CN109947654A - The method and apparatus automatically updated for test case library - Google Patents
The method and apparatus automatically updated for test case library Download PDFInfo
- Publication number
- CN109947654A CN109947654A CN201910242264.0A CN201910242264A CN109947654A CN 109947654 A CN109947654 A CN 109947654A CN 201910242264 A CN201910242264 A CN 201910242264A CN 109947654 A CN109947654 A CN 109947654A
- Authority
- CN
- China
- Prior art keywords
- test
- test case
- description information
- file
- library
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012360 testing method Methods 0.000 title claims abstract description 314
- 238000000034 method Methods 0.000 title claims abstract description 32
- 238000001514 detection method Methods 0.000 claims abstract description 51
- 238000011156 evaluation Methods 0.000 abstract description 3
- 238000005516 engineering process Methods 0.000 description 3
- 239000000284 extract Substances 0.000 description 3
- 238000000605 extraction Methods 0.000 description 3
- 230000008901 benefit Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 230000006399 behavior Effects 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 230000008859 change Effects 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 230000006870 function Effects 0.000 description 1
- 238000013095 identification testing Methods 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 239000000203 mixture Substances 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000008520 organization Effects 0.000 description 1
- 230000003068 static effect Effects 0.000 description 1
Landscapes
- Storage Device Security (AREA)
Abstract
The purpose of the application is to provide a kind of method and apparatus automatically updated for test case library.Compared with prior art, the application tests the identification information of loophole file by obtaining: the identification information based on test loophole file carries out inquiry operation in test case library, determines in the test case library with the presence or absence of the corresponding target detection use-case of test loophole file;When target detection use-case corresponding there is no the test loophole file in the test case library, corresponding test case group in the test case library is written into the test loophole file and generates the target detection use-case.The mode of Auto-matching and importing in this way, test loophole file can be automatically added in test case library, the addition efficiency of test case is improved, our test case library can be timely updated, manpower evaluation cost is greatly reduced and is also avoided that test leakage.
Description
Technical field
This application involves field of computer technology more particularly to a kind of technologies automatically updated for test case library.
Background technique
In the prior art, it is directed to the bug (loophole) found every time as tester, requires test organization's planning time
Periodically to evaluate and manually import test case library or increase test case newly thus and remove covering problem, comes in this way perfect
With healthy and strong test case library, on the one hand this mode very expends the time, if on the other hand new case could not be easy in time
Lead to test leakage, especially for the quick development scheme of present agility, this is a pain spot.
Summary of the invention
The purpose of the application is to provide a kind of method and apparatus automatically updated for test case library.
According to the one aspect of the application, a kind of method automatically updated for test case library is provided, wherein described
Method includes:
Obtain the identification information of test loophole file;
Based on inquiry operation is carried out in test case library, determine in the test case library with the presence or absence of test loophole text
The corresponding target detection use-case of part;
It, will be described when target detection use-case corresponding there is no the test loophole file in the test case library
It tests loophole file and the corresponding test case group generation target detection use-case in the test case library is written.
Further, wherein the method also includes:
When target detection use-case corresponding there are the test loophole file in the test case library, by the survey
The target detection use-case of the example file association on probation into test vulnerability database.
Further, wherein the method also includes:
Source-information is added for the corresponding target detection use-case of the test loophole file.
Further, wherein the identification information includes entry description information, the mark based on test loophole file
Information carries out inquiry operation in test case library, opposite with the presence or absence of test loophole file in the test case library to determine
The target detection use-case answered includes:
Entry description information based on the test loophole file carries out inquiry operation in test case library, determines described
With the presence or absence of the corresponding target detection use-case of test loophole file in test case library.
Further, wherein the entry description information based on the test loophole file is carried out in test case library
Inquiry operation, to determine in the test case library with the presence or absence of the corresponding target detection use-case packet of test loophole file
It includes:
The entry of test case in the entry description information and test case library of the test loophole file is described to believe
Breath carries out Keywords matching;
When the entry of the test case in the entry description information and test case library of the test loophole file describes to believe
When breath carries out crucial word mismatch, determine that there is no the corresponding target detections of the test loophole file in the test case library
Use-case;
When the entry of the test case in the entry description information and test case library of the test loophole file describes to believe
When breath carries out Keywords matching, determine that there are the corresponding target detections of the test loophole file to use in the test case library
Example.
