CN110826111A - Test supervision method, device, equipment and storage medium - Google Patents

Test supervision method, device, equipment and storage medium Download PDF

Info

Publication number
CN110826111A
CN110826111A CN201911269625.7A CN201911269625A CN110826111A CN 110826111 A CN110826111 A CN 110826111A CN 201911269625 A CN201911269625 A CN 201911269625A CN 110826111 A CN110826111 A CN 110826111A
Authority
CN
China
Prior art keywords
information
test
instruction
binding
server
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201911269625.7A
Other languages
Chinese (zh)
Other versions
CN110826111B (en
Inventor
陈金龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201911269625.7A priority Critical patent/CN110826111B/en
Publication of CN110826111A publication Critical patent/CN110826111A/en
Application granted granted Critical
Publication of CN110826111B publication Critical patent/CN110826111B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

The application discloses a test supervision method, a test supervision device, equipment and a storage medium, wherein in the method, a server acquires and executes a test instruction; binding the test instruction and the identity identification information; performing hash operation on the binding information, and performing digital signature on a hash operation result; and detecting whether the current condition of the preset uplink is met, if so, uploading the digital signature result and the binding information to a block chain node in a block chain network, so that the block chain node checks the signature and stores the binding information after the signature passes. The method and the device for testing the identity of the tester save information obtained after binding the test instruction and the identity information of the corresponding tester through the block chain network. After the chain linking is completed, the test instruction, the identity identification information and the binding relationship among the test instruction and the identity identification information in the binding information cannot be tampered, and the corresponding identity identification information can be accurately searched from the block chain network by using the test instruction related to the test accident in the later period, so that the actual person responsible can be accurately traced.

Description

Test supervision method, device, equipment and storage medium
The application is a divisional application which is submitted in 2019, 06, 26 and has the application number of 201910561207.9 and the invention name of a test supervision method, a test supervision device, test supervision equipment and a storage medium.
Technical Field
The present application relates to the field of computer technologies, and in particular, to a method, an apparatus, a device, and a storage medium for test supervision.
Background
Currently, with the development of daily business of an enterprise, the server function of the enterprise needs to be updated and iterated continuously. In this process, the tester is required to perform a corresponding test on the server.
The existing server testing technology is usually implemented based on a multitask multi-user platform, so that a plurality of testers can share one server. When testing a server, a tester sometimes intentionally or unintentionally submits a wrong test instruction or an illegal test instruction to the server, thereby causing abnormal operation of the server. At the moment, the enterprise can trace the historical operation records of the testing personnel to realize the responsibility tracing of the testing accident. However, in the prior art, the traced person may not be consistent with the actual person, thereby causing failure of tracing responsibility.
Disclosure of Invention
In view of this, an object of the present application is to provide a method, an apparatus, a device and a storage medium for testing and supervising, so that when performing responsibility tracing of a test accident, consistency between a traced responsible person and an actual responsible person can be ensured, and a situation that responsibility tracing fails is avoided. The specific scheme is as follows:
to achieve the above object, in one aspect, the present application provides a test supervision method, including:
acquiring and executing a test instruction; the test instruction is used for testing the server;
binding the test instruction and the identity identification information to obtain binding information; the identity identification information is used for representing the identity of a tester submitting the test instruction;
performing hash operation on the binding information, and performing digital signature on a hash operation result;
detecting whether a preset chain loading condition is met or not at present;
and if the preset uplink condition is met currently, uploading the digital signature result and the binding information to a block chain link point in a block chain network, so that the block chain link point verifies the digital signature result and stores the binding information after the verification passes.
In another aspect, the present application further provides a test supervision apparatus, including:
the instruction acquisition module is used for acquiring a test instruction; the test instruction is used for testing the server;
the instruction execution module is used for executing the test instruction;
the information binding module is used for binding the test instruction and the identity identification information to obtain binding information; the identity identification information is used for representing the identity of a tester submitting the test instruction;
the hash operation module is used for carrying out hash operation on the binding information;
the digital signature module is used for carrying out digital signature on the hash operation result;
and the information uplink module is used for detecting whether a preset uplink condition is met, and if the preset uplink condition is met currently, uploading the digital signature result and the binding information to a block chain node point in a block chain network so that the block chain node point checks the digital signature result and stores the binding information after the check is passed.
In yet another aspect, the present application further provides an electronic device comprising a processor and a memory; wherein the memory is used for storing a computer program which is loaded and executed by the processor to implement the aforementioned test supervision method.
In yet another aspect, the present application further provides a storage medium, in which computer-executable instructions are stored, and when the computer-executable instructions are loaded and executed by a processor, the foregoing test supervision method is implemented.
After the test instruction is acquired and executed, the test instruction is bound with the identity identification information of a corresponding tester, after Hash operation and digital signature are sequentially carried out on the bound information, a digital signature result and the bound information are uploaded to block chain nodes located in a block chain network, and therefore the digital signature result is subjected to signature verification and is stored after the signature verification passes. Therefore, the binding information is stored through the blockchain network, and is obtained after the test instruction and the identity information of the corresponding tester are bound, which means that after the binding information is linked, the test instruction, the identity information and the binding relationship among the test instruction and the identity information in the binding information cannot be tampered, and when the supervisor traces the responsibility of the test accident, the identity information bound with the test instruction can be accurately found from the blockchain network by using the test instruction related to the test accident, so that the actual responsible person can be accurately traced, that is, the consistency between the traced responsible person and the actual responsible person is ensured, and the occurrence of the responsibility tracing failure is avoided. In addition, before the uplink, whether the current uplink condition is met needs to be judged firstly, and the uplink is only carried out when the preset uplink condition is met, so that the system burden caused by random uplink for the whole network is avoided.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings needed to be used in the description of the embodiments or the prior art will be briefly introduced below, it is obvious that the drawings in the following description are only embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the provided drawings without creative efforts.
FIG. 1 is a schematic diagram of a test supervision system architecture provided in the present application;
FIG. 2 is a schematic diagram of a test supervision system architecture provided in the present application;
FIG. 3 is a schematic view of a third party management platform based blockchain overview;
FIG. 4 is a block chain data browsing diagram based on a third-party management platform;
FIG. 5 is a block chain data query based on a third party management platform;
FIG. 6 is a schematic diagram of transaction detail information based on a third-party management platform;
FIG. 7 is a schematic illustration of decoding of historical test operation records based on a third party management platform;
FIG. 8 is a flow chart of a test supervision method provided herein;
FIG. 9 is a flow chart of a test supervision method provided by the present application;
FIG. 10 is a flow chart of a test supervision method provided by the present application;
FIG. 11 is a flow chart of a test supervision method provided by the present application;
fig. 12 is a block chain information query flowchart of a test supervision method according to the present application;
FIG. 13 is a block diagram illustrating an overall multi-level architecture of a system according to the present application;
fig. 14 is an application diagram illustrating implementation of test supervision in an application scenario provided by the present application;
FIG. 15 is a schematic structural diagram of a test supervision apparatus provided in the present application;
FIG. 16 is a schematic structural diagram of a test supervision apparatus provided in the present application;
FIG. 17 is a diagram of a server architecture provided by the present application;
fig. 18 is a diagram of a terminal structure provided in the present application.
Detailed Description
The current server testing technology based on multi-task multi-user platform implementation allows multiple testers to test the same server. During the process of testing the server, relevant test data can be stored locally or sent to the centralized management server for storage. When the server runs abnormally due to the fact that the server executes wrong test instructions or illegal test instructions, a supervisor can trace back to a testing party corresponding to the corresponding test instructions in a mode of local number query or sending query requests to the centralized server, and accordingly accident liability determination is conducted. However, the test data is stored in a local database or on a remote centralized management server, and the data stored in the two ways is at risk of being tampered or destroyed.
For example, a falsifier changes an error test instruction in the stored test data into a normal test instruction, or the falsifier modifies a testing party a corresponding to an illegal test instruction into a testing party B, or the falsifier directly deletes the test data related to the test accident, or directly physically destroys the local tested server or the centralized management server, or the like. It is understood that the above-mentioned falsifier may be an illegal intruder of the database, which achieves the purpose of falsifiing the data by various illegal intrusion means, or a nominally legitimate access user of the database. Once the data in the local database or the centralized management server is tampered with, an accurate responsible person cannot be located when a test accident is subsequently subjected to responsibility tracing, so that responsibility tracing failure is caused, and even responsibility tracing disputes are caused.
In view of the existing problems, the application provides a server test supervision technical scheme based on the block chain, and through the technical scheme, the consistency between the traced responsible person and the actual responsible person can be ensured, and the occurrence of the responsibility tracing failure condition is avoided.
For ease of understanding, a system architecture to which the technical solution of the present application is applicable is described below. Referring to fig. 1 and 2, two different component architectures of a test supervision system of the present application are shown, respectively.
As shown in fig. 1, one component architecture of the test supervision system of the present application may include a tester terminal 11, a server 12, a blockchain network 13, a third-party management platform 14, and a query terminal 15.
The testing side terminal 11 may provide an information input interface and an information sending trigger unit for the testing side on the user interaction interface through a client installed in advance. The testing side terminal 11 obtains the testing instruction input by the testing side through the information input interface. When the information sending triggering unit is triggered by the outside, the tester terminal 11 may send the information acquired through the information input interface to the server 12 by using the first communication network. It is understood that the tester terminal 11 in the present application includes, but is not limited to, a smart phone, a tablet computer, a wearable device, a desktop computer, and the like, in which the above-mentioned client is installed.
In this application, the server 12 may specifically refer to a dedicated server for implementing a single service, and different servers 12 are respectively used for implementing different services. The server 12 establishes a communication connection with the tester terminal 11 through a first communication network. After the server 12 obtains the test instruction sent by the tester terminal 11, the test instruction may be executed to complete the corresponding test task. In the application, the server 12 integrates an instruction monitoring program in advance for monitoring the behavior of executing the test instruction, once a certain test instruction is executed, the test instruction can be collected, the test instruction collected currently in real time or historically can be bound with the identification information of the tester subsequently, hash operation is performed on the bound information, the hash operation result is digitally signed, and then the digital signature result and the bound information are sent to the blockchain network 13 through the second communication network, so that the uplink operation flow is developed. It is understood that the server 12 in the present embodiment includes, but is not limited to, a cloud server, a physical server, a virtual server, and the like.
It is understood that the blockchain network 13 includes a plurality of blockchain nodes 130. After the test data submitted by the server 12 is successfully uplinked on any blockchain node 130, the test data is quickly transmitted to other blockchain nodes 130 for storage within a second-level time period, and the blockchain nodes 130 maintain the full amount of instruction data through cooperative cooperation. In this application, any block of the blockchain network 13 may further record information such as a blockchain identifier, a test operation record, a root hash of a binary tree, and a transaction hash value corresponding to test data, in addition to the information such as a blockchain identifier and a blockchain account address.
The block identifier may refer to an identifier obtained after performing hash processing on a block header of a previous block, or may refer to a block height of a current block; the test operation record may include test data and a corresponding timestamp, where the test data at least includes the bound test instruction and the identity information of the tester; the binary tree may specifically be a Merkle tree; the block chain identifier is used for representing the identifier of the current block chain, and can be suitable for a scene with various different block chains and needing to apply a cross-chain technology; the blockchain account address is address information obtained after the tester registers the blockchain account, and the registration process may specifically include: after the account registration information of the tester is acquired, an account private key is created for the tester, an account public key corresponding to the account private key is generated by using an elliptic curve algorithm, and then the account public key is operated by using a one-way hash algorithm to obtain a block chain account address.
For the outside world, the blockchain account address is an irregular character string, and the occurrence of a user privacy disclosure event caused by the blockchain account address is avoided. It is understood that the above-mentioned account registration information may specifically include, but is not limited to, an IP address of the server, a user name assigned by Linux to the tester, a real name of the tester, a service type of the server, and group information to which the server belongs. As shown in table one, when providing the blockchain account information to the outside, the present application may provide, in addition to the account public key Facc _ pub _ key and the blockchain account address Facc _ addr, a user idfuse _ id, an account validity period, a corresponding blockchain identifier Fchain _ id, a blockchain version number Fversion, a CA authentication type Fissue, a digital signature algorithm type Fsign _ type, a merchant detail number Fmch _ id of the electronic payment platform, and account information Fother _ info corresponding to the blockchain account. The account validity period is determined by the validity period starting time Ffrom and the validity period ending time Fto in table one. The account detail information Fother _ info may specifically include an IP address of the server, a user name assigned by Linux to the tester, a real name of the tester, a service type of the server, and group information to which the server belongs. In addition, it should be noted that in the present application, one tester user may bind multiple blockchain accounts, and one blockchain account belongs to only one tester user.
Watch 1
Figure BDA0002313801070000061
The method and the device for providing the blockchain account information of the tester user can provide the blockchain account information of the tester user for the outside and can also provide the tester user information for the outside. As shown in table two, the tester user information may specifically include a corresponding user IDFuser _ id, a user wallet address Fuser _ addr, a user public key Fuser _ pub _ key, a corresponding blockchain identifier Fchain _ id, a blockversion number Fversion, a CA authentication type Fissue, a digital signature algorithm type Fsign _ type, a real name fffull _ name of the tester, a mailbox address Femail, a contact phone Ftel, a user information validity period, a merchant number Fmch _ id of the electronic payment platform, and the like.
Watch two
Figure BDA0002313801070000062
It is understood that the node device types of the blockchain node 130 in the present application include, but are not limited to, various types of servers, personal computers, handheld terminals, and the like.
In the present application, the third-party management platform 14 is a platform capable of collecting blockchain data, providing a blockchain data browsing and querying function, providing a private key generation service for a user, and managing an account. The user of the present application can view the profile information of the block chain through the third party management platform 14, which is specifically shown in fig. 3. In fig. 3, the profile information of the blockchain includes the blockchain name, the blockchain ID, the blockchain function description information, and the blockchain key indicator. In addition, as shown in table three, the third party management platform 14 may collect historical test operation records Fdata, transaction hash values fhsh, chunk heights fhight, chunk hash values (not shown in table three), transaction times Fblock _ time, chunk chain accounts Facc, chunk chain identifications Fchain _ id, and the like in the chunk chain network 13 periodically or aperiodically. Further, after the third-party management platform 14 collects the blockchain data, all or part of the collected blockchain data may be displayed on a human-computer interaction interface of the query terminal 15 for a user to browse, as shown in fig. 4. The blockchain data shown in fig. 4 includes transaction hash values, block heights, block hash values, transaction times, and the like. Further, as shown in table three, the testing operation record Fdata recorded in the blockchain network 13 may specifically include a server IP address, a timestamp, a user name, group information and a testing instruction.
Watch III
Figure BDA0002313801070000071
In addition, the third party management platform 14 may obtain, by using the third communication network, a query request for the historical test instruction, which is initiated by the query terminal 15, and then perform corresponding query on the information collected from the blockchain network 13, so as to obtain the identity information of the tester corresponding to the historical test instruction. Specifically, the query terminal 15 obtains search keywords such as a tile height, a transaction hash value, or a tile hash value, which are input by the user, through the search box shown in fig. 4, and then sends a query request including the search keywords to the third-party management platform 14. After acquiring the query request, the third-party management platform 14 searches for the blockchain data corresponding to the query request from the collected information, and returns the blockchain data to the terminal interface of the query terminal 15, as shown in fig. 5. In the present application, the query manner may specifically support fuzzy query. In addition, after the "view" shown in fig. 5 is clicked by the user, a display interface of the transaction details may be opened on the inquiry terminal 15, as shown in fig. 6 in particular. In fig. 6, the transaction details may specifically include a transaction hash value, a belonging block, a block size, a transaction time, a transaction amount, transaction data, and the like.
It should be noted that the historical test operation records collected by the third party management platform 14 from the blockchain network 13 are typically encoded information, for example, encoded by the Base58 encoding technology. For this purpose, as shown in fig. 7, after acquiring the historical test operation record issued by the blockchain network 13, the third-party management platform 14 needs to perform corresponding decoding processing to obtain a corresponding timestamp, a test instruction in a binding state, and identity information of a corresponding tester.
In the application, if the identification information in the binding state with the test instruction is obtained after encryption, in order to obtain the corresponding plaintext information, a corresponding decryption key is further required to be used for decryption operation, and the identification information corresponding to the historical test instruction can be finally obtained, so that corresponding responsibility tracing is performed. It is understood that the inquiry terminal 15 may be a terminal held by a supervisor, or a terminal held by an ordinary user. The monitoring party is a management party for performing responsibility confirmation on the testing behavior of the testing party, and the query terminal 15 includes but is not limited to a smart phone, a tablet computer, wearable equipment, a desktop computer and the like.
As shown in fig. 2, another component architecture of the test supervision system of the present application may include a server 21, a tester terminal 22, a blockchain network 23, a third-party management platform 24, and a query terminal 25. The difference between this component architecture and the former one is mainly reflected in the difference of the information interaction mechanism between the server 21, the tester terminal 22 and the blockchain network 23.
In fig. 2, the tester terminal 22 transmits a test instruction to the server 21. After the server 21 executes the test instruction, it sends corresponding feedback information to the tester terminal 22 to prompt that the corresponding test instruction of the tester terminal 22 has been executed. When the tester terminal 22 monitors that the server 21 has returned the feedback information, it collects the relevant test data and sends the test data to the blockchain network 23 through the fifth communication network, so as to store the test data through the blockchain network 23.
It should be noted that, the first communication network, the second communication network, the third communication network, the fourth communication network, and the fifth communication network of the present application may be determined according to network conditions and application requirements in an actual application process, and may be a wireless communication network, such as a mobile communication network or a WIFI network, or a wired communication network; either a wide area network or a local area network may be used as circumstances warrant.
Fig. 8 is a flowchart of a test supervision method according to an embodiment of the present application. Referring to fig. 8, the test supervision method may include the steps of:
s101, a testing party terminal creates a testing instruction, and the testing instruction is used for testing a server.
In the embodiment of the application, the tester terminal can provide one or more information input interfaces for the tester, and can acquire the instruction information input by the tester through the one or more information input interfaces and create the test instruction for testing the server according to the instruction information input by the tester.
In one implementation, the tester terminal may provide only one information input interface for the tester. All the various types of instruction information related to the server test are transmitted to the terminal of the testing party through the information input interface, wherein the different types of instruction information are used for generating test instructions for different functions of the server. The information input mode can enable different types of instruction information to be mutually nested to form more complex instruction codes, so that more complex test operation on the server can be completed, and the accuracy and the reliability of the test result of the server are improved.
In another implementation manner, the tester terminal may provide a plurality of information input interfaces for the tester, and obtain instruction information for creating test instructions for different functions of the server through different information input interfaces. For example, the tester terminal may provide three different information input interfaces for the data deletion function, the file arrangement function, and the data search function of the server. The information input mode can enable a testing party to edit and manage the instruction information aiming at different functions of the server through different information input interfaces, reduces the messiness of the editing process of the instruction information and is beneficial to reducing the error rate of the testing instruction.
In order to enable a tester to find out a test instruction with a problem in time and reduce the damage of an illegal test instruction to a server, a tester terminal can locally maintain a dangerous instruction feature library, and when a test instruction is created, the local dangerous instruction feature library is used for checking whether the test instruction is an error test instruction or an illegal test instruction, if so, the tester terminal sends a corresponding alarm prompt or a modification suggestion to the tester or a supervisor, and can also forbid sending the test instruction to the server. It can be understood that the dangerous instruction feature library refers to a database obtained by performing feature extraction and recording on dynamically collected wrong test instructions and/or illegal test instructions in advance.
In consideration of some situations, in order to complete the testing task successfully, the terminal at the testing side does need to send some testing instructions with instruction characteristics corresponding to the local dangerous instruction characteristic library to the server. At this time, in order not to affect the normal operation of the test task, the tester may request a temporary electronic permission for the special test instruction from the supervisor, and the feature test instruction may skip the interception of the dangerous instruction feature library by the temporary electronic permission. It is to be noted that the temporary electronic license is issued in particular by a supervisor and its validity automatically disappears after the special test instruction is sent to the server.
In order to reduce the risk that the dangerous instruction feature library is tampered by the outside, the testing party terminal can perform asymmetric encryption on the dangerous instruction feature library by using a public key under the condition that the dangerous instruction feature library is not called or updated, and then decrypt the encrypted dangerous instruction feature library by using a private key when the dangerous instruction feature library needs to be called or updated.
S102, the testing side terminal sends the testing instruction to the server.
In this embodiment, if the testing party terminal sends the testing instruction to the server for the first time, the testing party terminal also needs to send the identity information of the testing party to the server. After the server acquires the identification information, the identification information is stored locally in the server. If the identity information of the testing party needs to be used later, the corresponding identity information can be directly uploaded and taken out from the server locally.
S103, the server acquires and executes the test instruction.
In this embodiment, the server may also locally maintain a dangerous instruction feature library, and perform second interception on the obtained test instruction through the dangerous instruction feature library, so as to intercept the test instruction whose instruction feature is located in the dangerous instruction feature library, and the rest of the parties may be executed by the server. According to the method and the device, the danger of the test instruction finally executed by the server can be effectively reduced through the first re-interception on the test side terminal and the second re-interception on the server.
In addition, in this embodiment, the dangerous instruction feature library on the testing side terminal and the dangerous instruction feature library on the server may be periodically updated and maintained synchronously according to a preset time period.
It is to be understood that, for the dangerous instruction feature library in the server, since one server is usually a dedicated server for performing a specific service, in this embodiment, the dangerous instruction feature in the dangerous instruction feature library of each server can be a dangerous instruction feature specifically customized based on the service type of the server. Similarly, the dangerous instruction feature in the dangerous instruction feature library of the tester terminal may also be a dangerous instruction feature that is specifically customized based on the service type of the server.
S104, the server binds the test instruction and the identity identification information to obtain binding information, wherein the identity identification information is used for representing the identity of a tester submitting the test instruction.
In this embodiment, the server may construct a binding relationship between the test instruction and the identification information by binding the test instruction and the identification information of the corresponding tester, thereby obtaining the binding information. That is, the binding information specifically includes the test instruction, the identification information, and the binding relationship therebetween, and the identification information corresponding to the test instruction can be determined by the binding relationship.
It is understood that the identification information in this embodiment may specifically include, but is not limited to, a user name, a real name, a contact phone, and the like of the tester.
In order to reduce the amount of data in the subsequent uplink, the server may perform redundancy elimination on the test command before binding the test command and the id information. Specifically, the server may determine, from the test instruction, a redundant instruction code that matches the redundant instruction code library by using a redundant instruction code library that is constructed in advance, and then remove the redundant instruction code from the test instruction to obtain a simplified test instruction. It should be noted that the redundant instruction codes may specifically refer to instruction code segments in the test instructions that only play an auxiliary role rather than a critical role in the test process.
For example, for the following test instruction: after the redundancy removing processing is performed by using the redundancy instruction code library, the obtained simplified test instruction may specifically be: and find-name.
Further, in this embodiment, the process of binding the test instruction and the identity information by the server may specifically include: identifying the instruction characteristics of the test instruction, generating corresponding instruction description information for the test instruction according with preset instruction characteristics, and then binding the test instruction, the identity identification information and the instruction description information.
In a specific embodiment, the server may identify instruction execution efficiency of a certain test instruction according to an actual execution result of the test instruction, determine whether the instruction execution efficiency is greater than a preset instruction execution efficiency threshold, if so, generate corresponding instruction efficiency description information for the test instruction, which is used to characterize the test instruction as having higher execution efficiency, and then bind the test instruction, the identity information of the tester, and the instruction efficiency description information. After the binding information is subjected to uplink operation at the later stage, the contents of the test instruction, the identity identification information and the instruction efficiency description information and the binding relationship among the contents cannot be tampered by the outside, so that the fact that the test instruction submitted by a related tester has higher execution efficiency can be known by the public, and the test instruction plays a role in table recognition to a certain extent, thereby being beneficial to improving the working enthusiasm of the tester.
In another specific embodiment, if the server does not utilize the local dangerous instruction feature library to check the test instruction before executing a certain test instruction, the server may utilize the local dangerous instruction feature library to identify the instruction feature of the test instruction, and if it is identified that the instruction feature of the test instruction is located in the local dangerous instruction feature library, may generate corresponding instruction warning information for the test instruction, and then bind the test instruction, the identity information of the test party, and the instruction warning information. After the uplink operation is performed on the binding information at the later stage, the contents of the test instruction, the identity identification information and the instruction warning information and the binding relationship among the contents cannot be tampered by the outside, so that the dangerous test instruction submitted by the relevant tester can be known by the public, and the warning function is played to a certain extent.
In another embodiment, if the server passes the inspection of the dangerous instruction feature library on the tester terminal and the server before executing a certain test instruction, but the server causes an abnormal operation of the server when actually executing the test instruction, then the server may recognize the instruction severity of the test instruction according to the actual execution result of the test instruction, and determine whether the instruction severity is greater than a preset instruction severity threshold, if so, generate corresponding instruction type description information for the test instruction to characterize that the test instruction is a novel dangerous instruction, and then bind the test instruction, the identity information of the tester, and the instruction type description information. Furthermore, after the test instruction is found to cause the abnormal operation of the server, the characteristic of the test instruction can be added to a local dangerous instruction characteristic library.
It is understood that the binding information in this embodiment includes a timestamp, a server IP address, and the like, in addition to the test instruction, the identification information, and the instruction description information.
S105, the server performs hash operation on the binding information.
And S106, the server carries out digital signature on the hash operation result.
It is understood that the data needs to be hashed and digitally signed before the uplink operation is performed on the data. In this embodiment, the server performs hash operation on the bound test instruction and the identity information, and then performs digital signature on a hash operation result by using a private key.
In a specific implementation manner, each time the server generates one piece of the binding information, the server performs hash operation on the binding information immediately, and performs digital signature on the hash operation result by using a private key immediately after obtaining the hash operation result. That is, in this embodiment, a loop can be fastened between the three steps of generating the binding information, performing the hash operation, and performing the digital signature, and the time interval in the middle is very short, so that after the binding information is obtained, the digital signature result can be obtained at a higher speed, thereby greatly shortening the time window for external data tampering, and increasing the difficulty and cost of data tampering.
In another specific embodiment, the server performs a hash operation on the binding information after generating a plurality of copies of the binding information continuously, and then performs a digital signature on the hash operation result by using a private key. By the scheme, the times of hash operation and digital signature can be effectively reduced. For example, assume that the server continuously generates the following 3 pieces of binding information:
binding information A: { "linux _ ip": 127.0.0.1"," timestamp ": 2018-10-2816: 25:17", "linux _ user": tt _ tom "," linux _ group ": tt", "operator _ cmd": where mysql "};
binding information B: { "linux _ ip": 127.0.0.1"," timestamp ": 2018-10-2816: 25:17", "linux _ user": tt _ tom "," linux _ group ": tt", "operator _ cmd": rm-rf "};
binding information C: { "linux _ ip": 127.0.0.1"," timestamp ": 2018-10-2816: 25:17", "linux _ user": tt _ tom "," linux _ group ": tt", "operator _ cmd": find-name "};
then, the server performs hash operation on the binding information A, the binding information B and the binding information C which are sequentially linked, and then performs digital signature on the hash operation decoding result.
In another embodiment, after the server continuously generates a plurality of pieces of the binding information, the server performs hash operation on the plurality of pieces of the binding information, generates a plurality of hash operation results in the same manner, and then digitally signs the plurality of hash operation results which are sequentially linked together by using a private key. For example, after the server continuously generates 3 pieces of binding information, the server performs hash operation on each 3 pieces of continuous binding information, so that when the server continuously generates 9 pieces of binding information, 3 pieces of hash operation results are obtained, and at this time, the 3 pieces of hash operation results which are sequentially linked together can be digitally signed by using the private key. This scheme can reduce the number of digital signatures even further than the former scheme.
It can be understood that, in the embodiment of the present application, the binding information corresponding to each digital signature is the binding information belonging to the same blockchain account.
In addition, it should be noted that the private key used by the server when performing the digital signature may specifically be a private key created by the third-party management platform for the blockchain account of the tester, and may be stored in the server, so that when the server needs to use the private key, the private key may be directly called from the local.
In order to improve the security of the private key in the server, the server needs to avoid storing the private key which is not protected directly in the local, and also needs to avoid storing the private key which is processed by the existing known encoding or encryption technology in the local. In the embodiment of the application, a set of custom private key protection mechanisms can be created locally on the server, wherein the custom private key protection mechanisms include, but are not limited to, a custom private key encoding mechanism or a custom private key encryption mechanism. Before the server stores the private key, the server firstly utilizes the user-defined private key protection mechanism to correspondingly process the private key, and then stores the processed result in the local. When the subsequent server needs to call the private key, the private key can be restored based on the self-defined private key protection mechanism. The private key protection mechanism is self-defined, so that the private key protection mechanism is unknown to the outside, and the server does not know which protection mechanism is adopted to protect the private key to the outside, so that the probability of intercepting the private key by the outside can be effectively reduced through the private key protection scheme, and the safety of the local private key is greatly improved.
It can be understood that, in the actual application process, related technical personnel can customize the private key protection mechanism according to actual needs. According to the self-defined private key protection mechanism, the server can perform corresponding protection processing on the private key before storing the private key. For example, in a specific embodiment, the server may divide the private key into a plurality of segments to which serial numbers are allocated, modify the private key segments with different serial numbers according to different segment modification rules, and store all the modified private key segments in a plurality of different storage locations that are periodically and dynamically changed locally. For example, the private key is divided into 3 segments, wherein the segment modification rule corresponding to the 1 st segment is to interchange the nth character and the nth last character of the 1 st segment, the segment modification rule corresponding to the 2 nd segment is to add a preset character to the tail of the 2 nd segment, the segment modification rule corresponding to the 3 rd segment is to change all specific characters in the 3 rd segment to another preset character, and after 3 modified private key segments are obtained according to the segment modification rule, the 3 modified private key segments are respectively stored to 3 different storage locations corresponding to the current storage location change period. It can be understood that, in the later stage, when the private key is restored, the storage positions of different private key fragments need to be determined according to the characteristic that the storage positions of the fragments are periodically changed, then the original information of the different fragments is restored according to different fragment modification rules corresponding to the sequence numbers of the different fragments, and then the fragments are spliced based on the sequence numbers, so that the private key can be restored.
S107, the server uploads the digital signature result and the binding information to a block chain node in a block chain network.
In order to reduce the situation that some blockchain nodes in the blockchain network have an excessive workload or are in an idle state for a long time, in the present application, the process of uploading the digital signature result and the binding information to the blockchain node in the blockchain network by the server may include: and the server screens the block chain link points in the block chain network according to the load information and the position information of each current block chain node to obtain a target node, and then uploads the digital signature result and the binding information to the target node. That is, the server in this embodiment may select the blockchain node by itself as the node for directly acquiring the uplink data, and the server may filter the currently suitable blockchain node according to the load information and the location information of the blockchain node, and in this way, the server may select the blockchain node with a relatively small current load and a moderate geographical location as the node for directly receiving the uplink data.
In order to increase the speed of the entire uplink of data in the server, in this embodiment, the uploading, by the server, the digital signature result and the binding information to a block link point in a block link network may specifically include: and uploading the digital signature results and the corresponding binding information to different block chain nodes in a block chain network respectively. It should be noted that all the binding information corresponding to the same digital signature result belongs to the same blockchain account, and the binding information corresponding to different digital signature results may belong to the same blockchain account or different blockchain accounts. For the same server, the different blockchain accounts are usually blockchain accounts of different testers.
And S108, checking and signing the digital signature result by the block chain link point in the block chain network, and storing the binding information after the check and signing pass.
In this embodiment, after acquiring the digital signature result and the binding information sent by the server, an arbitrary node in the blockchain network first performs signature verification on the digital signature result, and after the signature verification passes, a block in which the binding information is stored is generated on the node, and then is broadcast to other nodes in the blockchain network, and the other nodes receive and verify the block, and after the verification passes, the block can be added to the blockchain. The block chain generated by the mode can help a monitoring party to trace the historical test data of all servers on the block chain.
According to the embodiment of the application, after the test instruction is obtained and executed, the test instruction is bound with the identity identification information of a corresponding tester, after Hash operation and digital signature are sequentially carried out on the bound information, the digital signature result and the bound information are uploaded to the block chain link points located in the block chain network, so that the digital signature result is subjected to signature verification and the bound information is stored after the signature verification passes. Therefore, the binding information is stored through the blockchain network, and is obtained by binding the test instruction and the identity information of the corresponding tester, which means that after the binding information is uplink, the test instruction, the identity information and the binding relationship among the test instruction and the identity information in the binding information cannot be tampered, and when the supervising party performs responsibility tracing of the test accident in the later stage, the identity information bound with the test instruction can be accurately found from the blockchain network by using the test instruction related to the test accident, so that the actual responsible person can be accurately traced, that is, the consistency between the traced responsible person and the actual responsible person is ensured, and the occurrence of responsibility tracing failure is avoided.
Fig. 9 is a flowchart of a test supervision method according to an embodiment of the present application. Referring to fig. 9, the test supervision method may include the steps of:
s201, the server detects whether the tester has an instruction submitting authority.
In a possible implementation manner, the server may detect whether the current tester has a blockchain account corresponding to the service of the server, and then determine whether the tester has the instruction submission authority according to the above blockchain account detection result of the tester. That is, if the server detects that the tester already has a blockchain account corresponding to the service of the server, it may be determined that the tester has the right to submit test instructions to the server. It can be understood that, if it is detected that the tester does not have a blockchain account corresponding to the service of the server at present, the server may send corresponding blockchain account registration prompt information to the tester terminal to prompt the tester to perform a corresponding blockchain account registration procedure.
In another possible implementation, the server may obtain historical test data currently saved on the blockchain network, which is sent by the third-party management platform, and then determine whether the tester has the instruction submission authority according to the historical test data saved on the current blockchain network. Specifically, the server may count the number of dangerous instructions and/or the severity level of the dangerous instructions of the tester historically according to historical test data stored in the current blockchain network, and then determine whether to continue to maintain the instruction submission permission of the tester currently according to a statistical result. The server can permanently or temporarily cancel the instruction submitting authority of the testing party under the condition that the statistical result meets a certain condition.
S202, if the server detects that the testing party has the instruction submitting authority, the server issues a corresponding instruction submitting authority certificate to the testing party terminal.
In this embodiment, when the server detects that the tester has the authority to submit the test instruction, a corresponding instruction submission authority credential is generated for the tester, and then the instruction submission authority credential is sent to the tester terminal. It should be noted that, in this embodiment, the server may embed the validity period of the instruction submission permission of the tester in the instruction submission permission credential.
S203, the testing side terminal creates a testing instruction, and the testing instruction is used for testing the server.
And S204, the testing party terminal submits the testing instruction to the server according to the instruction submission permission certificate.
In this embodiment, when the test instruction is submitted to the server, the tester terminal may transmit the instruction submission permission credential to a local instruction submission process, and the local instruction submission process determines the validity and validity of the instruction submission permission of the current tester through the instruction submission permission credential. In the event that the local instruction submission process determines that the instruction submission permission of the current tester is legitimate and valid, then the test instruction may be allowed to be submitted to the server. Further, in order to avoid that an illegal terminal submits a test instruction to the server by using the stolen instruction submission permission certificate, in the embodiment, the server may perform asymmetric encryption on the instruction submission permission certificate recorded in a plaintext form by using a public key of the tester, so as to obtain an encrypted instruction submission permission certificate, and then send the encrypted instruction submission permission certificate to the tester terminal. And the testing party terminal decrypts the encrypted instruction submission permission certificate by using a private key of the testing party terminal, restores the encrypted instruction submission permission certificate to obtain an instruction submission permission certificate recorded in a plaintext form, and submits a testing instruction to the server according to the restored instruction submission permission certificate.
S205, the server acquires and executes the test instruction.
S206, the server encrypts identity identification information to obtain first encrypted information, wherein the identity identification information is used for representing the identity of a testing party submitting the testing instruction.
S207, the server binds the test instruction and the first encryption information to obtain binding information.
In this embodiment, before the server binds the test instruction and the identification information, the server may encrypt the identification information. In an actual information binding process, the server may specifically bind the test instruction and the encrypted identification information. By processing in this way, when the test data stored in the blockchain network is queried subsequently, if the querier does not have the decryption key corresponding to the encryption process of the identification information, for such querier, they cannot know the identity information of the testing party corresponding to the test instruction in the test data, thereby protecting the privacy of the user to a certain extent.
In a possible implementation manner, the process of encrypting the identification information by the server may specifically include: and carrying out asymmetric encryption on the identity identification information by using a public key of the monitoring party. This means that the identification information corresponding to the test instruction stored in the blockchain network is the first encrypted information obtained by performing asymmetric encryption using the public key of the administrator. Correspondingly, in order to decrypt the first encrypted information to restore the identification information, the first encrypted information needs to be decrypted by using a private key of a monitoring party. The private key of the supervisor is stored by the supervisor and cannot be acquired by other personnel, so that the identity information corresponding to the test instruction is public for the supervisor and is secret for other types of personnel. Therefore, through the scheme design, on one hand, the responsibility tracing of the monitoring party to the testing party submitting the dangerous testing instruction is not influenced, and on the other hand, the identity privacy of the testing party is effectively ensured to a great extent.
In another possible implementation manner, the process of encrypting the identification information by the server may specifically include: and symmetrically encrypting the identity identification information by using a private key of the monitoring party. This means that the identification information corresponding to the test instruction stored in the blockchain network is the first encrypted information obtained by symmetric encryption using the private key of the administrator. Correspondingly, in order to decrypt the first encrypted information to restore the identification information, the first encrypted information needs to be decrypted by using a private key of a monitoring party. Through the above scheme design, the following effects can be achieved: the identification information corresponding to the test instructions is public to the supervisor and confidential to other types of personnel.
And S208, the server performs hash operation on the binding information.
S209, the server carries out digital signature on the hash operation result.
S210, the server detects whether the preset uplink condition is met currently.
S211, if the server detects that the preset uplink condition is met currently, the server uploads the digital signature result and the binding information to a block chain node in a block chain network.
That is, in this embodiment, before performing the uplink on the digital signature result and the binding information, the server first determines whether a preset uplink condition is currently met, and triggers the uplink operation if the preset uplink condition is met. Specifically, the block chain network or the third-party management platform may collectively allocate, for each server, corresponding legal uplink time according to the own device load of each block chain node in the current block chain network and the communication load of the entire network, with the goal of minimizing the workload of the entire network. Before any server carries out uplink on data, whether the current time is consistent with the pre-acquired legal uplink time needs to be detected, if so, uplink operation is allowed to be carried out on the digital signature result and the binding information, and if not, uplink operation is forbidden to be carried out on the digital signature result and the binding information.
S212, checking and signing the digital signature result by the block chain link point in the block chain network, and storing the binding information after the check and signing pass.
Fig. 10 is a flowchart of a test supervision method according to an embodiment of the present application. Referring to fig. 10, the test supervision method may include the steps of:
s301, the testing side terminal creates a testing instruction, and the testing instruction is used for testing the server.
S302, the testing party terminal sends the testing instruction to the server.
S303, the server acquires and executes the test instruction.
S304, the server collects the test instruction.
S305, the server binds the collected test instruction and the identity identification information under the condition that a preset binding triggering condition is met to obtain binding information, wherein the identity identification information is used for representing the identity of a tester submitting the test instruction.
In this embodiment, the server may collect a plurality of test instructions corresponding to the same id information, and bind the collected test instructions and the id information after a preset binding trigger condition is satisfied, so that the number of times of binding can be greatly reduced and the amount of information of the whole binding data can be reduced compared to a case where each test instruction is bound to the corresponding id information.
In this embodiment, in the process of collecting the test instruction, the server needs to monitor whether the preset binding trigger condition is currently met, and only after the preset binding trigger condition is currently met, the server allows the binding operation.
The preset binding trigger condition may specifically include: the collected number of the test instructions corresponding to the same identity information reaches a preset number value, or the size of the whole data volume of the collected test instructions corresponding to the same identity information reaches a preset data volume, or the collection duration of the test instructions corresponding to the same identity information reaches a preset duration, and the like. It should be noted that, in the embodiment of the present application, for the same piece of binding information, it is finally added to the same tile. Considering that the size of each block is limited, the specific values of the preset quantity value, the preset data quantity size and the preset duration are not unlimited, but are constrained by the size of the block. Therefore, the present embodiment may specifically determine the preset number value, the preset data size, or the preset duration according to the capacity of the block.
S306, the server carries out anti-tampering protection on the binding information based on a preset protection mechanism, and when the condition that Hash operation needs to be triggered is monitored, the information which is subjected to the anti-tampering protection is restored to obtain the binding information.
In a specific embodiment, the preset protection mechanism may be an information tamper-resistant protection mechanism constructed based on an encoding technology. Specifically, the server may encode the binding information by using a custom encoding rule to obtain encoded information, and when it is monitored that hash operation needs to be triggered, decode the encoded information by using a custom decoding rule to restore the binding information, where the custom decoding rule is a decoding rule corresponding to the custom encoding rule. In this embodiment, the customized encoding rule and the customized decoding rule may be the encoding rule and the decoding rule customized by a supervisor. Since the codec rule is self-defined by the supervisor, it is an unknown codec rule for the outside world, and in addition, the encoded information is generated based on which kind of the codec rule and is unknown for the outside world, thereby greatly increasing the difficulty of the outside world attempting to restore the binding information through decoding. If the external attempts to directly tamper the information content of the coded information, the decoded information obtained after the subsequent decoding processing becomes messy code information with a non-communicated semantic meaning. The server can directly send out related alarm information to the supervisor terminal through a semantic recognition technology in a natural language processing technology once the decoding information is monitored to be information with a semantic barrier. It is understood that the alarm information may specifically include, but is not limited to, a server IP address, information of a current time period, information of a tester terminal communicating with the server in the current time period, and the like.
In another specific embodiment, the preset protection mechanism may be an information tamper-resistant protection mechanism constructed based on an asymmetric encryption technology. Specifically, the server may perform asymmetric encryption on the binding information by using the public key of the server to obtain second encrypted information, and when it is monitored that hash operation needs to be triggered, decrypt the second encrypted information by using the private key of the server to restore the second encrypted information to obtain the binding information. In this embodiment, the private key of the server itself is kept by the server and cannot be obtained by the outside. After the server uses the public key of the server to asymmetrically encrypt the binding information to obtain second encrypted information, the outside cannot decrypt the second encrypted information, and therefore tampering of the binding information by the outside is prevented. In this embodiment, the server may generate its own public key and private key by using a local key generation program. In addition, in order to further improve the tamper-proof effect, the server may periodically update its own public key and private key according to a preset key update period.
S307, the server performs hash operation on the binding information.
S308, the server carries out digital signature on the hash operation result.
S309, the server uploads the digital signature result and the binding information to a block chain node in the block chain network.
And S310, checking and signing the digital signature result by the block chain link point in the block chain network, and storing the binding information after the check and signing pass.
It is understood that all the aforementioned alternative technical solutions can be adopted to form any combination of the alternative embodiments of the present application, and are not described in detail herein.
According to the above description, the uplink operation is performed by the server. In fact, the present application can complete the uplink operation through the server, and also can complete the uplink operation through the tester terminal. Referring to fig. 11 in particular, fig. 11 is a flowchart of a test supervision method provided in an embodiment of the present application, where the test supervision method may include the following steps:
s401, the testing side terminal creates a testing instruction, and the testing instruction is used for testing the server.
S402, the testing side terminal sends the testing instruction to the server.
And S403, the server acquires and tests the test instruction.
S404, the server feeds back prompt information indicating that the test is finished to the terminal of the testing party.
S405, after the testing party terminal acquires the feedback information, binding the testing instruction and the identity identification information to obtain binding information, wherein the identity identification information is used for representing the identity of the testing party; the feedback information is prompt information fed back by the server after the server executes the test instruction.
S406, the testing side terminal performs hash operation on the binding information and performs digital signature on the hash operation result.
S407, the testing side terminal uploads the digital signature result and the binding information to a block chain node in a block chain network.
And S408, checking and signing the digital signature result by the block chain link point in the block chain network, and storing the binding information after the check and signing pass.
That is, the operations of information binding, hash operation, digital signature, and information uplink, which are originally completed by the server, are all completed by the tester terminal in this embodiment, and the tester terminal performs the operations of information binding, hash operation, digital signature, and information uplink only after the server executes the test instruction and obtains the prompt information that the instruction fed back by the server is tested. In addition, the operations of information binding, hash operation, digital signature, information uplink, and the like performed by the tester terminal in this embodiment are substantially similar to the related operations performed by the server in the foregoing embodiment except for the difference of the execution bodies, so the descriptions of the technical details of the operations of information binding, hash operation, digital signature, information uplink, and the like in this embodiment may refer to the corresponding contents of the foregoing embodiment, and are not repeated herein.
After the information uplink operation is completed by the server or the testing side terminal, the inquiring terminal can perform the corresponding uplink information inquiring operation. Referring to fig. 12 in detail, fig. 12 is a flowchart of a blockchain information query process in a test supervision method according to an embodiment of the present disclosure, where the blockchain information query process may include the following steps:
s501, the query terminal generates a query request aiming at the target test instruction.
In this embodiment, when it is found that the target test instruction once causes the abnormal operation of the server, the target test instruction may be input to the query terminal, and then the query terminal generates a query request for the target test instruction.
S502, the inquiry terminal sends the inquiry request to a third-party management platform.
S503, the third-party management platform acquires historical test operation records from the block chain network.
In this embodiment, in order to accelerate data query speed and increase types of search keywords, the third-party management platform may obtain all history test operation records in advance from the blockchain network, where the history test operation records may specifically include information such as a server IP address, a timestamp, a user name, and a test instruction, and perform a corresponding decryption operation on encrypted data existing in the obtained history test operation records, for example, decrypt an asymmetrically encrypted user name in the history test operation records. It can be understood that, while the third-party management platform obtains the historical test operation record in the blockchain network, it may also obtain the corresponding transaction hash value, the blockchain height, the transaction time, the blockchain account address, and determine the corresponding blockchain hash value.
It is understood that the third party management platform may respond to the query request for the test instruction, or respond to the query request for the user name, the address of the blockchain account, the transaction hash value, the block height, the transaction time, the IP address of the server, or the block hash value by using the data information collected from the blockchain network. Each of the query modes can support fuzzy query. In addition, the third-party management platform may further obtain a blockchain identifier of any blockchain in the current blockchain network, and indexes such as a total transaction number of the blockchain, a today transaction number, a transaction number within a latest preset time period, a blocknumber within a latest preset time period, a total blocknumber of the blockchain, a current member number, a current node number, and a historical concurrency peak value in units of pens/sec. For example, the third party management platform may obtain indexes, called as a blockchain identifier of a test chain, a total transaction number, a today transaction number, a transaction number within a recent preset time period, a blocknumber within a recent preset time period, a total height of a block, a current member number, a current node number, a historical concurrency peak value in units of pens/seconds, and the like, so that the supervisor can learn various index information of the test chain in the current blockchain network through the third party management platform. It is to be understood that the above-mentioned test chain specifically refers to a blockchain dedicated to record historical test operation records in a blockchain network.
And S504, the third-party management platform returns data information corresponding to the query request to the query terminal by using the historical test operation records acquired from the blockchain network.
And S505, the inquiry terminal receives the data information so as to determine a responsible person corresponding to the target test instruction according to the data information.
The uplink and query process of the test data of the game server in the block chain network built based on TrustSQL is described below through a specific application scenario example. TrustSQL is a block chain bottom layer framework, can be compatible with Mysql and JsonRPC, and supports various consensus algorithms. TrustSQL specifically adopts a Byzantine fault-tolerant consensus mechanism, allows partial block chain links to be down, and is beneficial to reducing the node access cost and improving the network reliability. The digital signature algorithm of TrustSQL is an elliptic curve digital signature algorithm, and a private key can be generated by a user, so that the binding relationship between the test operation of the user and the user cannot be tampered.
Specifically, referring to fig. 13 and 14, fig. 13 is a schematic diagram of a multi-layer architecture of the whole system, and fig. 14 is a schematic diagram of uplink and query application of test data in a specific application scenario.
In fig. 13, the Linux Shell client runs on the tester terminal, and the tester terminal creates a test instruction through the Linux Shell client and sends the test instruction to the game server to test the game server. An Agent program for monitoring and collecting executed test instructions on the game server may be deployed on the Agent layer; an API (application programming interface) for carrying out information uplink, an API for carrying out uplink information inquiry and a service for managing the blockchain account can be deployed on an Agent layer; processing Logic associated with an instruction authority management service, an instruction uplink service, an instruction query service, an instruction statistics service, an instruction alarm service, or other auxiliary services can be deployed on the Logic layer; the underlying consensus modules, data nodes and traffic databases associated with the blockchain network may all be located at the DB layer. In fig. 13, a BaaS platform (BaaS, i.e., Blockchain as a Service) as a third-party management platform may provide a user with a Blockchain information query Service and an instruction statistics Service. Further, the BaaS platform may also provide services such as a node monitoring service, a node purchase service, and a chain creation service. It can be understood that, if the query of the blockchain information is performed without using a third-party management platform, a management background dedicated to performing the query of the blockchain information may also be developed on the local game server in the embodiment, but such development cost is relatively high.
In fig. 14, the tester terminal acquires a test instruction input by the tester, including an rm-rf instruction, and then transmits the test instruction to the game server. After the game server executes the test instruction, redundancy removal processing can be carried out on the test instruction to obtain an rm-rf instruction, then the rm-rf instruction and identity identification information containing a user name 'tt _ tom' of a test party are bound, hash operation is carried out on the bound information, digital signature is carried out on the hash operation result by using a private key, and then the digital signature result and the bound information are sent to any block chain node of a block chain network built based on TrustSQL. After the block chain link point obtains the digital signature result and the binding information, the public key corresponding to the private key is used for checking and signing the digital signature result, if the check and signing are passed, a block containing the binding information can be generated on the block chain node subsequently, the block is broadcasted to other block chain nodes in a block chain network, and after the other block chain link points pass the check and signing, the block can be added to the block chain. Subsequently, if the monitoring party terminal needs to send a query request aiming at the rm-rf instruction to the BaaS platform, the BaaS platform can query the identity information which is corresponding to the rm-rf instruction and contains the user name 'tt _ tom' by using a historical test operation record which is obtained from a block chain network in advance, and then the queried information is returned to the monitoring party terminal, so that a monitoring person can know that the rm-rf instruction is submitted to the game server by the 'tt _ tom', and accurate responsibility tracing can be realized.
Fig. 15 is a test supervision apparatus provided in an embodiment of the present application, including:
an instruction obtaining module 31, configured to obtain a test instruction; the test instruction is used for testing the server;
an instruction execution module 32, configured to execute the test instruction;
the information binding module 33 is configured to bind the test instruction and the identity information to obtain binding information; the identity identification information is used for representing the identity of a tester submitting the test instruction;
a hash operation module 34, configured to perform a hash operation on the binding information;
the digital signature module 35 is configured to digitally sign the hash operation result;
an information uplink module 36, configured to upload the digital signature result and the binding information to a block link point in a block link network, so that the block link point performs signature verification on the digital signature result and stores the binding information after the signature verification passes.
In a possible implementation manner, the information binding module 33 may specifically include:
the identification information encryption unit is used for encrypting the identity identification information to obtain first encryption information;
and the first information binding unit is used for binding the test instruction and the first encryption information.
In a possible implementation manner, the identification information encryption unit is specifically configured to: and carrying out asymmetric encryption on the identity identification information by using a public key of a supervisor, wherein the supervisor is a manager for carrying out responsibility confirmation on the test behavior of the tester.
In a possible implementation manner, the information binding module 33 may specifically include:
the instruction characteristic identification unit is used for identifying the instruction characteristics of the test instruction;
the instruction description unit is used for generating corresponding instruction description information for the test instruction which accords with the preset instruction characteristics;
and the second information binding unit is used for binding the test instruction, the identity identification information and the instruction description information.
In a possible implementation manner, the information binding module 33 may specifically include:
the instruction collecting unit is used for collecting the test instruction;
and the third instruction binding unit is used for binding the collected test instruction and the collected identity identification information after meeting a preset binding trigger condition.
In one possible implementation, the test supervision apparatus may further include:
the first protection module is configured to, before the hash operation module 34 performs hash operation on the binding information, encode the binding information by using a custom encoding rule to obtain encoded information; when the condition that Hash operation needs to be triggered is monitored, decoding processing is carried out on the coding information by utilizing a user-defined decoding rule so as to restore and obtain the binding information, wherein the user-defined decoding rule is a decoding rule corresponding to the user-defined coding rule.
In one possible implementation, the test supervision apparatus may further include:
a second protection module, configured to perform asymmetric encryption on the binding information by using the public key of the server before the hash operation module 34 performs hash operation on the binding information, so as to obtain second encrypted information; and when the condition that the Hash operation needs to be triggered is monitored, the second encrypted information is decrypted by using a private key of the server so as to restore and obtain the binding information.
In one possible implementation, the test supervision apparatus may further include:
an authority determining module, configured to determine whether the tester has an instruction submission authority according to a block chain account detection result of the tester or historical test data stored on a block chain network before the instruction obtaining module 31 obtains the test instruction;
and the certificate issuing module is used for issuing a corresponding instruction submission permission certificate to the terminal held by the tester after the permission determining module determines that the tester has the instruction submission permission, so that the terminal held by the tester submits the test instruction to the server according to the instruction submission permission certificate, and the instruction submission permission certificate is a certificate obtained by asymmetrically encrypting a public key of the tester.
In a possible implementation manner, the information uplink module 36 may specifically include:
the time detection unit is used for detecting whether the current time is consistent with the pre-acquired legal uplink time;
and the information uplink unit is used for uploading the digital signature result and the binding information to a block chain node in a block chain network under the condition that the current time is consistent with the legal uplink time.
In a possible implementation manner, the information uplink module 36 may specifically include:
the node screening unit is used for screening the block chain link points in the block chain network according to the load information and the position information of each current block chain node to obtain a target node;
and the information uploading unit is used for uploading the digital signature result and the binding information to the target node.
In one possible implementation manner, the information uplink module 36 may be specifically configured to: and uploading the digital signature results and the corresponding binding information to different block chain nodes in a block chain network respectively.
The device provided by the embodiment of the application binds the test instruction with the identity identification information of a corresponding tester after the test instruction is obtained and executed, and uploads the digital signature result and the binding information to the block chain nodes in the block chain network after the hash operation and the digital signature are sequentially carried out on the binding information, so that the digital signature result is subjected to signature verification and is stored after the signature verification is passed. Therefore, the binding information is stored through the blockchain network, and is obtained by binding the test instruction and the identity information of the corresponding tester, which means that after the binding information is uplink, the test instruction, the identity information and the binding relationship among the test instruction and the identity information in the binding information cannot be tampered, and when the supervising party performs responsibility tracing of the test accident in the later stage, the identity information bound with the test instruction can be accurately found from the blockchain network by using the test instruction related to the test accident, so that the actual responsible person can be accurately traced, that is, the consistency between the traced responsible person and the actual responsible person is ensured, and the occurrence of responsibility tracing failure is avoided.
Fig. 16 is a test supervision apparatus provided in an embodiment of the present application, and is applied to a terminal held by a tester, including:
an instruction creating module 41 for creating a test instruction; the test instruction is used for testing the server;
an instruction sending module 42, configured to send the test instruction to the server;
the information binding module 43 is configured to bind the test instruction and the identity information after obtaining the feedback information, so as to obtain binding information; the identity identification information is used for representing the identity of the testing party; the feedback information is prompt information fed back by the server after the server executes the test instruction;
a hash operation module 44, configured to perform a hash operation on the binding information;
a digital signature module 45, configured to digitally sign the hash operation result;
an information uplink module 46, configured to upload the digital signature result and the binding information to a block link point in a block link network, so that the block link point performs signature verification on the digital signature result and stores the binding information after the signature verification passes.
That is, the operations of information binding, hash operation, digital signature, and information uplink, which are originally completed by the server, are all completed by the tester terminal in this embodiment, and the tester terminal performs the operations of information binding, hash operation, digital signature, and information uplink only after the server executes the test instruction and obtains the prompt information that the instruction fed back by the server is tested. In addition, the operations of information binding, hash operation, digital signature, information uplink, and the like performed by the tester terminal in this embodiment are substantially similar to the operations performed by the server in the foregoing embodiment except for the difference of the execution bodies, so that the descriptions of the technical details of the operations of information binding, hash operation, digital signature, information uplink, and the like performed by the corresponding functional modules in this embodiment may refer to the corresponding contents of the foregoing embodiment, and are not repeated herein.
Further, the embodiment of the application also provides electronic equipment. The electronic device may be the server 50 shown in fig. 17 or the terminal 60 shown in fig. 18. Fig. 17 and 18 are each a block diagram of an electronic device according to an exemplary embodiment, and the contents of the diagrams should not be construed as any limitation to the scope of use of the present application.
Fig. 17 is a schematic structural diagram of a server according to an embodiment of the present application. The server 50 may specifically include: at least one processor 51, at least one memory 52, a power supply 53, a communication interface 54, an input output interface 55, and a communication bus 56. Wherein the memory 52 is used for storing a computer program, which is loaded and executed by the processor 51 to implement the relevant steps in the test supervision method executed by the server disclosed in any of the foregoing embodiments.
In this embodiment, the power supply 53 is used to provide operating voltage for each hardware device on the server 50; the communication interface 54 can create a data transmission channel between the server 50 and an external device, and the communication protocol followed by the communication interface is any communication protocol applicable to the technical solution of the present application, and is not specifically limited herein; the input/output interface 55 is configured to obtain external input data or output data to the outside, and a specific interface type thereof may be selected according to specific application requirements, which is not specifically limited herein.
The memory 52 may be a read-only memory, a random access memory, a magnetic disk, an optical disk, or the like as a carrier for storing resources, the resources stored thereon include an operating system 521, a computer program 522, data 523, and the like, and the storage manner may be a transient storage or a permanent storage.
The operating system 521 is used for managing and controlling each hardware device and the computer program 522 on the Server 50 to realize the operation and processing of the mass data 523 in the memory 52 by the processor 51, and may be Windows Server, Netware, Unix, Linux, or the like. The computer program 522 may further include a computer program that can be used to perform other specific tasks in addition to the computer program that can be used to perform the test supervision method performed by the server disclosed in any of the foregoing embodiments. The data 523 may include data such as test instructions collected by the server and identification information of the tester, and may also include business data such as game data and e-commerce transaction data.
Fig. 18 is a schematic structural diagram of a terminal according to an embodiment of the present disclosure, where the terminal 60 may specifically include, but is not limited to, a smart phone, a tablet computer, a notebook computer, or a desktop computer.
In general, the terminal 60 in the present embodiment includes: a processor 61 and a memory 62.
The processor 61 may include one or more processing cores, such as a 4-core processor, an 8-core processor, and the like. The processor 61 may be implemented in at least one hardware form of a DSP (Digital Signal Processing), an FPGA (Field-Programmable Gate Array), and a PLA (Programmable Logic Array). The processor 61 may also include a main processor and a coprocessor, where the main processor is a processor for processing data in an awake state, and is also called a Central Processing Unit (CPU); a coprocessor is a low power processor for processing data in a standby state. In some embodiments, the processor 61 may be integrated with a GPU (Graphics Processing Unit), which is responsible for rendering and drawing the content required to be displayed on the display screen. In some embodiments, the processor 61 may further include an AI (Artificial Intelligence) processor for processing computing operations related to machine learning.
Memory 62 may include one or more computer-readable storage media, which may be non-transitory. The memory 62 may also include high speed random access memory, as well as non-volatile memory, such as one or more magnetic disk storage devices, flash memory storage devices. In this embodiment, the memory 62 is at least used for storing a computer program 621, wherein after being loaded and executed by the processor 61, the computer program can implement relevant steps in the test supervision method executed by the terminal side disclosed in any of the foregoing embodiments. In addition, the resources stored in the memory 62 may also include an operating system 622 and data 623, etc., which may be stored in a transient or persistent manner. The operating system 622 may include Windows, Unix, Linux, etc. Data 623 may include, but is not limited to, test instruction data, user identity data, and the like.
In some embodiments, the terminal 60 may also include a display 63, an input/output interface 64, a communication interface 65, a sensor 66, a power supply 67, and a communication bus 68.
Those skilled in the art will appreciate that the configuration shown in fig. 18 is not intended to be limiting of terminal 60 and may include more or fewer components than those shown.
Further, an embodiment of the present application further discloses a storage medium, where the storage medium stores computer-executable instructions, and the computer-executable instructions are loaded and executed by a processor to implement the steps of the test supervision method executed by the server disclosed in any of the foregoing embodiments, or implement the steps of the test supervision method executed by the terminal side disclosed in any of the foregoing embodiments.
It should be noted that the above-mentioned embodiments are only preferred embodiments of the present application, and are not intended to limit the present application, and any modifications, equivalent replacements, improvements, etc. made within the spirit and principle of the present application should be included in the protection scope of the present application.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other. The device disclosed by the embodiment corresponds to the method disclosed by the embodiment, so that the description is simple, and the relevant points can be referred to the method part for description.
The above detailed description is provided for a test supervision method, apparatus, device and storage medium, and specific examples are applied in this document to explain the principle and implementation of the present application, and the description of the above embodiments is only used to help understand the method and core ideas of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, there may be variations in the specific embodiments and the application scope, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (15)

1. A test supervision method, comprising:
acquiring and executing a test instruction; the test instruction is used for testing the server;
binding the test instruction and the identity identification information to obtain binding information; the identity identification information is used for representing the identity of a tester submitting the test instruction;
performing hash operation on the binding information, and performing digital signature on a hash operation result;
detecting whether a preset chain loading condition is met or not at present;
and if the preset uplink condition is met currently, uploading the digital signature result and the binding information to a block chain link point in a block chain network, so that the block chain link point verifies the digital signature result and stores the binding information after the verification passes.
2. The test supervision method according to claim 1, wherein the binding the test instruction and the identification information comprises:
encrypting the identity identification information to obtain first encrypted information;
binding the test instruction and the first encryption information.
3. The test supervision method according to claim 2, wherein the encrypting the identification information comprises:
and carrying out asymmetric encryption on the identity identification information by using a public key of a supervisor, wherein the supervisor is a manager for carrying out responsibility confirmation on the test behavior of the tester.
4. The test supervision method according to claim 1, wherein the binding the test instruction and the identification information comprises:
collecting the test instruction;
and binding the collected test instruction and the collected identity identification information after the preset binding triggering condition is met.
5. The test supervision method according to claim 4, wherein the preset binding trigger condition comprises:
the number of the collected test instructions corresponding to the same identity identification information reaches a preset number value; or the size of the whole data volume of the collected test instruction corresponding to the same identity identification information reaches the size of the preset data volume; or the collection time of the test instruction corresponding to the same identification information in the current round reaches the preset time.
6. The test supervision method according to claim 5, further comprising:
and determining the preset quantity value, the preset data size or the preset duration according to the capacity of the block.
7. The test supervision method according to claim 4, wherein before the hashing the binding information, the method further comprises:
coding the binding information by using a custom coding rule to obtain coded information;
when the condition that Hash operation needs to be triggered is monitored, decoding processing is carried out on the coding information by utilizing a user-defined decoding rule so as to restore and obtain the binding information, wherein the user-defined decoding rule is a decoding rule corresponding to the user-defined coding rule.
8. The test supervision method according to claim 7, wherein after the decoding process of the encoded information by using the custom decoding rule, further comprising:
if the decoding information is monitored to be information with a semantic meaning which is not communicated through a semantic meaning recognition technology in a natural language processing technology, related alarm information is directly sent to the supervision party.
9. The test supervision method according to claim 4, wherein before the hashing the binding information, the method further comprises:
carrying out asymmetric encryption on the binding information by using a public key of the server to obtain second encryption information;
and when the condition that the Hash operation needs to be triggered is monitored, the second encrypted information is decrypted by using a private key of the server so as to restore and obtain the binding information.
10. The test supervision method according to claim 9, further comprising:
and periodically updating the public key and the private key of the user according to a preset key updating period.
11. The test supervision method according to claim 1, wherein before the obtaining and executing the test instructions, further comprising:
determining whether the tester has an instruction submitting permission or not according to the block chain account detection result of the tester or historical test data stored on a block chain network;
and if the testing party is determined to have the instruction submitting authority, issuing a corresponding instruction submitting authority certificate to the terminal held by the testing party so that the terminal held by the testing party submits the testing instruction to the server according to the instruction submitting authority certificate, wherein the instruction submitting authority certificate is a certificate obtained by asymmetrically encrypting by using a public key of the testing party.
12. The test supervision method according to any of claims 1 to 11, wherein the uploading of the digital signature result and the binding information to a block chain node point located in a block chain network comprises:
screening block chain link points in the block chain network according to the load information and the position information of each current block chain node to obtain a target node;
and uploading the digital signature result and the binding information to the target node.
13. A test supervision apparatus, comprising:
the instruction acquisition module is used for acquiring a test instruction; the test instruction is used for testing the server;
the instruction execution module is used for executing the test instruction;
the information binding module is used for binding the test instruction and the identity identification information to obtain binding information; the identity identification information is used for representing the identity of a tester submitting the test instruction;
the hash operation module is used for carrying out hash operation on the binding information;
the digital signature module is used for carrying out digital signature on the hash operation result;
and the information uplink module is used for detecting whether the preset uplink condition is met currently or not, and if the preset uplink condition is met currently, uploading the digital signature result and the binding information to a block chain node point in a block chain network so that the block chain node point checks the digital signature result and stores the binding information after the check is passed.
14. An electronic device, comprising a processor and a memory; wherein the memory is for storing a computer program that is loaded and executed by the processor to implement a test supervision method according to any of claims 1 to 12.
15. A storage medium having stored thereon computer-executable instructions which, when loaded and executed by a processor, carry out a test supervision method according to any one of claims 1 to 12.
CN201911269625.7A 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium Active CN110826111B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201911269625.7A CN110826111B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201911269625.7A CN110826111B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium
CN201910561207.9A CN110263585B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium

Related Parent Applications (1)

Application Number Title Priority Date Filing Date
CN201910561207.9A Division CN110263585B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110826111A true CN110826111A (en) 2020-02-21
CN110826111B CN110826111B (en) 2021-08-13

Family

ID=67921785

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201911269625.7A Active CN110826111B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium
CN201910561207.9A Active CN110263585B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium

Family Applications After (1)

Application Number Title Priority Date Filing Date
CN201910561207.9A Active CN110263585B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium

Country Status (1)

Country Link
CN (2) CN110826111B (en)

Cited By (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111478827A (en) * 2020-06-24 2020-07-31 支付宝(杭州)信息技术有限公司 Pressure testing method, device and system for block chain network
CN111783122A (en) * 2020-07-03 2020-10-16 常熟中信金桥科技服务有限公司 Research and development trial-production information management method and system
CN112163171A (en) * 2020-09-21 2021-01-01 中国电子科技网络信息安全有限公司 Data chaining method based on terminal signature
CN112269838A (en) * 2020-11-18 2021-01-26 网易(杭州)网络有限公司 Block chain-based supervision method and device, electronic equipment and storage medium
CN112333206A (en) * 2020-12-24 2021-02-05 长沙树根互联技术有限公司 Safety test method and device and electronic equipment
CN112711631A (en) * 2020-11-27 2021-04-27 国网山东省电力公司电力科学研究院 Digital twin information synchronization method, system, readable storage medium and device
CN113672994A (en) * 2021-09-03 2021-11-19 中国联合网络通信集团有限公司 Cooking equipment data management method, device and system based on block chain
CN114143067A (en) * 2021-11-26 2022-03-04 天翼数字生活科技有限公司 Instruction processing method and system of dial testing system
CN115114603A (en) * 2021-03-17 2022-09-27 中国移动通信集团福建有限公司 Base station equipment data management method and device and electronic equipment
CN115277179A (en) * 2022-07-26 2022-11-01 湖南三湘银行股份有限公司 Open platform comprehensive safety protection method based on multi-step protection
CN116684207A (en) * 2023-08-03 2023-09-01 杭州字节方舟科技有限公司 Method, device, equipment and medium for processing monitoring data based on blockchain

Families Citing this family (16)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110572480B (en) * 2019-10-14 2022-07-05 腾讯科技(深圳)有限公司 Method, device and equipment for realizing calibration of test equipment
CN111079136B (en) * 2019-11-07 2022-02-11 北京科技大学 Fog computing intrusion detection feature sharing system based on block chain technology
CN110941533B (en) * 2019-11-20 2023-04-18 腾讯科技(深圳)有限公司 Monitoring method, monitoring device and computer readable storage medium
CN111324517B (en) * 2020-01-20 2023-08-18 阿尔法云计算(深圳)有限公司 Application service supervision method, supervision server and storage medium
CN111291339B (en) * 2020-02-19 2024-02-06 上海方付通商务服务有限公司 Method, device, equipment and storage medium for processing blockchain data
CN111563365B (en) * 2020-03-31 2023-09-19 岭东核电有限公司 Method and device for processing modification information of test standard worksheet and computer equipment
CN111679648B (en) * 2020-05-22 2021-06-01 浙江浙能技术研究院有限公司 Multivariate closed-loop control loop performance evaluation method based on Gaussian process regression
CN111786791A (en) * 2020-06-16 2020-10-16 湖南天河国云科技有限公司 Industrial Internet data acquisition method based on block chain and gateway
CN111866088B (en) * 2020-06-29 2022-08-26 深圳壹账通智能科技有限公司 Block chain based test method and device, computer equipment and storage medium
CN111953940B (en) * 2020-08-06 2021-07-27 中标慧安信息技术股份有限公司 Uploading processing method and system for monitoring video
CN111988149B (en) * 2020-08-31 2022-09-23 中国信息通信研究院 Data sharing method, device and system in industrial internet
CN112015460B (en) * 2020-09-09 2023-11-03 南京工程学院 Code responsibility-following method and system based on block chain technology
CN112925846A (en) * 2021-01-18 2021-06-08 迅鳐成都科技有限公司 Historical operation tracing method and system based on block chain and identity authentication
CN113221159A (en) * 2021-04-19 2021-08-06 湖北邮电规划设计有限公司 Epidemic situation reporting system based on block chain
CN115277686B (en) * 2021-04-30 2024-04-19 中国移动通信集团辽宁有限公司 Data transmission method, device, equipment and computer storage medium
CN115150360B (en) * 2022-06-28 2023-12-19 北京送好运信息技术有限公司 Mailbox address and blockchain address binding method based on blockchain technology

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150187223A1 (en) * 2013-12-30 2015-07-02 Pearson Education, Inc. Deidentified access of instructional content
US20160014238A1 (en) * 2008-11-24 2016-01-14 Jpmorgan Chase Bank, N.A. System and Method for Testing Applications with a Load Tester and Testing Translator
CN106469113A (en) * 2015-08-18 2017-03-01 腾讯科技(深圳)有限公司 Applied program testing method and system
CN106933709A (en) * 2015-12-31 2017-07-07 北京金山云网络技术有限公司 A kind of method of testing and device
CN108076063A (en) * 2017-12-25 2018-05-25 天津理工大学 Network O&M auditing method, server terminal and client based on block chain
CN108694500A (en) * 2018-04-26 2018-10-23 布比(北京)网络技术有限公司 A kind of digital asset circulation method and system based on block chain
CN108833514A (en) * 2018-06-01 2018-11-16 众安信息技术服务有限公司 Audit log processing method, device and Log Audit System based on block chain
CN108874596A (en) * 2017-05-08 2018-11-23 龙芯中科技术有限公司 server stability test method and server
CN109194708A (en) * 2018-07-24 2019-01-11 哈尔滨工程大学 A kind of distributed memory system and its identity identifying method based on block chain technology
CN109447648A (en) * 2018-12-07 2019-03-08 深圳市智税链科技有限公司 The method of recorded data zone block, accounting nodes and medium in block chain network
CN109741063A (en) * 2019-01-10 2019-05-10 众安信息技术服务有限公司 Digital signature method and device based on block chain
CN109800248A (en) * 2018-12-17 2019-05-24 上海点融信息科技有限责任公司 Digital content for block chain network is traced to the source and recording method, storage medium, calculating equipment
CN109828958A (en) * 2019-01-31 2019-05-31 北京瑞卓喜投科技发展有限公司 Event recording method and record system based on block chain

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106899410B (en) * 2016-09-13 2019-06-25 中国移动通信有限公司研究院 A kind of method and device of equipment identities certification
CN108200208B (en) * 2018-02-11 2021-01-05 南宁师范大学 Logistics block chain consensus algorithm based on cloud computing

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160014238A1 (en) * 2008-11-24 2016-01-14 Jpmorgan Chase Bank, N.A. System and Method for Testing Applications with a Load Tester and Testing Translator
US20150187223A1 (en) * 2013-12-30 2015-07-02 Pearson Education, Inc. Deidentified access of instructional content
CN106469113A (en) * 2015-08-18 2017-03-01 腾讯科技(深圳)有限公司 Applied program testing method and system
CN106933709A (en) * 2015-12-31 2017-07-07 北京金山云网络技术有限公司 A kind of method of testing and device
CN108874596A (en) * 2017-05-08 2018-11-23 龙芯中科技术有限公司 server stability test method and server
CN108076063A (en) * 2017-12-25 2018-05-25 天津理工大学 Network O&M auditing method, server terminal and client based on block chain
CN108694500A (en) * 2018-04-26 2018-10-23 布比(北京)网络技术有限公司 A kind of digital asset circulation method and system based on block chain
CN108833514A (en) * 2018-06-01 2018-11-16 众安信息技术服务有限公司 Audit log processing method, device and Log Audit System based on block chain
CN109194708A (en) * 2018-07-24 2019-01-11 哈尔滨工程大学 A kind of distributed memory system and its identity identifying method based on block chain technology
CN109447648A (en) * 2018-12-07 2019-03-08 深圳市智税链科技有限公司 The method of recorded data zone block, accounting nodes and medium in block chain network
CN109800248A (en) * 2018-12-17 2019-05-24 上海点融信息科技有限责任公司 Digital content for block chain network is traced to the source and recording method, storage medium, calculating equipment
CN109741063A (en) * 2019-01-10 2019-05-10 众安信息技术服务有限公司 Digital signature method and device based on block chain
CN109828958A (en) * 2019-01-31 2019-05-31 北京瑞卓喜投科技发展有限公司 Event recording method and record system based on block chain

Cited By (20)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111478827A (en) * 2020-06-24 2020-07-31 支付宝(杭州)信息技术有限公司 Pressure testing method, device and system for block chain network
CN111783122A (en) * 2020-07-03 2020-10-16 常熟中信金桥科技服务有限公司 Research and development trial-production information management method and system
CN111783122B (en) * 2020-07-03 2022-07-15 常熟中信金桥科技服务有限公司 Research and development trial-production information management method and system
CN112163171B (en) * 2020-09-21 2022-03-18 中国电子科技网络信息安全有限公司 Data chaining method based on terminal signature
CN112163171A (en) * 2020-09-21 2021-01-01 中国电子科技网络信息安全有限公司 Data chaining method based on terminal signature
CN112269838A (en) * 2020-11-18 2021-01-26 网易(杭州)网络有限公司 Block chain-based supervision method and device, electronic equipment and storage medium
CN112269838B (en) * 2020-11-18 2023-07-25 网易(杭州)网络有限公司 Blockchain-based supervision method and device, electronic equipment and storage medium
CN112711631A (en) * 2020-11-27 2021-04-27 国网山东省电力公司电力科学研究院 Digital twin information synchronization method, system, readable storage medium and device
CN112711631B (en) * 2020-11-27 2022-07-08 国网山东省电力公司营销服务中心(计量中心) Digital twin information synchronization method, system, readable storage medium and device
CN112333206B (en) * 2020-12-24 2021-03-30 长沙树根互联技术有限公司 Safety test method and device and electronic equipment
CN112333206A (en) * 2020-12-24 2021-02-05 长沙树根互联技术有限公司 Safety test method and device and electronic equipment
CN115114603A (en) * 2021-03-17 2022-09-27 中国移动通信集团福建有限公司 Base station equipment data management method and device and electronic equipment
CN115114603B (en) * 2021-03-17 2024-06-11 中国移动通信集团福建有限公司 Base station equipment data management method and device and electronic equipment
CN113672994A (en) * 2021-09-03 2021-11-19 中国联合网络通信集团有限公司 Cooking equipment data management method, device and system based on block chain
CN113672994B (en) * 2021-09-03 2023-12-01 中国联合网络通信集团有限公司 Cooking equipment data management method, device and system based on blockchain
CN114143067A (en) * 2021-11-26 2022-03-04 天翼数字生活科技有限公司 Instruction processing method and system of dial testing system
CN114143067B (en) * 2021-11-26 2024-04-19 天翼视联科技有限公司 Instruction processing method and system of dial testing system
CN115277179A (en) * 2022-07-26 2022-11-01 湖南三湘银行股份有限公司 Open platform comprehensive safety protection method based on multi-step protection
CN116684207A (en) * 2023-08-03 2023-09-01 杭州字节方舟科技有限公司 Method, device, equipment and medium for processing monitoring data based on blockchain
CN116684207B (en) * 2023-08-03 2023-10-20 杭州字节方舟科技有限公司 Method, device, equipment and medium for processing monitoring data based on blockchain

Also Published As

Publication number Publication date
CN110263585B (en) 2024-04-26
CN110263585A (en) 2019-09-20
CN110826111B (en) 2021-08-13

Similar Documents

Publication Publication Date Title
CN110826111B (en) Test supervision method, device, equipment and storage medium
CN110113167B (en) Information protection method and system of intelligent terminal and readable storage medium
CN106230851B (en) Data security method and system based on block chain
CN112217835B (en) Message data processing method and device, server and terminal equipment
CN109740309B (en) File protection method and device
JP2023501152A (en) Random node selection for permissioned blockchains
JP2023504492A (en) Efficient threshold storage of data objects
CN112214519B (en) Data query method, device, equipment and readable medium
CN114564757A (en) Data auditing method, device and equipment of block chain and readable storage medium
CN114372296A (en) Block chain-based user behavior data auditing method and system
CN115238286A (en) Data protection method and device, computer equipment and storage medium
CN110866265A (en) Data storage method, device and storage medium based on block chain
CN111339141A (en) Data transmission method, block link node equipment and medium
JP2023530594A (en) Permitted Event Processing in Distributed Databases
CN116305290A (en) System log security detection method and device, electronic equipment and storage medium
CN108256351B (en) File processing method and device, storage medium and terminal
CN112069529B (en) Block chain-based volume management method and device, computer and storage medium
CN113505260A (en) Face recognition method and device, computer readable medium and electronic equipment
CN111198862A (en) File storage method and device based on block chain, terminal equipment and medium
CN110519287B (en) Information management method and related equipment
CN115935414A (en) Block chain based data verification method and device, electronic equipment and storage medium
CN115567218A (en) Data processing method and device of security certificate based on block chain and server
CN110855753A (en) Bank operation system, method and server
CN111008389B (en) Data processing method and device based on file system in satellite
CN114491661A (en) Log tamper-proofing method and system based on block chain

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant