CN112468356B - Router interface testing method, device, electronic equipment and storage medium - Google Patents

Router interface testing method, device, electronic equipment and storage medium Download PDF

Info

Publication number
CN112468356B
CN112468356B CN201910857722.1A CN201910857722A CN112468356B CN 112468356 B CN112468356 B CN 112468356B CN 201910857722 A CN201910857722 A CN 201910857722A CN 112468356 B CN112468356 B CN 112468356B
Authority
CN
China
Prior art keywords
router
test
interface
key
wifi
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201910857722.1A
Other languages
Chinese (zh)
Other versions
CN112468356A (en
Inventor
过一峰
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Qihoo Technology Co Ltd
Original Assignee
Beijing Qihoo Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Qihoo Technology Co Ltd filed Critical Beijing Qihoo Technology Co Ltd
Priority to CN201910857722.1A priority Critical patent/CN112468356B/en
Publication of CN112468356A publication Critical patent/CN112468356A/en
Application granted granted Critical
Publication of CN112468356B publication Critical patent/CN112468356B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L45/00Routing or path finding of packets in data switching networks
    • H04L45/14Routing performance; Theoretical aspects

Abstract

The invention discloses a router interface testing method, a router interface testing device, electronic equipment and a storage medium. The method comprises the following steps: dynamically generating a test key of a router to be tested; acquiring test verification information from the router according to the user name of the test user and the test key; logging in the router according to the test verification information; and testing one or more target interfaces of the router, and recording corresponding test data. Through the scheme, the router interface control method can be connected to all interfaces of the router, and only a few seconds are needed to quickly traverse the interface list of the router, and the router interface change information of different versions or models is directly obtained, so that application developers are guided to adapt, and testers are guided to carry out subsequent test work on the change information.

Description

Router interface testing method, device, electronic equipment and storage medium
Technical Field
The present invention relates to the field of testing technologies, and in particular, to a method and an apparatus for testing a router interface, an electronic device, and a storage medium.
Background
A general interface test may refer to submitting input data to a software and hardware interface, obtaining a returned result and analyzing whether the returned result meets expectations, or obtaining relevant information of the interface according to the returned result. Currently, in some software applications, such as firewall development, routers suitable for different versions or models are required, at this time, tests are required for the router interfaces to obtain router interface information of each version or model, so that adequate preparation is made for software development adaptation, however, no corresponding router interface test system tool or technical scheme is available at present to solve the problems.
Disclosure of Invention
The present invention has been made in view of the above problems, and it is an object of the present invention to provide a router interface testing method, apparatus, server and system that overcomes or at least partially solves the above problems.
According to one aspect of the present invention, there is provided a router interface test method, wherein the method includes:
dynamically generating a test key of a router to be tested;
acquiring test verification information from the router according to the user name of the test user and the test key;
logging in the router according to the test verification information;
and testing one or more target interfaces of the router, and recording corresponding test data.
Optionally, the test data includes at least one of: interface availability information, interface parameter change information, return parameter change information.
Optionally, the dynamically generating the test key of the router to be tested includes:
accessing a target address of a router to obtain a random key returned by the router;
cutting the random key;
and performing AES encryption according to the WiFi password of the router, the cut random key and the IV offset to obtain the test key.
Optionally, the method further comprises:
and analyzing and obtaining the WiFi password of the router.
Optionally, the visitor information includes: cookies and/or token.
Optionally, the logging in the router according to the visitor information includes:
and sending the cookie and the token to the login address of the router, activating the cookie, and logging in the router after passing token verification.
Optionally, the testing one or more target interfaces of the router, and recording corresponding test data includes:
and sending a request with a specified identifier to an online equipment list interface, and analyzing a return value of the online equipment list interface to obtain test data.
Optionally, the testing one or more target interfaces of the router, and recording corresponding test data includes:
and sending a request with the MAC address and the speed limiting threshold value to the intelligent equipment speed limiting interface, and analyzing the return value of the intelligent equipment speed limiting interface to obtain test data.
Optionally, the testing one or more target interfaces of the router, and recording corresponding test data includes:
sending a request with a WiFi mode, a network mode and a WiFi ID to a wireless data interface, and analyzing a return value of the wireless data interface to obtain a wireless SSID;
And analyzing the WiFi name according to the wireless SSID, and further modifying the WiFi password.
Optionally, the modifying the WiFi password includes: accessing a target address of a router, obtaining a random key returned by the router, and carrying out encryption operation on a WiFi password through AES to obtain a router encryption key;
accessing a target address of a router, obtaining a random key returned by the router, and carrying out encryption operation on a new password through an AES algorithm to obtain a new encryption key;
a request is sent to the WiFi password modification interface with at least one of a WiFi ID, a new encryption key, a WiFi mode, an encryption key, an encryption time, and a flag bit.
Optionally, the method further comprises:
correspondingly storing the test data and the model and/or firmware version of the router;
and generating router model change information and/or router firmware version change information according to the stored test data.
According to another aspect of the present invention, there is provided a router interface test apparatus, wherein the apparatus includes:
the key generation unit is suitable for dynamically generating a test key of the router to be tested;
an information acquisition unit adapted to acquire test verification information from the router according to a user name of a test user and the test key;
A login unit adapted to login the router according to the test verification information;
and the test recording unit is suitable for testing one or more target interfaces of the router and recording corresponding test data.
Optionally, the test data includes at least one of: interface availability information, interface parameter change information, return parameter change information.
Optionally, the key generation unit is adapted to:
accessing a target address of a router to obtain a random key returned by the router; cutting the random key; and performing AES encryption according to the WiFi password of the router, the cut random key and the IV offset to obtain the test key.
Optionally, the key generation unit is adapted to:
and analyzing and obtaining the WiFi password of the router.
Optionally, the visitor information includes: cookies and/or token.
Optionally, the login unit is adapted to:
and sending the cookie and the token to the login address of the router, activating the cookie, and logging in the router after passing token verification.
Optionally, the test recording unit is adapted to:
and sending a request with a specified identifier to an online equipment list interface, and analyzing a return value of the online equipment list interface to obtain test data.
Optionally, the test recording unit is adapted to:
and sending a request with the MAC address and the speed limiting threshold value to the intelligent equipment speed limiting interface, and analyzing the return value of the intelligent equipment speed limiting interface to obtain test data.
Optionally, the test recording unit is adapted to:
sending a request with a WiFi mode, a network mode and a WiFi ID to a wireless data interface, and analyzing a return value of the wireless data interface to obtain a wireless SSID; and analyzing the WiFi name according to the wireless SSID, and further modifying the WiFi password.
Optionally, the test recording unit is adapted to:
accessing a target address of a router, obtaining a random key returned by the router, and carrying out encryption operation on a WiFi password through AES to obtain a router encryption key;
accessing a target address of a router, obtaining a random key returned by the router, and carrying out encryption operation on a new password through an AES algorithm to obtain a new encryption key;
a request is sent to the WiFi password modification interface with at least one of a WiFi ID, a new encryption key, a WiFi mode, an encryption key, an encryption time, and a flag bit.
Optionally, the apparatus further comprises a storage unit adapted to:
correspondingly storing the test data and the model and/or firmware version of the router; and generating router model change information and/or router firmware version change information according to the stored test data.
According to still another aspect of the present invention, there is provided an electronic apparatus including: a processor; and a memory arranged to store computer executable instructions that, when executed, cause the processor to perform a method as described in any of the above.
According to a further aspect of the present invention there is provided a computer readable storage medium storing one or more programs which when executed by a processor implement a method as described in any of the above.
From the foregoing, the technical solution of the present invention provides a method for testing a router interface, where the method includes: dynamically generating a test key of a router to be tested; acquiring test verification information from the router according to the user name of the test user and the test key; logging in the router according to the test verification information; and testing one or more target interfaces of the router, and recording corresponding test data. Through the scheme, the router interface control method can be connected to all interfaces of the router, and only a few seconds are needed to quickly traverse the interface list of the router, and the router interface change information of different versions or models is directly obtained, so that application developers are guided to adapt, and testers are guided to carry out subsequent test work on the change information.
The foregoing description is only an overview of the present invention, and is intended to be implemented in accordance with the teachings of the present invention in order that the same may be more clearly understood and to make the same and other objects, features and advantages of the present invention more readily apparent.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the invention. Also, like reference numerals are used to designate like parts throughout the figures. In the drawings:
FIG. 1 shows a flow diagram of a router interface test method according to one embodiment of the invention;
FIG. 2 shows a schematic diagram of a router interface test apparatus according to one embodiment of the invention;
FIG. 3 shows a schematic diagram of an electronic device according to one embodiment of the invention;
fig. 4 illustrates a schematic structure of a computer-readable storage medium according to an embodiment of the present invention.
Detailed Description
Exemplary embodiments of the present invention will be described in more detail below with reference to the accompanying drawings. While exemplary embodiments of the present invention are shown in the drawings, it should be understood that the present invention may be embodied in various forms and should not be limited to the embodiments set forth herein. Rather, these embodiments are provided so that this disclosure will be thorough and complete, and will fully convey the scope of the invention to those skilled in the art.
FIG. 1 shows a flow diagram of a router interface test method according to one embodiment of the invention; wherein the method comprises the following steps:
step S110, dynamically generating a test key of the router to be tested.
Router interface test system tools or plug-in tools may be developed to enable interface testing of routers of different versions or models. According to the requirement of router interface test, firstly, the connection of all interfaces of the router is realized, the login process of a general user is simulated, and the user logs on the router in a new mode. Therefore, in this step, an address of a certain brand or model router capable of acquiring a random key is accessed, the random key is acquired, and the encryption key of the router is calculated as a test key according to the router WiFi password, the random key and a specific encryption algorithm.
Step S120, test verification information is obtained from the router according to the user name of the test user and the test key.
Automatically accessing a router homepage address, and sending a user name of a test user and a test key to the homepage address, wherein the user name of the test user can be newly created or account information of a previous user can be used; further, login information of the previous visitor, such as a cookie and/or token, stored in the homepage address is acquired, and the login information is used as verification information for the test.
Step S130, logging in the router according to the test verification information.
According to the test verification information, the router is automatically logged in, so that access, control and management of a router interface can be realized.
Step S140, testing one or more target interfaces of the router, and recording corresponding test data.
According to the requirements, one or more interfaces in routers with different versions or models can be tested item by item or simultaneously, and test results are recorded according to the models or versions respectively, so that the verification of the designed performance or recorded interface parameters is facilitated; or the developer for the application performs corresponding adaptation according to the record result of the test, and can also guide the subsequent testers to perform other subsequent test work aiming at the change information of different routers.
The embodiment of the invention provides a router interface testing method, which comprises the steps of firstly dynamically generating a key for testing a router to be tested; then according to the user name of the test user and the test key, test verification information is obtained from the router; logging in the router according to the test verification information; therefore, the router can test one or more target interfaces, and records corresponding test data. Through the scheme, the router interface control method can be connected to all interfaces of the router, and only a few seconds are needed to quickly traverse the interface list of the router, and the router interface change information of different versions or models is directly obtained, so that application developers are guided to adapt, and testers are guided to carry out subsequent test work on the change information.
In one embodiment, the test data includes at least one of: interface availability information, interface parameter change information, return parameter change information.
In the upgrading and updating process of different versions of a certain brand of router, the form of an interface, the type of parameters in the interface and the meaning of a representation may also change, so that the main focus of the test is also on the changes, and the changes specifically comprise: interface availability information, namely whether a certain interface exists in different versions or not and is still available, if call interface failure information is returned, the interface is indicated to be possibly abandoned in a router of a certain version; interface parameter change information, which indicates whether the number and types of parameters of different versions are the same or not, and whether the meanings of specific parameters are the same or not, and whether the logic and algorithm inside the router are the same or different or not can be judged according to the fact of the interface parameters; the change information of the returned parameters specifically refers to whether the parameters returned after a certain interface is called are the same, and whether the specific meaning is consistent with the previous version.
The test data is obtained after a certain interface with different versions is called for testing, and the interfaces include but are not limited to an interface for acquiring an online equipment list, an interface for setting speed limit and an interface for modifying WiFi passwords. After the corresponding test data of the interface are obtained, the corresponding test data can be correspondingly stored according to different version number lists so as to facilitate comparison and adaptation.
In one embodiment, dynamically generating the test key for the router to be tested includes: accessing a target address of a router to obtain a random key returned by the router; cutting the random key; and performing AES encryption according to the WiFi password of the router, the cut random key and the IV offset to obtain the test key.
In order to ensure the information security of the router, when a general user logs in the router, the router actually encrypts a password input by the user and a random password generated by the router, so that the router is logged in according to the encrypted password, and the connection with a network is realized.
In the development of the interface test system, the process is simulated in practice, and the process of logging in the router is realized by a developed system tool, namely: firstly, accessing a target address of a router, obtaining a random key returned by the router, then cutting the obtained random key, performing AES encryption according to a WiFi password, the random key and an IV offset of the router, and finally obtaining a key for testing. The AES encryption algorithm is selected according to the setting of the router, for example, the encryption of the router can be WPA/WPA2-PSKAES or WPA2-PSKAES, wherein the IV offset is generally determined by a router design developer and written into the router.
In one embodiment, the method further comprises: and analyzing and obtaining the WiFi password of the router.
When the router is initially logged in, in order to obtain login account numbers and passwords of a plurality of routers with different versions, the router is cracked, a configuration file of the router is obtained through a data interface of an access router, the configuration file contains the account numbers and the passwords of the router, and the account numbers and the passwords of the initial login of the router are obtained through analysis of the configuration file.
In one embodiment, the visitor information includes: cookies and/or token.
To achieve control over the router interface, it may be used to obtain its cookie and/or token information from the router homepage, and log in to the router, where the cookie is data stored on the local terminal of the user by some websites to identify the identity of the user and perform session tracking, and most typically, the application is to determine whether the registered user has logged in to the website, and if the user may get a prompt, whether to retain the user information when entering the website next time, so as to simplify the login procedure. token is a token that represents the object of rights to perform certain operations.
In one embodiment, logging in the router according to the visitor information includes: and sending the cookie and the token to the login address of the router, activating the cookie, and logging in the router after passing token verification.
After the cookie and the token are obtained, the cookie and the token are sent to the login address of the router, and the router can be logged in after the cookie is activated and the token is utilized for verification, so that whether the account number and the password of the router can be obtained or not can be logged in to control the router, and a unified and complete mode of logging in the router is provided.
After logging in the router, all router interfaces may be traversed, although only a portion of the interfaces may be invoked by configuration.
In one embodiment, testing one or more target interfaces of the router and recording corresponding test data includes: and sending a request with a specified identifier to an online equipment list interface, and analyzing a return value of the online equipment list interface to obtain test data.
Depending on the different router brands or versions, a cookie and token request with the brand or version identification is sent to the online device list interface, for example, the identification may be that of qihoo 360. After the return value is obtained, the obtained list information is analyzed by json, so that an online device list, such as a device list of a mobile phone, a PC, a Pad and the like which log in the router, is obtained, and the result is recorded in a local file for viewing.
In one embodiment, testing one or more target interfaces of the router and recording corresponding test data includes: and sending a request with the MAC address and the speed limiting threshold value to the intelligent equipment speed limiting interface, and analyzing the return value of the intelligent equipment speed limiting interface to obtain test data.
In order to realize testing of the intelligent device speed limiting interface, parameters such as an MAC address, a speed limiting threshold value and the like can be used as request information to be sent to the device speed limiting interface, then a json is utilized to analyze the returned value, the type and the numerical value of the returned value are obtained, and the result is recorded in a local file for viewing.
In one embodiment, testing one or more target interfaces of the router and recording corresponding test data includes: sending a request with a WiFi mode, a network mode and a WiFi ID to a wireless data interface, and analyzing a return value of the wireless data interface to obtain a wireless SSID; and analyzing the WiFi name according to the wireless SSID, and further modifying the WiFi password.
Because there are a plurality of WiFi accounts provided by the router and the possible aimed modes or standards are different, when testing the modified WiFi password interface, the name of WiFi needs to be obtained first to correspond to the WiFi mode in the router. Before the WiFi password is modified, a request of a WiFi mode, a network mode and a WiFi ID is sent to a wireless data interface, a return value is obtained and analyzed, a wireless SSID (service set identifier) is obtained, then a WiFi name is analyzed according to the wireless SSID, and the WiFi password corresponding to the WiFi name is modified. Four common working modes of the WIFI module are as follows: a pass-through mode, a serial port instruction mode, an HTTPD Client mode and a GPIO mode; the network mode refers to 2.4G and 5G networks, SSID technology can divide a wireless local area network into a plurality of sub-networks requiring different identity verification, each sub-network requires independent identity verification, and only users passing the identity verification can enter the corresponding sub-networks to prevent unauthorized users from entering the network.
In one embodiment, modifying the WiFi password includes: accessing a target address of a router, obtaining a random key returned by the router, and carrying out encryption operation on the WiFi password through AES to obtain a router encryption key; accessing a target address of a router, obtaining a random key returned by the router, and carrying out encryption operation on a new password through an AES algorithm to obtain a new encryption key; a request is sent to the WiFi password modification interface with at least one of a WiFi ID, a new encryption key, a WiFi mode, an encryption key, an encryption time, and a flag bit.
When the WiFi password is modified, the original WiFi password and the new password are required to be respectively subjected to encryption operation, the encryption algorithm can be selected according to the setting of the router, and then the encrypted secret key, the WiFi mode, the ID and other information are used as request information to be sent to the password modification interface, and of course, the sequence and the content of the interface parameters of different routers can be different. And then the parameter information and the interface return result are stored locally.
In one embodiment, the method further comprises: correspondingly storing the test data and the model and/or firmware version of the router; and generating router model change information and/or router firmware version change information according to the stored test data.
In order to reflect the influence of the version change of the router on the interface, the test data and the model and/or firmware version of the router are respectively stored correspondingly, and model change information and/or router firmware version change information is generated according to the stored test data. Thereby facilitating the adaptation of application developers or providing references for other testers.
FIG. 2 shows a schematic diagram of a router interface test apparatus according to one embodiment of the invention; wherein the apparatus 200 comprises:
the key generation unit 210 is adapted to dynamically generate a test key of the router to be tested.
In order to improve the unified applicability of each unit of the device, a unified algorithm needs to be set to realize login and interface traversal of all versions of routers. Therefore, according to the requirement of router interface test, the taking over of all interfaces of the router is realized, the login process of a general user needs to be simulated, and the login process is logged on the router in a new mode. The key generation unit accesses the address of a certain brand or model router capable of acquiring the random key, acquires the random key, and calculates the encryption key of the router as a key for testing according to the WiFi password of the router, the random key and a specific encryption algorithm.
The information obtaining unit 220 is adapted to obtain test verification information from the router based on the user name of the test user and the test key.
Automatically accessing a router homepage address, and sending a user name of a test user and a test key to the homepage address, wherein the user name of the test user can be newly created or account information of a previous user can be used; further, login information of the previous visitor, such as a cookie and/or token, stored in the homepage address is acquired, and the login information is used as verification information for the test.
The login unit 230 is adapted to login the router according to the test verification information.
According to the test verification information, the router is automatically logged in, so that access, control and management of a router interface can be realized.
The test recording unit 240 is adapted to test one or more target interfaces of the router and record corresponding test data.
According to the requirements, one or more interfaces in routers with different versions or models can be tested item by item or simultaneously, and test results are recorded according to the models or versions respectively, so that the verification of the designed performance or recorded interface parameters is facilitated; or the developer for the application performs corresponding adaptation according to the record result of the test, and can also guide the subsequent testers to perform other subsequent test work aiming at the change information of different routers.
In one embodiment, the test data includes at least one of: interface availability information, interface parameter change information, return parameter change information.
In the upgrading and updating process of different versions of a certain brand of router, the form of an interface, the type of parameters in the interface and the meaning of a representation may also change, so that the main focus of the test is also on the changes, and the changes specifically comprise: interface availability information, namely whether a certain interface exists in different versions or not and is still available, if call interface failure information is returned, the interface is indicated to be possibly abandoned in a router of a certain version; interface parameter change information, which indicates whether the number and types of parameters of different versions are the same or not, and whether the meanings of specific parameters are the same or not, and whether the logic and algorithm inside the router are the same or different or not can be judged according to the fact of the interface parameters; the change information of the returned parameters specifically refers to whether the parameters returned after a certain interface is called are the same, and whether the specific meaning is consistent with the previous version.
The test data is obtained after a certain interface with different versions is called for testing, and the interfaces include but are not limited to an interface for acquiring an online equipment list, an interface for setting speed limit and an interface for modifying WiFi passwords. After the corresponding test data of the interface are obtained, the corresponding test data can be correspondingly stored according to different version number lists so as to facilitate comparison and adaptation.
In one embodiment, the key generation unit 210 is adapted to: accessing a target address of a router to obtain a random key returned by the router; cutting the random key; and performing AES encryption according to the WiFi password of the router, the cut random key and the IV offset to obtain the test key.
In order to ensure the information security of the router, when a general user logs in the router, the router actually encrypts a password input by the user and a random password generated by the router, so that the router is logged in according to the encrypted password, and the connection with a network is realized.
In the development of the interface test system, the process is simulated in practice, and the process of logging in the router is realized by a developed system tool, namely: firstly, accessing a target address of a router, obtaining a random key returned by the router, then cutting the obtained random key, performing AES encryption according to a WiFi password, the random key and an IV offset of the router, and finally obtaining a key for testing. The AES encryption algorithm is selected according to the router setting, for example, the encryption of the router can be WPA/WPA2-PSKAES or WPA2-PSKAES, wherein the IV offset is generally determined by a router design developer and written into the router. In one embodiment, the key generation unit 210 is adapted to: and analyzing and obtaining the WiFi password of the router.
When the router is initially logged in, in order to obtain login account numbers and passwords of a plurality of routers with different versions, the router is cracked, a configuration file of the router is obtained through a data interface of an access router, the configuration file contains the account numbers and the passwords of the router, and the account numbers and the passwords of the initial login of the router are obtained through analysis of the configuration file.
In one embodiment, the visitor information includes: cookies and/or token.
To achieve control over the router interface, it may be used to obtain its cookie and/or token information from the router homepage, and log in to the router, where the cookie is data stored on the local terminal of the user by some websites to identify the identity of the user and perform session tracking, and most typically, the application is to determine whether the registered user has logged in to the website, and if the user may get a prompt, whether to retain the user information when entering the website next time, so as to simplify the login procedure. token is a token that represents the object of rights to perform certain operations.
In an embodiment, the login unit 230 is adapted to: and sending the cookie and the token to the login address of the router, activating the cookie, and logging in the router after passing token verification.
After the cookie and the token are obtained, the cookie and the token are sent to the login address of the router, and the router can be logged in after the cookie is activated and the token is utilized for verification, so that whether the account number and the password of the router can be obtained or not can be logged in to control the router, and a unified and complete mode of logging in the router is provided.
After logging in the router, all router interfaces may be traversed, although only a portion of the interfaces may be invoked by configuration.
In one embodiment, the test recording unit 240 is adapted to: and sending a request with a specified identifier to the online equipment list interface, and analyzing the return value of the online equipment list interface to obtain test data.
Depending on the different router brands or versions, a cookie and token request with the brand or version identification is sent to the online device list interface, for example, the identification may be that of qihoo 360. After the return value is obtained, the obtained list information is analyzed by json, so that an online device list, such as a device list of a mobile phone, a PC, a Pad and the like which log in the router, is obtained, and the result is recorded in a local file for viewing.
In one embodiment, the test recording unit 240 is adapted to: and sending a request with the MAC address and the speed limiting threshold value to the intelligent equipment speed limiting interface, and analyzing the return value of the intelligent equipment speed limiting interface to obtain test data.
In order to realize testing of the intelligent device speed limiting interface, parameters such as an MAC address, a speed limiting threshold value and the like can be used as request information to be sent to the device speed limiting interface, then a json is utilized to analyze the returned value, the type and the numerical value of the returned value are obtained, and the result is recorded in a local file for viewing.
In one embodiment, the test recording unit 240 is adapted to: sending a request with a WiFi mode, a network mode and a WiFi ID to a wireless data interface, and analyzing a return value of the wireless data interface to obtain a wireless SSID; and analyzing the WiFi name according to the wireless SSID, and further modifying the WiFi password.
Because there are a plurality of WiFi accounts provided by the router and the possible aimed modes or standards are different, when testing the modified WiFi password interface, the name of WiFi needs to be obtained first to correspond to the WiFi mode in the router. Before the WiFi password is modified, a request of a WiFi mode, a network mode and a WiFi ID is sent to a wireless data interface, a return value is obtained and analyzed, a wireless SSID (service set identifier) is obtained, then a WiFi name is analyzed according to the wireless SSID, and the WiFi password corresponding to the WiFi name is modified. Four common working modes of the WIFI module are as follows: a pass-through mode, a serial port instruction mode, an HTTPD Client mode and a GPIO mode; the network mode refers to 2.4G and 5G networks, SSID technology can divide a wireless local area network into a plurality of sub-networks requiring different identity verification, each sub-network requires independent identity verification, and only users passing the identity verification can enter the corresponding sub-networks to prevent unauthorized users from entering the network.
In one embodiment, the test recording unit 240 is adapted to: accessing a target address of a router, obtaining a random key returned by the router, and carrying out encryption operation on a WiFi password through AES to obtain a router encryption key; accessing a target address of a router, obtaining a random key returned by the router, and carrying out encryption operation on a new password through an AES algorithm to obtain a new encryption key; a request is sent to the WiFi password modification interface with at least one of a WiFi ID, a new encryption key, a WiFi mode, an encryption key, an encryption time, and a flag bit.
When the WiFi password is modified, the original WiFi password and the new password are required to be respectively subjected to encryption operation, the encryption algorithm can be selected according to the setting of the router, and then the encrypted secret key, the WiFi mode, the ID and other information are used as request information to be sent to the password modification interface, and of course, the sequence and the content of the interface parameters of different routers can be different. And then the parameter information and the interface return result are stored locally.
In one embodiment, the device further comprises a storing unit adapted to store the test data in correspondence with the model and/or firmware version of the router; and generating router model change information and/or router firmware version change information according to the stored test data.
In order to reflect the influence of the version change of the router on the interface, the test data and the model and/or firmware version of the router are respectively stored correspondingly, and model change information and/or router firmware version change information is generated according to the stored test data. Thereby facilitating the adaptation of application developers or providing references for other testers.
In summary, the technical solution of the present invention provides a method for testing a router interface, where the method includes: dynamically generating a test key of a router to be tested; acquiring test verification information from the router according to the user name of the test user and the test key; logging in the router according to the test verification information; and testing one or more target interfaces of the router, and recording corresponding test data. Through the scheme, the router interface control method can be connected to all interfaces of the router, and only a few seconds are needed to quickly traverse the interface list of the router, and the router interface change information of different versions or models is directly obtained, so that application developers are guided to adapt, and testers are guided to carry out subsequent testing work on the change information.
It should be noted that:
the algorithms and displays presented herein are not inherently related to any particular computer, virtual machine, or other apparatus. Various general purpose devices may also be used with the teachings herein. The required structure for the construction of such devices is apparent from the description above. In addition, the present invention is not directed to any particular programming language. It will be appreciated that the teachings of the present invention described herein may be implemented in a variety of programming languages, and the above description of specific languages is provided for disclosure of enablement and best mode of the present invention.
In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the invention may be practiced without these specific details. In some instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
Similarly, it should be appreciated that in the above description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. However, the disclosed method should not be construed as reflecting the intention that: i.e., the claimed invention requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the detailed description are hereby expressly incorporated into this detailed description, with each claim standing on its own as a separate embodiment of this invention.
Those skilled in the art will appreciate that the modules in the apparatus of the embodiments may be adaptively changed and disposed in one or more apparatuses different from the embodiments. The modules or units or components of the embodiments may be combined into one module or unit or component and, furthermore, they may be divided into a plurality of sub-modules or sub-units or sub-components. Any combination of all features disclosed in this specification (including any accompanying claims, abstract and drawings), and all of the processes or units of any method or apparatus so disclosed, may be used in combination, except insofar as at least some of such features and/or processes or units are mutually exclusive. Each feature disclosed in this specification (including any accompanying claims, abstract and drawings), may be replaced by alternative features serving the same, equivalent or similar purpose, unless expressly stated otherwise.
Furthermore, those skilled in the art will appreciate that while some embodiments described herein include some features but not others included in other embodiments, combinations of features of different embodiments are meant to be within the scope of the invention and form different embodiments. For example, in the following claims, any of the claimed embodiments can be used in any combination.
Various component embodiments of the invention may be implemented in hardware, or in software modules running on one or more processors, or in a combination thereof. Those skilled in the art will appreciate that some or all of the functions of some or all of the components in a router interface test apparatus according to an embodiment of the present invention may be implemented in practice using a microprocessor or Digital Signal Processor (DSP). The present invention can also be implemented as an apparatus or device program (e.g., a computer program and a computer program product) for performing a portion or all of the methods described herein. Such a program embodying the present invention may be stored on a computer readable medium, or may have the form of one or more signals. Such signals may be downloaded from an internet website, provided on a carrier signal, or provided in any other form.