Further, wherein the entry description information include first entry description information, second entry description information and
Third entry description information, wherein the survey by the entry description information and test case library of the test loophole file
The entry description information of example on probation carries out Keywords matching
By first of the test case in the first entry description information and test case library of the test loophole file
Mesh description information carries out Keywords matching;
Test case in the keyword and test case library of the first entry description information of the test loophole file
First entry description information Keywords matching when, by it is described test loophole file second entry description information and test use
The second entry description information of test case in example library carries out Keywords matching;
Test case in the keyword and test case library of the second entry description information of the test loophole file
Second entry description information Keywords matching when, by it is described test loophole file third entry description information and test use
The third entry description information of test case in example library carries out Keywords matching.Compared with prior art, the application is by obtaining
Test loophole file is taken, inquiry operation is carried out in test case library based on the test loophole file, is determined in the test
With the presence or absence of the corresponding target detection use-case of test loophole file in use-case library;When there is no institutes in the test case library
When stating the test corresponding target detection use-case of loophole file, the test loophole file is written in the test case library relatively
The test case group answered generates the target detection use-case.The mode of Auto-matching and importing in this way can will test
Loophole is automatically added in test case library, improves the addition efficiency of test case, can timely update our test
Use-case library greatly reduces manpower evaluation cost and is also avoided that test leakage.
Moreover, the application can also be when there are the corresponding targets of the test loophole file to survey in the test case library
When example on probation, by the target detection use-case of the test loophole file association into the test case library.By this
Mode can be quickly found corresponding test loophole, save the time, improved user's body while checking test case
It tests.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, of the invention other
Feature, objects and advantages will become more apparent upon:
Fig. 1 shows a kind of method flow diagram automatically updated for test case library according to the application one aspect.
The same or similar appended drawing reference represents the same or similar component in attached drawing.
Specific embodiment
Present invention is further described in detail with reference to the accompanying drawing.
In a typical configuration of this application, terminal, the equipment of service network and trusted party include one or more
Processor (CPU), input/output interface, network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or
The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium
Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method
Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data.
The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves
State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable
Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM),
Digital versatile disc (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices or
Any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, computer
Readable medium does not include non-temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
Fig. 1 shows a kind of method automatically updated for test case library provided on one side according to the application, the party
Method executes on the device 1, method includes the following steps:
S11 obtains test loophole file;
S12 is based on test loophole file and carries out inquiry operation in test case library, and determination is in the test case library
It is no to there is the corresponding target detection use-case of test loophole file;
S13 when the corresponding target detection use-case of the test loophole file is not present in the test case library,
The test case about the test loophole is added in the test case library.
In this embodiment, in the step S11, equipment 1 obtains the identification information of test loophole file, here, institute
Stating equipment 1 includes but is not limited to computer, network host, single network server, multiple network server collection or multiple services
The cloud that device is constituted;Here, cloud is made of a large number of computers or network servers based on cloud computing (Cloud Computing),
Wherein, cloud computing is one kind of distributed computing, a virtual supercomputing consisting of a loosely coupled set of computers
Machine.Wherein, the test loophole file includes but is not limited to the bug etc. occurred in system or software program test process.
Specifically, the equipment 1 can carry out the acquisition of test loophole file based on preset time interval, alternatively,
When occurring testing loophole file, system can automatically be reported the test loophole file, wherein the test loophole text
Part includes the file for having test loophole file identification information, for example, equipment 1 can pass through the mark of identification test loophole file
Information tests loophole file to determine, then further obtains the test loophole file.The side of above-mentioned acquisition test loophole file
Formula is only for example, and the mode that loophole file is tested in other acquisitions that are existing or being likely to occur from now on is such as suitable for the application,
It should also be included in the protection scope of the application, here, being incorporated herein by reference.
Continue in this embodiment, in the step S12, based on test loophole file in test case library inquiry
Match, determines and whether there is the corresponding target detection use-case of the test loophole file in the test case library.Wherein, institute
State test case library to store can testing the various use-cases of bug, can be tester pre-set it is various
Use-case can also be the various use-cases being added based on test loophole.Here, the test case can be based on preset rule
It is then stored, for example, the composition format of different test cases can be based on same or different rule.
Preferably, wherein the step S12 includes: that the entry description information based on the test loophole file is being tested
Use-case library carries out inquiry operation, determines in the test case library with the presence or absence of the corresponding target detection of test loophole file
Use-case.
In this embodiment, the entry description information refers to that the item that test case is described, the entry are retouched
Stating information includes but is not limited to functional module, problem overview, problem detailed description etc..It specifically, can be according to the test loophole
Entry description information inquired in the test case library, for example, can be according to functional module in test case library
The same or similar test case corresponding with test loophole file of matching feature module, when in entry description information at least one
Item meets matching condition, corresponding test case can be selected, to carry out judgement further.
Preferably, the entry description information based on the test loophole file carries out inquiry behaviour in test case library
Make, includes: with the presence or absence of the corresponding target detection use-case of test loophole file in the test case library to determine
S121 (not shown) by it is described test loophole file entry description information and test case library in test case
Entry description information carry out keyword match;
S122 (not shown) is when the test case in the entry description information and test case library of the test loophole file
Entry description information crucial word mismatch when, determine in the test case library there is no it is described test loophole test use
Example;
S123 (not shown) is when the test case in the entry description information and test case library of the test loophole file
Entry description information carry out Keywords matching when, determine that there are the test loophole file is corresponding in the test case library
Target detection use-case.
In this embodiment, test loophole phase identical or basic with the entry description information of target detection use-case
Together, the entry description information for testing loophole can be compared with the entry description information of test case, for example, can will retouch
It states the problems in entry information detailed description to be directly compared, when problem detailed description is identical or essentially identical, determination is used in the test
Test case of the discovery about the test loophole in example library;Alternatively, can also will describe entry information in functional module and
Problem detailed description is compared respectively, when both identical or essentially identical, determine and finds to close in the test case library
In the test case of the test loophole.
Preferably, wherein the entry description information includes first entry description information, second entry description information and
Three entry description informations, wherein the step S121 (not shown) includes:
S1211 (not shown) by it is described test loophole file first entry description information and test case library in test
The first entry description information of use-case carries out Keywords matching;
Keyword and test case library of the S1212 (not shown) when the first entry description information of the test loophole file
In test case first entry description information Keywords matching when, by it is described test loophole file second entry describe
The second entry description information of test case in information and test case library carries out Keywords matching;
Keyword and test case library of the S1213 (not shown) when the second entry description information of the test loophole file
In test case second entry description information Keywords matching when, by it is described test loophole file third entry describe
The third entry description information of test case in information and test case library carries out Keywords matching.
In this embodiment, the entry description information of the test loophole can be compared one by one, for example, comparing first
Then the entry description information of higher level compares the other entry description information of next stage, until the entry of all ranks describes
Information comparison is completed, for example, the rank of first entry description information is higher can to carry out keyword to first entry description information
Matching when the matching of first entry description information, then compares second entry description information, then when second entry description information
After matching, then compare third entry description information, until all entry description informations all complete by matching.For example, when entry is retouched
State information include functional module, problem overview, problem be described in detail etc., first can comparing function module, then compare problem overview, most
Comparison problem is described in detail afterwards, completes, and each description entry information is consistent or almost the same, determines when all entry information compare
The target detection use-case about the test loophole is found in the test case library.
In this embodiment, in the comparison process to entry description information, can take extract keyword mode into
Row compares, for example, when entry description information includes functional module, problem overview, problem detailed description etc., wherein problem overview, problem
The descriptive text of the secondary entry information of detailed description etc. may be more, can on possible form of presentation for the same test case
Difference can be had, it is thus impossible to the mode for taking single word to compare, but can be by way of keyword come to these descriptions
Entry is compared, and for primary description entry, can also be compared by way of keyword, pass through pass
The mode that key word extracts, can be improved the accuracy of comparison.Specifically, it for the extraction of keyword, can be carried out based on semantic
It extracts, to ensure the accuracy rate extracted.Here, the mode for keyword extraction is only for example, other are existing or from now on
The mode for the keyword extraction being likely to occur, such as be suitable for the application should also be included in the protection scope of the application, herein with
The mode of reference is incorporated herein.
Continue in this embodiment, in the step S13, is leaked when the test is not present in the test case library
When the corresponding target detection use-case of hole file, corresponding test in the test case library is written into the test loophole file
Use-case group generates the target detection use-case.It is relevant to test loophole file generally for what is be not present in test case library
When target detection use-case, the correspondence test case about the test loophole file can be added in test case library, so as to
In subsequent test or other uses.Specifically, the test loophole can be carried out pair based on the compiling form of test case
That answers writes, and with the format of unified test case, facilitates user to check, here, compiling form specific for test case is not
It limits.
Preferably, wherein the method also includes: S14 (not shown) is that the corresponding target of the test loophole file is surveyed
Example on probation adds source-information.In this embodiment, it is added to when by the target detection use-case about the test loophole file
After in test case library, can also corresponding source-information be added to the target detection use-case, the source-information is to show
The test case is imported from test loophole, so that user understands the source of test case.
Preferably, wherein the method also includes: S15 (not shown) is when there are the surveys in the test case library
When the corresponding target detection use-case of leak test hole file, by the test loophole file association into the test case library described in
Target detection use-case.In this embodiment, the target detection use-case about the test loophole file is added to test case library
In after, can also by it is described about it is described test loophole file target detection use-case be closed with corresponding test loophole file
Connection, so that user can quickly locate corresponding test loophole file, specifically, meeting after seeing the target detection use-case
The corresponding address information of addition test loophole file at the test case, with quick links to the loophole file.
Compared with prior art, the application is being tested by obtaining test loophole file based on the test loophole file
Inquiry operation is carried out in use-case library, is determined and be whether there is the corresponding mesh of the test loophole file in the test case library
Mark test case;It, will when target detection use-case corresponding there is no the test loophole file in the test case library
The test loophole file is written corresponding test case group in the test case library and generates the target detection use-case.It is logical
The mode of such Auto-matching and importing is crossed, test loophole can be automatically added in test case library, improve test
The addition efficiency of use-case can timely update our test case library, greatly reduce manpower evaluation cost and be also avoided that
Test leakage.
Moreover, the application can also be when there are the corresponding targets of the test loophole file to survey in the test case library
When example on probation, by the target detection use-case of the test loophole file association into the test case library.By this
Mode can be quickly found corresponding test loophole, save the time, improved use while checking target detection use-case
Family experience.
In addition, it is stored thereon with computer-readable instruction the embodiment of the present application also provides a kind of computer-readable medium,
The computer-readable instruction can be executed by processor to realize preceding method.
The embodiment of the present application also provides a kind of equipment automatically updated for test case library, wherein the equipment includes:
One or more processors;And
It is stored with the memory of computer-readable instruction, the computer-readable instruction makes the processor when executed
Execute the operation of preceding method.
For example, computer-readable instruction makes one or more of processors when executed: obtaining test loophole;It is based on
Preset matching rule matches the test loophole in test case library, and whether determination finds in the test case library
Test case about the test loophole;When do not found in the test case library about it is described test loophole test use
Example adds the test case about the test loophole in the test case library.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie
In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter
From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power
Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims
Variation is included in the present invention.Any reference signs in the claims should not be construed as limiting the involved claims.This
Outside, it is clear that one word of " comprising " does not exclude other units or steps, and odd number is not excluded for plural number.That states in device claim is multiple
Unit or device can also be implemented through software or hardware by a unit or device.The first, the second equal words are used to table
Show title, and does not indicate any particular order.
Claims (8)
1. a kind of method automatically updated for test case library, wherein the described method includes:
Obtain test loophole file;
Inquiry operation is carried out in test case library based on the test loophole file, whether determination deposits in the test case library
In the corresponding target detection use-case of the test loophole file;
When target detection use-case corresponding there is no the test loophole file in the test case library, by the test
Loophole file is written corresponding test case group in the test case library and generates the target detection use-case.
2. according to the method described in claim 1, wherein, the method also includes:
When target detection use-case corresponding there are the test loophole file in the test case library, the test is leaked
The target detection use-case of the hole file association into the test case library.
3. according to the method described in claim 1, wherein, the method also includes:
Source-information is added for the corresponding target detection use-case of the test loophole file.
4. according to the method in any one of claims 1 to 3, wherein the identification information includes entry description information, institute
It states and inquiry operation is carried out in test case library based on the test loophole file, determination whether there is in the test case library
The corresponding target detection use-case of the test loophole file includes:
Entry description information based on the test loophole file carries out inquiry operation in test case library, to determine in the survey
With the presence or absence of the corresponding target detection use-case of test loophole file in example library on probation.
5. described to be looked into based on the test loophole file in test case library according to the method described in claim 4, wherein
Operation is ask, determines and whether there is the corresponding target detection use-case packet of the test loophole file in the test case library
It includes:
By it is described test loophole file entry description information and test case library in test case entry description information into
Row Keywords matching;
When the entry description information and the entry description information of the test case in test case library of the test loophole file
When crucial word mismatch, determine that there is no the corresponding target detection use-cases of the test loophole file in the test case library.
When it is described test loophole file entry description information and test case library in test case entry description information into
When row Keywords matching, determine that there are the corresponding target detection use-cases of the test loophole file in the test case library.
6. according to the method described in claim 5, the entry description information includes that first entry description information, second entry are retouched
State information and third entry description information, wherein the entry description information and test case by the test loophole file
The entry description information of test case in library carries out Keywords matching
The first entry description information of the test loophole file and the first entry of the test case in test case library are retouched
It states information and carries out Keywords matching;
When the of the test case in the keyword and test case library of the first entry description information of the test loophole file
When the Keywords matching of one entry description information, by the second entry description information and test case library of the test loophole file
In test case second entry description information carry out Keywords matching;
When the of the test case in the keyword and test case library of the second entry description information of the test loophole file
When the Keywords matching of two entry description informations, by the third entry description information and test case library of the test loophole file
In test case third entry description information carry out Keywords matching.
7. a kind of computer-readable medium, is stored thereon with computer-readable instruction, the computer-readable instruction can be processed
Device is executed to realize such as method described in any one of claims 1 to 6.
8. a kind of equipment automatically updated for test case library, wherein the equipment includes:
One or more processors;And
It is stored with the memory of computer-readable instruction, the computer-readable instruction when executed executes the processor
Such as the operation of any one of claims 1 to 6 the method.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910242264.0A CN109947654A (en) | 2019-03-28 | 2019-03-28 | The method and apparatus automatically updated for test case library |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201910242264.0A CN109947654A (en) | 2019-03-28 | 2019-03-28 | The method and apparatus automatically updated for test case library |
Publications (1)
Publication Number | Publication Date |
---|---|
CN109947654A true CN109947654A (en) | 2019-06-28 |
Family
ID=67012168
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201910242264.0A Pending CN109947654A (en) | 2019-03-28 | 2019-03-28 | The method and apparatus automatically updated for test case library |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN109947654A (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112416768A (en) * | 2020-11-20 | 2021-02-26 | 深圳开源互联网安全技术有限公司 | Interactive security vulnerability detection method, system, device and readable storage medium |
CN112597349A (en) * | 2020-12-25 | 2021-04-02 | 中国农业银行股份有限公司 | Method for processing regulation and regulation, and device for acquiring regulation information |
CN113268419A (en) * | 2021-05-19 | 2021-08-17 | 北京金山云网络技术有限公司 | Method, device, equipment and storage medium for generating test case optimization information |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070271252A1 (en) * | 2002-10-31 | 2007-11-22 | Dettinger Richard D | Global query correlation attritubes |
CN103366008A (en) * | 2013-07-22 | 2013-10-23 | 天津汉柏信息技术有限公司 | Resource searching method and device |
CN103473178A (en) * | 2013-09-24 | 2013-12-25 | 上海斐讯数据通信技术有限公司 | Method and system for optimizing testing process execution |
CN104239212A (en) * | 2014-09-28 | 2014-12-24 | 北京国双科技有限公司 | Query method and device of test case and establishment method and device of test case |
CN108647355A (en) * | 2018-05-16 | 2018-10-12 | 平安普惠企业管理有限公司 | Methods of exhibiting, device, equipment and the storage medium of test case |
-
2019
- 2019-03-28 CN CN201910242264.0A patent/CN109947654A/en active Pending
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070271252A1 (en) * | 2002-10-31 | 2007-11-22 | Dettinger Richard D | Global query correlation attritubes |
CN103366008A (en) * | 2013-07-22 | 2013-10-23 | 天津汉柏信息技术有限公司 | Resource searching method and device |
CN103473178A (en) * | 2013-09-24 | 2013-12-25 | 上海斐讯数据通信技术有限公司 | Method and system for optimizing testing process execution |
CN104239212A (en) * | 2014-09-28 | 2014-12-24 | 北京国双科技有限公司 | Query method and device of test case and establishment method and device of test case |
CN108647355A (en) * | 2018-05-16 | 2018-10-12 | 平安普惠企业管理有限公司 | Methods of exhibiting, device, equipment and the storage medium of test case |
Non-Patent Citations (2)
Title |
---|
唐明晔: "测试用例的复用技术的研究", 《数字技术与应用》 * |
徐英等编著: "《装备试验与评价概论》", 31 October 2016 * |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN112416768A (en) * | 2020-11-20 | 2021-02-26 | 深圳开源互联网安全技术有限公司 | Interactive security vulnerability detection method, system, device and readable storage medium |
CN112597349A (en) * | 2020-12-25 | 2021-04-02 | 中国农业银行股份有限公司 | Method for processing regulation and regulation, and device for acquiring regulation information |
CN113268419A (en) * | 2021-05-19 | 2021-08-17 | 北京金山云网络技术有限公司 | Method, device, equipment and storage medium for generating test case optimization information |
CN113268419B (en) * | 2021-05-19 | 2024-04-09 | 北京金山云网络技术有限公司 | Method, device, equipment and storage medium for generating test case optimization information |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US10423726B2 (en) | Machine learning to integrate knowledge and natural language processing | |
US9483648B2 (en) | Security testing for software applications | |
US11650905B2 (en) | Testing source code changes | |
CN109947654A (en) | The method and apparatus automatically updated for test case library | |
CN109359468A (en) | Leak detection method, device and equipment | |
CN107665171A (en) | Automatic regression test method and device | |
CN111046386B (en) | Method and system for dynamically detecting program third-party library and performing security evaluation | |
CN110162971A (en) | A kind of leak detection method of software project, device, storage medium and server | |
US20130311517A1 (en) | Representing Incomplete and Uncertain Information in Graph Data | |
CN106780045A (en) | Policy information corrects method and apparatus | |
CN107943694A (en) | A kind of test data generating method and device | |
Shen et al. | Pareto optimality for sensor placements in a water distribution system | |
CN105760292A (en) | Assertion verification method and device for unit testing | |
Karim et al. | Mining android apps to recommend permissions | |
US10031936B2 (en) | Database table data fabrication | |
US20140280228A1 (en) | Semantic Mapping of Topic Map Meta-Models Identifying Assets and Events to Include Weights | |
US9134975B1 (en) | Determining which computer programs are candidates to be recompiled after application of updates to a compiler | |
WO2023098462A1 (en) | Improving performance of sql execution sequence in production database instance | |
US9405796B2 (en) | Systems and methods for analyzing registrar and hosting provider relationships | |
CN110362569A (en) | The method of calibration and device of tables of data, electronic equipment, storage medium | |
CN110334012A (en) | A kind of methods of risk assessment and device | |
CN107133163A (en) | A kind of method and apparatus for verifying description class API | |
US9740694B2 (en) | Identifying missing content using searcher skill ratings | |
CN110147313A (en) | A kind of log-output method and device | |
US10437710B2 (en) | Code coverage testing utilizing test-to-file maps |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
TA01 | Transfer of patent application right | ||
TA01 | Transfer of patent application right |
Effective date of registration: 20211216 Address after: 200240 building 41, 398 Heqing Road, Minhang District, Shanghai Applicant after: Shanghai Shangxiang Network Technology Co.,Ltd. Address before: 201306 2, building 979, Yun Han Road, mud town, Pudong New Area, Shanghai Applicant before: SHANGHAI LIANSHANG NETWORK TECHNOLOGY Co.,Ltd. |
|
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20190628 |