CN110263585B - Test supervision method, device, equipment and storage medium - Google Patents

Test supervision method, device, equipment and storage medium Download PDF

Info

Publication number
CN110263585B
CN110263585B CN201910561207.9A CN201910561207A CN110263585B CN 110263585 B CN110263585 B CN 110263585B CN 201910561207 A CN201910561207 A CN 201910561207A CN 110263585 B CN110263585 B CN 110263585B
Authority
CN
China
Prior art keywords
information
instruction
binding
test
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910561207.9A
Other languages
Chinese (zh)
Other versions
CN110263585A (en
Inventor
陈金龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201911269625.7A priority Critical patent/CN110826111B/en
Priority to CN201910561207.9A priority patent/CN110263585B/en
Publication of CN110263585A publication Critical patent/CN110263585A/en
Application granted granted Critical
Publication of CN110263585B publication Critical patent/CN110263585B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application discloses a test supervision method, a device, equipment and a storage medium, wherein in the method, a server acquires and executes a test instruction; binding the test instruction and the identity information; carrying out hash operation on the binding information and carrying out digital signature on the hash operation result; and uploading the digital signature result and the binding information to a blockchain node positioned in a blockchain network so that the blockchain node performs signature verification and stores the binding information after the signature verification passes. The application stores the information obtained after the test instruction and the identity information of the corresponding test party are bound through the blockchain network. After the uplink is completed, the test instruction, the identity information and the binding relation among the test instruction, the identity information and the identity information cannot be tampered, and when the later supervision party performs responsibility tracing of the test accident, the corresponding identity information can be accurately searched from the blockchain network by using the test instruction related to the test accident, so that the actual responsible person can be accurately traced.