For example, fig. 3 shows a schematic structural diagram of an electronic device according to an embodiment of the present invention. The electronic device 300 comprises a processor 310 and a memory 320 arranged to store computer executable instructions (computer readable program code). The memory 320 may be an electronic memory such as a flash memory, an EEPROM (electrically erasable programmable read only memory), an EPROM, a hard disk, or a ROM. The memory 320 has a memory space 330 storing computer readable program code 331 for performing any of the method steps described above. For example, the memory space 330 for storing computer readable program code may include respective computer readable program code 331 for implementing the respective steps in the above method, respectively. The computer readable program code 331 can be read from or written to one or more computer program products. These computer program products comprise a program code carrier such as a hard disk, a Compact Disc (CD), a memory card or a floppy disk. Such a computer program product is typically a computer readable storage medium as described for example in fig. 4. Fig. 4 illustrates a schematic structure of a computer-readable storage medium according to an embodiment of the present invention. The computer readable storage medium 400 stores computer readable program code 331 for performing the steps of the method according to the invention, which may be read by the processor 310 of the electronic device 300, which computer readable program code 331, when executed by the electronic device 300, causes the electronic device 300 to perform the steps of the method described above, in particular the computer readable program code 331 stored by the computer readable storage medium may perform the method shown in any of the embodiments described above. The computer readable program code 331 may be compressed in a suitable form.
It should be noted that the above-mentioned embodiments illustrate rather than limit the invention, and that those skilled in the art will be able to design alternative embodiments without departing from the scope of the appended claims. In the claims, any reference signs placed between parentheses shall not be construed as limiting the claim. The word "comprising" does not exclude the presence of elements or steps not listed in a claim. The word "a" or "an" preceding an element does not exclude the presence of a plurality of such elements. The invention may be implemented by means of hardware comprising several distinct elements, and by means of a suitably programmed computer. In the unit claims enumerating several means, several of these means may be embodied by one and the same item of hardware. The use of the words first, second, third, etc. do not denote any order. These words may be interpreted as names.
A1, a router interface testing method, wherein the method comprises the following steps:
dynamically generating a test key of a router to be tested;
acquiring test verification information from the router according to the user name of the test user and the test key;
Logging in the router according to the test verification information;
and testing one or more target interfaces of the router, and recording corresponding test data.
A2. the method of claim A1, wherein the test data comprises at least one of: interface availability information, interface parameter change information, return parameter change information.
A3. the method of claim A1, wherein the dynamically generating the test key of the router to be tested comprises:
accessing a target address of a router to obtain a random key returned by the router;
cutting the random key;
and performing AES encryption according to the WiFi password of the router, the cut random key and the IV offset to obtain the test key.
A4. the method of claim A3, wherein the method further comprises:
and analyzing and obtaining the WiFi password of the router.
A5. the method of claim A1, wherein the visitor information comprises: cookies and/or token.
A6. the method of claim A5, wherein said logging into the router according to the visitor information comprises:
and sending the cookie and the token to the login address of the router, activating the cookie, and logging in the router after passing token verification.
A7. the method of claim A1, wherein said testing one or more target interfaces of the router and recording corresponding test data comprises:
and sending a request with a specified identifier to an online equipment list interface, and analyzing a return value of the online equipment list interface to obtain test data.
A8. the method of claim A1, wherein said testing one or more target interfaces of the router and recording corresponding test data comprises:
and sending a request with the MAC address and the speed limiting threshold value to the intelligent equipment speed limiting interface, and analyzing the return value of the intelligent equipment speed limiting interface to obtain test data.
A9. the method of claim A1, wherein said testing one or more target interfaces of the router and recording corresponding test data comprises:
sending a request with a WiFi mode, a network mode and a WiFi ID to a wireless data interface, and analyzing a return value of the wireless data interface to obtain a wireless SSID;
and analyzing the WiFi name according to the wireless SSID, and further modifying the WiFi password.
The method of claim a10, A9, wherein the modifying the WiFi password comprises:
Accessing a target address of a router, obtaining a random key returned by the router, and carrying out encryption operation on a WiFi password through an AES algorithm to obtain a router encryption key;
accessing a target address of a router, obtaining a random key returned by the router, and carrying out encryption operation on a new password through an AES algorithm to obtain a new encryption key;
a request is sent to the WiFi password modification interface with at least one of a WiFi ID, a new encryption key, a WiFi mode, an encryption key, an encryption time, and a flag bit.
A11, the method of any of claims A1-a10, wherein the method further comprises:
correspondingly storing the test data and the model and/or firmware version of the router;
and generating router model change information and/or router firmware version change information according to the stored test data.
B12, a router interface testing device, wherein the device comprises:
the key generation unit is suitable for dynamically generating a test key of the router to be tested;
an information acquisition unit adapted to acquire test verification information from the router according to a user name of a test user and the test key;
a login unit adapted to login the router according to the test verification information;
And the test recording unit is suitable for testing one or more target interfaces of the router and recording corresponding test data.
B13, the apparatus of claim B12, wherein the test data comprises at least one of: interface availability information, interface parameter change information, return parameter change information.
B14, the apparatus of claim B12, wherein the key generation unit is adapted to:
accessing a target address of a router to obtain a random key returned by the router; cutting the random key; and performing AES encryption according to the WiFi password of the router, the cut random key and the IV offset to obtain the test key.
B15, the apparatus of claim B14, wherein the key generation unit is adapted to:
and analyzing and obtaining the WiFi password of the router.
B16, the apparatus of claim B12, wherein the visitor information comprises: cookies and/or token.
B17, the apparatus of claim B16, wherein the login unit is adapted to:
and sending the cookie and the token to the login address of the router, activating the cookie, and logging in the router after passing token verification.
B18, the apparatus of claim B12, wherein the test recording unit is adapted to:
and sending a request with a specified identifier to an online equipment list interface, and analyzing a return value of the online equipment list interface to obtain test data.
B19, the apparatus of claim B12, wherein the test recording unit is adapted to:
and sending a request with the MAC address and the speed limiting threshold value to the intelligent equipment speed limiting interface, and analyzing the return value of the intelligent equipment speed limiting interface to obtain test data.
B20, the apparatus of claim B12, wherein the test recording unit is adapted to:
sending a request with a WiFi mode, a network mode and a WiFi ID to a wireless data interface, and analyzing a return value of the wireless data interface to obtain a wireless SSID; and analyzing the WiFi name according to the wireless SSID, and further modifying the WiFi password.
B21, the apparatus of claim B20, wherein the test recording unit is adapted to: accessing a target address of a router, obtaining a random key returned by the router, and carrying out encryption operation on a WiFi password through an AES algorithm to obtain a router encryption key;
accessing a target address of a router, obtaining a random key returned by the router, and carrying out encryption operation on a new password through an AES algorithm to obtain a new encryption key;
A request is sent to the WiFi password modification interface with at least one of a WiFi ID, a new encryption key, a WiFi mode, an encryption key, an encryption time, and a flag bit.
B22, the apparatus of any one of claims B12-B21, wherein the apparatus further comprises a holding unit adapted to:
correspondingly storing the test data and the model and/or firmware version of the router; and generating router model change information and/or router firmware version change information according to the stored test data.
C23. an electronic device, wherein the electronic device comprises: a processor; and a memory arranged to store computer executable instructions which, when executed, cause the processor to perform the method of any of claims A1-a 11.
D24, a computer readable storage medium, wherein the computer readable storage medium stores one or more programs, which when executed by a processor, implement the method of any of claims A1-a 11.

Claims (24)

1. A router interface testing method, wherein the method comprises:
the method comprises the steps of accessing an address of a router, which can acquire a random key, acquiring the random key returned by the router, and encrypting according to a WiFi password of the router, the random key and a specific encryption algorithm to acquire a test key;
Acquiring test verification information from the router according to the user name of the test user and the test key;
logging in the router according to the test verification information;
and testing one or more target interfaces of the router, and recording corresponding test data.
2. The method of claim 1, wherein the test data comprises at least one of: interface availability information, interface parameter change information, return parameter change information.
3. The method of claim 1, wherein the access router is capable of obtaining an address of a random key, obtaining a random key returned by the router, encrypting according to a WiFi password of the router, the random key and a specific encryption algorithm, and obtaining a test key comprises:
accessing a target address of a router to obtain a random key returned by the router;
cutting the random key;
and performing AES encryption according to the WiFi password of the router, the cut random key and the IV offset to obtain the test key.
4. A method as claimed in claim 3, wherein the method further comprises:
and analyzing and obtaining the WiFi password of the router.
5. The method of claim 1, wherein the test verification information comprises: cookies and/or token.
6. The method of claim 5, wherein said logging into said router according to said test verification information comprises:
when the test verification information comprises a cookie and a token, sending the cookie and the token to a login address of the router, activating the cookie, and logging in the router after passing token verification.
7. The method of claim 1, wherein said testing one or more target interfaces of the router and recording corresponding test data comprises:
sending a request with a specified identifier to an online equipment list interface, and analyzing a return value of the online equipment list interface to obtain test data; the designation is identified as being based on a brand or version validation of the router.
8. The method of claim 1, wherein said testing one or more target interfaces of the router and recording corresponding test data comprises:
and sending a request with the MAC address and the speed limiting threshold value to the intelligent equipment speed limiting interface, and analyzing the return value of the intelligent equipment speed limiting interface to obtain test data.
9. The method of claim 1, wherein said testing one or more target interfaces of the router and recording corresponding test data comprises:
sending a request with a WiFi mode, a network mode and a WiFi ID to a wireless data interface, and analyzing a return value of the wireless data interface to obtain a wireless SSID;
and analyzing the WiFi name according to the wireless SSID, and further modifying the WiFi password.
10. The method of claim 9, wherein the modifying a WiFi password comprises:
accessing a target address of a router, obtaining a random key returned by the router, and carrying out encryption operation on a WiFi password through an AES algorithm to obtain a router encryption key;
accessing a target address of a router, obtaining a random key returned by the router, and carrying out encryption operation on a new password through an AES algorithm to obtain a new encryption key;
a request is sent to the WiFi password modification interface with at least one of a WiFi ID, a new encryption key, a WiFi mode, an encryption key, an encryption time, and a flag bit.
11. The method of any one of claims 1-10, wherein the method further comprises:
correspondingly storing the test data and the model and/or firmware version of the router;
And generating router model change information and/or router firmware version change information according to the stored test data.
12. A router interface test apparatus, wherein the apparatus comprises:
the key generation unit is suitable for accessing an address of a router, which can acquire a random key, acquiring the random key returned by the router, and encrypting according to a WiFi password of the router, the random key and a specific encryption algorithm to acquire a test key;
an information acquisition unit adapted to acquire test verification information from the router according to a user name of a test user and the test key;
a login unit adapted to login the router according to the test verification information;
and the test recording unit is suitable for testing one or more target interfaces of the router and recording corresponding test data.
13. The apparatus of claim 12, wherein the test data comprises at least one of: interface availability information, interface parameter change information, return parameter change information.
14. The apparatus of claim 12, wherein the key generation unit is adapted to:
accessing a target address of a router to obtain a random key returned by the router; cutting the random key; and performing AES encryption according to the WiFi password of the router, the cut random key and the IV offset to obtain the test key.
15. The apparatus of claim 14, wherein the key generation unit is adapted to:
and analyzing and obtaining the WiFi password of the router.
16. The apparatus of claim 12, wherein the test verification information comprises: cookies and/or token.
17. The apparatus of claim 16, wherein the login unit is adapted to:
when the test verification information comprises a cookie and a token, sending the cookie and the token to a login address of the router, activating the cookie, and logging in the router after passing token verification.
18. The apparatus of claim 12, wherein the test recording unit is adapted to:
sending a request with a specified identifier to an online equipment list interface, and analyzing a return value of the online equipment list interface to obtain test data; the designation is identified as being based on a brand or version validation of the router.
19. The apparatus of claim 12, wherein the test recording unit is adapted to:
and sending a request with the MAC address and the speed limiting threshold value to the intelligent equipment speed limiting interface, and analyzing the return value of the intelligent equipment speed limiting interface to obtain test data.
20. The apparatus of claim 12, wherein the test recording unit is adapted to:
Sending a request with a WiFi mode, a network mode and a WiFi ID to a wireless data interface, and analyzing a return value of the wireless data interface to obtain a wireless SSID; and analyzing the WiFi name according to the wireless SSID, and further modifying the WiFi password.
21. The apparatus of claim 20, wherein the test recording unit is adapted to: accessing a target address of a router, obtaining a random key returned by the router, and carrying out encryption operation on a WiFi password through an AES algorithm to obtain a router encryption key;
accessing a target address of a router, obtaining a random key returned by the router, and carrying out encryption operation on a new password through an AES algorithm to obtain a new encryption key;
a request is sent to the WiFi password modification interface with at least one of a WiFi ID, a new encryption key, a WiFi mode, an encryption key, an encryption time, and a flag bit.
22. The apparatus according to any of claims 12-21, wherein the apparatus further comprises a holding unit adapted to:
correspondingly storing the test data and the model and/or firmware version of the router; and generating router model change information and/or router firmware version change information according to the stored test data.
23. An electronic device, wherein the electronic device comprises: a processor; and a memory arranged to store computer executable instructions which, when executed, cause the processor to perform the method of any of claims 1-11.
24. A computer readable storage medium, wherein the computer readable storage medium stores one or more programs, which when executed by a processor, implement the method of any of claims 1-11.
CN201910857722.1A 2019-09-09 2019-09-09 Router interface testing method, device, electronic equipment and storage medium Active CN112468356B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910857722.1A CN112468356B (en) 2019-09-09 2019-09-09 Router interface testing method, device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910857722.1A CN112468356B (en) 2019-09-09 2019-09-09 Router interface testing method, device, electronic equipment and storage medium

Publications (2)

Publication Number Publication Date
CN112468356A CN112468356A (en) 2021-03-09
CN112468356B true CN112468356B (en) 2023-11-03

Family

ID=74807571

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910857722.1A Active CN112468356B (en) 2019-09-09 2019-09-09 Router interface testing method, device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN112468356B (en)

Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5583848A (en) * 1994-11-15 1996-12-10 Telefonaktiebolaget L M Ericsson Methods for verification of routing table information
CN1499396A (en) * 2002-10-24 2004-05-26 �Ҵ���˾ Method and device for maintaining internet field names data
CN101420423A (en) * 2007-10-26 2009-04-29 株式会社日立制作所 Network system
CN101617513A (en) * 2007-02-27 2009-12-30 思科技术公司 Utilize the oppositely routing optimality of route network prefix option between mobile router and the peer node
CN102385052A (en) * 2011-12-09 2012-03-21 中国人民解放军第二炮兵计量站 Radar parameter encryption and test device and method
CN102571766A (en) * 2010-12-23 2012-07-11 微软公司 Registration and network access control
CN103079200A (en) * 2011-10-26 2013-05-01 国民技术股份有限公司 Wireless access authentication method, system and wireless router
CN103605931A (en) * 2013-12-09 2014-02-26 福建联迪商用设备有限公司 Special payment router and payment information encryption method thereof
CN103974455A (en) * 2014-01-26 2014-08-06 杭州古北电子科技有限公司 Quick safe WIFI network connection method
CN106375141A (en) * 2016-08-25 2017-02-01 上海斐讯数据通信技术有限公司 Router crash test method and test system
CN106776349A (en) * 2017-02-07 2017-05-31 武汉斗鱼网络科技有限公司 A kind of method to set up and system of interface testing process
CN107070918A (en) * 2017-04-14 2017-08-18 天地融科技股份有限公司 A kind of network application login method and system
CN108694104A (en) * 2017-04-12 2018-10-23 北京京东尚科信息技术有限公司 A kind of interface function contrast test method, apparatus, electronic equipment and storage medium
CN109150910A (en) * 2018-10-11 2019-01-04 平安科技(深圳)有限公司 Log in token generation and verification method, device and storage medium
CN109618363A (en) * 2018-11-14 2019-04-12 青岛海信电子设备股份有限公司 Mobile gateway test macro and method
CN109889342A (en) * 2018-12-15 2019-06-14 中国平安人寿保险股份有限公司 Interface testing method for authenticating, device, electronic equipment and storage medium
CN110198539A (en) * 2019-01-02 2019-09-03 腾讯科技(深圳)有限公司 A kind of authentication method and its device, equipment and storage medium

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9105027B2 (en) * 2009-05-15 2015-08-11 Visa International Service Association Verification of portable consumer device for secure services

Patent Citations (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5583848A (en) * 1994-11-15 1996-12-10 Telefonaktiebolaget L M Ericsson Methods for verification of routing table information
CN1499396A (en) * 2002-10-24 2004-05-26 �Ҵ���˾ Method and device for maintaining internet field names data
CN101617513A (en) * 2007-02-27 2009-12-30 思科技术公司 Utilize the oppositely routing optimality of route network prefix option between mobile router and the peer node
CN101420423A (en) * 2007-10-26 2009-04-29 株式会社日立制作所 Network system
CN102571766A (en) * 2010-12-23 2012-07-11 微软公司 Registration and network access control
CN103079200A (en) * 2011-10-26 2013-05-01 国民技术股份有限公司 Wireless access authentication method, system and wireless router
CN102385052A (en) * 2011-12-09 2012-03-21 中国人民解放军第二炮兵计量站 Radar parameter encryption and test device and method
CN103605931A (en) * 2013-12-09 2014-02-26 福建联迪商用设备有限公司 Special payment router and payment information encryption method thereof
CN103974455A (en) * 2014-01-26 2014-08-06 杭州古北电子科技有限公司 Quick safe WIFI network connection method
CN106375141A (en) * 2016-08-25 2017-02-01 上海斐讯数据通信技术有限公司 Router crash test method and test system
CN106776349A (en) * 2017-02-07 2017-05-31 武汉斗鱼网络科技有限公司 A kind of method to set up and system of interface testing process
CN108694104A (en) * 2017-04-12 2018-10-23 北京京东尚科信息技术有限公司 A kind of interface function contrast test method, apparatus, electronic equipment and storage medium
CN107070918A (en) * 2017-04-14 2017-08-18 天地融科技股份有限公司 A kind of network application login method and system
CN109150910A (en) * 2018-10-11 2019-01-04 平安科技(深圳)有限公司 Log in token generation and verification method, device and storage medium
CN109618363A (en) * 2018-11-14 2019-04-12 青岛海信电子设备股份有限公司 Mobile gateway test macro and method
CN109889342A (en) * 2018-12-15 2019-06-14 中国平安人寿保险股份有限公司 Interface testing method for authenticating, device, electronic equipment and storage medium
CN110198539A (en) * 2019-01-02 2019-09-03 腾讯科技(深圳)有限公司 A kind of authentication method and its device, equipment and storage medium

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
基于加密接入令牌的IGMP安全机制;刘利, 李津生, 洪佩琳;小型微型计算机系统(第12期);全文 *
路由器到路由器VPN试验网的组建和测试分析;董云耀, 耿进锋;计算机工程与设计(第06期);全文 *

Also Published As

Publication number Publication date
CN112468356A (en) 2021-03-09

Similar Documents

Publication Publication Date Title
CN113574838A (en) System and method for filtering internet traffic through client fingerprints
CN110401614B (en) Malicious domain name tracing method and device
TWI654533B (en) Method for downloading and installing client, server and client
US20130347085A1 (en) Data exfiltration attack simulation technology
CN108628743B (en) Application program testing method, device, equipment and storage medium
US11363054B2 (en) Apparatus and method for analyzing security vulnerabilities
JP2022508899A (en) Container builder for personalized network services
CN108777687B (en) Crawler intercepting method based on user behavior portrait, electronic equipment and storage medium
US9059987B1 (en) Methods and systems of using single sign-on for identification for a web server not integrated with an enterprise network
CN107104924B (en) Verification method and device for website backdoor file
CN105099983B (en) authorization method, authority setting method and device
CN105915364A (en) Method for preventing malicious sharing of user identity and device thereof
CN108600259B (en) Authentication and binding method of equipment, computer storage medium and server
US10180900B2 (en) Recordation of user interface events for script generation
CN110768947A (en) Penetration test password sending method and device, storage medium and electronic device
CN113553557A (en) Application secret-free login method and device, electronic equipment and storage medium
KR102292579B1 (en) Method of checking vulnerability based on hybrid using verification code and script and apparatus using the same
CN111090616B (en) File management method, corresponding device, equipment and storage medium
CN113206850A (en) Malicious sample message information acquisition method, device, equipment and storage medium
CN112468356B (en) Router interface testing method, device, electronic equipment and storage medium
CN107276966B (en) Control method and login system of distributed system
CN117251837A (en) System access method and device, electronic equipment and storage medium
CN116522308A (en) Database account hosting method, device, computer equipment and storage medium
CN107707550B (en) Method, device and system for accessing virtual machine
CN111885063B (en) Open source system access control method, device, equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant