.0A 2017-12-28 2017-12-28 Network request verification method and device, computer equipment and readable storage medium Active CN108322436B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711458481.0A CN108322436B (en) 2017-12-28 2017-12-28 Network request verification method and device, computer equipment and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711458481.0A CN108322436B (en) 2017-12-28 2017-12-28 Network request verification method and device, computer equipment and readable storage medium

Publications (2)

Publication Number Publication Date
CN108322436A true CN108322436A (en) 2018-07-24
CN108322436B CN108322436B (en) 2022-05-31

Family

ID=62893267

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711458481.0A Active CN108322436B (en) 2017-12-28 2017-12-28 Network request verification method and device, computer equipment and readable storage medium

Country Status (1)

Country Link
CN (1) CN108322436B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109460653A (en) * 2018-10-22 2019-03-12 武汉极意网络科技有限公司 Verification method, verifying equipment, storage medium and the device of rule-based engine

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101656711A (en) * 2008-08-22 2010-02-24 中国科学院计算机网络信息中心 System and method for verifying website information
KR20130089700A (en) * 2011-12-29 2013-08-13 엔에이치엔(주) Method, search server and computer readable recording medium for advertising management based on exposure frequency of keyword
CN103984624A (en) * 2014-04-29 2014-08-13 北京京东尚科信息技术有限公司 Automatic testing method and system for webpage
CN104021172A (en) * 2014-05-30 2014-09-03 北京搜狗科技发展有限公司 Advertisement filtering method and advertisement filtering device
CN104572914A (en) * 2014-12-27 2015-04-29 北京奇虎科技有限公司 Method and device for intercepting advertisements of double-core browser
CN105654350A (en) * 2016-01-06 2016-06-08 北京齐尔布莱特科技有限公司 Method for conducting statistics on visual exposure of advertisement
CN105808417A (en) * 2014-12-29 2016-07-27 平安科技(深圳)有限公司 Automated testing method and proxy server
CN106339893A (en) * 2016-08-11 2017-01-18 乐视控股(北京)有限公司 Exposure condition processing method and device of promotion information
CN106528432A (en) * 2016-12-12 2017-03-22 北京三快在线科技有限公司 Construction method and apparatus for test scene data, and buried point test method
CN107133180A (en) * 2017-06-07 2017-09-05 腾讯科技(深圳)有限公司 Method of testing, test device and the storage medium of dynamic page
CN107171889A (en) * 2017-05-27 2017-09-15 北京金山安全软件有限公司 Network application interface test method and device and electronic equipment

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101656711A (en) * 2008-08-22 2010-02-24 中国科学院计算机网络信息中心 System and method for verifying website information
KR20130089700A (en) * 2011-12-29 2013-08-13 엔에이치엔(주) Method, search server and computer readable recording medium for advertising management based on exposure frequency of keyword
CN103984624A (en) * 2014-04-29 2014-08-13 北京京东尚科信息技术有限公司 Automatic testing method and system for webpage
CN104021172A (en) * 2014-05-30 2014-09-03 北京搜狗科技发展有限公司 Advertisement filtering method and advertisement filtering device
CN104572914A (en) * 2014-12-27 2015-04-29 北京奇虎科技有限公司 Method and device for intercepting advertisements of double-core browser
CN105808417A (en) * 2014-12-29 2016-07-27 平安科技(深圳)有限公司 Automated testing method and proxy server
CN105654350A (en) * 2016-01-06 2016-06-08 北京齐尔布莱特科技有限公司 Method for conducting statistics on visual exposure of advertisement
CN106339893A (en) * 2016-08-11 2017-01-18 乐视控股(北京)有限公司 Exposure condition processing method and device of promotion information
CN106528432A (en) * 2016-12-12 2017-03-22 北京三快在线科技有限公司 Construction method and apparatus for test scene data, and buried point test method
CN107171889A (en) * 2017-05-27 2017-09-15 北京金山安全软件有限公司 Network application interface test method and device and electronic equipment
CN107133180A (en) * 2017-06-07 2017-09-05 腾讯科技(深圳)有限公司 Method of testing, test device and the storage medium of dynamic page

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109460653A (en) * 2018-10-22 2019-03-12 武汉极意网络科技有限公司 Verification method, verifying equipment, storage medium and the device of rule-based engine

Also Published As

Publication number Publication date
CN108322436B (en) 2022-05-31

Similar Documents

Publication Publication Date Title
Barse et al. Synthesizing test data for fraud detection systems
CN103607385B (en) Method and apparatus for security detection based on browser
CN105516165B (en) A kind of method illegally acted on behalf of, equipment and the system of identification charging fraud
CN103179132B (en) A kind of method and device detecting and defend CC attack
US8484741B1 (en) Software service to facilitate organizational testing of employees to determine their potential susceptibility to phishing scams
CN104092811B (en) Mobile terminal information download method, system, terminal device and server
CN107341109B (en) Test data generation method and system
CN105357195A (en) Unauthorized web access vulnerability detecting method and device
CN107608874A (en) Method of testing and device
CN106874768A (en) The method and device of penetration testing
CN102365878B (en) Adaptive ambient services
CN106156133A (en) Method that control table substance is submitted to again, Apparatus and system
CN106878108A (en) Network flow playback method of testing and device
CN103229479A (en) Website identification method and device and network system
CN107682361A (en) Website vulnerability scan method, device, computer equipment and storage medium
CN104580230A (en) Website attack verification method and device
CN108206769A (en) Method, apparatus, equipment and the medium of screen quality alarm
WO2016119953A1 (en) Checking system for checking a computer of a computer system in a checking network
CN106651580A (en) Method and device for judging whether financial account is malicious or not, and computing device
CN112817867A (en) Interface test script generation method and device, computer equipment and medium
CN104731937A (en) User behavior data processing method and device
CN108322436A (en) Verification method, device, computer equipment and the readable storage medium storing program for executing of network request
CN104636340A (en) Webpage URL filtering method, device and system
CN106998255A (en) A kind of feedback processing server, network system and feedback method for treating
CN108279970A (en) The switching method and apparatus of browser kernel

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant