CN112328480A - System testing method and device - Google Patents

System testing method and device Download PDF

Info

Publication number
CN112328480A
CN112328480A CN202011216369.8A CN202011216369A CN112328480A CN 112328480 A CN112328480 A CN 112328480A CN 202011216369 A CN202011216369 A CN 202011216369A CN 112328480 A CN112328480 A CN 112328480A
Authority
CN
China
Prior art keywords
test
test information
processing result
intermediate module
information
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202011216369.8A
Other languages
Chinese (zh)
Inventor
王宇航
曾炬纲
邱莉
徐佳磊
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhejiang Nuonuo Network Technology Co ltd
Original Assignee
Zhejiang Nuonuo Network Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhejiang Nuonuo Network Technology Co ltd filed Critical Zhejiang Nuonuo Network Technology Co ltd
Priority to CN202011216369.8A priority Critical patent/CN112328480A/en
Publication of CN112328480A publication Critical patent/CN112328480A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3692Test management for test results analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3696Methods or tools to render software testable
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Security & Cryptography (AREA)
  • Software Systems (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application discloses a system testing method, which is applied to an intermediate module, wherein the intermediate module is connected with a simulation system, and the method comprises the following steps: receiving test information transmitted by a test system; decrypting the test information, and sending the decrypted test information to the simulation system so that the simulation system can simulate a dependent system of the test system to generate a processing result and then return the processing result; and encrypting the processing result and returning the encrypted processing result to the test system. By applying the technical scheme provided by the application, the test system can be normally tested when the dependence system cannot be normally used, the test progress is prevented from being influenced, and the test efficiency can be improved. In addition, the intermediate module decrypts the test information and encrypts the processing result, so that the encryption and decryption requirements of the test system can be better met, and the test efficiency is further improved. The application also discloses a system testing device which has corresponding technical effects.

Description

System testing method and device
Technical Field
The present application relates to the field of computer application technologies, and in particular, to a system testing method and apparatus.
Background
In the test work, the condition of multi-system mutual calling often occurs. For example, when testing the system a, the system a needs to call the system B, and the test can be performed depending on the processing result returned by the system B. If the system B which the system A depends on is abnormal in code or is not on line normally, the system B cannot be successfully butted with the system A, a processing result cannot be returned, and the system A cannot be tested normally. Under the condition, the normal test can be performed only by waiting for the system B which the system A depends on to recover, so that the test progress is easily influenced, and the test efficiency is low.
Disclosure of Invention
The application aims to provide a system testing method and device so as to avoid influencing testing progress and improve testing efficiency.
In order to solve the technical problem, the application provides the following technical scheme:
a system testing method applied to an intermediate module, the intermediate module being connected to a simulation system, the method comprising:
receiving test information transmitted by a test system;
decrypting the test information, and sending the decrypted test information to the simulation system so that the simulation system simulates a dependent system of the test system to generate a processing result, and then returning the processing result;
and encrypting the processing result and returning the encrypted processing result to the test system.
In a specific embodiment of the present application, an interface address of the intermediate module is configured in a call address of the test system.
In a specific embodiment of the present application, the test information includes a message signature, and after the decrypting the test information and before sending the decrypted test information to the simulation system, the method further includes:
signing the message obtained after decryption by using a public key to obtain a verification signature;
comparing the verification signature with a message signature in the test information;
and if the test information is consistent with the test information, the step of sending the decrypted test information to the simulation system is executed.
In one embodiment of the present application, the method further includes:
the key information is obtained via a database.
In a specific embodiment of the present application, the processing result is: the simulation system generates an exception result based on the exception test instruction.
A system test device comprises an intermediate module and a simulation system connected with the intermediate module; wherein,
the intermediate module is used for receiving test information transmitted by the test system; decrypting the test information, sending the decrypted test information to the simulation system, receiving a processing result returned by the simulation system, encrypting the processing result, and returning the encrypted processing result to the test system;
and the simulation system is used for simulating a dependence system of the test system to generate a processing result and then returning the processing result to the intermediate module.
In a specific embodiment of the present application, an interface address of the intermediate module is configured in a call address of the test system.
In a specific embodiment of the present application, the test information includes a message signature, and the intermediate module is further configured to:
after the test information is decrypted and before the decrypted test information is sent to the simulation system, signing the message obtained after decryption by using a public key to obtain a verification signature;
comparing the verification signature with a message signature in the test information;
and if the test information is consistent with the test information, the step of sending the decrypted test information to the simulation system is executed.
In a specific embodiment of the present application, the intermediate module is further configured to:
and before the test information is decrypted, obtaining key information through a database.
In a specific embodiment of the present application, the processing result is: the simulation system generates an exception result based on the exception test instruction.
By applying the technical scheme provided by the embodiment of the application, the test of the test system does not depend on whether the dependence system is normal or on line, but returns the processing result through the intermediate module and the simulation system, so that the test system can be normally tested when the dependence system cannot be normally used, the test progress is prevented from being influenced, and the test efficiency can be improved. In addition, the decryption of the test information and the encryption of the processing result by the intermediate module can better adapt to the encryption and decryption requirements of the test system, so that the information interaction is smoother, and the test efficiency is further improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
FIG. 1 is a schematic diagram of a system test system according to an embodiment of the present application;
fig. 2 is a flowchart illustrating an implementation of a system testing method according to an embodiment of the present disclosure.
Detailed Description
The core of the application is to provide a system testing method, which can be applied to an intermediate module, and the intermediate module is connected with a simulation system.
As shown in fig. 1, the intermediate module 110 is located between the test system and the simulation system 120, and can receive the test information transmitted by the test system, decrypt the test information, and send the decrypted test information to the simulation system 120, the simulation system 120 simulates a dependent system of the test system to generate a processing result and returns the processing result to the intermediate module 110, and the intermediate module 110 encrypts the processing result and returns the processing result to the test system. Problems that may occur to the test system may be determined by testing whether the processing results received by the system meet expectations.
The test of the test system does not depend on whether the dependence system is normal or on-line, but returns the processing result through the intermediate module and the simulation system, so that the test system can be normally tested when the dependence system cannot be normally used, the test progress is prevented from being influenced, and the test efficiency can be improved. In addition, the decryption of the test information and the encryption of the processing result by the intermediate module can better adapt to the encryption and decryption requirements of the test system, so that the information interaction is smoother, and the test efficiency is further improved.
In order that those skilled in the art will better understand the disclosure, the following detailed description will be given with reference to the accompanying drawings. It is to be understood that the embodiments described are only a few embodiments of the present application and not all embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
Referring to fig. 2, there is shown a flowchart for implementing a system testing method provided in the embodiment of the present application, where the method may include the following steps:
s210: and receiving test information transmitted by the test system.
The test system is the system currently to be tested.
In the embodiment of the present application, the call address of the test system may be configured with an interface address of the intermediate module. When the test system needs to be tested, if the dependent system of the test system is not on line or has abnormity, the test system can search the interface address of the intermediate module in the calling address and transmit the test information to the intermediate module through the interface.
After receiving the test information transmitted by the test system, the intermediate module may continue to perform the operation of step S220.
S220: and decrypting the test information, and sending the decrypted test information to the simulation system so that the simulation system simulates the dependence system of the test system to generate a processing result and then returns the processing result.
For a system with higher security requirement, the information transmission needs to be encrypted and decrypted. The test system can encrypt the test information and then transmit the encrypted test information to the intermediate module according to actual requirements. After receiving the test information transmitted by the test system, the intermediate module may decrypt the test information first and then send the decrypted test information to the simulation system. The test information received by the simulation system is decrypted, and a processing result can be generated by the dependence system of the simulation test system based on the test information and then returned to the intermediate module. Specific Encryption and decryption rules, such as AES (Advanced Encryption Standard), DES (Data Encryption Standard), RSA (Rivest Shamir Adleman), and the like, may be configured in the intermediate module in advance. The middle module can be configured with a plurality of encryption and decryption rules, is connected with different test systems, and can search the encryption and decryption rules consistent with the use of a certain test system to encrypt and decrypt corresponding information when receiving test information transmitted by the test system.
The simulation system may specifically simulate the system dependent return of the test system using the easy mock tool. The easy mock tool can provide visual and persistent service for quickly generating simulation data and support swagger interface import of the interface management platform. The easy mock tool can provide simulation of the interface, complete the simulated test process through recording, playback, checking and other steps, verify the calling type, times, sequence and the like of the method, and simulate other systems to return a specified value or throw a specified exception.
In practical application, the interface information can be imported into the easy mock tool in advance, or the interface information can be manually filled in the easy mock tool. The data needing to be returned in the interface can be viewed, and the variable needing to be automatically generated each time is determined so as to carry out simulation return through the mockjs interface. For automatically generated data returns, the corresponding simulation method can be written by looking at the code of the easy mock tool. For example, if a real interface returns a 6-bit integer, mockjs may simulate returning a random 6-bit number, such as natural (100000,999999). This allows a more realistic simulation interface to return.
In a specific embodiment of the present application, the test information may include a message signature, and after the test information is decrypted and before the decrypted test information is sent to the simulation system, the method may further include the following steps:
the method comprises the following steps: signing the message obtained after decryption by using a public key to obtain a verification signature;
step two: comparing the check signature with the message signature in the test information; and if so, executing the step of sending the decrypted test information to the simulation system.
For convenience of description, the above two steps are combined for illustration.
In this embodiment, the test system may generate a key pair in advance, including a public key and a private key. The test system can use the private key to sign the message body of the test message to obtain the message signature. The test information passed by the test system to the intermediate module via the interface may contain a message signature. Meanwhile, the test information containing the message body and the message signature can be transmitted to the intermediate module after being encrypted.
After receiving the test information transmitted by the test system, the intermediate module decrypts the test information to obtain a message body and a message signature. The obtained message body may be signed using the public key to obtain a verification signature, and then the verification signature may be compared with the message signature in the test information. If the two are consistent, the sender of the test information is considered as the test system and is legal, and the step of sending the decrypted test information, namely the message body, to the simulation system can be further executed. If the two are not consistent, the sender of the test information is considered to be not the test system, and is illegal, and no treatment can be carried out, or verification error prompt information is returned to the test system, so that the test system can carry out the transmission of the test information again.
In practical application, key information such as public keys and private keys can be stored in a database in advance. Before the intermediate module decrypts the test information, the intermediate module can obtain the key information through the database, so as to obtain the public key corresponding to the private key used by the test system.
S230: and encrypting the processing result and returning the encrypted processing result to the test system.
And after the intermediate module sends the decrypted test information to the simulation system, the simulation system simulates a dependent system of the test system to generate a processing result, and then the processing result is returned to the intermediate module. The intermediate module can encrypt the received processing result returned by the simulation system and then return the encrypted processing result to the test system. Also, the intermediate module may obtain key information via a database. After the intermediate module returns the encrypted processing result to the test system, the test system can perform corresponding decryption processing on the processing result, and then determine whether the corresponding function is normal or not based on the decrypted processing result, and whether a problem exists or not.
In one embodiment of the present application, the processing result may be: and simulating an exception result generated by the system based on the exception test instruction. According to actual test requirements, an abnormal test instruction can be sent to the simulation system, and the simulation system can generate a corresponding abnormal result when receiving the decrypted test information sent by the intermediate module based on the abnormal test instruction. And returning the abnormal result to the intermediate module as a processing result generated by the simulation dependence system, and returning the abnormal result to the test system after being encrypted by the intermediate module, so that the test system determines whether the abnormal processing function is normal or not and whether a problem exists or not based on the abnormal result.
For example, based on the test information of the test system, it is normally required to return 1, when the simulation system returns 1, the test system may consider it to be a normal result, and if the simulation system returns non-1, the test system may recognize an abnormal condition.
The embodiment of the application can effectively test abnormal scenes without depending on system manufacturing data.
By applying the method provided by the embodiment of the application, the test of the test system does not depend on whether the dependence system is normal or on line, but returns the processing result through the intermediate module and the simulation system, so that the test system can be normally tested when the dependence system cannot be normally used, the test progress is prevented from being influenced, and the test efficiency can be improved. In addition, the decryption of the test information and the encryption of the processing result by the intermediate module can better adapt to the encryption and decryption requirements of the test system, so that the information interaction is smoother, and the test efficiency is further improved.
Corresponding to the above method embodiments, the present application further provides a system test apparatus, and the system test apparatus described below and the system test apparatus method described above may be referred to correspondingly.
Referring to fig. 1, the apparatus may include a middle module 110 and a simulation system 120 connected to the middle module 110; wherein,
the middle module 110 is configured to receive test information transmitted by the test system; decrypting the test information, sending the decrypted test information to the simulation system 120, receiving a processing result returned by the simulation system 120, encrypting the processing result, and returning the encrypted processing result to the test system;
the simulation system 120 is configured to return a processing result to the intermediate module 110 after the processing result is generated by the dependence system of the simulation test system.
By applying the system provided by the embodiment of the application, the test of the test system does not depend on whether the dependence system is normal or on line, but returns the processing result through the intermediate module and the simulation system, so that the test system can be normally tested when the dependence system cannot be normally used, the test progress is prevented from being influenced, and the test efficiency can be improved. In addition, the decryption of the test information and the encryption of the processing result by the intermediate module can better adapt to the encryption and decryption requirements of the test system, so that the information interaction is smoother, and the test efficiency is further improved.
In one embodiment of the present application, the call address of the test system is configured with the interface address of the intermediate module 110.
In an embodiment of the application, the test information includes a message signature, and the intermediate module 110 is further configured to:
after the test information is decrypted and before the decrypted test information is sent to the simulation system 120, the public key is used for signing the message obtained after decryption to obtain a verification signature;
comparing the check signature with the message signature in the test information;
if so, the step of sending the decrypted test information to the simulation system 120 is performed.
In one embodiment of the present application, the middle module 110 is further configured to:
before the test information is decrypted, the key information is obtained through the database.
In one embodiment of the present application, the processing result is: the simulation system 120 generates an exception result based on the exception test instruction.
The embodiments are described in a progressive manner, each embodiment focuses on differences from other embodiments, and the same or similar parts among the embodiments are referred to each other.
Those of skill would further appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments disclosed herein may be implemented as electronic hardware, computer software, or combinations of both, and that the various illustrative components and steps have been described above generally in terms of their functionality in order to clearly illustrate this interchangeability of hardware and software. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the implementation. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
The steps of a method or algorithm described in connection with the embodiments disclosed herein may be embodied directly in hardware, in a software module executed by a processor, or in a combination of the two. A software module may reside in Random Access Memory (RAM), memory, Read Only Memory (ROM), electrically programmable ROM, electrically erasable programmable ROM, registers, hard disk, a removable disk, a CD-ROM, or any other form of storage medium known in the art.
The principle and the implementation of the present application are explained in the present application by using specific examples, and the above description of the embodiments is only used to help understanding the technical solution and the core idea of the present application. It should be noted that, for those skilled in the art, it is possible to make several improvements and modifications to the present application without departing from the principle of the present application, and such improvements and modifications also fall within the scope of the claims of the present application.

Claims (10)

1. A system testing method applied to an intermediate module, the intermediate module being connected to a simulation system, the method comprising:
receiving test information transmitted by a test system;
decrypting the test information, and sending the decrypted test information to the simulation system so that the simulation system simulates a dependent system of the test system to generate a processing result, and then returning the processing result;
and encrypting the processing result and returning the encrypted processing result to the test system.
2. The method of claim 1, wherein the call address of the test system is configured with an interface address of the intermediate module.
3. The method according to claim 1, wherein the test information includes a message signature, and after the decrypting the test information and before the sending the decrypted test information to the simulation system, the method further includes:
signing the message obtained after decryption by using a public key to obtain a verification signature;
comparing the verification signature with a message signature in the test information;
and if the test information is consistent with the test information, the step of sending the decrypted test information to the simulation system is executed.
4. The method of claim 1, further comprising:
the key information is obtained via a database.
5. The method according to any one of claims 1 to 4, wherein the processing result is: the simulation system generates an exception result based on the exception test instruction.
6. The system testing device is characterized by comprising an intermediate module and a simulation system connected with the intermediate module; wherein,
the intermediate module is used for receiving test information transmitted by the test system; decrypting the test information, sending the decrypted test information to the simulation system, receiving a processing result returned by the simulation system, encrypting the processing result, and returning the encrypted processing result to the test system;
and the simulation system is used for simulating a dependence system of the test system to generate a processing result and then returning the processing result to the intermediate module.
7. The apparatus of claim 6, wherein the call address of the test system is configured with an interface address of the intermediate module.
8. The apparatus of claim 6, wherein the test information comprises a message signature, and wherein the intermediate module is further configured to:
after the test information is decrypted and before the decrypted test information is sent to the simulation system, signing the message obtained after decryption by using a public key to obtain a verification signature;
comparing the verification signature with a message signature in the test information;
and if the test information is consistent with the test information, the step of sending the decrypted test information to the simulation system is executed.
9. The apparatus of claim 6, wherein the intermediate module is further configured to:
and before the test information is decrypted, obtaining key information through a database.
10. The apparatus according to any one of claims 6 to 9, wherein the processing result is: the simulation system generates an exception result based on the exception test instruction.
CN202011216369.8A 2020-11-04 2020-11-04 System testing method and device Pending CN112328480A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202011216369.8A CN112328480A (en) 2020-11-04 2020-11-04 System testing method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202011216369.8A CN112328480A (en) 2020-11-04 2020-11-04 System testing method and device

Publications (1)

Publication Number Publication Date
CN112328480A true CN112328480A (en) 2021-02-05

Family

ID=74324699

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202011216369.8A Pending CN112328480A (en) 2020-11-04 2020-11-04 System testing method and device

Country Status (1)

Country Link
CN (1) CN112328480A (en)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106845256A (en) * 2017-01-24 2017-06-13 腾讯科技(深圳)有限公司 A kind of method and terminal of encryption and decryption data in the application
CN108183962A (en) * 2018-01-04 2018-06-19 上海瀚之友信息技术服务有限公司 A kind of simulated testing system
CN108347361A (en) * 2018-03-06 2018-07-31 平安普惠企业管理有限公司 Applied program testing method, device, computer equipment and storage medium
CN109104275A (en) * 2018-07-28 2018-12-28 杭州电子科技大学 A kind of HSM equipment
CN109359472A (en) * 2018-09-19 2019-02-19 腾讯科技(深圳)有限公司 A kind of data encrypting and deciphering processing method, device and relevant device
CN111224834A (en) * 2019-11-18 2020-06-02 北京三快在线科技有限公司 Simulation test method, simulation test device, server and storage medium

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106845256A (en) * 2017-01-24 2017-06-13 腾讯科技(深圳)有限公司 A kind of method and terminal of encryption and decryption data in the application
CN108183962A (en) * 2018-01-04 2018-06-19 上海瀚之友信息技术服务有限公司 A kind of simulated testing system
CN108347361A (en) * 2018-03-06 2018-07-31 平安普惠企业管理有限公司 Applied program testing method, device, computer equipment and storage medium
CN109104275A (en) * 2018-07-28 2018-12-28 杭州电子科技大学 A kind of HSM equipment
CN109359472A (en) * 2018-09-19 2019-02-19 腾讯科技(深圳)有限公司 A kind of data encrypting and deciphering processing method, device and relevant device
CN111224834A (en) * 2019-11-18 2020-06-02 北京三快在线科技有限公司 Simulation test method, simulation test device, server and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
WEIXIN_34318272: "mock以及特殊场景下对mock数据的处理", 《HTTPS://BLOG.CSDN.NET/WEIXIN_34318272/ARTICLE/DETAILS/86442550》 *
郭文普,杨百龙,张海静编著: "《通信网络安全与防护》", 31 May 2020, 西安:西安电子科技大学出版社 *

Similar Documents

Publication Publication Date Title
EP3779751B1 (en) Multi-party security computing method and apparatus, and electronic device
CN106850699B (en) A kind of mobile terminal login authentication method and system
CN102484638B (en) Layered protection and validation of identity data delivered online via multiple intermediate clients
US20080083039A1 (en) Method for integrity attestation of a computing platform hiding its configuration information
EP1714420B1 (en) One way authentication
EP3804213A1 (en) Shared secret establishment
CN112699353B (en) Financial information transmission method and financial information transmission system
CN110929291A (en) Method and device for accessing text file and computer readable storage medium
CN113128999B (en) Block chain privacy protection method and device
CN109858911A (en) Qualification verification method, device, system, equipment and readable storage medium storing program for executing
CN108449756A (en) A kind of system of network cryptographic key updating, method and device
CN115242553B (en) Data exchange method and system supporting safe multi-party calculation
CN116361833A (en) Verification method and device and terminal equipment
CN114826623B (en) Mock test message processing method and device
CN111245594A (en) Homomorphic operation-based collaborative signature method and system
CN107241341B (en) Access control method and device
CN112328480A (en) System testing method and device
CN115052053A (en) Message processing method and simulator for bank system test
CN113821446A (en) Test verification method and device for transaction system
CN114500044A (en) Data verification method and device, storage medium and electronic equipment
CN112597453A (en) Program code encryption and decryption method and device
CN114124542B (en) Method for exporting confidential data to shared security area after approval by research and development network
CN115134093B (en) Digital signature method and computing device
CN116132185B (en) Data calling method, system, device, equipment and medium
CN115643113B (en) Secure transmission method and device for private data and financial private data

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210205