Disclosure of Invention
The invention aims to provide a method for optimizing and testing data payload by computer software, which divides the tested computer software into three copies, decodes the three copies into three payloads, and respectively transfers the payloads into three computers with the same specification configuration for hierarchical processing, when the copies are decoded, the computers can automatically store the generated data, thereby avoiding the phenomenon of data loss in the testing process, increasing the safety of the computer software testing, an application tester and an evaluator can carry out data detection on the using effect of the payloads after hierarchical processing, and people can visually see the difference between the data detected by different processing through comparison, thereby avoiding the occurrence of a leak in the data payload optimized and tested by the computer software, and increasing the comprehensive optimization to solve the problems in the background technology.
In order to achieve the purpose, the invention provides the following technical scheme: a method for optimizing test data payload by computer software comprises a main computer, wherein the output end of the main computer is provided with a first computer, a second computer and a third computer, the output end of the third computer is provided with an application tester, the output end of the application tester is provided with an evaluator, and the method specifically comprises the following steps:
a) Creating a plurality of copies of computer software to be optimized through a host computer, and moving the copies to different computer equipment;
b) Decoding the software copy through computer equipment, and storing the payload data generated by decoding through pluggable storage equipment;
c) Transferring the effective load data analyzed by the computer equipment to a database of effective loads through the pluggable storage equipment for storage;
d) Moving the effective load copies to different computer equipment, carrying out different levels of processing, then using, and detecting the using effect of the computer equipment by using a tester;
e) And transmitting the data used by the computer equipment to be tested to an evaluator, and evaluating the use effect of the software.
In a preferred embodiment, the computer software creates three copies, marked as a first copy, a second copy and a third copy, to be handed over to the first computer, the second computer and the second computer, respectively.
In a preferred embodiment, the first computer, the second computer and the second computer are all configured in the same specification, the first copy of the payload, the second copy of the payload and the third copy of the payload are generated by decoding the first copy, the second copy and the third copy of the payload, and data generated when the data are decoded by the first computer, the second computer and the second computer are automatically stored in the corresponding computers.
In a preferred embodiment, the first copy is approved for further processing by data inspection software in a first computer, and a second copy of the test data payload is sent over a computer network to a computer software application at a second computer for handling the threat.
In a preferred embodiment, the pluggable storage device comprises a storage hard disk, a U disk, an electronic device with a storage function and the like, and the second computer does not perform any processing on the third copy of the payload.
In a preferred embodiment, the first copy is processed by a data checking software of the first computer to test its associated security vulnerabilities.
In a preferred embodiment, the database of payloads is embodied as a web site and the evaluator may provide a description of data inspection software for use by a computer software application to a payload application tester at the computer.
In a preferred embodiment, the output of the application tester is electrically connected to the input of the evaluator.
The invention has the technical effects and advantages that: the computer software to be tested is divided into three copies, three copies of software are decoded into three payloads, the payloads are respectively transferred into three computers with the same specification configuration for hierarchical processing, when the copies of software are decoded, the computers can automatically store generated data, the phenomenon of data loss in the testing process is avoided, the safety of computer software testing is improved, the application tester and the evaluator can carry out data detection on the using effect of the payloads after hierarchical processing, through comparison, people can visually see that the differences among the data are detected through different processing, and therefore the situation that the payloads of the data are optimized and tested through the computer software is prevented from being leaked, and the optimization comprehensiveness is improved.
Detailed Description
The technical solutions in the embodiments of the present invention will be clearly and completely described below with reference to the embodiments of the present invention, and it is obvious that the described embodiments are only a part of the embodiments of the present invention, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1:
the invention provides a method for optimizing test data payload by computer software, which comprises a main computer 1, wherein the output end of the main computer 1 is provided with a first computer 2, a second computer 3 and a third computer 4, the output end of the third computer 4 is provided with an application tester 5, the output end of the application tester 5 is provided with an evaluator 6, and the specific steps are as follows:
a) Creating a plurality of copies of computer software to be optimized through a host computer 1, moving the computer software into different computer equipment, wherein the number of the created copies of the computer software is three, the created copies are marked as a first copy, a second copy and a third copy, and are respectively handed over into a first computer 2, a second computer 3 and a second computer 4, and the specification configurations of the first computer 2, the second computer 3 and the second computer 4 are the same;
b) Decoding the first copy, the second copy and the third copy of the software through computer equipment, storing the first copy of a payload, the second copy of the payload and the third copy of the payload which are generated by decoding the first copy, the second copy and the third copy of the software through pluggable storage equipment, wherein the pluggable storage equipment comprises a storage hard disk, a U disk, electronic equipment with a storage function and the like, and data generated when the first computer 2, the second computer 3 and the second computer 4 decode can be automatically stored in the corresponding computers;
c) Transferring the effective load data analyzed by the computer equipment to a database of the effective load through the pluggable storage equipment for storage, wherein the database of the effective load is a network website;
d) Respectively transferring the first copy of the payload, the second copy of the payload and the third copy of the payload into a first computer 2, a second computer 3 and a second computer 4, testing the relevant security loopholes of the first copy after the first copy is processed by data inspection software of the first computer 2, processing the security loopholes, using the security loopholes, and detecting the using effect of computer equipment by using a tester 5;
e) Data used by the computer device to which the test is applied is transmitted to an evaluator 6, which evaluates the effect of the use of the software, and the evaluator 6 can provide a description of the data-checking software used by the computer software application to a payload application tester 5 at the computer.
Example 2:
the invention provides a method for optimizing test data payload by computer software, which comprises a main computer 1, wherein the output end of the main computer 1 is provided with a first computer 2, a second computer 3 and a third computer 4, the output end of the third computer 4 is provided with an application tester 5, the output end of the application tester 5 is provided with an evaluator 6, and the specific steps are as follows:
a) Creating a plurality of copies of computer software to be optimized through a host computer 1, moving the computer software into different computer equipment, wherein the number of the created copies of the computer software is three, the created copies are marked as a first copy, a second copy and a third copy, and are respectively handed over into a first computer 2, a second computer 3 and a second computer 4, and the specification configurations of the first computer 2, the second computer 3 and the second computer 4 are the same;
b) Decoding the first copy, the second copy and the third copy of the software through computer equipment, storing the first copy of a payload, the second copy of the payload and the third copy of the payload which are generated by decoding the first copy, the second copy and the third copy of the software through pluggable storage equipment, wherein the pluggable storage equipment comprises a storage hard disk, a U disk, electronic equipment with a storage function and the like, and data generated when the first computer 2, the second computer 3 and the second computer 4 decode can be automatically stored in the corresponding computers;
c) Transferring the effective load data analyzed by the computer equipment to a database of the effective load through the pluggable storage equipment for storage, wherein the database of the effective load is a network website;
d) Respectively transferring the first copy of the payload, the second copy of the payload and the third copy of the payload into a first computer 2, a second computer 3 and a second computer 4, testing the related security loopholes of the second copy after the second copy is processed by data inspection software of the second computer 3, processing the security loopholes, sending the second copy of the payload of test data to a computer software application of the second computer 3 by using a computer network for processing threats, using the second copy of the payload of test data, and detecting the using effect of computer equipment by using an application tester 5;
e) Data used by the computer device to which the test is applied is transmitted to an evaluator 6 for data evaluation of the effect of the use of the software, the evaluator 6 being operable to provide a description of the data inspection software used by the computer software application to a payload application tester 5 at the computer.
Example 3:
the invention provides a method for optimizing test data payload by computer software, which comprises a main computer 1, wherein the output end of the main computer 1 is provided with a first computer 2, a second computer 3 and a third computer 4, the output end of the third computer 4 is provided with an application tester 5, the output end of the application tester 5 is provided with an evaluator 6, and the specific steps are as follows:
a) Creating a plurality of copies of computer software to be optimized through a host computer 1, moving the computer software into different computer equipment, wherein the number of the created copies of the computer software is three, the created copies are marked as a first copy, a second copy and a third copy, and are respectively handed over into a first computer 2, a second computer 3 and a second computer 4, and the specification configurations of the first computer 2, the second computer 3 and the second computer 4 are the same;
b) Decoding the first copy, the second copy and the third copy of the software through computer equipment, storing the first copy of a payload, the second copy of the payload and the third copy of the payload which are generated by decoding the first copy, the second copy and the third copy of the software through pluggable storage equipment, wherein the pluggable storage equipment comprises a storage hard disk, a U disk, electronic equipment with a storage function and the like, and data generated when the first computer 2, the second computer 3 and the second computer 4 decode can be automatically stored in the corresponding computers;
c) Transferring the effective load data analyzed by the computer equipment to a database of the effective load through the pluggable storage equipment for storage, wherein the database of the effective load is a network website;
d) Respectively handing over the first copy of the payload, the second copy of the payload and the third copy of the payload into the first computer 2, the second computer 3 and the second computer 4, wherein the third copy of the payload is not processed by the third computer 4 and is used, and the use effect of the computer equipment is detected by the application tester 5;
e) Data used by the computer device to which the test is applied is transmitted to an evaluator 6, which evaluates the effect of the use of the software, and the evaluator 6 can provide a description of the data-checking software used by the computer software application to a payload application tester 5 at the computer.
Example 4:
respectively taking 30 optimized software of the embodiments 1 to 3, averagely taking out 10 software of each embodiment, respectively dividing 3 optimized software of the embodiments 1 to 3 into 10 hands of users, wherein each user is a test group, and totally dividing the test groups into 10 groups for testing to obtain the following data:
|
number of test persons
|
Fluency of software use (compare with usual)
|
Power consumption (mA) of software in 1h
|
How fast the software loads the data (compared to usual)
|
Example 1
|
10
|
Is relatively smooth
|
25
|
Is quicker
|
Example 2
|
10
|
Is very smooth
|
20
|
Quickly get rid of
|
Example 3
|
10
|
Is normal
|
30
|
Is normal |
As can be seen from the above table, the optimization scheme for software in embodiment 2 is used the most, the fluency of the optimized software is greatly improved, the time for loading data is also shortened, and the power consumption of the software is greatly reduced when the software is used.
Finally, it should be noted that: although the present invention has been described in detail with reference to the foregoing embodiments, those skilled in the art can still make modifications to the technical solutions described in the foregoing embodiments, or make equivalent substitutions and improvements to part of the technical features of the foregoing embodiments, and any modifications, equivalent substitutions and improvements made within the spirit and principle of the present invention should be included in the protection scope of the present invention.