CN112328480A - System testing method and device - Google Patents
System testing method and device Download PDFInfo
- Publication number
- CN112328480A CN112328480A CN202011216369.8A CN202011216369A CN112328480A CN 112328480 A CN112328480 A CN 112328480A CN 202011216369 A CN202011216369 A CN 202011216369A CN 112328480 A CN112328480 A CN 112328480A
- Authority
- CN
- China
- Prior art keywords
- test
- test information
- processing result
- intermediate module
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
- 238000012360 testing method Methods 0.000 title claims abstract description 226
- 238000004088 simulation Methods 0.000 claims abstract description 67
- 238000012545 processing Methods 0.000 claims abstract description 64
- 238000000034 method Methods 0.000 claims abstract description 20
- 230000001419 dependent effect Effects 0.000 claims abstract description 7
- 238000012795 verification Methods 0.000 claims description 13
- 230000000694 effects Effects 0.000 abstract 1
- 230000002159 abnormal effect Effects 0.000 description 10
- 230000003993 interaction Effects 0.000 description 4
- 230000005540 biological transmission Effects 0.000 description 2
- 238000013478 data encryption standard Methods 0.000 description 2
- 230000006870 function Effects 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000004883 computer application Methods 0.000 description 1
- 238000013461 design Methods 0.000 description 1
- 238000010586 diagram Methods 0.000 description 1
- 238000005516 engineering process Methods 0.000 description 1
- 230000008676 import Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000002085 persistent effect Effects 0.000 description 1
- 230000008569 process Effects 0.000 description 1
- 230000000750 progressive effect Effects 0.000 description 1
- 230000000007 visual effect Effects 0.000 description 1
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
- G06F11/3688—Test management for test execution, e.g. scheduling of test suites
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3672—Test management
- G06F11/3692—Test management for test results analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F11/00—Error detection; Error correction; Monitoring
- G06F11/36—Preventing errors by testing or debugging software
- G06F11/3668—Software testing
- G06F11/3696—Methods or tools to render software testable
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Computer Hardware Design (AREA)
- Quality & Reliability (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
The application discloses a system testing method, which is applied to an intermediate module, wherein the intermediate module is connected with a simulation system, and the method comprises the following steps: receiving test information transmitted by a test system; decrypting the test information, and sending the decrypted test information to the simulation system so that the simulation system can simulate a dependent system of the test system to generate a processing result and then return the processing result; and encrypting the processing result and returning the encrypted processing result to the test system. By applying the technical scheme provided by the application, the test system can be normally tested when the dependence system cannot be normally used, the test progress is prevented from being influenced, and the test efficiency can be improved. In addition, the intermediate module decrypts the test information and encrypts the processing result, so that the encryption and decryption requirements of the test system can be better met, and the test efficiency is further improved. The application also discloses a system testing device which has corresponding technical effects.
Description
Technical Field
The present application relates to the field of computer application technologies, and in particular, to a system testing method and apparatus.
Background
In the test work, the condition of multi-system mutual calling often occurs. For example, when testing the system a, the system a needs to call the system B, and the test can be performed depending on the processing result returned by the system B. If the system B which the system A depends on is abnormal in code or is not on line normally, the system B cannot be successfully butted with the system A, a processing result cannot be returned, and the system A cannot be tested normally. Under the condition, the normal test can be performed only by waiting for the system B which the system A depends on to recover, so that the test progress is easily influenced, and the test efficiency is low.
Disclosure of Invention
The application aims to provide a system testing method and device so as to avoid influencing testing progress and improve testing efficiency.
In order to solve the technical problem, the application provides the following technical scheme:
a system testing method applied to an intermediate module, the intermediate module being connected to a simulation system, the method comprising:
receiving test information transmitted by a test system;
decrypting the test information, and sending the decrypted test information to the simulation system so that the simulation system simulates a dependent system of the test system to generate a processing result, and then returning the processing result;
and encrypting the processing result and returning the encrypted processing result to the test system.
In a specific embodiment of the present application, an interface address of the intermediate module is configured in a call address of the test system.
In a specific embodiment of the present application, the test information includes a message signature, and after the decrypting the test information and before sending the decrypted test information to the simulation system, the method further includes:
signing the message obtained after decryption by using a public key to obtain a verification signature;
comparing the verification signature with a message signature in the test information;
and if the test information is consistent with the test information, the step of sending the decrypted test information to the simulation system is executed.
In one embodiment of the present application, the method further includes:
the key information is obtained via a database.
In a specific embodiment of the present application, the processing result is: the simulation system generates an exception result based on the exception test instruction.
A system test device comprises an intermediate module and a simulation system connected with the intermediate module; wherein,
the intermediate module is used for receiving test information transmitted by the test system; decrypting the test information, sending the decrypted test information to the simulation system, receiving a processing result returned by the simulation system, encrypting the processing result, and returning the encrypted processing result to the test system;
and the simulation system is used for simulating a dependence system of the test system to generate a processing result and then returning the processing result to the intermediate module.
In a specific embodiment of the present application, an interface address of the intermediate module is configured in a call address of the test system.
In a specific embodiment of the present application, the test information includes a message signature, and the intermediate module is further configured to:
after the test information is decrypted and before the decrypted test information is sent to the simulation system, signing the message obtained after decryption by using a public key to obtain a verification signature;
comparing the verification signature with a message signature in the test information;
and if the test information is consistent with the test information, the step of sending the decrypted test information to the simulation system is executed.
In a specific embodiment of the present application, the intermediate module is further configured to:
and before the test information is decrypted, obtaining key information through a database.
In a specific embodiment of the present application, the processing result is: the simulation system generates an exception result based on the exception test instruction.
By applying the technical scheme provided by the embodiment of the application, the test of the test system does not depend on whether the dependence system is normal or on line, but returns the processing result through the intermediate module and the simulation system, so that the test system can be normally tested when the dependence system cannot be normally used, the test progress is prevented from being influenced, and the test efficiency can be improved. In addition, the decryption of the test information and the encryption of the processing result by the intermediate module can better adapt to the encryption and decryption requirements of the test system, so that the information interaction is smoother, and the test efficiency is further improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic diagram of a system test system according to an embodiment of the present application;
fig. 2 is a flowchart illustrating an implementation of a system testing method according to an embodiment of the present disclosure.
Detailed Description
The core of the application is to provide a system testing method, which can be applied to an intermediate module, and the intermediate module is connected with a simulation system.
As shown in fig. 1, the intermediate module 110 is located between the test system and the simulation system 120, and can receive the test information transmitted by the test system, decrypt the test information, and send the decrypted test information to the simulation system 120, the simulation system 120 simulates a dependent system of the test system to generate a processing result and returns the processing result to the intermediate module 110, and the intermediate module 110 encrypts the processing result and returns the processing result to the test system. Problems that may occur to the test system may be determined by testing whether the processing results received by the system meet expectations.
The test of the test system does not depend on whether the dependence system is normal or on-line, but returns the processing result through the intermediate module and the simulation system, so that the test system can be normally tested when the dependence system cannot be normally used, the test progress is prevented from being influenced, and the test efficiency can be improved. In addition, the decryption of the test information and the encryption of the processing result by the intermediate module can better adapt to the encryption and decryption requirements of the test system, so that the information interaction is smoother, and the test efficiency is further improved.
In order that those skilled in the art will better understand the disclosure, the following detailed description will be given with reference to the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 2, there is shown a flowchart for implementing a system testing method provided in the embodiment of the present application, where the method may include the following steps:
s210: and receiving test information transmitted by the test system.
The test system is the system currently to be tested.
In the embodiment of the present application, the call address of the test system may be configured with an interface address of the intermediate module. When the test system needs to be tested, if the dependent system of the test system is not on line or has abnormity, the test system can search the interface address of the intermediate module in the calling address and transmit the test information to the intermediate module through the interface.
After receiving the test information transmitted by the test system, the intermediate module may continue to perform the operation of step S220.
S220: and decrypting the test information, and sending the decrypted test information to the simulation system so that the simulation system simulates the dependence system of the test system to generate a processing result and then returns the processing result.
For a system with higher security requirement, the information transmission needs to be encrypted and decrypted. The test system can encrypt the test information and then transmit the encrypted test information to the intermediate module according to actual requirements. After receiving the test information transmitted by the test system, the intermediate module may decrypt the test information first and then send the decrypted test information to the simulation system. The test information received by the simulation system is decrypted, and a processing result can be generated by the dependence system of the simulation test system based on the test information and then returned to the intermediate module. Specific Encryption and decryption rules, such as AES (Advanced Encryption Standard), DES (Data Encryption Standard), RSA (Rivest Shamir Adleman), and the like, may be configured in the intermediate module in advance. The middle module can be configured with a plurality of encryption and decryption rules, is connected with different test systems, and can search the encryption and decryption rules consistent with the use of a certain test system to encrypt and decrypt corresponding information when receiving test information transmitted by the test system.
The simulation system may specifically simulate the system dependent return of the test system using the easy mock tool. The easy mock tool can provide visual and persistent service for quickly generating simulation data and support swagger interface import of the interface management platform. The easy mock tool can provide simulation of the interface, complete the simulated test process through recording, playback, checking and other steps, verify the calling type, times, sequence and the like of the method, and simulate other systems to return a specified value or throw a specified exception.
In practical application, the interface information can be imported into the easy mock tool in advance, or the interface information can be manually filled in the easy mock tool. The data needing to be returned in the interface can be viewed, and the variable needing to be automatically generated each time is determined so as to carry out simulation return through the mockjs interface. For automatically generated data returns, the corresponding simulation method can be written by looking at the code of the easy mock tool. For example, if a real interface returns a 6-bit integer, mockjs may simulate returning a random 6-bit number, such as natural (100000,999999). This allows a more realistic simulation interface to return.
In a specific embodiment of the present application, the test information may include a message signature, and after the test information is decrypted and before the decrypted test information is sent to the simulation system, the method may further include the following steps:
the method comprises the following steps: signing the message obtained after decryption by using a public key to obtain a verification signature;
step two: comparing the check signature with the message signature in the test information; and if so, executing the step of sending the decrypted test information to the simulation system.
For convenience of description, the above two steps are combined for illustration.
In this embodiment, the test system may generate a key pair in advance, including a public key and a private key. The test system can use the private key to sign the message body of the test message to obtain the message signature. The test information passed by the test system to the intermediate module via the interface may contain a message signature. Meanwhile, the test information containing the message body and the message signature can be transmitted to the intermediate module after being encrypted.
After receiving the test information transmitted by the test system, the intermediate module decrypts the test information to obtain a message body and a message signature. The obtained message body may be signed using the public key to obtain a verification signature, and then the verification signature may be compared with the message signature in the test information. If the two are consistent, the sender of the test information is considered as the test system and is legal, and the step of sending the decrypted test information, namely the message body, to the simulation system can be further executed. If the two are not consistent, the sender of the test information is considered to be not the test system, and is illegal, and no treatment can be carried out, or verification error prompt information is returned to the test system, so that the test system can carry out the transmission of the test information again.
In practical application, key information such as public keys and private keys can be stored in a database in advance. Before the intermediate module decrypts the test information, the intermediate module can obtain the key information through the database, so as to obtain the public key corresponding to the private key used by the test system.
S230: and encrypting the processing result and returning the encrypted processing result to the test system.
And after the intermediate module sends the decrypted test information to the simulation system, the simulation system simulates a dependent system of the test system to generate a processing result, and then the processing result is returned to the intermediate module. The intermediate module can encrypt the received processing result returned by the simulation system and then return the encrypted processing result to the test system. Also, the intermediate module may obtain key information via a database. After the intermediate module returns the encrypted processing result to the test system, the test system can perform corresponding decryption processing on the processing result, and then determine whether the corresponding function is normal or not based on the decrypted processing result, and whether a problem exists or not.
In one embodiment of the present application, the processing result may be: and simulating an exception result generated by the system based on the exception test instruction. According to actual test requirements, an abnormal test instruction can be sent to the simulation system, and the simulation system can generate a corresponding abnormal result when receiving the decrypted test information sent by the intermediate module based on the abnormal test instruction. And returning the abnormal result to the intermediate module as a processing result generated by the simulation dependence system, and returning the abnormal result to the test system after being encrypted by the intermediate module, so that the test system determines whether the abnormal processing function is normal or not and whether a problem exists or not based on the abnormal result.
For example, based on the test information of the test system, it is normally required to return 1, when the simulation system returns 1, the test system may consider it to be a normal result, and if the simulation system returns non-1, the test system may recognize an abnormal condition.
The embodiment of the application can effectively test abnormal scenes without depending on system manufacturing data.
By applying the method provided by the embodiment of the application, the test of the test system does not depend on whether the dependence system is normal or on line, but returns the processing result through the intermediate module and the simulation system, so that the test system can be normally tested when the dependence system cannot be normally used, the test progress is prevented from being influenced, and the test efficiency can be improved. In addition, the decryption of the test information and the encryption of the processing result by the intermediate module can better adapt to the encryption and decryption requirements of the test system, so that the information interaction is smoother, and the test efficiency is further improved.
Corresponding to the above method embodiments, the present application further provides a system test apparatus, and the system test apparatus described below and the system test apparatus method described above may be referred to correspondingly.
Referring to fig. 1, the apparatus may include a middle module 110 and a simulation system 120 connected to the middle module 110; wherein,
the middle module 110 is configured to receive test information transmitted by the test system; decrypting the test information, sending the decrypted test information to the simulation system 120, receiving a processing result returned by the simulation system 120, encrypting the processing result, and returning the encrypted processing result to the test system;
the simulation system 120 is configured to return a processing result to the intermediate module 110 after the processing result is generated by the dependence system of the simulation test system.
By applying the system provided by the embodiment of the application, the test of the test system does not depend on whether the dependence system is normal or on line, but returns the processing result through the intermediate module and the simulation system, so that the test system can be normally tested when the dependence system cannot be normally used, the test progress is prevented from being influenced, and the test efficiency can be improved. In addition, the decryption of the test information and the encryption of the processing result by the intermediate module can better adapt to the encryption and decryption requirements of the test system, so that the information interaction is smoother, and the test efficiency is further improved.
In one embodiment of the present application, the call address of the test system is configured with the interface address of the intermediate module 110.
In an embodiment of the application, the test information includes a message signature, and the intermediate module 110 is further configured to:
after the test information is decrypted and before the decrypted test information is sent to the simulation system 120, the public key is used for signing the message obtained after decryption to obtain a verification signature;
comparing the check signature with the message signature in the test information;
if so, the step of sending the decrypted test information to the simulation system 120 is performed.
In one embodiment of the present application, the middle module 110 is further configured to:
before the test information is decrypted, the key information is obtained through the database.
In one embodiment of the present application, the processing result is: the simulation system 120 generates an exception result based on the exception test instruction.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The principle and the implementation of the present application are explained in the present application by using specific examples, and the above description of the embodiments is only used to help understanding the technical solution and the core idea of the present application. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.
Claims (10)
1. A system testing method applied to an intermediate module, the intermediate module being connected to a simulation system, the method comprising:
receiving test information transmitted by a test system;
decrypting the test information, and sending the decrypted test information to the simulation system so that the simulation system simulates a dependent system of the test system to generate a processing result, and then returning the processing result;
and encrypting the processing result and returning the encrypted processing result to the test system.
2. The method of claim 1, wherein the call address of the test system is configured with an interface address of the intermediate module.
3. The method according to claim 1, wherein the test information includes a message signature, and after the decrypting the test information and before the sending the decrypted test information to the simulation system, the method further includes:
signing the message obtained after decryption by using a public key to obtain a verification signature;
comparing the verification signature with a message signature in the test information;
and if the test information is consistent with the test information, the step of sending the decrypted test information to the simulation system is executed.
4. The method of claim 1, further comprising:
the key information is obtained via a database.
5. The method according to any one of claims 1 to 4, wherein the processing result is: the simulation system generates an exception result based on the exception test instruction.
6. The system testing device is characterized by comprising an intermediate module and a simulation system connected with the intermediate module; wherein,
the intermediate module is used for receiving test information transmitted by the test system; decrypting the test information, sending the decrypted test information to the simulation system, receiving a processing result returned by the simulation system, encrypting the processing result, and returning the encrypted processing result to the test system;
and the simulation system is used for simulating a dependence system of the test system to generate a processing result and then returning the processing result to the intermediate module.
7. The apparatus of claim 6, wherein the call address of the test system is configured with an interface address of the intermediate module.
8. The apparatus of claim 6, wherein the test information comprises a message signature, and wherein the intermediate module is further configured to:
after the test information is decrypted and before the decrypted test information is sent to the simulation system, signing the message obtained after decryption by using a public key to obtain a verification signature;
comparing the verification signature with a message signature in the test information;
and if the test information is consistent with the test information, the step of sending the decrypted test information to the simulation system is executed.
9. The apparatus of claim 6, wherein the intermediate module is further configured to:
and before the test information is decrypted, obtaining key information through a database.
10. The apparatus according to any one of claims 6 to 9, wherein the processing result is: the simulation system generates an exception result based on the exception test instruction.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011216369.8A CN112328480A (en) | 2020-11-04 | 2020-11-04 | System testing method and device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202011216369.8A CN112328480A (en) | 2020-11-04 | 2020-11-04 | System testing method and device |
Publications (1)
Publication Number | Publication Date |
---|---|
CN112328480A true CN112328480A (en) | 2021-02-05 |
Family
ID=74324699
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202011216369.8A Pending CN112328480A (en) | 2020-11-04 | 2020-11-04 | System testing method and device |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN112328480A (en) |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106845256A (en) * | 2017-01-24 | 2017-06-13 | 腾讯科技(深圳)有限公司 | A kind of method and terminal of encryption and decryption data in the application |
CN108183962A (en) * | 2018-01-04 | 2018-06-19 | 上海瀚之友信息技术服务有限公司 | A kind of simulated testing system |
CN108347361A (en) * | 2018-03-06 | 2018-07-31 | 平安普惠企业管理有限公司 | Applied program testing method, device, computer equipment and storage medium |
CN109104275A (en) * | 2018-07-28 | 2018-12-28 | 杭州电子科技大学 | A kind of HSM equipment |
CN109359472A (en) * | 2018-09-19 | 2019-02-19 | 腾讯科技(深圳)有限公司 | A kind of data encrypting and deciphering processing method, device and relevant device |
CN111224834A (en) * | 2019-11-18 | 2020-06-02 | 北京三快在线科技有限公司 | Simulation test method, simulation test device, server and storage medium |
-
2020
- 2020-11-04 CN CN202011216369.8A patent/CN112328480A/en active Pending
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN106845256A (en) * | 2017-01-24 | 2017-06-13 | 腾讯科技(深圳)有限公司 | A kind of method and terminal of encryption and decryption data in the application |
CN108183962A (en) * | 2018-01-04 | 2018-06-19 | 上海瀚之友信息技术服务有限公司 | A kind of simulated testing system |
CN108347361A (en) * | 2018-03-06 | 2018-07-31 | 平安普惠企业管理有限公司 | Applied program testing method, device, computer equipment and storage medium |
CN109104275A (en) * | 2018-07-28 | 2018-12-28 | 杭州电子科技大学 | A kind of HSM equipment |
CN109359472A (en) * | 2018-09-19 | 2019-02-19 | 腾讯科技(深圳)有限公司 | A kind of data encrypting and deciphering processing method, device and relevant device |
CN111224834A (en) * | 2019-11-18 | 2020-06-02 | 北京三快在线科技有限公司 | Simulation test method, simulation test device, server and storage medium |
Non-Patent Citations (2)
Title |
---|
WEIXIN_34318272: "mock以及特殊场景下对mock数据的处理", 《HTTPS://BLOG.CSDN.NET/WEIXIN_34318272/ARTICLE/DETAILS/86442550》 * |
郭文普,杨百龙,张海静编著: "《通信网络安全与防护》", 31 May 2020, 西安:西安电子科技大学出版社 * |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3779751B1 (en) | Multi-party security computing method and apparatus, and electronic device | |
CN106850699B (en) | A kind of mobile terminal login authentication method and system | |
CN102484638B (en) | Layered protection and validation of identity data delivered online via multiple intermediate clients | |
US20080083039A1 (en) | Method for integrity attestation of a computing platform hiding its configuration information | |
EP1714420B1 (en) | One way authentication | |
EP3804213A1 (en) | Shared secret establishment | |
CN112699353B (en) | Financial information transmission method and financial information transmission system | |
CN110929291A (en) | Method and device for accessing text file and computer readable storage medium | |
CN113128999B (en) | Block chain privacy protection method and device | |
CN109858911A (en) | Qualification verification method, device, system, equipment and readable storage medium storing program for executing | |
CN108449756A (en) | A kind of system of network cryptographic key updating, method and device | |
CN115242553B (en) | Data exchange method and system supporting safe multi-party calculation | |
CN116361833A (en) | Verification method and device and terminal equipment | |
CN114826623B (en) | Mock test message processing method and device | |
CN111245594A (en) | Homomorphic operation-based collaborative signature method and system | |
CN107241341B (en) | Access control method and device | |
CN112328480A (en) | System testing method and device | |
CN115052053A (en) | Message processing method and simulator for bank system test | |
CN113821446A (en) | Test verification method and device for transaction system | |
CN114500044A (en) | Data verification method and device, storage medium and electronic equipment | |
CN112597453A (en) | Program code encryption and decryption method and device | |
CN114124542B (en) | Method for exporting confidential data to shared security area after approval by research and development network | |
CN115134093B (en) | Digital signature method and computing device | |
CN116132185B (en) | Data calling method, system, device, equipment and medium | |
CN115643113B (en) | Secure transmission method and device for private data and financial private data |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20210205 |