CN109947654A - The method and apparatus automatically updated for test case library - Google Patents

The method and apparatus automatically updated for test case library Download PDF

Info

Publication number
CN109947654A
CN109947654A CN201910242264.0A CN201910242264A CN109947654A CN 109947654 A CN109947654 A CN 109947654A CN 201910242264 A CN201910242264 A CN 201910242264A CN 109947654 A CN109947654 A CN 109947654A
Authority
CN
China
Prior art keywords
test
test case
description information
file
library
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910242264.0A
Other languages
Chinese (zh)
Inventor
陈大年
李佩
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Shangxiang Network Technology Co.,Ltd.
Original Assignee
Shanghai Lianshang Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shanghai Lianshang Network Technology Co Ltd filed Critical Shanghai Lianshang Network Technology Co Ltd
Priority to CN201910242264.0A priority Critical patent/CN109947654A/en
Publication of CN109947654A publication Critical patent/CN109947654A/en
Pending legal-status Critical Current

Links

Landscapes

  • Storage Device Security (AREA)

Abstract

The purpose of the application is to provide a kind of method and apparatus automatically updated for test case library.Compared with prior art, the application tests the identification information of loophole file by obtaining: the identification information based on test loophole file carries out inquiry operation in test case library, determines in the test case library with the presence or absence of the corresponding target detection use-case of test loophole file;When target detection use-case corresponding there is no the test loophole file in the test case library, corresponding test case group in the test case library is written into the test loophole file and generates the target detection use-case.The mode of Auto-matching and importing in this way, test loophole file can be automatically added in test case library, the addition efficiency of test case is improved, our test case library can be timely updated, manpower evaluation cost is greatly reduced and is also avoided that test leakage.

Description

The method and apparatus automatically updated for test case library
Technical field
This application involves field of computer technology more particularly to a kind of technologies automatically updated for test case library.
Background technique
In the prior art, it is directed to the bug (loophole) found every time as tester, requires test organization's planning time Periodically to evaluate and manually import test case library or increase test case newly thus and remove covering problem, comes in this way perfect With healthy and strong test case library, on the one hand this mode very expends the time, if on the other hand new case could not be easy in time Lead to test leakage, especially for the quick development scheme of present agility, this is a pain spot.
Summary of the invention
The purpose of the application is to provide a kind of method and apparatus automatically updated for test case library.
According to the one aspect of the application, a kind of method automatically updated for test case library is provided, wherein described Method includes:
Obtain the identification information of test loophole file;
Based on inquiry operation is carried out in test case library, determine in the test case library with the presence or absence of test loophole text The corresponding target detection use-case of part;
It, will be described when target detection use-case corresponding there is no the test loophole file in the test case library It tests loophole file and the corresponding test case group generation target detection use-case in the test case library is written.
Further, wherein the method also includes:
When target detection use-case corresponding there are the test loophole file in the test case library, by the survey The target detection use-case of the example file association on probation into test vulnerability database.
Further, wherein the method also includes:
Source-information is added for the corresponding target detection use-case of the test loophole file.
Further, wherein the identification information includes entry description information, the mark based on test loophole file Information carries out inquiry operation in test case library, opposite with the presence or absence of test loophole file in the test case library to determine The target detection use-case answered includes:
Entry description information based on the test loophole file carries out inquiry operation in test case library, determines described With the presence or absence of the corresponding target detection use-case of test loophole file in test case library.
Further, wherein the entry description information based on the test loophole file is carried out in test case library Inquiry operation, to determine in the test case library with the presence or absence of the corresponding target detection use-case packet of test loophole file It includes:
The entry of test case in the entry description information and test case library of the test loophole file is described to believe Breath carries out Keywords matching;
When the entry of the test case in the entry description information and test case library of the test loophole file describes to believe When breath carries out crucial word mismatch, determine that there is no the corresponding target detections of the test loophole file in the test case library Use-case;
When the entry of the test case in the entry description information and test case library of the test loophole file describes to believe When breath carries out Keywords matching, determine that there are the corresponding target detections of the test loophole file to use in the test case library Example.
Further, wherein the entry description information include first entry description information, second entry description information and Third entry description information, wherein the survey by the entry description information and test case library of the test loophole file The entry description information of example on probation carries out Keywords matching
By first of the test case in the first entry description information and test case library of the test loophole file Mesh description information carries out Keywords matching;
Test case in the keyword and test case library of the first entry description information of the test loophole file First entry description information Keywords matching when, by it is described test loophole file second entry description information and test use The second entry description information of test case in example library carries out Keywords matching;
Test case in the keyword and test case library of the second entry description information of the test loophole file Second entry description information Keywords matching when, by it is described test loophole file third entry description information and test use The third entry description information of test case in example library carries out Keywords matching.Compared with prior art, the application is by obtaining Test loophole file is taken, inquiry operation is carried out in test case library based on the test loophole file, is determined in the test With the presence or absence of the corresponding target detection use-case of test loophole file in use-case library;When there is no institutes in the test case library When stating the test corresponding target detection use-case of loophole file, the test loophole file is written in the test case library relatively The test case group answered generates the target detection use-case.The mode of Auto-matching and importing in this way can will test Loophole is automatically added in test case library, improves the addition efficiency of test case, can timely update our test Use-case library greatly reduces manpower evaluation cost and is also avoided that test leakage.
Moreover, the application can also be when there are the corresponding targets of the test loophole file to survey in the test case library When example on probation, by the target detection use-case of the test loophole file association into the test case library.By this Mode can be quickly found corresponding test loophole, save the time, improved user's body while checking test case It tests.
Detailed description of the invention
By reading a detailed description of non-restrictive embodiments in the light of the attached drawings below, of the invention other Feature, objects and advantages will become more apparent upon:
Fig. 1 shows a kind of method flow diagram automatically updated for test case library according to the application one aspect.
The same or similar appended drawing reference represents the same or similar component in attached drawing.
Specific embodiment
Present invention is further described in detail with reference to the accompanying drawing.
In a typical configuration of this application, terminal, the equipment of service network and trusted party include one or more Processor (CPU), input/output interface, network interface and memory.
Memory may include the non-volatile memory in computer-readable medium, random access memory (RAM) and/or The forms such as Nonvolatile memory, such as read-only memory (ROM) or flash memory (flash RAM).Memory is computer-readable medium Example.
Computer-readable medium includes permanent and non-permanent, removable and non-removable media can be by any method Or technology come realize information store.Information can be computer readable instructions, data structure, the module of program or other data. The example of the storage medium of computer includes, but are not limited to phase change memory (PRAM), static random access memory (SRAM), moves State random access memory (DRAM), other kinds of random access memory (RAM), read-only memory (ROM), electric erasable Programmable read only memory (EEPROM), flash memory or other memory techniques, read-only disc read only memory (CD-ROM) (CD-ROM), Digital versatile disc (DVD) or other optical storage, magnetic cassettes, magnetic tape disk storage or other magnetic storage devices or Any other non-transmission medium, can be used for storage can be accessed by a computing device information.As defined in this article, computer Readable medium does not include non-temporary computer readable media (transitory media), such as the data-signal and carrier wave of modulation.
Fig. 1 shows a kind of method automatically updated for test case library provided on one side according to the application, the party Method executes on the device 1, method includes the following steps:
S11 obtains test loophole file;
S12 is based on test loophole file and carries out inquiry operation in test case library, and determination is in the test case library It is no to there is the corresponding target detection use-case of test loophole file;
S13 when the corresponding target detection use-case of the test loophole file is not present in the test case library, The test case about the test loophole is added in the test case library.
In this embodiment, in the step S11, equipment 1 obtains the identification information of test loophole file, here, institute Stating equipment 1 includes but is not limited to computer, network host, single network server, multiple network server collection or multiple services The cloud that device is constituted;Here, cloud is made of a large number of computers or network servers based on cloud computing (Cloud Computing), Wherein, cloud computing is one kind of distributed computing, a virtual supercomputing consisting of a loosely coupled set of computers Machine.Wherein, the test loophole file includes but is not limited to the bug etc. occurred in system or software program test process.
Specifically, the equipment 1 can carry out the acquisition of test loophole file based on preset time interval, alternatively, When occurring testing loophole file, system can automatically be reported the test loophole file, wherein the test loophole text Part includes the file for having test loophole file identification information, for example, equipment 1 can pass through the mark of identification test loophole file Information tests loophole file to determine, then further obtains the test loophole file.The side of above-mentioned acquisition test loophole file Formula is only for example, and the mode that loophole file is tested in other acquisitions that are existing or being likely to occur from now on is such as suitable for the application, It should also be included in the protection scope of the application, here, being incorporated herein by reference.
Continue in this embodiment, in the step S12, based on test loophole file in test case library inquiry Match, determines and whether there is the corresponding target detection use-case of the test loophole file in the test case library.Wherein, institute State test case library to store can testing the various use-cases of bug, can be tester pre-set it is various Use-case can also be the various use-cases being added based on test loophole.Here, the test case can be based on preset rule It is then stored, for example, the composition format of different test cases can be based on same or different rule.
Preferably, wherein the step S12 includes: that the entry description information based on the test loophole file is being tested Use-case library carries out inquiry operation, determines in the test case library with the presence or absence of the corresponding target detection of test loophole file Use-case.
In this embodiment, the entry description information refers to that the item that test case is described, the entry are retouched Stating information includes but is not limited to functional module, problem overview, problem detailed description etc..It specifically, can be according to the test loophole Entry description information inquired in the test case library, for example, can be according to functional module in test case library The same or similar test case corresponding with test loophole file of matching feature module, when in entry description information at least one Item meets matching condition, corresponding test case can be selected, to carry out judgement further.
Preferably, the entry description information based on the test loophole file carries out inquiry behaviour in test case library Make, includes: with the presence or absence of the corresponding target detection use-case of test loophole file in the test case library to determine
S121 (not shown) by it is described test loophole file entry description information and test case library in test case Entry description information carry out keyword match;
S122 (not shown) is when the test case in the entry description information and test case library of the test loophole file Entry description information crucial word mismatch when, determine in the test case library there is no it is described test loophole test use Example;
S123 (not shown) is when the test case in the entry description information and test case library of the test loophole file Entry description information carry out Keywords matching when, determine that there are the test loophole file is corresponding in the test case library Target detection use-case.
In this embodiment, test loophole phase identical or basic with the entry description information of target detection use-case Together, the entry description information for testing loophole can be compared with the entry description information of test case, for example, can will retouch It states the problems in entry information detailed description to be directly compared, when problem detailed description is identical or essentially identical, determination is used in the test Test case of the discovery about the test loophole in example library;Alternatively, can also will describe entry information in functional module and Problem detailed description is compared respectively, when both identical or essentially identical, determine and finds to close in the test case library In the test case of the test loophole.
Preferably, wherein the entry description information includes first entry description information, second entry description information and Three entry description informations, wherein the step S121 (not shown) includes:
S1211 (not shown) by it is described test loophole file first entry description information and test case library in test The first entry description information of use-case carries out Keywords matching;
Keyword and test case library of the S1212 (not shown) when the first entry description information of the test loophole file In test case first entry description information Keywords matching when, by it is described test loophole file second entry describe The second entry description information of test case in information and test case library carries out Keywords matching;
Keyword and test case library of the S1213 (not shown) when the second entry description information of the test loophole file In test case second entry description information Keywords matching when, by it is described test loophole file third entry describe The third entry description information of test case in information and test case library carries out Keywords matching.
In this embodiment, the entry description information of the test loophole can be compared one by one, for example, comparing first Then the entry description information of higher level compares the other entry description information of next stage, until the entry of all ranks describes Information comparison is completed, for example, the rank of first entry description information is higher can to carry out keyword to first entry description information Matching when the matching of first entry description information, then compares second entry description information, then when second entry description information After matching, then compare third entry description information, until all entry description informations all complete by matching.For example, when entry is retouched State information include functional module, problem overview, problem be described in detail etc., first can comparing function module, then compare problem overview, most Comparison problem is described in detail afterwards, completes, and each description entry information is consistent or almost the same, determines when all entry information compare The target detection use-case about the test loophole is found in the test case library.
In this embodiment, in the comparison process to entry description information, can take extract keyword mode into Row compares, for example, when entry description information includes functional module, problem overview, problem detailed description etc., wherein problem overview, problem The descriptive text of the secondary entry information of detailed description etc. may be more, can on possible form of presentation for the same test case Difference can be had, it is thus impossible to the mode for taking single word to compare, but can be by way of keyword come to these descriptions Entry is compared, and for primary description entry, can also be compared by way of keyword, pass through pass The mode that key word extracts, can be improved the accuracy of comparison.Specifically, it for the extraction of keyword, can be carried out based on semantic It extracts, to ensure the accuracy rate extracted.Here, the mode for keyword extraction is only for example, other are existing or from now on The mode for the keyword extraction being likely to occur, such as be suitable for the application should also be included in the protection scope of the application, herein with The mode of reference is incorporated herein.
Continue in this embodiment, in the step S13, is leaked when the test is not present in the test case library When the corresponding target detection use-case of hole file, corresponding test in the test case library is written into the test loophole file Use-case group generates the target detection use-case.It is relevant to test loophole file generally for what is be not present in test case library When target detection use-case, the correspondence test case about the test loophole file can be added in test case library, so as to In subsequent test or other uses.Specifically, the test loophole can be carried out pair based on the compiling form of test case That answers writes, and with the format of unified test case, facilitates user to check, here, compiling form specific for test case is not It limits.
Preferably, wherein the method also includes: S14 (not shown) is that the corresponding target of the test loophole file is surveyed Example on probation adds source-information.In this embodiment, it is added to when by the target detection use-case about the test loophole file After in test case library, can also corresponding source-information be added to the target detection use-case, the source-information is to show The test case is imported from test loophole, so that user understands the source of test case.
Preferably, wherein the method also includes: S15 (not shown) is when there are the surveys in the test case library When the corresponding target detection use-case of leak test hole file, by the test loophole file association into the test case library described in Target detection use-case.In this embodiment, the target detection use-case about the test loophole file is added to test case library In after, can also by it is described about it is described test loophole file target detection use-case be closed with corresponding test loophole file Connection, so that user can quickly locate corresponding test loophole file, specifically, meeting after seeing the target detection use-case The corresponding address information of addition test loophole file at the test case, with quick links to the loophole file.
Compared with prior art, the application is being tested by obtaining test loophole file based on the test loophole file Inquiry operation is carried out in use-case library, is determined and be whether there is the corresponding mesh of the test loophole file in the test case library Mark test case;It, will when target detection use-case corresponding there is no the test loophole file in the test case library The test loophole file is written corresponding test case group in the test case library and generates the target detection use-case.It is logical The mode of such Auto-matching and importing is crossed, test loophole can be automatically added in test case library, improve test The addition efficiency of use-case can timely update our test case library, greatly reduce manpower evaluation cost and be also avoided that Test leakage.
Moreover, the application can also be when there are the corresponding targets of the test loophole file to survey in the test case library When example on probation, by the target detection use-case of the test loophole file association into the test case library.By this Mode can be quickly found corresponding test loophole, save the time, improved use while checking target detection use-case Family experience.
In addition, it is stored thereon with computer-readable instruction the embodiment of the present application also provides a kind of computer-readable medium, The computer-readable instruction can be executed by processor to realize preceding method.
The embodiment of the present application also provides a kind of equipment automatically updated for test case library, wherein the equipment includes:
One or more processors;And
It is stored with the memory of computer-readable instruction, the computer-readable instruction makes the processor when executed Execute the operation of preceding method.
For example, computer-readable instruction makes one or more of processors when executed: obtaining test loophole;It is based on Preset matching rule matches the test loophole in test case library, and whether determination finds in the test case library Test case about the test loophole;When do not found in the test case library about it is described test loophole test use Example adds the test case about the test loophole in the test case library.
It is obvious to a person skilled in the art that invention is not limited to the details of the above exemplary embodiments, Er Qie In the case where without departing substantially from spirit or essential attributes of the invention, the present invention can be realized in other specific forms.Therefore, no matter From the point of view of which point, the present embodiments are to be considered as illustrative and not restrictive, and the scope of the present invention is by appended power Benefit requires rather than above description limits, it is intended that all by what is fallen within the meaning and scope of the equivalent elements of the claims Variation is included in the present invention.Any reference signs in the claims should not be construed as limiting the involved claims.This Outside, it is clear that one word of " comprising " does not exclude other units or steps, and odd number is not excluded for plural number.That states in device claim is multiple Unit or device can also be implemented through software or hardware by a unit or device.The first, the second equal words are used to table Show title, and does not indicate any particular order.

Claims (8)

1. a kind of method automatically updated for test case library, wherein the described method includes:
Obtain test loophole file;
Inquiry operation is carried out in test case library based on the test loophole file, whether determination deposits in the test case library In the corresponding target detection use-case of the test loophole file;
When target detection use-case corresponding there is no the test loophole file in the test case library, by the test Loophole file is written corresponding test case group in the test case library and generates the target detection use-case.
2. according to the method described in claim 1, wherein, the method also includes:
When target detection use-case corresponding there are the test loophole file in the test case library, the test is leaked The target detection use-case of the hole file association into the test case library.
3. according to the method described in claim 1, wherein, the method also includes:
Source-information is added for the corresponding target detection use-case of the test loophole file.
4. according to the method in any one of claims 1 to 3, wherein the identification information includes entry description information, institute It states and inquiry operation is carried out in test case library based on the test loophole file, determination whether there is in the test case library The corresponding target detection use-case of the test loophole file includes:
Entry description information based on the test loophole file carries out inquiry operation in test case library, to determine in the survey With the presence or absence of the corresponding target detection use-case of test loophole file in example library on probation.
5. described to be looked into based on the test loophole file in test case library according to the method described in claim 4, wherein Operation is ask, determines and whether there is the corresponding target detection use-case packet of the test loophole file in the test case library It includes:
By it is described test loophole file entry description information and test case library in test case entry description information into Row Keywords matching;
When the entry description information and the entry description information of the test case in test case library of the test loophole file When crucial word mismatch, determine that there is no the corresponding target detection use-cases of the test loophole file in the test case library.
When it is described test loophole file entry description information and test case library in test case entry description information into When row Keywords matching, determine that there are the corresponding target detection use-cases of the test loophole file in the test case library.
6. according to the method described in claim 5, the entry description information includes that first entry description information, second entry are retouched State information and third entry description information, wherein the entry description information and test case by the test loophole file The entry description information of test case in library carries out Keywords matching
The first entry description information of the test loophole file and the first entry of the test case in test case library are retouched It states information and carries out Keywords matching;
When the of the test case in the keyword and test case library of the first entry description information of the test loophole file When the Keywords matching of one entry description information, by the second entry description information and test case library of the test loophole file In test case second entry description information carry out Keywords matching;
When the of the test case in the keyword and test case library of the second entry description information of the test loophole file When the Keywords matching of two entry description informations, by the third entry description information and test case library of the test loophole file In test case third entry description information carry out Keywords matching.
7. a kind of computer-readable medium, is stored thereon with computer-readable instruction, the computer-readable instruction can be processed Device is executed to realize such as method described in any one of claims 1 to 6.
8. a kind of equipment automatically updated for test case library, wherein the equipment includes:
One or more processors;And
It is stored with the memory of computer-readable instruction, the computer-readable instruction when executed executes the processor Such as the operation of any one of claims 1 to 6 the method.
CN201910242264.0A 2019-03-28 2019-03-28 The method and apparatus automatically updated for test case library Pending CN109947654A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910242264.0A CN109947654A (en) 2019-03-28 2019-03-28 The method and apparatus automatically updated for test case library

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910242264.0A CN109947654A (en) 2019-03-28 2019-03-28 The method and apparatus automatically updated for test case library

Publications (1)

Publication Number Publication Date
CN109947654A true CN109947654A (en) 2019-06-28

Family

ID=67012168

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910242264.0A Pending CN109947654A (en) 2019-03-28 2019-03-28 The method and apparatus automatically updated for test case library

Country Status (1)

Country Link
CN (1) CN109947654A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112416768A (en) * 2020-11-20 2021-02-26 深圳开源互联网安全技术有限公司 Interactive security vulnerability detection method, system, device and readable storage medium
CN112597349A (en) * 2020-12-25 2021-04-02 中国农业银行股份有限公司 Method for processing regulation and regulation, and device for acquiring regulation information
CN113268419A (en) * 2021-05-19 2021-08-17 北京金山云网络技术有限公司 Method, device, equipment and storage medium for generating test case optimization information

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070271252A1 (en) * 2002-10-31 2007-11-22 Dettinger Richard D Global query correlation attritubes
CN103366008A (en) * 2013-07-22 2013-10-23 天津汉柏信息技术有限公司 Resource searching method and device
CN103473178A (en) * 2013-09-24 2013-12-25 上海斐讯数据通信技术有限公司 Method and system for optimizing testing process execution
CN104239212A (en) * 2014-09-28 2014-12-24 北京国双科技有限公司 Query method and device of test case and establishment method and device of test case
CN108647355A (en) * 2018-05-16 2018-10-12 平安普惠企业管理有限公司 Methods of exhibiting, device, equipment and the storage medium of test case

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070271252A1 (en) * 2002-10-31 2007-11-22 Dettinger Richard D Global query correlation attritubes
CN103366008A (en) * 2013-07-22 2013-10-23 天津汉柏信息技术有限公司 Resource searching method and device
CN103473178A (en) * 2013-09-24 2013-12-25 上海斐讯数据通信技术有限公司 Method and system for optimizing testing process execution
CN104239212A (en) * 2014-09-28 2014-12-24 北京国双科技有限公司 Query method and device of test case and establishment method and device of test case
CN108647355A (en) * 2018-05-16 2018-10-12 平安普惠企业管理有限公司 Methods of exhibiting, device, equipment and the storage medium of test case

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
唐明晔: "测试用例的复用技术的研究", 《数字技术与应用》 *
徐英等编著: "《装备试验与评价概论》", 31 October 2016 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112416768A (en) * 2020-11-20 2021-02-26 深圳开源互联网安全技术有限公司 Interactive security vulnerability detection method, system, device and readable storage medium
CN112597349A (en) * 2020-12-25 2021-04-02 中国农业银行股份有限公司 Method for processing regulation and regulation, and device for acquiring regulation information
CN113268419A (en) * 2021-05-19 2021-08-17 北京金山云网络技术有限公司 Method, device, equipment and storage medium for generating test case optimization information
CN113268419B (en) * 2021-05-19 2024-04-09 北京金山云网络技术有限公司 Method, device, equipment and storage medium for generating test case optimization information

Similar Documents

Publication Publication Date Title
US10423726B2 (en) Machine learning to integrate knowledge and natural language processing
US9483648B2 (en) Security testing for software applications
US11650905B2 (en) Testing source code changes
CN109947654A (en) The method and apparatus automatically updated for test case library
CN109359468A (en) Leak detection method, device and equipment
CN107665171A (en) Automatic regression test method and device
CN111046386B (en) Method and system for dynamically detecting program third-party library and performing security evaluation
CN110162971A (en) A kind of leak detection method of software project, device, storage medium and server
US20130311517A1 (en) Representing Incomplete and Uncertain Information in Graph Data
CN106780045A (en) Policy information corrects method and apparatus
CN107943694A (en) A kind of test data generating method and device
Shen et al. Pareto optimality for sensor placements in a water distribution system
CN105760292A (en) Assertion verification method and device for unit testing
Karim et al. Mining android apps to recommend permissions
US10031936B2 (en) Database table data fabrication
US20140280228A1 (en) Semantic Mapping of Topic Map Meta-Models Identifying Assets and Events to Include Weights
US9134975B1 (en) Determining which computer programs are candidates to be recompiled after application of updates to a compiler
WO2023098462A1 (en) Improving performance of sql execution sequence in production database instance
US9405796B2 (en) Systems and methods for analyzing registrar and hosting provider relationships
CN110362569A (en) The method of calibration and device of tables of data, electronic equipment, storage medium
CN110334012A (en) A kind of methods of risk assessment and device
CN107133163A (en) A kind of method and apparatus for verifying description class API
US9740694B2 (en) Identifying missing content using searcher skill ratings
CN110147313A (en) A kind of log-output method and device
US10437710B2 (en) Code coverage testing utilizing test-to-file maps

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20211216

Address after: 200240 building 41, 398 Heqing Road, Minhang District, Shanghai

Applicant after: Shanghai Shangxiang Network Technology Co.,Ltd.

Address before: 201306 2, building 979, Yun Han Road, mud town, Pudong New Area, Shanghai

Applicant before: SHANGHAI LIANSHANG NETWORK TECHNOLOGY Co.,Ltd.

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20190628