CN109240914B - Monitoring management method for security test task and terminal equipment - Google Patents

Monitoring management method for security test task and terminal equipment Download PDF

Info

Publication number
CN109240914B
CN109240914B CN201810923988.7A CN201810923988A CN109240914B CN 109240914 B CN109240914 B CN 109240914B CN 201810923988 A CN201810923988 A CN 201810923988A CN 109240914 B CN109240914 B CN 109240914B
Authority
CN
China
Prior art keywords
simulators
simulator
security
unoccupied
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201810923988.7A
Other languages
Chinese (zh)
Other versions
CN109240914A (en
Inventor
席悦洋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui Zhishidai Technology Co ltd
Original Assignee
Anhui Dingli Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui Dingli Network Technology Co ltd filed Critical Anhui Dingli Network Technology Co ltd
Priority to CN201810923988.7A priority Critical patent/CN109240914B/en
Publication of CN109240914A publication Critical patent/CN109240914A/en
Application granted granted Critical
Publication of CN109240914B publication Critical patent/CN109240914B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/30Monitoring
    • G06F11/3051Monitoring arrangements for monitoring the configuration of the computing system or of the computing system component, e.g. monitoring the presence of processing resources, peripherals, I/O links, software programs
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F9/00Arrangements for program control, e.g. control units
    • G06F9/06Arrangements for program control, e.g. control units using stored programs, i.e. using an internal store of processing equipment to receive or retain programs
    • G06F9/46Multiprogramming arrangements
    • G06F9/48Program initiating; Program switching, e.g. by interrupt
    • G06F9/4806Task transfer initiation or dispatching
    • G06F9/4843Task transfer initiation or dispatching by program, e.g. task dispatcher, supervisor, operating system

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Software Systems (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • Debugging And Monitoring (AREA)

Abstract

The application is applicable to the technical field of testing, and provides a monitoring management method and terminal equipment for a security test task, wherein the monitoring management method comprises the following steps: obtaining occupation result information of the simulators, and screening unoccupied simulators based on the occupation result information; determining a target simulator from unoccupied simulators, and distributing a security test task to the target simulator; acquiring application program information of the security test task, and acquiring an installation package of the security test task according to the application program information; controlling the target simulator to install the installation package, and generating an application program of the security test task; after the application program is started, carrying out a security detection flow on the application program in the target simulator; and after the security detection flow is finished, outputting a security test result of the application program. The application improves the test efficiency by realizing automatic test and supporting multiple safety test tasks at the same time.

Description

Monitoring management method for security test task and terminal equipment
Technical Field
The application belongs to the technical field of testing, and particularly relates to a monitoring management method for a safety test task and terminal equipment.
Background
The number of Applications (APP) is increasing with the development of terminal devices, and the security thereof is an object of increasing attention. There is also an increasing demand for security of applications.
At present, a dynamic detection method, such as an Android security vulnerability detection platform, is mainly used for an application program security detection method. However, the current method generally cannot realize an automatic dynamic detection function, does not support multi-task detection, and has low safety detection efficiency.
Disclosure of Invention
In view of the above, the embodiment of the application provides a monitoring management method for a security test task and a terminal device, so as to solve the problem of low security detection efficiency in the prior art.
A first aspect of an embodiment of the present application provides a method for monitoring and managing a security test task, which is applied to a terminal device, where the terminal device runs multiple simulators at the same time, and the method includes:
obtaining occupation result information of the simulators, and screening unoccupied simulators based on the occupation result information;
determining a target simulator from unoccupied simulators, and distributing a security test task to the target simulator;
acquiring application program information of the security test task, and acquiring an installation package of the security test task according to the application program information;
controlling the target simulator to install the installation package, and generating an application program of the security test task;
after the application program is started, carrying out a security detection flow on the application program in the target simulator;
and after the security detection flow is finished, outputting a security test result of the application program.
A second aspect of an embodiment of the present application provides a terminal device, including a memory and a processor, where the memory stores a computer program executable on the processor, and when the processor executes the computer program, the processor implements the following steps:
obtaining occupation result information of the simulators, and screening unoccupied simulators based on the occupation result information;
determining a target simulator from unoccupied simulators, and distributing a security test task to the target simulator;
acquiring application program information of the security test task, and acquiring an installation package of the security test task according to the application program information;
controlling the target simulator to install the installation package, and generating an application program of the security test task;
after the application program is started, carrying out a security detection flow on the application program in the target simulator;
and after the security detection flow is finished, outputting a security test result of the application program.
A third aspect of the embodiments of the present application provides a computer readable storage medium storing a computer program which when executed by a processor performs the steps of:
obtaining occupation result information of the simulators, and screening unoccupied simulators based on the occupation result information;
determining a target simulator from unoccupied simulators, and distributing a security test task to the target simulator;
acquiring application program information of the security test task, and acquiring an installation package of the security test task according to the application program information;
controlling the target simulator to install the installation package, and generating an application program of the security test task;
after the application program is started, carrying out a security detection flow on the application program in the target simulator;
and after the security detection flow is finished, outputting a security test result of the application program.
In the embodiment of the application, the plurality of simulators are operated on the terminal equipment simultaneously to acquire the occupied state information of the simulators, and the safety test task is distributed to the unoccupied simulators, so that the automatic implementation of the safety detection of the application program is realized, and the simultaneous multi-task detection can be realized through the plurality of simulators. In addition, the detection task is distributed to the unoccupied simulator, so that the stability of the terminal equipment is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present application, the drawings that are needed in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
FIG. 1 is a flow chart of an implementation of a method for monitoring and managing security test tasks according to an embodiment of the present application;
FIG. 2 is a flowchart of another method for monitoring and managing security test tasks according to an embodiment of the present application;
FIG. 3 is a flowchart of another method for monitoring and managing security test tasks according to an embodiment of the present application;
FIG. 4 is a flowchart of another method for monitoring and managing security test tasks according to an embodiment of the present application;
FIG. 5 is a block diagram of a security test task monitoring and managing device according to an embodiment of the present application;
FIG. 6 is a block diagram of another security test task monitoring and managing device according to an embodiment of the present application;
FIG. 7 is a block diagram of another security test task monitoring and managing device according to an embodiment of the present application;
FIG. 8 is a block diagram of another security test task monitoring and management device according to an embodiment of the present application;
fig. 9 is a schematic diagram of a terminal device provided in an embodiment of the present application.
Detailed Description
In the following description, for purposes of explanation and not limitation, specific details are set forth such as the particular system architecture, techniques, etc., in order to provide a thorough understanding of the embodiments of the present application. It will be apparent, however, to one skilled in the art that the present application may be practiced in other embodiments that depart from these specific details. In other instances, detailed descriptions of well-known systems, devices, circuits, and methods are omitted so as not to obscure the description of the present application with unnecessary detail.
In order to illustrate the technical scheme of the application, the following description is made by specific examples.
Fig. 1 shows an implementation flow of a method for monitoring and managing a security test task according to an embodiment of the present application, where the method flow includes steps S101 to S106. The monitoring management method is suitable for the situation of monitoring management of the simulator executing the security test task. The monitoring management method is executed by a monitoring management device which is configured at the terminal equipment and can be realized by software and/or hardware. Terminal devices include portable or non-portable terminal devices such as desktop computers, notebook computers, tablet computers (Portable Android Device, PAD), smart phones, and servers. The terminal device operates a plurality of simulators simultaneously. The specific implementation principle of each step is as follows.
S101, obtaining occupied result information of the simulators, and screening unoccupied simulators based on the occupied result information.
Wherein the terminal device operates a plurality of simulators simultaneously. The simulator is a virtual terminal device, such as a virtual machine, in the terminal device for simulating a real hardware terminal device, thereby running an application in the simulator.
The occupancy outcome information includes whether the simulator is marked as occupied. Marking the simulator as occupied when the simulator is assigned a detection task, i.e. not in an idle state; and when the simulator completes the safety test task, releasing the occupied state of the simulator.
And obtaining the occupation result information of the simulators, and screening unoccupied simulators based on the occupation result information.
S102, determining a target simulator from unoccupied simulators, and distributing safety test tasks to the target simulator.
Wherein the target simulator is determined from the unoccupied simulators, the security test task is assigned to the target simulator, and the target simulator assigned with the security test task is marked as occupied. Therefore, when the next safety test task allocation is carried out, the safety test task is not allocated to the occupied simulator any more, and the detection efficiency is improved.
S103, acquiring application program information of the security test task, and acquiring an installation package of the security test task according to the application program information.
The security test task comprises the name of the application program to be tested, and after the security test task is determined, the application program to be tested is determined. The security test task database of the terminal equipment stores a plurality of application program information, and after the security test task is determined, an installation package of the security test task, namely an installation package of an application program to be tested, can be obtained according to the application program information. The application information includes at least an application name, application version information, and an installation package storage path.
According to the embodiment of the application, the installation package of the detection task can be obtained according to the installation package storage path in the application program information, and the application program is installed and started in the simulator, so that the subsequent security detection flow of the application program is carried out.
S104, controlling the target simulator to install the installation package, and generating an application program of the security test task.
S105, after the application program is started, a security detection flow is carried out on the application program in the target simulator.
And sending the safety test data to the application program for operation, and monitoring the safety detection result of the simulator, namely the output result of the simulator, so as to judge whether the application program passes the safety detection according to the output result.
Illustratively, in the running process of the application program, the externally callable component in the application program transmits in the malformed parameter, and the output result after the malformed parameter is received by the monitoring application program is used for obtaining the safety test result of the safety test task. The output log and the file content information of the simulator can be monitored, whether the output log and the file content information are abnormal or not is judged, if so, the existence of security holes of the application program is judged, the external callable component which is currently tested is recorded, and the next external callable component is continuously tested.
S106, outputting a security test result of the application program after the security detection flow is finished.
And after all detection is completed, analyzing the security detection result, analyzing security holes existing in the application program, and summarizing to generate a security test result.
When the safety test result is output, the safety test task of the simulator is completed, and at this time, the occupied state of the simulator is released.
In the embodiment of the application, the plurality of simulators are operated on the terminal equipment simultaneously to acquire the occupied state information of the simulators, and the safety test task is distributed to the unoccupied simulators, so that the automatic implementation of the safety detection of the application program is automatically realized, and the simultaneous multi-task detection can be realized through the plurality of simulators. In addition, the detection task is distributed to the unoccupied simulator, so that the stability of the terminal equipment is improved.
On the basis of the above embodiment, as shown in fig. 2, the present application further provides a method for monitoring and managing a security test task, where the step of initializing a simulator is more than the step S101 on the basis of the above embodiment. This embodiment is the same as the above embodiment and will not be described again, as shown in fig. 2, the monitoring management method includes steps S201 to S207. The specific implementation principle of each step is as follows.
S201, obtaining the initial number of simulators, and starting the simulators with the initial number.
As an embodiment of the application, the initial number of simulators is set and the resident is started according to the load capacity of the terminal equipment and the size of the resources occupied by the simulators. As another embodiment of the present application, the initial number of simulators is empirically set, and is generally estimated according to the number of current detection tasks, and at the same time, starting the initial number of simulators does not occupy all the resources of the terminal device, so as to ensure the stability of the system operation.
In addition, the current load capacity of the terminal device is acquired before the detection task is distributed subsequently, so that whether a new simulator is started or the running simulator is closed is determined. By changing the number of running simulators, the stability of the system is maintained while the detection efficiency is improved, and the following embodiments will not be described in detail, and the descriptions of the simulators are the same as the simulators 101 to 106 in the first embodiment, and the descriptions of the simulators are not described in detail.
The present application also provides a method for monitoring and managing security test tasks based on the embodiment shown in fig. 1 or fig. 2, in which steps of changing the number of running simulators are added based on the embodiment shown in fig. 1 or fig. 2, and stability of the system is maintained while improving detection efficiency, and the embodiment of the present application is illustrated by taking the improvement based on the embodiment shown in fig. 2 as an example, and as shown in fig. 3, the method for monitoring and managing security test tasks includes steps S301 to S308. The specific implementation principle of each step is as follows.
S301, obtaining the initial number of simulators, and starting the simulators with the initial number.
S302, obtaining the occupied result information of the simulators, and screening unoccupied simulators based on the occupied result information.
S303, if the number of the safety test tasks is higher than the number of the unoccupied simulators, determining whether to start a new simulator according to the current load condition of the terminal equipment, and if the current load of the terminal equipment does not reach the preset threshold, starting the new simulator.
And if the current load of the terminal equipment does not reach the preset threshold, namely the load of the terminal equipment is surplus, starting the new simulator so as to increase the unoccupied simulator.
The number of the opened new simulators is determined according to the current load condition of the simulators, and the opened new simulators cannot enable the load of the terminal equipment to be equal to or exceed a preset threshold value, namely the load of the terminal equipment cannot be enabled to be too high. The new simulators are turned on to increase the number of unoccupied simulators, thereby improving the detection efficiency.
The preset threshold is an empirical value, typically expressed as a load capacity of the terminal device, and may be set to a load size of 60% to 85% of the resource occupancy of the terminal device, for example. The present application is not particularly limited thereto.
It should be noted that, according to the current load condition of the terminal device, it is determined whether to start a new simulator, if the current load of the terminal device is equal to or exceeds the preset threshold, the new simulator is not started, i.e. the unoccupied simulator is not added. In addition, if the current load of the terminal equipment exceeds the preset threshold, the process of the unoccupied simulator can be closed, so that the load of the terminal equipment is reduced. According to the embodiment of the application, on one hand, the detection efficiency is improved, and meanwhile, the stability of the system is maintained.
As an embodiment of the present application, if the number of security test tasks is higher than the number of unoccupied simulators by a preset value, it is determined whether to start a new simulator according to the current load condition of the terminal device, and if the current load of the terminal device does not reach the preset threshold, the new simulator is started.
S304, determining a target simulator from unoccupied simulators, and distributing a safety test task to the target simulator.
Wherein determining a target simulator from unoccupied simulators, assigning a security test task to the target simulator, comprises: and determining a target simulator from the unoccupied simulators according to the number of the safety test tasks and the number of the unoccupied simulators, and distributing the safety test tasks to the target simulator.
If the number of the received safety test tasks is N, M unoccupied simulators are provided, wherein M is greater than or equal to N, N target simulators are determined from the unoccupied M simulators and are respectively used for executing N safety test tasks in a safety test task queue, and M and N are positive integers;
if the number of the received safety test tasks is N, the number of the unoccupied simulators is M, wherein M is smaller than N, the unoccupied M simulators are all determined to be target simulators and are respectively used for executing M safety test tasks at the head of a queue in the safety test task queue.
Further, determining N target simulators from the unoccupied M simulators, each for executing N security test tasks in the security test task queue, including:
acquiring resources CPn1, CPn2 and CPnN occupied by each target simulator to execute N security test tasks, wherein CPn1, CPn2 and CPnN represent the resources occupied by the N target simulators to execute 1 st to N security test tasks respectively; n is a positive integer from 1 to N;
based on the resources occupied by N security test tasks respectively executed by N target simulators, generating a resource COST matrix COST;
subtracting the minimum value CPimin of the row where the element (i, j) of the resource COST matrix COST is located and the minimum value CPjmin of the column where the element (i, j) is located to obtain an intermediate COST matrix COST';
covering rows and/or columns of an intermediate cost matrix with a minimum total number of horizontal and vertical lines, thereby covering all elements 0 in the intermediate cost matrix;
determining a smallest element among the uncovered elements;
subtracting the minimum element from each element of the row where the uncovered element is located, and adding the minimum element to each element of the covered column until the element 0 in the intermediate cost matrix can be covered by using N horizontal lines and N vertical lines, namely the minimum total number of the elements is N; at this time, a result COST matrix COST 'is generated, and at least N elements in the result COST matrix COST' are 0;
and obtaining the corresponding relation between the N target simulators and the N safety test tasks according to the element of the resource COST matrix COST corresponding to the element position with the element of 0 in the result COST matrix COST ", thereby determining that the N target simulators are respectively used for executing the N safety test tasks in the safety test task queue.
As an embodiment of the present application, the resulting cost matrix is:
the element positions of element 0 in the result COST matrix COST "are (i, j), i=j, and the elements corresponding to the element positions in the resource COST matrix COST are in turn: CP11, CP22, CPNN, thus, a first target simulator is used to perform a first security test task, a second target simulator is used to perform a second security test task, and so on, an nth simulator is used to perform an nth security test task.
As a further embodiment of the application, the resulting cost matrix is:
the element positions of the element 0 in the result COST matrix COST "are (1, 2), (2, 1), (3, j), (N, N), where j is a positive integer from 1 to N, and the elements corresponding to the element positions in the resource COST matrix COST are sequentially: CP12, CP21, CPNN, thus, a first target simulator is used to perform a second security test task, a second target simulator is used to perform a first security test task, and so on, an nth simulator is used to perform an nth security test task.
By the arrangement, the security test task can be allocated under the condition of least occupied resources so as to execute the security test task, so that the detection efficiency is greatly improved, and the detection efficiency is the same as that of the detection efficiency of the detection method of 103-106 in the first embodiment, and the description is omitted.
The present application also provides a method for monitoring and managing security test tasks based on the embodiment shown in fig. 1, fig. 2 or fig. 3, in which steps of interaction between a terminal device and a web terminal are added based on the embodiment shown in fig. 1, fig. 2 or fig. 3, and the embodiment of the present application is described based on the embodiment shown in fig. 1, and as shown in fig. 4, the method for monitoring and managing security test tasks includes steps S401 to S406. The specific implementation principle of each step is as follows.
S401, obtaining occupied result information of the simulators, and screening unoccupied simulators based on the occupied result information.
S402, determining a target simulator from unoccupied simulators, and distributing security test tasks to the target simulator.
S403, acquiring application program information of the security test task from a security test task database, and acquiring an installation package of the security test task according to the application program information.
The safety test task database is a storage database of safety test task application program information uploaded from the web end, and the safety test task database stores the application program information of the safety test task and is used for being read when the terminal equipment distributes detection tasks to the simulator. The web end may be a user terminal.
S404, controlling the target simulator to install the installation package, and generating an application program of the security test task.
S405, after the application program is started, a security detection flow is carried out on the application program in the target simulator.
S406, after the security detection flow is finished, outputting a security test result of the application program, and storing the security test result in a detection result database for being called and displayed by the web terminal.
In the embodiment of the application, the web end is mainly used for logging in by a user, uploading the application program to be detected and displaying the detection result. The method comprises the steps that a mode of separating a web end from a terminal device executing a monitoring management method is adopted, data are read in a database by the web end and the terminal device, for example, an application program to be detected is stored in a security test task database by the web end, the terminal device automatically reads the application program, after the monitoring management program is operated, an operation result is stored in a detection result database, and the detection result is read by the web end. The security test task database and the detection result database can be databases in the web server. The condition of no mutual call exists between the Web terminal and the terminal equipment, so that the problem of thread blocking of the Web terminal caused by the breakdown of the simulator can be avoided.
Optionally, on the basis of the embodiments described in fig. 1, fig. 2, fig. 3 or fig. 4, after screening out unoccupied simulators, the method further includes: and acquiring the current load condition of the terminal equipment, and ending the process of the unoccupied simulator if the current load of the terminal equipment exceeds a preset threshold value.
After screening the unoccupied simulators, acquiring the current load condition of the terminal equipment, and if the current load of the terminal equipment exceeds a preset threshold, namely the load of the terminal equipment is too high, ending the process of the unoccupied simulators so as to reduce the load of the terminal equipment, thereby further maintaining the stability of the system.
After the process of the unoccupied simulator is finished, the allocation of the detection task is suspended until the simulator releases the occupied state, at this time, the current load condition of the terminal equipment is acquired again, if the current load of the terminal equipment does not reach the preset threshold value, a target simulator is determined from the unoccupied simulator, and a safety test task is allocated to the target simulator.
Optionally, on the basis of the embodiment shown in fig. 1, fig. 2, fig. 3 or fig. 4, after the application program is started, after the security detection process is performed on the application program in the target simulator, the method further includes:
when the safety detection process is not finished within the preset time period or the safety detection process is monitored to generate abnormal error reporting, the safety test task of the target simulator is forcedly finished, the occupied state of the current simulator is released, and whether the target simulator survives is checked; if the target simulator is not viable, the target simulator process is forcefully ended, and a security test task generating an abnormality is marked;
determining whether to start a new simulator according to the current load condition of the terminal equipment, if the current load of the terminal equipment does not reach a preset threshold value, starting the new simulator, and retesting a safety test task marked as abnormal through the new simulator; if the safety test task marked as abnormal results in that the safety detection flow of the new simulator is not finished within the preset time period or an abnormal error is generated, the distribution of the safety test task marked as abnormal is terminated, and feedback information that the safety test task marked as abnormal is the abnormal detection task is fed back.
When the safety detection process is not finished within the preset time, namely the occupied time of the target simulator is too long, or the safety detection process is monitored to generate abnormal error reporting, the safety test task of the target simulator is forcedly finished, the occupied state of the current simulator is released, and whether the target simulator survives is checked; if the target simulator is not viable, the target simulator process is forcedly ended, and the simulator is removed from a simulator list, so that the simulator does not participate in the distribution of subsequent detection tasks, and the security test task generating abnormality is marked. After that, if the current load of the terminal equipment does not reach the preset threshold value, starting a new simulator, and retesting the safety test task marked as abnormal through the new simulator; if the safety test task marked as abnormal again causes the safety detection flow of the new simulator to not end within the preset time period or generates abnormal error reporting, the distribution of the safety test task marked as abnormal is terminated, and feedback information that the safety test task marked as abnormal is the abnormal detection task is fed back. At this time, the abnormality of the detection task is confirmed by two times of detection, thereby improving the detection accuracy.
It should be understood that the sequence number of each step in the foregoing embodiment does not mean that the execution sequence of each process should be determined by the function and the internal logic, and should not limit the implementation process of the embodiment of the present application.
Corresponding to the monitoring management method described in the above embodiments, fig. 5 shows a block diagram of the monitoring management device provided in the embodiment of the present application, and for convenience of explanation, only the portion related to the embodiment of the present application is shown.
Referring to fig. 5, the monitoring management apparatus includes:
the screening module 51 is configured to obtain occupation result information of the simulators, and screen unoccupied simulators based on the occupation result information;
an allocation module 52 for determining a target simulator from unoccupied simulators, allocating a security test task to the target simulator;
the acquiring module 53 is configured to acquire application information of the security test task, and acquire an installation package of the security test task according to the application information;
a generating module 54, configured to control the target simulator to install the installation package, and generate an application program of the security test task;
the security detection module 55 is configured to perform a security detection procedure on the application in the target simulator after the application is started;
and the output module 56 is used for outputting the security test result of the application program after the security detection flow is finished.
Optionally, as shown in fig. 6, the monitoring management device further includes:
an initialization module 50, configured to obtain an initial number of simulators, and turn on the initial number of simulators.
And an ending process module 57, configured to acquire a current load situation of the terminal device, and if the current load of the terminal device exceeds a preset threshold, end the process of the unoccupied simulator.
Optionally, as shown in fig. 7, the monitoring management device further includes:
and the loading module 58 is configured to determine whether to start a new simulator according to the current load situation of the terminal device if the number of security test tasks is higher than the number of unoccupied simulators, and if the current load of the terminal device does not reach the preset threshold, start the new simulator.
Optionally, as shown in fig. 8, the monitoring management device further includes:
the detection module 59 is configured to, when it is detected that the security detection procedure is not finished within a preset duration or it is detected that an abnormal error is generated in the security detection procedure, forcibly end a security test task of the target simulator, release an occupied state of a current simulator, and check whether the target simulator survives; if the target simulator is not viable, the target simulator process is forcefully ended, and a security test task generating an abnormality is marked;
determining whether to start a new simulator according to the current load condition of the terminal equipment, if the current load of the terminal equipment does not reach a preset threshold value, starting the new simulator, and retesting a safety test task marked as abnormal through the new simulator; if the safety test task marked as abnormal results in that the safety detection flow of the new simulator is not finished within the preset time period or an abnormal error is generated, the distribution of the safety test task marked as abnormal is terminated, and feedback information that the safety test task marked as abnormal is the abnormal detection task is fed back.
Fig. 9 is a schematic diagram of a terminal device according to an embodiment of the present application. As shown in fig. 9, the terminal device 9 of this embodiment includes: a processor 90, a memory 91 and a computer program 92, such as a supervisory management program, stored in the memory 91 and executable on the processor 90. The processor 90, when executing the computer program 92, implements the steps in the above-described embodiments of the monitoring management method, such as steps S101 to S106 shown in fig. 1. Alternatively, the processor 90, when executing the computer program 92, performs the functions of the modules/units of the apparatus embodiments described above, such as the functions of the modules 51 to 56 shown in fig. 5.
Illustratively, the computer program 92 may be partitioned into one or more modules/units that are stored in the memory 91 and executed by the processor 90 to complete the present application. The one or more modules/units may be a series of computer program instruction segments capable of performing specific functions describing the execution of the computer program 92 in the terminal device 9.
The terminal device 9 may be a desktop computer, a notebook computer, a PAD, a smart phone, a server, etc. The terminal device 9 may include, but is not limited to, a processor 90, a memory 91. It will be appreciated by those skilled in the art that fig. 9 is merely an example of the terminal device 9 and does not constitute a limitation of the terminal device 9, and may include more or less components than illustrated, or may combine certain components, or different components, e.g., the terminal device may further include an input-output device, a network access device, a bus, etc.
The processor 90 may be a central processing unit (Central Processing Unit, CPU), other general purpose processor, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), off-the-shelf programmable gate array (Field-Programmable Gate Array, FPGA) or other programmable logic device, discrete gate or transistor logic device, discrete hardware components, or the like. A general purpose processor may be a microprocessor or the processor may be any conventional processor or the like.
The memory 91 may be an internal storage unit of the terminal device 9, such as a hard disk or a memory of the terminal device 9. The memory 91 may also be an external storage device of the terminal device 9, such as a plug-in hard disk, a Smart Media Card (SMC), a Secure Digital (SD) Card, a Flash memory Card (Flash Card) or the like, which are provided on the terminal device 9. Further, the memory 91 may also include both an internal storage unit and an external storage device of the terminal device 9. The memory 91 is used for storing the computer program and other programs and data required by the terminal device. The memory 91 may also be used for temporarily storing data that has been output or is to be output.
It will be apparent to those skilled in the art that, for convenience and brevity of description, only the above-described division of the functional units and modules is illustrated, and in practical application, the above-described functional distribution may be performed by different functional units and modules according to needs, i.e. the internal structure of the apparatus is divided into different functional units or modules to perform all or part of the above-described functions. The functional units and modules in the embodiment may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit, where the integrated units may be implemented in a form of hardware or a form of a software functional unit. In addition, the specific names of the functional units and modules are only for distinguishing from each other, and are not used for limiting the protection scope of the present application. The specific working process of the units and modules in the above system may refer to the corresponding process in the foregoing method embodiment, which is not described herein again.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and in part, not described or illustrated in any particular embodiment, reference is made to the related descriptions of other embodiments.
The units described as separate units may or may not be physically separate, and units shown as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units may be selected according to actual needs to achieve the purpose of the solution of this embodiment.
In addition, each functional unit in the embodiments of the present application may be integrated in one processing unit, or each unit may exist alone physically, or two or more units may be integrated in one unit. The integrated units may be implemented in hardware or in software functional units.
The integrated modules/units, if implemented in the form of software functional units and sold or used as stand-alone products, may be stored in a computer readable storage medium. Based on such understanding, the present application may implement all or part of the flow of the method of the above embodiment, or may be implemented by a computer program to instruct related hardware, where the computer program may be stored in a computer readable storage medium, and when the computer program is executed by a processor, the computer program may implement the steps of each of the method embodiments described above.
The above embodiments are only for illustrating the technical solution of the present application, and not for limiting the same; although the application has been described in detail with reference to the foregoing embodiments, it will be understood by those of ordinary skill in the art that: the technical scheme described in the foregoing embodiments can be modified or some technical features thereof can be replaced by equivalents; such modifications and substitutions do not depart from the spirit and scope of the technical solutions of the embodiments of the present application, and are intended to be included in the scope of the present application.

Claims (9)

1. The monitoring management method of the security test task is applied to terminal equipment and is characterized in that the terminal equipment simultaneously operates a plurality of simulators, and the monitoring management method comprises the following steps:
obtaining occupation result information of the simulators, and screening unoccupied simulators based on the occupation result information;
determining a target simulator from unoccupied simulators, assigning a security test task to the target simulator, comprising: if the number of the safety test tasks is N, M unoccupied simulators are provided, wherein M is greater than or equal to N, N target simulators are determined from the unoccupied M simulators and are respectively used for executing N safety test tasks in a safety test task queue, and M and N are positive integers;
acquiring application program information of the security test task, and acquiring an installation package of the security test task according to the application program information;
controlling the target simulator to install the installation package, and generating an application program of the security test task;
after the application program is started, carrying out a security detection flow on the application program in the target simulator;
after the security detection flow is finished, outputting a security test result of the application program;
the determining N target simulators from the unoccupied M simulators is used for executing N security test tasks in the security test task queue, and includes:
acquiring resources CPn1, CPn2 and CPnN occupied by each target simulator to execute N safety test tasks respectively, wherein CPn1, CPn2 and CPnN represent the resources occupied by the N target simulators to execute 1 st to N safety test tasks respectively, and the value of N is a positive integer from 1 to N;
based on the resources occupied by N security test tasks respectively executed by N target simulators, generating a resource COST matrix COST;
subtracting the minimum value CPimin of the row where the resource COST matrix COST is located and the minimum value CPjmin of the column where the resource COST matrix COST is located from each element of the resource COST matrix COST to obtain an intermediate COST matrix COST';
covering rows and/or columns of an intermediate cost matrix with a minimum total number of horizontal and vertical lines, thereby covering all elements 0 in the intermediate cost matrix;
determining a smallest element of the uncovered elements;
subtracting the minimum element from each element of the row where the uncovered element is located, and adding each element of the covered column to the minimum element until element 0 in the intermediate COST matrix can be covered by using N horizontal lines and vertical lines, so as to generate a result COST matrix COST ", wherein at least N elements in the result COST matrix COST" are 0;
and obtaining the corresponding relation between the N target simulators and the N safety test tasks according to the element of the resource COST matrix COST corresponding to the element position with the element of 0 in the result COST matrix COST ", thereby determining that the N target simulators are respectively used for executing the N safety test tasks in the safety test task queue.
2. The method for monitoring and managing as set forth in claim 1, wherein said obtaining the occupation result information of the simulators, before screening out unoccupied simulators based on the occupation result information, further comprises: an initial number of simulators is obtained and the initial number of simulators is started.
3. The monitoring management method according to claim 1 or 2, wherein after screening out unoccupied simulators based on the occupancy result information, further comprising:
if the number of the safety test tasks is higher than the number of the unoccupied simulators, determining whether to start a new simulator according to the current load condition of the terminal equipment, and if the current load of the terminal equipment does not reach a preset threshold value, starting the new simulator.
4. The monitoring and management method according to claim 1 or 2, wherein after the application program is started, after the security detection process is performed on the application program in the target simulator, the method further comprises:
when the safety detection process is not finished within the preset time period or the safety detection process is monitored to generate abnormal error reporting, the safety test task of the target simulator is forcedly finished, the occupied state of the current simulator is released, and whether the target simulator survives is checked; if the state of the target simulator is non-survival, the process of the target simulator is forcedly ended, and a security test task generating abnormality is marked;
determining whether to start a new simulator according to the current load condition of the terminal equipment, if the current load of the terminal equipment does not reach a preset threshold value, starting the new simulator, and retesting a safety test task marked as abnormal through the new simulator;
if the safety test task marked as abnormal results in that the safety detection flow of the new simulator is not finished within the preset time period or an abnormal error is generated, the distribution of the safety test task marked as abnormal is terminated, and feedback information that the safety test task marked as abnormal is the abnormal detection task is fed back.
5. The monitoring management method according to claim 1 or 2, wherein the determining a target simulator from unoccupied simulators, before assigning a security test task to the target simulator, further comprises:
and acquiring the current load condition of the terminal equipment, and ending the process of the unoccupied simulator if the current load of the terminal equipment exceeds a preset threshold value.
6. The monitoring management method according to claim 1 or 2, wherein the determining a target simulator from unoccupied simulators, assigning a security test task to the target simulator, comprises:
and determining a target simulator from the unoccupied simulators according to the number of the safety test tasks and the number of the unoccupied simulators, and distributing the safety test tasks to the target simulator.
7. The method for monitoring and managing as set forth in claim 6, wherein said determining a target simulator from among unoccupied simulators based on the number of security test tasks and the number of unoccupied simulators, assigning security test tasks to the target simulator, further comprises:
if the number of the safety test tasks is N, the number of the unoccupied simulators is M, wherein M is smaller than N, the unoccupied M simulators are all determined to be target simulators and are respectively used for executing M safety test tasks at the head of a queue in the safety test task queue.
8. A terminal device comprising a memory and a processor, said memory storing a computer program executable on said processor, characterized in that said processor, when executing said computer program, performs the steps of:
acquiring occupied result information of whether the simulator is occupied or not, and screening unoccupied simulators based on the occupied result information;
determining a target simulator from unoccupied simulators, assigning a security test task to the target simulator, comprising: if the number of the safety test tasks is N, M unoccupied simulators are provided, wherein M is greater than or equal to N, N target simulators are determined from the unoccupied M simulators and are respectively used for executing N safety test tasks in a safety test task queue, and M and N are positive integers;
acquiring application program information of the security test task, and acquiring an installation package of the security test task according to the application program information;
controlling the target simulator to install the installation package, and generating an application program of the security test task;
after the application program is started, carrying out a security detection flow on the application program in the target simulator;
after the security detection flow is finished, outputting a security test result of the application program;
the determining N target simulators from the unoccupied M simulators is used for executing N security test tasks in the security test task queue, and includes:
acquiring resources CPn1, CPn2 and CPnN occupied by each target simulator to execute N safety test tasks respectively, wherein CPn1, CPn2 and CPnN represent the resources occupied by the N target simulators to execute 1 st to N safety test tasks respectively, and the value of N is a positive integer from 1 to N;
based on the resources occupied by N security test tasks respectively executed by N target simulators, generating a resource COST matrix COST;
subtracting the minimum value CPimin of the row where the resource COST matrix COST is located and the minimum value CPjmin of the column where the resource COST matrix COST is located from each element of the resource COST matrix COST to obtain an intermediate COST matrix COST';
covering rows and/or columns of an intermediate cost matrix with a minimum total number of horizontal and vertical lines, thereby covering all elements 0 in the intermediate cost matrix;
determining a smallest element of the uncovered elements;
subtracting the minimum element from each element of the row where the uncovered element is located, and adding each element of the covered column to the minimum element until element 0 in the intermediate COST matrix can be covered by using N horizontal lines and vertical lines, so as to generate a result COST matrix COST ", wherein at least N elements in the result COST matrix COST" are 0;
and obtaining the corresponding relation between the N target simulators and the N safety test tasks according to the element of the resource COST matrix COST corresponding to the element position with the element of 0 in the result COST matrix COST ", thereby determining that the N target simulators are respectively used for executing the N safety test tasks in the safety test task queue.
9. A computer readable storage medium storing a computer program, characterized in that the computer program when executed by a processor implements the steps of the method according to any one of claims 1 to 7.
CN201810923988.7A 2018-08-14 2018-08-14 Monitoring management method for security test task and terminal equipment Active CN109240914B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201810923988.7A CN109240914B (en) 2018-08-14 2018-08-14 Monitoring management method for security test task and terminal equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201810923988.7A CN109240914B (en) 2018-08-14 2018-08-14 Monitoring management method for security test task and terminal equipment

Publications (2)

Publication Number Publication Date
CN109240914A CN109240914A (en) 2019-01-18
CN109240914B true CN109240914B (en) 2023-12-08

Family

ID=65071067

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201810923988.7A Active CN109240914B (en) 2018-08-14 2018-08-14 Monitoring management method for security test task and terminal equipment

Country Status (1)

Country Link
CN (1) CN109240914B (en)

Families Citing this family (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111950821B (en) * 2019-05-15 2023-07-25 腾讯科技(深圳)有限公司 Test method, device and server
TWI709308B (en) * 2019-07-22 2020-11-01 思銳科技股份有限公司 Time control method and system on network simulator platform
CN111459833B (en) * 2020-04-13 2021-01-29 大汉软件股份有限公司 Method for realizing multi-terminal multi-platform automatic test and monitoring of mobile terminal of government and enterprise

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014006693A1 (en) * 2012-07-03 2014-01-09 株式会社日立製作所 Malfunction influence evaluation system and evaluation method
CN104050076A (en) * 2013-03-12 2014-09-17 阿里巴巴集团控股有限公司 Testing method, device and system of application software on mobile terminal
CN104978263A (en) * 2014-04-09 2015-10-14 腾讯科技(深圳)有限公司 Mobile terminal application program test method and mobile terminal application program test system
CN105787364A (en) * 2014-12-23 2016-07-20 深圳市腾讯计算机系统有限公司 Automated testing method, device and system for task
US9589085B1 (en) * 2014-12-03 2017-03-07 Cadence Design Systems, Inc. Systems and methods for viewing analog simulation check violations in an electronic design automation framework

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014006693A1 (en) * 2012-07-03 2014-01-09 株式会社日立製作所 Malfunction influence evaluation system and evaluation method
CN104050076A (en) * 2013-03-12 2014-09-17 阿里巴巴集团控股有限公司 Testing method, device and system of application software on mobile terminal
CN104978263A (en) * 2014-04-09 2015-10-14 腾讯科技(深圳)有限公司 Mobile terminal application program test method and mobile terminal application program test system
US9589085B1 (en) * 2014-12-03 2017-03-07 Cadence Design Systems, Inc. Systems and methods for viewing analog simulation check violations in an electronic design automation framework
CN105787364A (en) * 2014-12-23 2016-07-20 深圳市腾讯计算机系统有限公司 Automated testing method, device and system for task

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
Kinematic calibration analysis of 3SPS+1PS bionic parallel test platform for hip joint simulator;Gang Cheng等;《 Measurement》;4152-4160 *

Also Published As

Publication number Publication date
CN109240914A (en) 2019-01-18

Similar Documents

Publication Publication Date Title
CN109936604B (en) Resource scheduling method, device and system
CN111625452A (en) Flow playback method and system
CN109240914B (en) Monitoring management method for security test task and terminal equipment
CN110457197B (en) Service testing method, device, computer equipment and storage medium
CN109814910A (en) Automate gray scale dissemination method, device, computer system and storage medium
WO2017166643A1 (en) Method and device for quantifying task resources
US20140047115A1 (en) Immediately launching applications
US20130219227A1 (en) Multi-Entity Test Case Execution Workflow
US20090172372A1 (en) Methods and apparatus for generating system management interrupts
CN110677453A (en) ZooKeeper-based distributed lock service implementation method, device, equipment and storage medium
CN111258913A (en) Automatic algorithm testing method and device, computer system and readable storage medium
CN115328752B (en) Cluster simulation method and system for Kubernetes control plane test
CN111736957A (en) Multi-type service mixed deployment method, device, equipment and storage medium
CN110262878A (en) Timed task processing method, device, equipment and computer readable storage medium
CN114629960B (en) Resource scheduling method, device, system, equipment, medium and program product
CN111124772A (en) Cloud platform storage performance testing method, system, terminal and storage medium
CN108280024B (en) Flow distribution strategy testing method and device and electronic equipment
US20220206836A1 (en) Method and Apparatus for Processing Virtual Machine Migration, Method and Apparatus for Generating Virtual Machine Migration Strategy, Device and Storage Medium
CN112256588A (en) Resource allocation method for application program test, computer readable storage medium and tester
CN106330595B (en) Heartbeat detection method and device for distributed platform
CN109040491B (en) Hanging-up behavior processing method and device, computer equipment and storage medium
CN115858114A (en) Scheduling method and device of idle task, electronic equipment and readable storage medium
CN114328196A (en) Method, device and equipment for testing data leakage prevention system and storage medium
CN115237441A (en) Upgrade test method, device and medium based on cloud platform
Liu et al. A concurrent approach for improving the efficiency of Android CTS testing

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right

Effective date of registration: 20231113

Address after: 230000 second floor, building 8, big data Industrial Park, Luyang District, Hefei City, Anhui Province

Applicant after: ANHUI DINGLI NETWORK TECHNOLOGY Co.,Ltd.

Address before: 518000 Room 202, block B, aerospace micromotor building, No.7, Langshan No.2 Road, Xili street, Nanshan District, Shenzhen City, Guangdong Province

Applicant before: Shenzhen LIAN intellectual property service center

Effective date of registration: 20231113

Address after: 518000 Room 202, block B, aerospace micromotor building, No.7, Langshan No.2 Road, Xili street, Nanshan District, Shenzhen City, Guangdong Province

Applicant after: Shenzhen LIAN intellectual property service center

Address before: 518000 Room 201, building A, No. 1, Qian Wan Road, Qianhai Shenzhen Hong Kong cooperation zone, Shenzhen, Guangdong (Shenzhen Qianhai business secretary Co., Ltd.)

Applicant before: PING AN PUHUI ENTERPRISE MANAGEMENT Co.,Ltd.

TA01 Transfer of patent application right
GR01 Patent grant
GR01 Patent grant
TR01 Transfer of patent right

Effective date of registration: 20240113

Address after: 230000, 3rd floor, Block D, Artificial Intelligence Building, Phase III, Independent Innovation Industrial Base, Shushan District Economic Development Zone, Hefei City, Anhui Province

Patentee after: Anhui zhishidai Technology Co.,Ltd.

Address before: 230000 second floor, building 8, big data Industrial Park, Luyang District, Hefei City, Anhui Province

Patentee before: ANHUI DINGLI NETWORK TECHNOLOGY Co.,Ltd.

TR01 Transfer of patent right