Description

Test supervision method, device, equipment and storage medium
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, an apparatus, a device, and a storage medium for testing and supervising.
Background
Currently, with the development of daily business of an enterprise, the server function of the enterprise needs to be updated continuously and iterated. In this process, a tester is required to develop a corresponding test on the server.
The existing server testing technology is usually realized based on a multi-task multi-user platform, so that a plurality of testers can share one server. When testing a server, a tester sometimes intentionally or unintentionally submits an incorrect test instruction or an illegal test instruction to the server, thereby causing abnormal operation of the server. At this time, the enterprise can realize the responsibility tracing of the test accidents by monitoring the historical operation records of the testers. However, in the prior art, there may be a case that the traced responsible person is inconsistent with the actual responsible person, thereby causing the tracing of the responsibility to fail.
Disclosure of Invention
In view of the above, the present application aims to provide a test supervision method, a device and a storage medium, so that when the responsibility of a test accident is traced, consistency between traced responsible persons and actual responsible persons can be ensured, and the situation of failure of tracing responsibility is avoided. The specific scheme is as follows:
to achieve the above object, in one aspect, the present application provides a test supervision method, including:
Acquiring and executing a test instruction; the test instruction is used for testing the server;
Binding the test instruction and the identity information to obtain binding information; the identity information is used for representing the identity of a testing party submitting the testing instruction;
carrying out hash operation on the binding information and carrying out digital signature on a hash operation result;
uploading the digital signature result and the binding information to a blockchain node positioned in a blockchain network, so that the blockchain node performs signature verification on the digital signature result and stores the binding information after the signature verification passes.
In yet another aspect, the present application further provides a test supervision apparatus, including:
The instruction acquisition module is used for acquiring a test instruction; the test instruction is used for testing the server;
The instruction execution module is used for executing the test instruction;
The information binding module is used for binding the test instruction and the identity information to obtain binding information; the identity information is used for representing the identity of a testing party submitting the testing instruction;
the hash operation module is used for carrying out hash operation on the binding information;
The digital signature module is used for carrying out digital signature on the hash operation result;
and the information uplink module is used for uploading the digital signature result and the binding information to a blockchain node positioned in a blockchain network so that the blockchain node can check the digital signature result and store the binding information after the digital signature result passes the check.
In yet another aspect, the present application also provides an electronic device including a processor and a memory; the memory is used for storing a computer program, and the computer program is loaded and executed by the processor to realize the test supervision method.
In yet another aspect, the present application further provides a storage medium having stored therein computer-executable instructions that, when loaded and executed by a processor, implement the foregoing test supervision method.
After the test instruction is acquired and executed, the test instruction is bound with the identity information of the corresponding test party, after hash operation and digital signature are sequentially carried out on the binding information, the digital signature result and the binding information are uploaded to the blockchain nodes positioned in the blockchain network, so that the blockchain nodes can check the digital signature result and store the binding information after the digital signature passes. Therefore, the application stores the binding information through the blockchain network, and the binding information is obtained after the test instruction and the identity information of the corresponding test party are bound, which means that after the binding information is linked, the test instruction, the identity information and the binding relation among the test instruction and the identity information in the binding information can not be tampered, and the later supervision party can accurately find the identity information bound with the test instruction from the blockchain network by utilizing the test instruction related to the test accident when tracing the responsibility of the test accident, thereby accurately tracing the actual responsible person, namely ensuring the consistency between the traced responsible person and the actual responsible person and avoiding the occurrence of the condition of tracing failure of the responsibility.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required to be used in the embodiments or the description of the prior art will be briefly described below, and it is obvious that the drawings in the following description are only embodiments of the present application, and that other drawings can be obtained according to the provided drawings without inventive effort for a person skilled in the art.
FIG. 1 is a schematic diagram of a test supervision system according to the present application;
FIG. 2 is a schematic diagram of a test supervision system according to the present application;
FIG. 3 is a block chain overview diagram based on a third party management platform;
FIG. 4 is a schematic view of blockchain data browsing based on a third party management platform;
FIG. 5 is a schematic diagram of a blockchain data query based on a third party management platform;
FIG. 6 is a schematic diagram of transaction details based on a third party management platform;
FIG. 7 is a schematic diagram of decoding a historical test operation record based on a third party management platform;
FIG. 8 is a flow chart of a method of monitoring and controlling a test provided by the present application;
FIG. 9 is a flow chart of a method of monitoring and controlling a test provided by the present application;
FIG. 10 is a flow chart of a method of monitoring and controlling a test provided by the present application;
FIG. 11 is a flow chart of a method for monitoring and controlling a test provided by the application;
FIG. 12 is a block chain information query flow chart of a test supervision method according to the present application;
FIG. 13 is a schematic diagram of a system overall multi-layer architecture according to the present application;
fig. 14 is an application schematic diagram for implementing test supervision in an application scenario provided by the present application;
FIG. 15 is a schematic structural diagram of a test supervision apparatus according to the present application;
FIG. 16 is a schematic diagram of a test supervision apparatus according to the present application;
FIG. 17 is a diagram illustrating a server configuration according to the present application;
fig. 18 is a diagram of a terminal structure according to the present application.
Detailed Description
The current server testing technology based on the multi-task multi-user platform allows multiple testers to develop tests on the same server. In the process of unfolding the test on the server, relevant test data can be stored locally or sent to a centralized management server for storage. When the server runs abnormally due to the fact that the error test instruction or the illegal test instruction is executed, the supervisory personnel can trace back to the tester corresponding to the corresponding test instruction through local data inquiry or a mode of sending an inquiry request to the centralized server, so that accident responsibility determination is carried out. However, the test data are stored in a local database or on a remote centralized management server, and the data stored in the two modes are at risk of being tampered or destroyed.
For example, the falsifier changes the error test instruction in the saved test data into a normal test instruction, or the falsifier changes the test party A corresponding to the illegal test instruction into the test party B, or the falsifier directly deletes the test data related to the test accident, or directly performs physical destruction on a local tested server or a centralized management server, and the like. It will be appreciated that the above-mentioned tamperer may be an illegal intruder of the database, and the purpose of tampering data is achieved by various illegal intrusion means, or may be a nominally legal access user of the database. Once the data in the local database or the centralized management server is tampered, the accurate responsible person cannot be positioned in the follow-up process when the test accident is overtaken, so that the responsibility tracing is failed, and even the responsibility tracing disputes are caused.
In view of the problems existing at present, the application provides a server test supervision technical scheme based on a block chain, by which consistency between traced responsible persons and actual responsible persons can be ensured, and occurrence of responsibility tracing failure is avoided.
For easy understanding, a system architecture to which the technical solution of the present application is applied is described below. Referring to fig. 1 and 2, two different component architectures of a test supervision system of the application are shown, respectively.
As shown in fig. 1, one component architecture of the test supervision system of the present application may include a tester terminal 11, a server 12, a blockchain network 13, a third party management platform 14, and a query terminal 15.
The testing party terminal 11 may provide an information input interface and an information sending triggering unit for the testing party on the user interaction interface through a client installed in advance. The testing party terminal 11 obtains a testing instruction input by the testing party through the information input interface. When the information transmission triggering unit is triggered by the outside, the tester terminal 11 may transmit the information acquired through the information input interface to the server 12 using the first communication network. It is understood that the testing party terminal 11 in the present application includes, but is not limited to, a smart phone, a tablet computer, a wearable device, a desktop computer, etc. in which the above-described client is installed.
In the present application, the server 12 may specifically refer to a dedicated server for implementing a single service, and different servers 12 are respectively used for implementing different services. The server 12 establishes a communication connection with the tester terminal 11 through a first communication network. After the server 12 obtains the test instruction sent by the terminal 11 of the testing party, the test instruction can be executed to complete the corresponding test task. In the present application, an instruction monitoring program is integrated in advance in the server 12, and is used for monitoring the behavior of executing a test instruction, and once it is monitored that a certain test instruction is executed, the test instruction can be collected, then the test instruction collected in real time or historically can be bound with the identity information of the testing party, the binding information is hashed and the hash result is digitally signed, and then the digital signature result and the binding information are sent to the blockchain network 13 through the second communication network, so as to develop the uplink operation flow. It is to be understood that the server 12 in this embodiment includes, but is not limited to, a cloud server, a physical server, a virtual server, and the like.
It is understood that the blockchain network 13 includes a plurality of blockchain nodes 130. After the test data submitted by the server 12 is successfully uploaded to any blockchain node 130, the test data is quickly transferred to other blockchain nodes 130 for storage in a second-level time period, and all the blockchain nodes 130 maintain the full instruction data through cooperation. In the application, any block of the blockchain network 13 can record the information such as the blockchain identifier, the test operation record, the root hash of the binary tree and the transaction hash value corresponding to the test data, and can further record the blockchain identifier, the blockchain account address and the like.
The block identifier may be an identifier obtained after hash processing is performed on a block header of a previous block, or may be a block height of a current block; the test operation record can comprise test data, a corresponding time stamp and the like, wherein the test data at least comprises a bound test instruction and identity information of a tester; the binary tree may specifically be a Merkle tree; the blockchain identifier is used for representing the identifier of the current blockchain, and can be suitable for a scene in which a plurality of different blockchains exist and a cross-chain technology needs to be applied; the blockchain account address is address information obtained after the testing party registers the blockchain account, and the registering process specifically may include: after the account registration information of the testing party is obtained, an account private key is created for the testing party, an account public key corresponding to the account private key is generated by using an elliptic curve algorithm, and then the account public key is operated by using a one-way hash algorithm to obtain the blockchain account address.
For the outside world, the blockchain account address is an irregular character string, so that the occurrence of a user privacy disclosure event caused by the blockchain account address is avoided. It is understood that the account registration information may include, but is not limited to, an IP address of the server, a user name assigned to the testing party by Linux, a real name of the testing party, a service type of the server, and group information to which the server belongs. As shown in the table one, when the application provides the blockchain account information to the outside, besides the account public key Facc _pub_key and the blockchain account address Facc _addr, the application can further provide the user IDFuser _id corresponding to the blockchain account, the account validity period, the corresponding blockchain identifier Fchain _id, the blockversion number Fversion, the CA authentication type Fissue, the digital signature algorithm type fsign_type, the merchant number Fmch _id of the electronic payment platform and the account detail information Fother _info. The account validity period is determined by a validity period start time Ffrom and a validity period expiration time Fto in table one. The account detail information Fother _info may specifically include an IP address of the server, a user name allocated by Linux to the testing party, a real name of the testing party, a service type of the server, and group information to which the server belongs. In addition, it should be noted that in the present application, one tester user can bind a plurality of blockchain accounts, and one blockchain account only belongs to one tester user.
List one
The application can provide the blockchain account information of the tester user to the outside and also can provide the tester user information to the outside. As shown in table two, the user information of the testing party may specifically include a corresponding user IDFuser _id, a user wallet address furer_addr, a user public key furer_pub_key, a corresponding blockchain identifier Fchain _id, a blockversion number Fversion, a CA authentication type Fissue, a digital signature algorithm type fsign_type, a real name Ffull _name of the testing party, a mailbox address Femail, a contact phone Ftel, a user information validity period, and a merchant number Fmch _id of an electronic payment platform.
Watch II
It is to be understood that the node device types of the blockchain node 130 in the present application include, but are not limited to, various types of servers, personal computers, handheld terminals, and the like.
In the present application, the third party management platform 14 is a platform capable of collecting blockchain data, providing a blockchain data browsing and querying function, providing a private key generation service for a user, and managing accounts. The user of the present application can view the profile information of the blockchain through the third party management platform 14, as shown in fig. 3. In FIG. 3, the blockchain profile information is specific to blockchain names, blockchain IDs, blockchain function description information, blockchain key indicators, and the like. In addition, as shown in Table three, the third party management platform 14 may periodically or aperiodically collect historical test operation records Fdata, transaction hash value Fhash, block height Fheight, block hash value (not shown in Table three), transaction time Fblock _time, blockchain account Facc, blockchain identification Fchain _id, and the like in the blockchain network 13. Further, after the third party management platform 14 collects the above blockchain data, all types of blockchain data or part types of blockchain data collected above may be displayed on the man-machine interface of the query terminal 15 for the user to browse, see fig. 4 in particular. The blockchain data shown in fig. 4 includes transaction hash values, blockheights, blockhash values, transaction times, and the like. Further, as shown in table three, the test operation records Fdata recorded in the blockchain network 13 may specifically include a server IP address, a timestamp, a user name, belonging group information, test instructions, and the like.
Watch III
In addition, the third party management platform 14 may acquire the query request for the historical test instruction initiated by the query terminal 15 by using the third communication network, and then perform a corresponding query on the information collected from the blockchain network 13 to obtain the identity information of the tester corresponding to the historical test instruction. Specifically, the query terminal 15 obtains the search keywords such as the block height, the transaction hash value or the block hash value input by the user through the search box shown in fig. 4, and then sends a query request including the search keywords to the third party management platform 14. After the third party management platform 14 obtains the query request, the blockchain data corresponding to the query request is found out from the collected information, and returned to the terminal interface of the query terminal 15, as shown in fig. 5. In the application, the query mode can specifically support fuzzy query. In addition, when "view" shown in fig. 5 is clicked by the user, a display interface of transaction details may be opened on the query terminal 15, as shown in fig. 6 in particular. In fig. 6, transaction details may specifically include a transaction hash value, a belonging block, a block size, a transaction time, a transaction amount, transaction data, and the like.
It should be noted that the historical test operation records collected by the third party management platform 14 from the blockchain network 13 are typically encoded information, such as encoded by the Base58 encoding technique. For this reason, referring to fig. 7, after the third party management platform 14 obtains the history test operation record issued by the blockchain network 13, a corresponding decoding process is further required to obtain a corresponding timestamp, a test instruction in a binding state, and identification information of a corresponding tester.
In the application, if the identity information in the binding state with the test instruction is obtained after encryption, in order to obtain the corresponding plaintext information, the corresponding decryption key is further required to be used for decryption operation, so that the identity information corresponding to the historical test instruction can be finally obtained, and the corresponding responsibility tracing can be developed. It will be appreciated that the inquiry terminal 15 may be a terminal held by a supervisor or a terminal held by a general user. The supervisory party is a management party responsible for the test behavior of the test party, and the query terminal 15 includes, but is not limited to, a smart phone, a tablet computer, a wearable device, a desktop computer, and the like.
As shown in fig. 2, another component architecture of the test supervision system of the application may include a server 21, a tester terminal 22, a blockchain network 23, a third party management platform 24, and a query terminal 25. The difference between this composition architecture and the former composition architecture is mainly represented by the difference in information interaction mechanism among the server 21, the tester terminal 22, and the blockchain network 23.
In fig. 2, the test party terminal 22 transmits a test instruction to the server 21. After the server 21 executes the test instruction, it sends corresponding feedback information to the terminal 22 of the test party to prompt the terminal 22 of the test party that the corresponding test instruction has been executed. When the testing party terminal 22 monitors that the server 21 has returned feedback information, relevant test data are collected, and the test data are sent to the blockchain network 23 through the fifth communication network, so that the test data are stored through the blockchain network 23.
It should be noted that, the first communication network, the second communication network, the third communication network, the fourth communication network and the fifth communication network of the present application may be determined according to the network status and the application requirement in the practical application process, and may be a wireless communication network, such as a mobile communication network or a WIFI network, or may be a wired communication network; the network may be a wide area network or a local area network as the case may be.
Fig. 8 is a flowchart of a test supervision method according to an embodiment of the present application. Referring to fig. 8, the test supervision method may include the steps of:
S101, a test instruction is created by the terminal of the testing party, and the test instruction is used for testing the server.
In the embodiment of the application, the terminal of the testing party can provide one or more information input interfaces for the testing party, the instruction information input by the testing party can be obtained through the one or more information input interfaces, and the test instruction for the test server is created according to the instruction information input by the testing party.
In one implementation, the tester terminal may provide only one information input interface for the tester. All the various types of instruction information related to the server test are transmitted to the terminal of the testing party through the information input interface, wherein the different types of instruction information are used for generating test instructions aiming at different functions of the server. The information input mode can enable different types of instruction information to be mutually nested to form more complex instruction codes, so that more complex test operation on the server is facilitated, and accuracy and reliability of a test result of the server are improved.
In another implementation, the tester terminal may provide a plurality of information input interfaces for the tester, and obtain instruction information for creating test instructions for different functions of the server through different information input interfaces. For example, for the data deleting function, the file arranging function and the data searching function of the server, the tester terminal may provide three different information input interfaces accordingly. The information input mode can enable the testing party to edit and manage the instruction information aiming at different functions of the server through different information input interfaces, reduces the confusion of the instruction information editing process, and is beneficial to reducing the error rate of the test instructions.
In order to enable the testing party to timely find out the test instruction with the problem and reduce damage caused by the illegal test instruction to the server, the terminal of the testing party can locally maintain a dangerous instruction feature library, and each time a test instruction is created, the terminal of the testing party can use the local dangerous instruction feature library to check whether the test instruction is an erroneous test instruction or an illegal test instruction, if so, the terminal of the testing party sends a corresponding alarm prompt or modification suggestion to the testing party or the supervisor, and can also prohibit the test instruction from being sent to the server. It can be understood that the dangerous instruction feature library refers to a database obtained by extracting and recording features of a dynamically collected error test instruction and/or illegal test instruction in advance.
In some cases, in order to successfully complete the test task, the test party terminal does need to send test instructions with instruction features conforming to the local dangerous instruction feature library to the server. At this time, in order not to affect the normal running of the test task, the tester may request the temporary electronic permission for the special test instruction from the supervisor, and by using the temporary electronic permission, the feature test instruction may skip interception of the dangerous instruction feature library. It is noted that the temporary electronic license is issued in particular by the supervisor and its validity automatically disappears after the special test instruction is sent to the server.
In order to reduce the risk of the dangerous instruction feature library being tampered with by the outside, the terminal of the testing party can utilize the public key to asymmetrically encrypt the dangerous instruction feature library under the condition that the dangerous instruction feature library is not called or updated, and then utilize the private key to decrypt the encrypted dangerous instruction feature library when the dangerous instruction feature library needs to be called or updated.
S102, the test party terminal sends the test instruction to the server.
In this embodiment, if the terminal of the testing party sends the test instruction to the server for the first time, the terminal of the testing party also needs to send the identity information of the testing party to the server. After the server acquires the identification information, the identification information is stored in the server local. And if the identity information of the testing party is needed to be used later, the corresponding identity information can be directly called out from the server.
S103, the server acquires and executes the test instruction.
In this embodiment, the server may also locally maintain a dangerous instruction feature library, through which the acquired test instruction is intercepted for the second time, so that the test instruction with the instruction feature in the dangerous instruction feature library is intercepted, and the rest of the test instructions may be executed by the server. According to the application, through the first re-interception on the terminal of the testing party and the second re-interception on the server, the risk of the finally executed testing instruction of the server can be effectively reduced.
In addition, in this embodiment, the synchronous updating maintenance operation may be performed on the dangerous instruction feature library on the test side terminal and the dangerous instruction feature library on the server periodically according to a preset time period.
It will be appreciated that, for the dangerous instruction feature library in the server, since one server is usually a dedicated server for completing a specific service, in this embodiment, the dangerous instruction feature in the dangerous instruction feature library of each server may be a dangerous instruction feature specifically customized based on the service type of the server. Similarly, the dangerous instruction features in the dangerous instruction feature library of the terminal of the testing party can also be dangerous instruction features which are specially customized based on the service type of the server.
S104, the server binds the test instruction and the identity information to obtain binding information, wherein the identity information is used for representing the identity of a test party submitting the test instruction.
In this embodiment, the server may construct a binding relationship between the test instruction and the identity information by binding the test instruction and the identity information of the corresponding test party, so as to obtain the binding information. Namely, the binding information specifically includes a test instruction, identity information and a binding relationship between the test instruction and the identity information, and the identity information corresponding to the test instruction can be determined through the binding relationship.
It will be appreciated that the identification information in this embodiment may specifically include, but is not limited to, a user name, a real name, a contact phone, etc. of the test party.
In order to reduce the subsequent uplink data size, the server may perform redundancy elimination processing on the test instruction before binding the test instruction and the identification information. Specifically, the server may determine, from the test instruction, a redundant instruction code conforming to the redundant instruction code library by using a pre-constructed redundant instruction code library, and then reject the redundant instruction code from the test instruction, to obtain a simplified test instruction. It should be noted that the redundant instruction code may specifically refer to an instruction code segment in the test instruction that only plays an auxiliary role, not a critical role, on the test procedure.
For example, for the following test instructions: the [ root@gin scripts ] # find-name "locatetest" is subjected to redundancy elimination processing by using a redundancy instruction code library, and the obtained simplified test instruction can be specifically: find-name.
Further, in this embodiment, the process of binding the test instruction and the identification information by the server may specifically include: and identifying the instruction characteristics of the test instruction, generating corresponding instruction description information for the test instruction conforming to the preset instruction characteristics, and binding the test instruction, the identity identification information and the instruction description information.
In a specific embodiment, the server may identify the instruction execution efficiency of a certain test instruction according to the actual execution result of the test instruction, determine whether the instruction execution efficiency is greater than a preset instruction execution efficiency threshold, if so, generate corresponding instruction efficiency description information for representing that the test instruction has higher execution efficiency for the test instruction, and then bind the test instruction, the identity information of the test party and the instruction efficiency description information. After the binding information is subjected to the uplink operation in the later period, the content of the test instruction, the identity identification information and the instruction efficiency description information and the binding relation among the test instruction, the identity identification information and the instruction efficiency description information cannot be tampered by the outside, so that the fact that the test instruction submitted by the related test party has higher execution efficiency is known to the public, the effect of the top in the middle is achieved to a certain extent, and the work enthusiasm of the test party is promoted.
In another embodiment, if the server does not utilize the local dangerous instruction feature library to verify the test instruction before executing the certain test instruction, then the server can utilize the local dangerous instruction feature library to identify the instruction feature of the test instruction, if the instruction feature of the test instruction is identified to be located in the local dangerous instruction feature library, corresponding instruction alarm information can be generated for the test instruction, and then the test instruction, the identity information of the test party and the instruction alarm information are bound. After the binding information is subjected to the uplink operation in the later period, the content of the test instruction, the identity identification information and the instruction alarm information and the binding relation among the test instruction, the identity identification information and the instruction alarm information can not be tampered by the outside, so that the fact that the test instruction submitted by the related test party has danger is known to the public, and the warning effect is achieved to a certain extent.
In still another specific embodiment, if the server passes the inspection of the dangerous instruction feature library on the terminal of the testing party and the server before executing a certain test instruction, but the server causes abnormal operation of the server when actually executing the test instruction, then the server can identify the instruction severity of the test instruction according to the actual execution result of the test instruction, judge whether the instruction severity is greater than a preset instruction severity threshold, if so, generate corresponding instruction type description information for representing that the test instruction is a novel dangerous instruction for the test instruction, and then bind the test instruction, the identity identification information of the testing party and the instruction type description information. Further, after the abnormal operation of the server caused by the test instruction is found, the feature of the test instruction can be added into a local dangerous instruction feature library.
It can be appreciated that the binding information in this embodiment includes, in addition to the test instruction, the identification information, and the instruction description information, a timestamp, a server IP address, and the like.
S105, the server carries out hash operation on the binding information.
S106, the server carries out digital signature on the hash operation result.
It will be appreciated that the data needs to be hashed and digitally signed prior to being subject to the uplink operation. In this embodiment, the server performs hash operation on the bound test instruction and the identity information, and then digitally signs the hash operation result by using the private key.
In a specific embodiment, the server performs a hash operation on the binding information once every time the binding information is generated, and after the hash operation result is obtained, the hash operation result is digitally signed by using the private key. In other words, in this embodiment, a loop may be fastened between the three steps of generation of the binding information, hash operation and digital signature, and the middle time interval is very short, so that after the binding information is obtained, the digital signature result can be obtained at a relatively high speed, so that the time window for external tampering with data can be greatly shortened, and the difficulty and cost for data tampering are increased.
In another embodiment, after continuously generating a plurality of binding information, the server hashes the binding information, and then digitally signs the hash result by using a private key. By the scheme, the times of hash operation and digital signature can be effectively reduced. For example, assume that the server continuously generates the following 3 pieces of binding information:
binding information A:{"linux_ip":"127.0.0.1"、"timestamp":"2018-10-2816:25:17"、"linux_user":"tt_tom"、"linux_group":"tt"、"operator_cmd":"whereis mysql"};
Binding information B:{"linux_ip":"127.0.0.1"、"timestamp":"2018-10-2816:25:17"、"linux_user":"tt_tom"、"linux_group":"tt"、"operator_cmd":"rm-rf*"};
Binding information C:{"linux_ip":"127.0.0.1"、"timestamp":"2018-10-2816:25:17"、"linux_user":"tt_tom"、"linux_group":"tt"、"operator_cmd":"find-name"};
Then, the server carries out hash operation on the binding information A, the binding information B and the binding information C which are sequentially connected, and then carries out digital signature on the hash operation solution result.
In another specific embodiment, after each time the server continuously generates a plurality of pieces of binding information, hash operation is performed on the plurality of pieces of binding information, after a plurality of pieces of hash operation results are generated in the same way, digital signature is performed on the plurality of pieces of hash operation results which are sequentially connected by using a private key. For example, after each server continuously generates 3 parts of binding information, hash operation is performed on each 3 parts of continuous binding information, so that after the server continuously generates 9 parts of binding information, 3 parts of hash operation results are obtained, and at this time, the digital signature can be performed on the 3 parts of hash operation results which are sequentially connected by using the private key. This scheme can reduce the number of digital signatures even further than the former scheme.
It can be understood that in the embodiment of the present application, the binding information corresponding to the digital signature is the binding information belonging to the same blockchain account.
In addition, the private key used by the server in the digital signature process may be specifically a private key created by the third party management platform for the blockchain account of the testing party, and may be stored in the server, so that when the server needs to use the private key, the private key is directly called from the local.
In order to improve the security of the private key in the server, the server needs to avoid directly storing the private key which is not subjected to any protection processing in the local area, and also needs to avoid storing the private key which is processed by the prior known encoding or encryption technology in the local area. In the embodiment of the application, a set of self-defined private key protection mechanism can be created on the local server, wherein the self-defined private key protection mechanism comprises, but is not limited to, a self-defined private key coding mechanism or a self-defined private key encryption mechanism. Before the server stores the private key, the private key is correspondingly processed by utilizing the self-defined private key protection mechanism, and then the processed result is stored locally. When the subsequent server needs to call the private key, the private key can be restored based on the self-defined private key protection mechanism. Because the private key protection mechanism is self-defined, the private key protection mechanism is unknown to the outside, and the protection mechanism adopted by the server to protect the private key is also unknown to the outside, so that the probability of interception of the private key by the outside can be effectively reduced through the private key protection scheme, and the safety of the local private key is greatly improved.
It can be appreciated that in the practical application process, the related technicians can customize the private key protection mechanism according to the practical use requirement according to the practical needs. According to the self-defined private key protection mechanism, the server can perform corresponding protection processing on the private key before storing the private key. For example, in one embodiment, the server may divide the private key into a plurality of segments with assigned sequence numbers, then modify the private key segments with different sequence numbers according to different segment modification rules, and store all modified private key segments to a plurality of different storage locations of the local periodic dynamic change. For example, the private key is divided into 3 segments, wherein the segment modification rule corresponding to the 1 st segment is to exchange the nth character and the nth character of the 1 st segment, the segment modification rule corresponding to the 2 nd segment is to add a preset character to the tail of the 2 nd segment, the segment modification rule corresponding to the 3 rd segment is to change all specific characters in the 3 rd segment into another preset character, and after obtaining 3 modified private key segments according to the segment modification rule, the 3 modified private key segments are respectively stored in 3 different storage positions corresponding to the current storage position change period. It can be understood that when restoring the private key in the later stage, the storage positions of the segments of different private keys need to be determined according to the characteristic that the storage positions of the segments periodically change, then the original information of the different segments is restored according to the modification rules of the different segments corresponding to the serial numbers of the different segments, and then the segments are spliced based on the serial numbers, so that the private key can be restored.
S107, the server uploads the digital signature result and the binding information to a blockchain node located in a blockchain network.
In order to reduce the situation that the workload of some blockchain nodes in the blockchain network is excessive or is in idle state for a long time, the process of uploading the digital signature result and the binding information to the blockchain nodes in the blockchain network by the server can comprise the following steps: and the server screens the blockchain nodes in the blockchain network according to the load information and the position information of the current blockchain nodes to obtain target nodes, and then uploads the digital signature result and the binding information to the target nodes. That is, the server in this embodiment may select the blockchain node by itself as a node for directly acquiring the uplink data, and the server may screen the currently suitable blockchain node according to the load information and the position information of the blockchain node, so that the server may select the blockchain node with smaller current load and moderate geographic position as a node for directly receiving the uplink data.
In order to accelerate the overall data uplink speed in the server, in this embodiment, the server uploads the digital signature result and the binding information to a blockchain node located in a blockchain network, which may specifically include: and uploading the digital signature results and the corresponding binding information to different blockchain nodes in a blockchain network respectively. It should be noted that all binding information corresponding to the same digital signature result belongs to the same blockchain account, and binding information corresponding to different digital signature results can belong to the same blockchain account or different blockchain accounts. For the same server, the different blockchain accounts are usually blockchain accounts of different testers.
S108, checking the digital signature result by using a blockchain node in a blockchain network, and storing the binding information after the checking is passed.
In this embodiment, after any node in the blockchain network obtains the digital signature result and the binding information sent by the server, the digital signature result is checked, after the digital signature result passes the check, a block storing the binding information is generated on the node, then the block is broadcast to other nodes in the blockchain network, the other nodes receive and verify the block, and after the verification passes, the block can be added to the blockchain. The blockchain generated in the mode can help a supervisor trace back historical test data of all servers on the blockchain.
After the test instruction is acquired and executed, the embodiment of the application binds the test instruction with the identity information of the corresponding testing party, and after hash operation and digital signature are sequentially carried out on the binding information, the digital signature result and the binding information are uploaded to a blockchain node positioned in a blockchain network, so that the blockchain node can test the digital signature result and store the binding information after the digital signature passes. Therefore, the embodiment of the application stores the binding information through the blockchain network, and the binding information is obtained after the test instruction and the identity information of the corresponding test party are bound, which means that after the binding information is linked, the test instruction, the identity information and the binding relation among the test instruction and the identity information in the binding information cannot be tampered, and a later supervisor can accurately find the identity information bound with the test instruction from the blockchain network by using the test instruction related to the test accident when tracing the responsibility of the test accident, thereby accurately tracing the actual responsible person, namely ensuring the consistency between the traced responsible person and the actual responsible person and avoiding the occurrence of the condition of tracing back failure.
Fig. 9 is a flowchart of a test supervision method according to an embodiment of the present application. Referring to fig. 9, the test supervision method may include the steps of:
S201, the server detects whether the testing party has instruction submitting permission.
In one possible implementation, a server may detect whether a current testing party has a blockchain account corresponding to a service of the server, and then determine whether the testing party has instruction submission rights according to the blockchain account detection result of the testing party. That is, the server may determine that the testing party has authority to submit test instructions to the server if it detects that the testing party already has a blockchain account corresponding to the server's business. It can be appreciated that if it is detected that the current testing party does not have a blockchain account corresponding to the service of the server, the server may send a corresponding blockchain account registration prompt message to the testing party terminal to prompt the testing party to perform a corresponding blockchain account registration procedure.
In another possible implementation, the server may obtain historical test data currently stored on the blockchain network sent by the third party management platform, and then determine whether the testing party has instruction submitting permission according to the historical test data stored on the current blockchain network. Specifically, the server may count the number of dangerous instructions and/or the severity level of the dangerous instructions of the testing party in history according to the historical test data stored in the current blockchain network, and then determine whether to continue to maintain the instruction submitting authority of the testing party according to the statistical result. The server may cancel the instruction submission authority of the test party permanently or temporarily in the case that the statistical result satisfies a certain condition.
S202, if the server detects that the testing party has the instruction submitting permission, issuing a corresponding instruction submitting permission certificate to the terminal of the testing party.
In this embodiment, when the server detects that the testing party has the authority to submit the test instruction, a corresponding instruction submitting authority certificate is generated for the testing party, and then the instruction submitting authority certificate is sent to the terminal of the testing party. It should be noted that, in this embodiment, the server may embed the validity period of the instruction submission authority of the testing party in the instruction submission authority credential.
S203, the terminal of the testing party creates a testing instruction, wherein the testing instruction is used for testing the server.
S204, the terminal of the testing party submits the testing instruction to the server according to the instruction submitting authority certificate.
In this embodiment, when the test party terminal submits the test instruction to the server, the instruction submitting permission credential may be transmitted to a local instruction submitting process, and the local instruction submitting process determines the validity and effectiveness of the instruction submitting permission of the current test party through the instruction submitting permission credential. In the event that the local instruction submission process determines that the instruction submission authority of the current tester is legal and valid, then the test instruction may be allowed to be submitted to the server. Further, in order to avoid that an illegal terminal submits a test instruction to a server by using a stolen instruction submitting permission certificate, in this embodiment, the server may asymmetrically encrypt the instruction submitting permission certificate recorded in a plaintext form by using a public key of a testing party, thereby obtaining an encrypted instruction submitting permission certificate, and then send the encrypted instruction submitting permission certificate to the testing party terminal. And the terminal of the testing party decrypts the encrypted instruction submitting permission certificate by using the private key of the terminal of the testing party, and restores the instruction submitting permission certificate recorded in a plaintext form so as to submit a testing instruction to the server according to the restored instruction submitting permission certificate.
S205, the server acquires and executes the test instruction.
S206, the server encrypts the identity information to obtain first encrypted information, wherein the identity information is used for representing the identity of a testing party submitting the testing instruction.
S207, the server binds the test instruction and the first encryption information to obtain binding information.
In this embodiment, the server may encrypt the identification information before binding the test instruction and the identification information. In the actual information binding process, the server can specifically bind the test instruction and the encrypted identification information. By the processing, when the test data stored in the blockchain network is queried later, if the querier does not have a decryption key corresponding to the encryption process of the identification information, the querier cannot know the identity information of the tester corresponding to the test instruction in the test data, so that the privacy of the user is protected to a certain extent.
In one possible implementation manner, the process of encrypting the identity information by the server may specifically include: and carrying out asymmetric encryption on the identity information by using the public key of the supervision party. That is, the identification information corresponding to the test instruction stored in the blockchain network is first encrypted information obtained after asymmetric encryption by using the public key of the supervisor. Accordingly, in order to decrypt the first encrypted information to restore the identity information, the first encrypted information needs to be implemented by means of a private key of the supervisor. Because the private key of the supervisor is stored by the supervisor and cannot be obtained by other personnel, the identity information corresponding to the test instruction is disclosed to the supervisor and is kept secret for other types of personnel. Therefore, through the scheme design, on one hand, responsibility tracing of the supervision party to the testing party submitting the dangerous test instruction is not influenced, and on the other hand, identity privacy of the testing party is effectively guaranteed to a great extent.
In another possible implementation manner, the process of encrypting the identification information by the server may specifically include: and symmetrically encrypting the identity information by using a private key of the supervision party. That is, the identification information corresponding to the test instruction stored in the blockchain network is first encrypted information obtained by symmetric encryption by using the private key of the supervisor. Accordingly, in order to decrypt the first encrypted information to restore the identity information, the first encrypted information needs to be implemented by means of a private key of the supervisor. Through the design of the scheme, the following effects can be achieved as well: the identification information corresponding to the test instructions is public to the supervisor and private to other types of personnel.
S208, the server carries out hash operation on the binding information.
S209, the server carries out digital signature on the hash operation result.
S210, the server detects whether the preset upper chain piece is met or not currently.
S211, if the server detects that the preset chain uploading piece is met currently, uploading the digital signature result and the binding information to a block chain node located in a block chain network.
That is, in this embodiment, before the server performs the uplink to the digital signature result and the binding information, it is first determined whether a preset uplink component is currently satisfied, and if so, the uplink operation is triggered. Specifically, the blockchain network or the third party management platform can allocate corresponding legal uplink time for each server in a comprehensive way according to the self equipment load of each blockchain node in the current blockchain network and the communication load of the whole network and with the aim of minimizing the work load of the whole network. Before any server performs the uplink of the data, whether the current moment is consistent with the legal uplink moment acquired in advance or not needs to be detected, if so, the uplink operation is allowed to be performed on the digital signature result and the binding information, and if not, the uplink operation is forbidden to be performed on the digital signature result and the binding information.
S212, checking the digital signature result by using a blockchain node in a blockchain network, and storing the binding information after the checking is passed.
Fig. 10 is a flowchart of a test supervision method according to an embodiment of the present application. Referring to fig. 10, the test supervision method may include the steps of:
s301, the terminal of the testing party creates a testing instruction, wherein the testing instruction is used for testing the server.
S302, the test party terminal sends the test instruction to the server.
S303, the server acquires and executes the test instruction.
S304, the server collects the test instruction.
S305, the server binds the collected test instruction and the identity information under the condition that the preset binding triggering condition is met, so as to obtain binding information, wherein the identity information is used for representing the identity of a test party submitting the test instruction.
In this embodiment, the server may collect a plurality of test instructions corresponding to the same id information, and bind the collected plurality of test instructions with the id information after a preset binding triggering condition is satisfied, so as to greatly reduce the number of times of binding and reduce the information size of the whole binding data relative to the case that each test instruction is bound with the corresponding id information.
In this embodiment, during the process of collecting the test instruction, the server needs to monitor whether the preset binding triggering condition is currently met, and only after the fact that the preset binding triggering condition is currently met is monitored, the binding operation is allowed.
The preset binding triggering condition specifically may include: the number of the collected test instructions corresponding to the same identity information reaches a preset number value, or the whole data size of the collected test instructions corresponding to the same identity information reaches a preset data size, or the collection time length of the test instructions corresponding to the same identity information reaches a preset time length, and the like. It should be noted that in the embodiment of the present application, for the same binding information, it is finally added to the same block. The specific values of the preset number value, the preset data amount size, and the preset duration are not unrestricted, but are constrained by the block capacity size, considering that the capacity size of each block is limited. For this reason, the embodiment may specifically determine the preset number value, the preset data size, or the preset duration according to the capacity size of the block.
S306, the server performs tamper-proof protection on the binding information based on a preset protection mechanism, and restores the information subjected to the tamper-proof protection when the need of triggering hash operation is detected, so as to obtain the binding information.
In a specific embodiment, the preset protection mechanism may be an information tamper-proof protection mechanism constructed based on an encoding technology. Specifically, the server may perform encoding processing on the binding information by using a custom encoding rule to obtain encoded information, and when detecting that the hash operation needs to be triggered, perform decoding processing on the encoded information by using a custom decoding rule to restore to obtain the binding information, where the custom decoding rule is a decoding rule corresponding to the custom encoding rule. In this embodiment, the custom encoding rule and the custom decoding rule may specifically be an encoding rule and a decoding rule that are custom-defined by a supervisor. Since the coding and decoding rule is custom defined by the supervisor, the coding and decoding rule is an unknown set of coding and decoding rule for the outside world, and in addition, the coding information is generated based on which coding rule and is unknown for the outside world, so that the difficulty of the outside world attempting to restore the binding information through decoding can be greatly increased. If the external attempt directly tampers the information content of the encoded information, the decoded information obtained after the subsequent decoding processing becomes messy code information with unsmoothness. The server can directly send out relevant alarm information to the supervision terminal once the fact that the decoded information is the information with the unsound semantics is monitored through the semantic recognition technology in the natural language processing technology. It will be appreciated that the alert information may include, but is not limited to, a server IP address, current time period information, and information of a tester terminal in communication with the server during the current time period, etc.
In another specific embodiment, the preset protection mechanism may be an information tamper-proof protection mechanism constructed based on an asymmetric encryption technology. Specifically, the server may perform asymmetric encryption on the binding information by using the public key of the server to obtain second encrypted information, and decrypt the second encrypted information by using the private key of the server when the need of triggering the hash operation is detected, so as to restore and obtain the binding information. In this embodiment, the private key of the server itself is kept by the server, and cannot be obtained by the outside. After the server utilizes the public key of the server to asymmetrically encrypt the binding information to obtain second encrypted information, the outside cannot decrypt the second encrypted information, so that the outside is prevented from tampering the binding information. In this embodiment, the server may generate its own public key and private key using a local key generation program. In addition, in order to further improve the tamper protection effect, the server may update its public key and private key periodically according to a preset key update period.
S307, the server carries out hash operation on the binding information.
S308, the server carries out digital signature on the hash operation result.
S309, the server uploads the digital signature result and the binding information to a blockchain node located in the blockchain network.
And S310, checking the digital signature result by using a blockchain node in a blockchain network, and storing the binding information after the checking is passed.
It can be understood that all the foregoing optional technical solutions may be combined to form an optional embodiment of the present application, which is not described herein in detail.
From the foregoing, it can be seen that the foregoing operations are all performed by the server. In fact, the application can complete the uplink operation by the server, and can also complete the uplink operation by the terminal of the testing party. Referring specifically to fig. 11, fig. 11 is a flowchart of a test supervision method according to an embodiment of the application, where the test supervision method may include the following steps:
s401, the terminal of the testing party creates a testing instruction, wherein the testing instruction is used for testing the server.
S402, the test party terminal sends the test instruction to the server.
S403, the server acquires and tests the test instruction.
S404, the server feeds back prompt information indicating that the instruction is tested to the terminal of the testing party.
S405, after obtaining feedback information, the terminal of the testing party binds the testing instruction and the identity information to obtain binding information, wherein the identity information is used for representing the identity of the testing party; the feedback information is prompt information fed back by the server after the server executes the test instruction.
S406, the testing party terminal carries out hash operation on the binding information and carries out digital signature on a hash operation result.
S407, the terminal of the testing party uploads the digital signature result and the binding information to a block chain node in a block chain network.
S408, checking the digital signature result by using a blockchain node in a blockchain network, and storing the binding information after the checking is passed.
That is, the operations of information binding, hash operation, digital signature and information linking, which are originally completed by the server, are all completed by the testing party terminal in this embodiment, and the testing party terminal is configured to expand the operations of information binding, hash operation, digital signature and information linking after the server executes the test instruction and obtains the prompt information of the instruction completion fed back by the server. In addition, the operations of information binding, hash operation, digital signature, and information uplink performed by the terminal of the testing party in this embodiment are substantially similar to the related operations performed by the server in the foregoing embodiment, except for differences in execution subject, so the description of the technical details regarding the operations of information binding, hash operation, digital signature, and information uplink in this embodiment may refer to the corresponding contents of the foregoing embodiment, and will not be repeated herein.
After the information uplink operation is completed through the server or the terminal of the testing party, the query terminal can develop a corresponding uplink information query operation. Referring specifically to fig. 12, fig. 12 is a flowchart of a blockchain information query process in a test supervision method according to an embodiment of the application, where the blockchain information query process may include the following steps:
S501, the query terminal generates a query request aiming at a target test instruction.
In this embodiment, when it is found that the target test instruction once causes abnormal operation of the server, the target test instruction may be input to the query terminal, and then the query terminal generates a query request for the target test instruction.
S502, the query terminal sends the query request to a third party management platform.
S503, the third party management platform acquires a history test operation record from the blockchain network.
In this embodiment, in order to increase the data query speed and increase the types of the search keywords, the third party management platform may obtain all the history test operation records from the blockchain network in advance, where the history test operation records may include information such as the server IP address, the timestamp, the user name, the test instruction, and the like, and perform corresponding decryption operation on the encrypted data existing in the obtained history test operation records, for example, decrypt the asymmetrically encrypted user name in the history test operation records. It can be appreciated that the third party management platform may also obtain the corresponding transaction hash value, the block height, the transaction time, the blockchain account address, determine the corresponding blockhash value, and the like while obtaining the historical test operation record in the blockchain network.
It will be appreciated that the third party management platform may respond to both query requests for test instructions, and query requests for usernames, blockchain account addresses, transaction hash values, blockheights, transaction times, server IP addresses, or blockhash values, using the data information collected from the blockchain network. Each of the above query methods may support fuzzy queries. In addition, the third party management platform can also obtain the blockchain identification of any blockchain in the current blockchain network, and indexes such as total transaction number, today transaction number, transaction number in the latest preset time period, block number in the latest preset time period, total height of the block, current member number, current node number, historical concurrency peak value taking pen/second as a unit and the like of the blockchain. For example, the third party management platform may obtain metrics called blockchain identification of the testing chain, total number of transactions, number of transactions today, number of transactions in a last preset time period, number of blocks in a last preset time period, total height of blocks, current number of members, current number of nodes, historical concurrency peak in pen/second, etc., so that the supervisor can learn various metrics information of the testing chain in the current blockchain network through the third party management platform. It will be appreciated that the above-described test chain specifically refers to a blockchain in a blockchain network that is dedicated to recording historical test operation records.
S504, the third party management platform returns data information corresponding to the query request to the query terminal by utilizing the historical test operation record acquired from the blockchain network.
S505, the query terminal receives the data information to determine a responsible person corresponding to the target test instruction according to the data information.
The following describes the uplink and query process of the test data of the game server in the TrustSQL-based block chain network through a specific application scenario example. TrustSQL is a blockchain bottom framework, which is compatible with Mysql and JsonRPC and supports multiple consensus algorithms. TrustSQL specifically adopts a Bayesian fault-tolerant consensus mechanism, allows partial block chain nodes to downtime, and is beneficial to reducing the node access cost and improving the network reliability. TrustSQL is an elliptic curve digital signature algorithm, and the private key can be generated by the user, so that the binding relationship between the user test operation and the user cannot be tampered.
Referring specifically to fig. 13 and 14, fig. 13 is a schematic diagram of a multi-layer architecture of the whole system, and fig. 14 is a schematic diagram of uplink and query application of test data in a specific application scenario.
In fig. 13, the Linux Shell client runs on the tester terminal, and the tester terminal creates a test instruction through the Linux Shell client and sends the test instruction to the game server to test the game server. An Agent program for monitoring and collecting executed test instructions on the game server may be deployed on the Agent layer; the API interface for information uplink, the API interface for uplink information inquiry and the service for managing the blockchain account can be deployed on the Agent layer; processing Logic associated with an instruction rights management service, an instruction uplink service, an instruction query service, an instruction statistics service, an instruction alert service, or other auxiliary class services may all be deployed on the Logic layer; the underlying consensus module, data nodes, and traffic databases associated with the blockchain network may all be located at the DB layer. In fig. 13, baaS platform (BaaS, blockchain AS A SERVICE, blockchain as a service) as a third party management platform can provide blockchain information query service and instruction statistics service for users. Further, the BaaS platform may also provide services such as node monitoring services, node purchasing services, chain creation services, and the like. It will be appreciated that if the query of the blockchain information is not performed by the third party management platform, the present embodiment may also develop a management background on the game server specifically for the query of the blockchain information, but such development costs are relatively high.
In fig. 14, the test party terminal acquires a test instruction input by the test party, which includes an rm-rf instruction, and then sends the test instruction to the game server. After the game server executes the test instruction, redundancy removal processing can be performed on the test instruction to obtain an rm-rf instruction, then the rm-rf instruction and identity information containing a user name 'tt_tom' of a testing party are bound, hash operation is performed on the binding information, a private key is used for carrying out digital signature on a hash operation result, and then the digital signature result and the binding information are sent to any block chain node of the block chain network built based on TrustSQL. After the block chain node obtains the digital signature result and the binding information, the digital signature result is checked by utilizing a public key corresponding to the private key, if the digital signature result passes the check, a block containing the binding information can be generated on the block chain node subsequently, the block is broadcast to other block chain nodes in a block chain network, and after the verification of other block chain nodes passes, the block can be added to the block chain. Subsequently, if the supervisor terminal needs to send a query request for the rm-rf instruction to the BaaS platform, the BaaS platform can query the identity information containing the user name of "tt_tom" corresponding to the rm-rf instruction by using the historical test operation record obtained from the blockchain network in advance, and then returns the queried information to the supervisor terminal, so that the supervisor can know that the rm-rf instruction is submitted to the game server by the "tt_tom", and accurate responsibility tracing can be realized.
Fig. 15 is a schematic diagram of a test supervision apparatus according to an embodiment of the present application, including:
An instruction acquisition module 31 for acquiring a test instruction; the test instruction is used for testing the server;
an instruction execution module 32 for executing the test instruction;
the information binding module 33 is configured to bind the test instruction and the identity information to obtain binding information; the identity information is used for representing the identity of a testing party submitting the testing instruction;
A hash operation module 34, configured to perform hash operation on the binding information;
a digital signature module 35, configured to digitally sign the hash operation result;
And the information uplink module 36 is configured to upload the digital signature result and the binding information to a blockchain node located in the blockchain network, so that the blockchain node performs signature verification on the digital signature result and stores the binding information after the signature verification passes.
In one possible implementation manner, the information binding module 33 may specifically include:
the identification information encryption unit is used for encrypting the identification information to obtain first encrypted information;
and the first information binding unit is used for binding the test instruction and the first encryption information.
In one possible implementation manner, the identification information encryption unit is specifically configured to: and carrying out asymmetric encryption on the identity information by using a public key of a supervisor, wherein the supervisor is a supervisor responsible for the test behavior of the tester.
In one possible implementation manner, the information binding module 33 may specifically include:
an instruction feature recognition unit for recognizing instruction features of the test instruction;
the instruction description unit is used for generating corresponding instruction description information for the test instruction conforming to the preset instruction characteristics;
And the second information binding unit is used for binding the test instruction, the identity identification information and the instruction description information.
In one possible implementation manner, the information binding module 33 may specifically include:
The instruction collection unit is used for collecting the test instructions;
and the third instruction binding unit is used for binding the collected test instruction and the identity information after the preset binding triggering condition is met.
In one possible implementation manner, the test supervision apparatus may further include:
The first protection module is configured to encode the binding information by using a custom encoding rule before the hash operation module 34 performs hash operation on the binding information, so as to obtain encoded information; when the need of triggering the hash operation is detected, decoding the encoded information by utilizing a custom decoding rule to restore the encoded information to obtain the binding information, wherein the custom decoding rule is a decoding rule corresponding to the custom encoding rule.
In one possible implementation manner, the test supervision apparatus may further include:
The second protection module is configured to asymmetrically encrypt the binding information by using the public key of the server before the hash operation module 34 performs hash operation on the binding information, so as to obtain second encrypted information; and when the need of triggering the hash operation is detected, decrypting the second encrypted information by using the private key of the server so as to restore and obtain the binding information.
In one possible implementation manner, the test supervision apparatus may further include:
The permission determining module is configured to determine, before the instruction obtaining module 31 obtains a test instruction, whether the test party has instruction submitting permission according to a blockchain account detection result of the test party or historical test data stored on a blockchain network;
And the certificate issuing module is used for issuing a corresponding instruction submitting permission certificate to a terminal held by the testing party after the permission determining module determines that the testing party has the instruction submitting permission, so that the terminal held by the testing party submits the testing instruction to the server according to the instruction submitting permission certificate, and the instruction submitting permission certificate is a certificate obtained by utilizing the public key of the testing party to carry out asymmetric encryption.
In one possible implementation, the information uplink module 36 may specifically include:
the time detection unit is used for detecting whether the current time is consistent with the legal uplink time acquired in advance;
And the information uplink unit is used for uploading the digital signature result and the binding information to a blockchain node positioned in a blockchain network under the condition that the current moment is consistent with the legal uplink moment.
In one possible implementation, the information uplink module 36 may specifically include:
the node screening unit is used for screening the block chain nodes in the block chain network according to the load information and the position information of each current block chain node to obtain a target node;
And the information uploading unit is used for uploading the digital signature result and the binding information to the target node.
In one possible implementation, the information uplink module 36 may be specifically configured to: and uploading the digital signature results and the corresponding binding information to different blockchain nodes in a blockchain network respectively.
After the test instruction is acquired and executed, the device provided by the embodiment of the application binds the test instruction with the identity information of the corresponding test party, and after hash operation and digital signature are sequentially carried out on the binding information, the digital signature result and the binding information are uploaded to the blockchain node in the blockchain network, so that the blockchain node can check the digital signature result and store the binding information after the digital signature result passes the check. Therefore, the embodiment of the application stores the binding information through the blockchain network, and the binding information is obtained after the test instruction and the identity information of the corresponding test party are bound, which means that after the binding information is linked, the test instruction, the identity information and the binding relation among the test instruction and the identity information in the binding information cannot be tampered, and a later supervisor can accurately find the identity information bound with the test instruction from the blockchain network by using the test instruction related to the test accident when tracing the responsibility of the test accident, thereby accurately tracing the actual responsible person, namely ensuring the consistency between the traced responsible person and the actual responsible person and avoiding the occurrence of the condition of tracing back failure.
Fig. 16 is a schematic diagram of a test supervision apparatus applied to a terminal held by a tester, including:
An instruction creation module 41 for creating a test instruction; the test instruction is used for testing the server;
an instruction sending module 42, configured to send the test instruction to the server;
An information binding module 43, configured to bind the test instruction and the identity information after obtaining the feedback information, to obtain binding information; the identity information is used for representing the identity of the testing party; the feedback information is prompt information fed back by the server after the server executes the test instruction;
a hash operation module 44, configured to perform hash operation on the binding information;
A digital signature module 45, configured to digitally sign the hash operation result;
The information uplink module 46 is configured to upload the digital signature result and the binding information to a blockchain node located in a blockchain network, so that the blockchain node performs signature verification on the digital signature result and stores the binding information after the signature verification passes.
That is, the operations of information binding, hash operation, digital signature and information linking, which are originally completed by the server, are all completed by the testing party terminal in this embodiment, and the testing party terminal is configured to expand the operations of information binding, hash operation, digital signature and information linking after the server executes the test instruction and obtains the prompt information of the instruction completion fed back by the server. In addition, the operations of information binding, hash operation, digital signature, and information uplink performed by the test-side terminal in this embodiment are substantially similar to the related operations performed by the server in the foregoing embodiment, except for differences in execution subject, so the description of the technical details regarding the operations of information binding, hash operation, digital signature, and information uplink performed by the corresponding functional modules in this embodiment may refer to the corresponding contents of the foregoing embodiment, and will not be repeated herein.
Further, the embodiment of the application also provides electronic equipment. The electronic device may be the server 50 shown in fig. 17 or the terminal 60 shown in fig. 18. Fig. 17 and 18 are structural diagrams of an electronic device according to an exemplary embodiment, and the contents of the drawings should not be construed as any limitation on the scope of use of the present application.
Fig. 17 is a schematic structural diagram of a server according to an embodiment of the present application. The server 50 may specifically include: at least one processor 51, at least one memory 52, a power supply 53, a communication interface 54, an input output interface 55, and a communication bus 56. Wherein the memory 52 is configured to store a computer program that is loaded and executed by the processor 51 to implement the relevant steps of the server-executed test supervision method disclosed in any one of the foregoing embodiments.
In this embodiment, the power supply 53 is configured to provide an operating voltage for each hardware device on the server 50; the communication interface 54 can create a data transmission channel between the server 50 and an external device, and the communication protocol to be followed is any communication protocol applicable to the technical solution of the present application, which is not specifically limited herein; the input/output interface 55 is used for acquiring external input data or outputting external output data, and the specific interface type thereof may be selected according to the specific application needs, which is not limited herein.
The memory 52 may be a carrier for storing resources, such as a read-only memory, a random access memory, a magnetic disk, or an optical disk, and the resources stored thereon include an operating system 521, a computer program 522, and data 523, and the storage may be temporary storage or permanent storage.
The operating system 521 is used for managing and controlling various hardware devices on the Server 50 and the computer program 522 to implement the operation and processing of the processor 51 on the mass data 523 in the memory 52, which may be Windows Server, netware, unix, linux, etc. The computer program 522 may further include a computer program that can be used to perform other specific tasks in addition to the computer program that can be used to perform the test supervision method performed by the server as disclosed in any of the previous embodiments. The data 523 may include, in addition to data such as test instructions collected by the server and identification information of the test party, service data such as game data and e-commerce transaction data.
Fig. 18 is a schematic structural diagram of a terminal according to an embodiment of the present application, and the terminal 60 may specifically include, but is not limited to, a smart phone, a tablet computer, a notebook computer, a desktop computer, or the like.
Generally, the terminal 60 in this embodiment includes: a processor 61 and a memory 62.
Processor 61 may include one or more processing cores, such as a 4-core processor, an 8-core processor, etc. The processor 61 may be implemented in at least one hardware form of DSP (DIGITAL SIGNAL Processing), FPGA (Field-Programmable gate array), PLA (Programmable Logic Array ). The processor 61 may also include a main processor, which is a processor for processing data in an awake state, also called a CPU (Central Processing Unit ), and a coprocessor; a coprocessor is a low-power processor for processing data in a standby state. In some embodiments, the processor 61 may integrate a GPU (Graphics Processing Unit, image processor) for rendering and drawing of content required to be displayed by the display screen. In some embodiments, the processor 61 may also include an AI (ARTIFICIAL INTELLIGENCE ) processor for processing computing operations related to machine learning.
Memory 62 may include one or more computer-readable storage media, which may be non-transitory. Memory 62 may also include high-speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In this embodiment, the memory 62 is at least used for storing a computer program 621, where the computer program, after being loaded and executed by the processor 61, can implement relevant steps in the test supervision method performed by the terminal side as disclosed in any of the foregoing embodiments. In addition, the resources stored by the memory 62 may also include an operating system 622, data 623, and the like, and the storage manner may be transient storage or permanent storage. Wherein the operating system 622 may include Windows, unix, linux, etc. The data 623 may include, but is not limited to, test instruction data, user identity data, and the like.
In some embodiments, the terminal 60 may further include a display 63, an input-output interface 64, a communication interface 65, a sensor 66, a power supply 67, and a communication bus 68.
Those skilled in the art will appreciate that the structure shown in fig. 18 is not limiting of the terminal 60 and may include more or fewer components than shown.
Further, the embodiment of the application also discloses a storage medium, wherein the storage medium stores computer executable instructions, and when the computer executable instructions are loaded and executed by a processor, the steps of the test supervision method executed by the server disclosed in any embodiment or the steps of the test supervision method executed by the terminal disclosed in any embodiment are realized.
It should be noted that the foregoing is only a preferred embodiment of the present application, and is not intended to limit the present application, but any modification, equivalent replacement, improvement, etc. which fall within the spirit and principles of the present application should be included in the scope of the present application.
In this specification, each embodiment is described in a progressive manner, and each embodiment is mainly described in a different point from other embodiments, so that the same or similar parts between the embodiments are referred to each other. For the device disclosed in the embodiment, since it corresponds to the method disclosed in the embodiment, the description is relatively simple, and the relevant points refer to the description of the method section.
The foregoing has described in detail a test supervision method, apparatus, device and storage medium provided by the present application, and specific examples are applied herein to illustrate the principles and embodiments of the present application, and the above examples are only for helping to understand the method and core ideas of the present application; meanwhile, as those skilled in the art will have variations in the specific embodiments and application scope in accordance with the ideas of the present application, the present description should not be construed as limiting the present application in view of the above.

Claims (22)

1. A method of test supervision, comprising:
Acquiring and executing a test instruction; the test instruction is used for testing the server;
When a preset binding triggering condition is met, the test instruction and the identity identification information are bound to obtain binding information; the identity information is used for representing the identity of a testing party submitting the testing instruction;
carrying out hash operation on the binding information and carrying out digital signature on a hash operation result;
uploading the digital signature result and the binding information to a blockchain node positioned in a blockchain network so that the blockchain node can check the digital signature result and store the binding information after the digital signature passes;
when there are a plurality of digital signature results and corresponding binding information, the uploading the digital signature results and the binding information to a blockchain node located in a blockchain network includes:
Uploading the digital signature results and the corresponding binding information to different blockchain nodes in a blockchain network respectively; all binding information corresponding to the same digital signature result belongs to the same blockchain account, and binding information corresponding to different digital signature results belongs to the same blockchain account or different blockchain accounts.
2. The method of claim 1, wherein the binding the test instruction and the identification information comprises:
encrypting the identity information to obtain first encrypted information;
binding the test instruction and the first encryption information.
3. The method of testing supervision according to claim 2, wherein encrypting the identity information comprises:
And carrying out asymmetric encryption on the identity information by using a public key of a supervisor, wherein the supervisor is a supervisor responsible for the test behavior of the tester.
4. The method of claim 1, wherein the binding the test instruction and the identification information comprises:
Identifying instruction features of the test instruction;
Generating corresponding instruction description information for the test instruction conforming to the preset instruction characteristics;
Binding the test instruction, the identification information and the instruction description information.
5. The method of claim 1, wherein the binding the test instruction and the identification information comprises:
Collecting the test instruction;
and binding the collected test instruction and the identity information after the preset binding triggering condition is met.
6. The method of testing supervision according to claim 5, further comprising, prior to hashing the binding information:
coding the binding information by using a custom coding rule to obtain coding information;
When the need of triggering the hash operation is detected, decoding the encoded information by utilizing a custom decoding rule to restore the encoded information to obtain the binding information, wherein the custom decoding rule is a decoding rule corresponding to the custom encoding rule.
7. The method of testing supervision according to claim 5, further comprising, prior to hashing the binding information:
carrying out asymmetric encryption on the binding information by utilizing the public key of the server to obtain second encryption information;
and when the need of triggering the hash operation is detected, decrypting the second encrypted information by using the private key of the server so as to restore and obtain the binding information.
8. The method of claim 1, further comprising, prior to the obtaining and executing the test instruction:
Determining whether the testing party has instruction submitting authority according to a blockchain account detection result of the testing party or historical test data stored on a blockchain network;
and if the testing party is determined to have the instruction submitting permission, issuing a corresponding instruction submitting permission certificate to a terminal held by the testing party, so that the terminal held by the testing party submits the testing instruction to the server according to the instruction submitting permission certificate, wherein the instruction submitting permission certificate is a certificate obtained by utilizing a public key of the testing party to carry out asymmetric encryption.
9. The method of any of claims 1 to 8, wherein the uploading the digital signature result and the binding information to a blockchain node located in a blockchain network comprises:
Detecting whether the current moment is consistent with the legal uplink moment acquired in advance;
And if the current time is consistent with the legal uplink time, uploading the digital signature result and the binding information to a block chain node positioned in a block chain network.
10. The method of any of claims 1 to 8, wherein the uploading the digital signature result and the binding information to a blockchain node located in a blockchain network comprises:
According to the load information and the position information of each current blockchain node, the blockchain nodes in the blockchain network are screened to obtain target nodes;
And uploading the digital signature result and the binding information to the target node.
11. A test supervision apparatus, comprising:
the instruction acquisition module is used for acquiring a test instruction; the test instruction is used for testing the server;
The instruction execution module is used for executing the test instruction;
The information binding module is used for binding the test instruction and the identity information to obtain binding information when a preset binding triggering condition is met; the identity information is used for representing the identity of a testing party submitting the testing instruction;
the hash operation module is used for carrying out hash operation on the binding information;
The digital signature module is used for carrying out digital signature on the hash operation result;
The information uplink module is used for uploading the digital signature result and the binding information to a blockchain node positioned in a blockchain network so that the blockchain node can check the digital signature result and store the binding information after the digital signature result passes the check;
When a plurality of digital signature results and corresponding binding information exist, the information uplink module is specifically configured to: uploading the digital signature results and the corresponding binding information to different blockchain nodes in a blockchain network respectively; all binding information corresponding to the same digital signature result belongs to the same blockchain account, and binding information corresponding to different digital signature results belongs to the same blockchain account or different blockchain accounts.
12. The apparatus of claim 11, wherein the information binding module specifically comprises:
the identification information encryption unit is used for encrypting the identification information to obtain first encrypted information;
and the first information binding unit is used for binding the test instruction and the first encryption information.
13. The apparatus according to claim 12, wherein the identification information encrypting unit is specifically configured to: and carrying out asymmetric encryption on the identity information by using a public key of a supervisor, wherein the supervisor is a supervisor responsible for the test behavior of the tester.
14. The apparatus of claim 11, wherein the information binding module specifically comprises:
an instruction feature recognition unit for recognizing instruction features of the test instruction;
the instruction description unit is used for generating corresponding instruction description information for the test instruction conforming to the preset instruction characteristics;
And the second information binding unit is used for binding the test instruction, the identity identification information and the instruction description information.
15. The apparatus of claim 11, wherein the information binding module specifically comprises:
The instruction collection unit is used for collecting the test instructions;
and the third instruction binding unit is used for binding the collected test instruction and the identity information after the preset binding triggering condition is met.
16. The apparatus of claim 15, wherein the test supervision apparatus further comprises:
the first protection module is used for carrying out coding processing on the binding information by utilizing a custom coding rule before the hash operation module carries out hash operation on the binding information to obtain coding information; when the need of triggering the hash operation is detected, decoding the encoded information by utilizing a custom decoding rule to restore the encoded information to obtain the binding information, wherein the custom decoding rule is a decoding rule corresponding to the custom encoding rule.
17. The apparatus of claim 15, wherein the test supervision apparatus further comprises:
The second protection module is used for asymmetrically encrypting the binding information by utilizing the public key of the server before the hash operation module performs hash operation on the binding information to obtain second encrypted information; and when the need of triggering the hash operation is detected, decrypting the second encrypted information by using the private key of the server so as to restore and obtain the binding information.
18. The apparatus of claim 11, wherein the test supervision apparatus further comprises:
The permission determining module is used for determining whether the testing party has instruction submitting permission or not according to the block chain account detection result of the testing party or historical test data stored on a block chain network before the instruction obtaining module obtains the testing instruction;
And the certificate issuing module is used for issuing a corresponding instruction submitting permission certificate to a terminal held by the testing party after the permission determining module determines that the testing party has the instruction submitting permission, so that the terminal held by the testing party submits the testing instruction to the server according to the instruction submitting permission certificate, and the instruction submitting permission certificate is a certificate obtained by utilizing the public key of the testing party to carry out asymmetric encryption.
19. The apparatus according to any of the claims 11 to 18, wherein the information uplink module specifically comprises:
the time detection unit is used for detecting whether the current time is consistent with the legal uplink time acquired in advance;
And the information uplink unit is used for uploading the digital signature result and the binding information to a blockchain node positioned in a blockchain network under the condition that the current moment is consistent with the legal uplink moment.
20. The apparatus according to any of the claims 11 to 18, wherein the information uplink module specifically comprises:
the node screening unit is used for screening the block chain nodes in the block chain network according to the load information and the position information of each current block chain node to obtain a target node;
And the information uploading unit is used for uploading the digital signature result and the binding information to the target node.
21. An electronic device comprising a processor and a memory; wherein the memory is for storing a computer program that is loaded and executed by the processor to implement the test supervision method of any one of claims 1 to 10.
22. A storage medium having stored therein computer executable instructions which when loaded and executed by a processor implement the test supervision method according to any one of claims 1 to 10.
CN201910561207.9A 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium Active CN110263585B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201911269625.7A CN110826111B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium
CN201910561207.9A CN110263585B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910561207.9A CN110263585B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201911269625.7A Division CN110826111B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110263585A CN110263585A (en) 2019-09-20
CN110263585B true CN110263585B (en) 2024-04-26

Family

ID=67921785

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201911269625.7A Active CN110826111B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium
CN201910561207.9A Active CN110263585B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201911269625.7A Active CN110826111B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium

Country Status (1)

Country Link
CN (2) CN110826111B (en)

Families Citing this family (27)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110572480B (en) * 2019-10-14 2022-07-05 腾讯科技(深圳)有限公司 Method, device and equipment for realizing calibration of test equipment
CN111079136B (en) * 2019-11-07 2022-02-11 北京科技大学 Fog computing intrusion detection feature sharing system based on block chain technology
CN110941533B (en) * 2019-11-20 2023-04-18 腾讯科技(深圳)有限公司 Monitoring method, monitoring device and computer readable storage medium
CN111324517B (en) * 2020-01-20 2023-08-18 阿尔法云计算(深圳)有限公司 Application service supervision method, supervision server and storage medium
CN111291339B (en) * 2020-02-19 2024-02-06 上海方付通商务服务有限公司 Method, device, equipment and storage medium for processing blockchain data
CN111563365B (en) * 2020-03-31 2023-09-19 岭东核电有限公司 Method and device for processing modification information of test standard worksheet and computer equipment
CN111679648B (en) * 2020-05-22 2021-06-01 浙江浙能技术研究院有限公司 Multivariate closed-loop control loop performance evaluation method based on Gaussian process regression
CN111786791A (en) * 2020-06-16 2020-10-16 湖南天河国云科技有限公司 Industrial Internet data acquisition method based on block chain and gateway
CN111478827B (en) * 2020-06-24 2020-12-04 支付宝(杭州)信息技术有限公司 Pressure testing method, device and system for block chain network
CN111866088B (en) * 2020-06-29 2022-08-26 深圳壹账通智能科技有限公司 Block chain based test method and device, computer equipment and storage medium
CN111783122B (en) * 2020-07-03 2022-07-15 常熟中信金桥科技服务有限公司 Research and development trial-production information management method and system
CN111953940B (en) * 2020-08-06 2021-07-27 中标慧安信息技术股份有限公司 Uploading processing method and system for monitoring video
CN111988149B (en) * 2020-08-31 2022-09-23 中国信息通信研究院 Data sharing method, device and system in industrial internet
CN112015460B (en) * 2020-09-09 2023-11-03 南京工程学院 Code responsibility-following method and system based on block chain technology
CN112163171B (en) * 2020-09-21 2022-03-18 中国电子科技网络信息安全有限公司 Data chaining method based on terminal signature
CN112269838B (en) * 2020-11-18 2023-07-25 网易(杭州)网络有限公司 Blockchain-based supervision method and device, electronic equipment and storage medium
CN112711631B (en) * 2020-11-27 2022-07-08 国网山东省电力公司营销服务中心(计量中心) Digital twin information synchronization method, system, readable storage medium and device
CN112333206B (en) * 2020-12-24 2021-03-30 长沙树根互联技术有限公司 Safety test method and device and electronic equipment
CN112925846A (en) * 2021-01-18 2021-06-08 迅鳐成都科技有限公司 Historical operation tracing method and system based on block chain and identity authentication
CN115114603B (en) * 2021-03-17 2024-06-11 中国移动通信集团福建有限公司 Base station equipment data management method and device and electronic equipment
CN113221159A (en) * 2021-04-19 2021-08-06 湖北邮电规划设计有限公司 Epidemic situation reporting system based on block chain
CN115277686B (en) * 2021-04-30 2024-04-19 中国移动通信集团辽宁有限公司 Data transmission method, device, equipment and computer storage medium
CN113672994B (en) * 2021-09-03 2023-12-01 中国联合网络通信集团有限公司 Cooking equipment data management method, device and system based on blockchain
CN114143067B (en) * 2021-11-26 2024-04-19 天翼视联科技有限公司 Instruction processing method and system of dial testing system
CN115150360B (en) * 2022-06-28 2023-12-19 北京送好运信息技术有限公司 Mailbox address and blockchain address binding method based on blockchain technology
CN115277179A (en) * 2022-07-26 2022-11-01 湖南三湘银行股份有限公司 Open platform comprehensive safety protection method based on multi-step protection
CN116684207B (en) * 2023-08-03 2023-10-20 杭州字节方舟科技有限公司 Method, device, equipment and medium for processing monitoring data based on blockchain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106933709A (en) * 2015-12-31 2017-07-07 北京金山云网络技术有限公司 A kind of method of testing and device
WO2018050081A1 (en) * 2016-09-13 2018-03-22 中国移动通信有限公司研究院 Device identity authentication method and apparatus, electric device, and storage medium
CN108200208A (en) * 2018-02-11 2018-06-22 广西师范学院 Logistics block chain common recognition algorithm based on cloud computing
CN108833514A (en) * 2018-06-01 2018-11-16 众安信息技术服务有限公司 Audit log processing method, device and Log Audit System based on block chain
CN109447648A (en) * 2018-12-07 2019-03-08 深圳市智税链科技有限公司 The method of recorded data zone block, accounting nodes and medium in block chain network

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9122789B1 (en) * 2008-11-24 2015-09-01 Jpmorgan Chase Bank, N.A. System and method for testing applications with a load tester and testing translator
US20150187223A1 (en) * 2013-12-30 2015-07-02 Pearson Education, Inc. Deidentified access of instructional content
CN106469113B (en) * 2015-08-18 2023-08-08 腾讯科技(深圳)有限公司 Application program testing method and system
CN108874596B (en) * 2017-05-08 2022-11-08 龙芯中科(山西)技术有限公司 Server stability testing method and server
CN108076063A (en) * 2017-12-25 2018-05-25 天津理工大学 Network O&M auditing method, server terminal and client based on block chain
CN108694500B (en) * 2018-04-26 2021-04-13 布比(北京)网络技术有限公司 Block chain-based digital asset circulation method and system
CN109194708B (en) * 2018-07-24 2021-07-13 哈尔滨工程大学 Distributed storage system based on block chain technology and identity authentication method thereof
CN109800248A (en) * 2018-12-17 2019-05-24 上海点融信息科技有限责任公司 Digital content for block chain network is traced to the source and recording method, storage medium, calculating equipment
CN109741063A (en) * 2019-01-10 2019-05-10 众安信息技术服务有限公司 Digital signature method and device based on block chain
CN109828958A (en) * 2019-01-31 2019-05-31 北京瑞卓喜投科技发展有限公司 Event recording method and record system based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106933709A (en) * 2015-12-31 2017-07-07 北京金山云网络技术有限公司 A kind of method of testing and device
WO2018050081A1 (en) * 2016-09-13 2018-03-22 中国移动通信有限公司研究院 Device identity authentication method and apparatus, electric device, and storage medium
CN108200208A (en) * 2018-02-11 2018-06-22 广西师范学院 Logistics block chain common recognition algorithm based on cloud computing
CN108833514A (en) * 2018-06-01 2018-11-16 众安信息技术服务有限公司 Audit log processing method, device and Log Audit System based on block chain
CN109447648A (en) * 2018-12-07 2019-03-08 深圳市智税链科技有限公司 The method of recorded data zone block, accounting nodes and medium in block chain network

Also Published As

Publication number Publication date
CN110826111A (en) 2020-02-21
CN110263585A (en) 2019-09-20
CN110826111B (en) 2021-08-13

Similar Documents

Publication Publication Date Title
CN110263585B (en) Test supervision method, device, equipment and storage medium
CN110457957B (en) Information processing method and device of electronic bill, electronic equipment and medium
CN108810006B (en) Resource access method, device, equipment and storage medium
CN112217835B (en) Message data processing method and device, server and terminal equipment
CN111694840A (en) Data synchronization method, device, server and storage medium
CN114372296B (en) Block chain-based user behavior data auditing method and system
CN107506289A (en) The abnormality monitoring method and financial terminal of a kind of financial terminal
CN113315828B (en) Traffic recording method and device, traffic recording equipment and storage medium
CN110866265A (en) Data storage method, device and storage medium based on block chain
CN112487042B (en) Electric energy metering data processing method, device, computer equipment and storage medium
CN114564757A (en) Data auditing method, device and equipment of block chain and readable storage medium
CN111488372A (en) Data processing method, device and storage medium
CN110062926A (en) Device driver telemetering
CN110866261A (en) Data processing method and device based on block chain and storage medium
CN111339141A (en) Data transmission method, block link node equipment and medium
CN112131002A (en) Data management method and device
CN114625767A (en) Data query method, device, equipment and readable medium
CN112069529B (en) Block chain-based volume management method and device, computer and storage medium
EP4120096A1 (en) Method and device for data retrieval, electronic device, and storage medium
CN113129017B (en) Information sharing method, device and equipment
CN113505260A (en) Face recognition method and device, computer readable medium and electronic equipment
CN115567218A (en) Data processing method and device of security certificate based on block chain and server
CN116070191A (en) Information processing method and device, storage medium, and program product
CN115221136A (en) Log tamper-proof verification system, method and device and computer equipment
CN113010480B (en) Log processing method, device, electronic equipment and computer readable storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40008584

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant