CN113037526B - Security detection method, terminal, system and storage medium - Google Patents
Security detection method, terminal, system and storage medium Download PDFInfo
- Publication number
- CN113037526B CN113037526B CN201911350628.3A CN201911350628A CN113037526B CN 113037526 B CN113037526 B CN 113037526B CN 201911350628 A CN201911350628 A CN 201911350628A CN 113037526 B CN113037526 B CN 113037526B
- Authority
- CN
- China
- Prior art keywords
- server
- test
- detection
- intelligent television
- test script
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
Images
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/02—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP]
- H04L67/025—Protocols based on web technology, e.g. hypertext transfer protocol [HTTP] for remote control or remote monitoring of applications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/0631—Management of faults, events, alarms or notifications using root cause analysis; using analysis of correlation between notifications, alarms or events based on decision criteria, e.g. hierarchy, tree or time analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L41/00—Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
- H04L41/06—Management of faults, events, alarms or notifications
- H04L41/069—Management of faults, events, alarms or notifications using logs of notifications; Post-processing of notifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/06—Generation of reports
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/08—Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L43/00—Arrangements for monitoring or testing data switching networks
- H04L43/14—Arrangements for monitoring or testing data switching networks using software, i.e. software packages
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
- H04L63/0876—Network architectures or network communication protocols for network security for authentication of entities based on the identity of the terminal or configuration, e.g. MAC address, hardware or software configuration or device fingerprint
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/14—Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
- H04L63/1433—Vulnerability analysis
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network arrangements or protocols for supporting network services or applications
- H04L67/01—Protocols
- H04L67/133—Protocols for remote procedure calls [RPC]
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Environmental & Geological Engineering (AREA)
- Power Engineering (AREA)
- Testing, Inspecting, Measuring Of Stereoscopic Televisions And Televisions (AREA)
Abstract
The invention discloses a security detection method, a terminal, a system and a storage medium, wherein the security detection method comprises the following steps: under the condition of entering a detection interface, acquiring test item information in the detection interface, and sending the test item information to a server; receiving a test script sent by the server, and detecting the intelligent television through the test script; the test script is automatically generated by the server according to the test item information; and sending the test result of the test script to the server, and generating a detection report according to the analysis result of the server. According to the method, the security detection is carried out on the system, the loophole, the data, the network, the application and the like of the intelligent television, and the detection report is automatically output, so that the security performance of the intelligent television is visualized, and the security of the intelligent television is improved.
Description
Technical Field
The present invention relates to the field of smart tv applications, and in particular, to a security detection method, a terminal, a system, and a storage medium.
Background
With the vigorous development of smart televisions, sensors (such as cameras and microphones) applied in smart televisions are also increasing; meanwhile, with the wide use of AI (artificial intelligence) application and IOT interconnection (everything interconnection), security threats of the smart television system are increasing, and therefore security of the smart television system and software is also increasing.
Accordingly, the prior art is still in need of improvement and development.
Disclosure of Invention
Aiming at the defects of the prior art, the invention provides a security detection method, a terminal, a system and a storage medium, which are used for improving the security of an intelligent television system and an application by detecting the security of the intelligent television system, loopholes, data, networks, the application and the like.
The technical scheme adopted for solving the technical problems is as follows:
in a first aspect, the present invention provides a security detection method, including the steps of:
under the condition of entering a detection interface, acquiring test item information in the detection interface, and sending the test item information to a server;
receiving a test script sent by the server, and detecting the intelligent television through the test script; the test script is automatically generated by the server according to the test item information;
and sending the test result of the test script to the server, and generating a detection report according to the analysis result of the server.
Further, the security detection method further comprises the following steps:
acquiring an authentication instruction and sending the authentication instruction to the server;
receiving an authentication result fed back by the server, and determining whether to enter a detection interface according to the authentication result; the authentication result is obtained by the server according to the authentication instruction.
Further, under the condition of entering a detection interface, acquiring the test item information in the detection interface and transmitting the test item information to a server, wherein the method specifically comprises the following steps:
under the condition of entering the detection interface, establishing protocol communication with the server through a socket;
and acquiring the test item information in the detection interface, and sending the test item information to the server through a hypertext protocol request.
Further, the receiving the test script sent by the server, and detecting the smart television through the test script specifically includes the following steps:
receiving a test script sent by the server, and establishing serial communication with the intelligent television;
starting a thread in the test script and acquiring a log of the intelligent television;
and selecting a corresponding test command from the test script, and detecting the intelligent television through the test command.
Further, after the thread in the test script is started and the log of the smart television is obtained, the method further comprises the following steps:
analyzing the log, and sending the analyzed log data to the server.
Further, the selecting a corresponding test command from the test script, and detecting the smart television through the test command specifically includes the following steps:
selecting a corresponding test command from the test script according to the test item information;
and detecting the system, the loophole, the data, the network and the application of the intelligent television according to the test command.
Further, the step of sending the test result of the test script to the server and generating a detection report according to the analysis result of the server specifically includes the following steps:
acquiring data output by a serial port in the intelligent television, and sending the data output by the serial port to the server;
receiving an analysis result sent by the server, and generating a detection report according to the analysis result; the analysis result is generated by the server according to the data output by the serial port.
Further, the step of sending the test result of the test script to the server, and generating a detection report according to the analysis result of the server further comprises the following steps:
and repairing the system, the loopholes, the data, the network and the anomalies in the application of the intelligent television according to the detection report and the analysis result.
In a second aspect, the present invention provides a terminal, including: the system comprises a processor and a memory connected with the processor, wherein the memory stores a security detection program which is used for realizing the operation of the security detection method in the first aspect when being executed by the processor.
In a third aspect, the present invention provides a security detection system comprising: the terminal, the smart television, and the server as described in the second aspect; the terminal is respectively connected with the server and the intelligent television through a wired network or a wireless network;
the terminal is used for acquiring test item information in a detection interface and detecting the intelligent television according to a test script sent by the server; the test result of the test script is sent to the server, and a detection report is generated according to the analysis result of the server;
the intelligent television is used for executing the test script and sending the detection result of the test script to the terminal;
the server is used for receiving the authentication instruction of the terminal and authenticating the authentication instruction; and the terminal is used for generating the test script and sending the test script to the terminal.
In a fourth aspect, the present invention provides a storage medium storing a security detection program for implementing the operations of the security detection method in the first aspect described above when executed by a processor.
The technical scheme adopted by the invention has the following effects:
the invention provides a safety detection method, a terminal, a system and a storage medium, wherein test item information in a detection interface is acquired and is sent to a server, so that the server can automatically generate a test script according to the test item information; when a test script sent by a server is received, the intelligent television is detected by the test script, so that the safety of the intelligent television is visualized, and a user can intuitively know the safety condition of the intelligent television; according to the method, the security detection is carried out on the system, the loophole, the data, the network, the application and the like of the intelligent television, and the detection report is automatically output, so that the security performance of the intelligent television is visualized, and the security of the intelligent television is improved.
Drawings
FIG. 1 is a flow chart of a security detection method according to a preferred embodiment of the present invention.
Fig. 2 is a flowchart of the preferred embodiment of step S100 in fig. 1.
Fig. 3 is a flowchart of a preferred embodiment of step S200 in fig. 1.
Fig. 4 is a flowchart of the preferred embodiment of step S220 in fig. 3.
Fig. 5 is a flowchart of the preferred embodiment of step S230 in fig. 3.
Fig. 6 is a flowchart of the preferred embodiment of step S300 in fig. 1.
FIG. 7 is a timing diagram of a security detection method of the present invention.
Fig. 8 is a functional schematic of the security detection system of the present invention.
Fig. 9 is a functional schematic of the terminal of the present invention.
Detailed Description
In order to make the objects, technical solutions and advantages of the present invention more clear and clear, the present invention will be further described in detail below with reference to the accompanying drawings and examples. It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Example 1
With the vigorous development of intelligent televisions, the safety of the intelligent televisions is also getting more and more importance; the inventor finds that no special tool is used for detecting the safety performance of the intelligent television at present, and only manual detection can be performed by a test engineer; because the security of the intelligent television relates to aspects of a system, loopholes, data, a network, application and the like, the efficiency of a manual detection mode is extremely low when the security of the intelligent television is detected; moreover, the manual inspection method requires high expertise of the test engineer.
The inventor proposes a security detection method aiming at the problems, and the security of the intelligent television is improved by performing security detection on a system, loopholes, data, a network, application and the like of the intelligent television and automatically outputting a detection report.
As shown in fig. 1, in one implementation manner of the present embodiment, the security detection method includes the following steps:
step S100, under the condition of entering a detection interface, acquiring test item information in the detection interface, and sending the test item information to a server.
In this embodiment, a detection tool (i.e., detection software) for detecting the security performance of the smart tv needs to be installed in the terminal, and security detection is automatically performed on a system, a vulnerability, data, a network, an application, and the like of the smart tv through the detection tool, so that a corresponding detection report is generated, so that a test engineer can maintain the security problem of the smart tv; and a detection interface for detection is arranged in the detection tool, and the intelligent television can be detected by setting detection options in the detection interface.
Before detection, the terminal is required to be connected with the intelligent television and the terminal is required to be connected with a server so as to form a network for detecting the safety performance of the intelligent television; among the networks, the terminal may be connected to the smart tv through a wired network or a wireless network, and the terminal may be connected to the server through a wired network or a wireless network, which is not limited in this embodiment.
In this embodiment, before entering the detection interface, authentication is also required for the smart tv to be detected; specifically, a tester can log in the server through a browser in the terminal, and input an authentication instruction (namely an account number and a password) in the browser, and the server authenticates; when the terminal receives an authentication instruction input by a tester, an authentication request is sent to the server, and the authentication instruction is sent to the server through an HTTP POST (hypertext transfer protocol request); after receiving the authentication instruction, the server authenticates the authentication instruction and feeds an authentication result back to the terminal, so that the terminal can select to enter the detection interface according to the authentication result of the server.
When the terminal receives the authentication result, judging whether the authentication instruction is successful, if so, starting the testing tool, and entering a detection interface of the testing tool; if the authentication fails, the authentication failure of the tester is prompted to conduct re-authentication.
As shown in fig. 2, the security detection method further includes the steps of:
step 001, acquiring an authentication instruction and sending the authentication instruction to the server;
step 002, receiving the authentication result fed back by the server, and determining whether to enter a detection interface according to the authentication result; the authentication result is obtained by the server according to the authentication instruction.
In this embodiment, when the terminal enters the detection interface, an RPC (Remote Procedure Call ) communication is established with the server through a socket (socket function is called by an application program to create a socket capable of network communication); when the terminal successfully establishes communication with the server, the terminal may acquire detection parameters input by the user at the detection interface, for example: detecting type, calling interface, detecting instruction, etc.; the detection type comprises a system of the intelligent television, loopholes, data in a database, network conditions, application use conditions and the like; and after the terminal acquires the test item information, the acquired test item information is sent to the server through the HTTP POST.
In this embodiment, the server may be divided into a front end and a back end, and when the terminal sends the authentication request, the terminal sends an authentication instruction input by a user to the front end of the server, performs authentication through the front end of the server, and feeds back an authentication result; when the terminal and the server successfully establish communication, the terminal sends the test item information to the server so as to facilitate the analysis of the rear end of the server and generate a test script for testing the intelligent television.
As shown in fig. 2, in the step 100, the following steps are specifically included:
step 110, under the condition of entering the detection interface, establishing protocol communication with the server through a socket;
step 120, obtaining the test item information in the detection interface, and sending the test item information to the server through a hypertext protocol request.
According to the invention, the test item information set by the user on the detection interface is obtained, and the test item information is sent to the rear end of the server, so that the rear end of the server can analyze the test item information, and a test script for detecting the intelligent television is automatically generated according to the test item information.
As shown in fig. 1, the security detection method includes the steps of:
and step 200, receiving a test script sent by the server, and detecting the intelligent television through the test script.
In this embodiment, when the rear end of the server receives the test item information, the test item information is parsed to generate a corresponding test script, and the test script is sent to the terminal; when the terminal receives the test script, serial communication is established with the intelligent television according to the connection information in the test script; when the terminal is successfully connected with the intelligent television, the terminal starts a thread in the test script, and a log in the intelligent television is obtained through the thread so as to analyze the log; and at the same time, the terminal selects a corresponding test command from the test script, sends the test command to the intelligent television, and detects the intelligent television through the test command so as to detect the security of a system, loopholes, data, a network and an application in the intelligent television.
In this embodiment, according to the test item information and the test script, different test commands may be selected to perform a test, and when the test is performed, a corresponding interface in the smart television is called to detect the smart television through the test command; for example, the selected test command is an application test command, and when in test, an interface corresponding to the application is called, and the application is detected through the interface; and after the detection is finished, outputting a detection result to the serial port of the intelligent television, so that the terminal can grasp the detection result from the serial port of the intelligent television.
As shown in fig. 3, in the step 200, the following steps are specifically included:
step 210, receiving a test script sent by the server, and establishing serial communication with the smart television;
step 220, starting a thread in the test script and acquiring a log of the intelligent television;
and 230, selecting a corresponding test command from the test script, and detecting the intelligent television through the test command.
Further, as shown in fig. 4, after the above step 220, the following steps are further included:
step 221, analyzing the log, and sending the analyzed log data to the server.
Further, as shown in fig. 5, in the above step 230, the following steps are specifically included:
step 231, selecting a corresponding test command from the test script according to the test item information;
and step 232, detecting the system, the loophole, the data, the network and the application of the intelligent television according to the test command.
According to the invention, the terminal and the intelligent television are communicated through a serial port, so that the terminal can carry out safety detection on the intelligent television through the serial port; and selecting a corresponding test command from the test script, and detecting the system, the vulnerability, the data, the network and the application of the intelligent television according to the test command, so that the terminal can automatically detect the security performances of the system, the vulnerability, the data, the network and the application of the intelligent television, thereby facilitating the operation of a tester.
As shown in fig. 1, the security detection method includes the steps of:
and step S300, sending the test result of the test script to the server, and generating a detection report according to the analysis result of the server.
In this embodiment, after the smart tv is tested, the terminal may obtain a detection result from the serial port of the smart tv; the method comprises the steps of capturing output specific JSON (Java Script Object Notation, JS object numbered musical notation, which is a lightweight data exchange format) data from a serial port of the intelligent television, and then sending the obtained data to the rear end of the server; the rear end of the server evaluates the safety performance of the intelligent television according to the detection result and gives out a corresponding analysis result; and after receiving the analysis result sent by the server, the terminal generates a corresponding detection report according to the analysis result and the evaluation and displays the detection report on a corresponding display interface for reference and use by a tester.
As shown in fig. 6, in the step 300, the following steps are specifically included:
step 310, obtaining data output by a serial port in the smart television, and sending the data output by the serial port to the server;
and 320, receiving the analysis result sent by the server, and generating a detection report according to the analysis result.
In this embodiment, when the terminal generates a detection report, if an abnormal situation is detected, repairing the abnormality in the system, the vulnerability, the data, the network and the application of the smart television according to the detection report and the analysis result; for example, when an abnormality occurs in the system, the terminal reports the abnormality to the rear end of the server, and the rear end of the server sends a corresponding patch or upgrade package to the terminal according to the detected abnormality, so that the abnormality of the smart television is repaired by the terminal, or the system of the smart television is upgraded to ensure the security of the smart television.
I.e. after said step 320 the following steps are also included:
and step 330, repairing the anomalies in the system, the loopholes, the data, the network and the application of the intelligent television according to the detection report and the analysis result.
According to the method and the device, the serial port output data of the intelligent television are obtained, and the detection result of the intelligent television is obtained, so that the terminal can generate a corresponding detection report according to the detection result and the analysis result of the server, and the safety performance of the intelligent television is visualized, so that a tester can conveniently refer to the detection report; moreover, the safety of the intelligent television is ensured by timely repairing the abnormality in the detection process.
The invention is illustrated by the following specific examples:
referring to the timing sequence in fig. 7, as shown in fig. 7, the test and communication flow of the present invention includes the following steps:
step S1, a tester opens a browser of a terminal and logs in a security detection website (logs in a server) through the browser;
step S2, uploading an account password input by a user to a server through an HTTP POST in a browser for confirmation;
step S3, the server returns a confirmation result, and if the confirmation is successful, the terminal jumps to the detection page;
step S4, executing a workbench (namely a testing tool, wherein the testing tool can be set to be self-starting) at the terminal;
step S5, after the tester starts the workbench, the tester establishes RPC communication with the rear end of the server through the socket;
step S6, the tester selects related test items on the test page and clicks on the start of the test;
step S7, the front end of the server integrates the test information and transmits the test item information to the rear end of the server through the HTTP POST;
step S8, the rear end of the server automatically generates a test script according to the test item information and transmits the test script to the workbench through RPC communication;
step S9, the workbench executes the acquired test script;
step S10, a serial port communication is established between the terminal and the intelligent television through a test script, and a thread is started to capture a television terminal log;
step S11, a test command is sent to the intelligent television through a test script;
step S12, the intelligent television executes a relevant detection command;
step S13, the intelligent television outputs a test result to the serial port;
s14, analyzing and reading the intelligent television log through the test script, and transmitting related data to the workbench through socket communication;
step S15, the workbench transmits the test result to the server through RPC communication;
in step S16, the server sets the test result to be visual, scores the test result according to the scoring standard, and generates a test report.
According to the method and the device, the security detection is carried out on the system, the loophole, the data, the network, the application and the like of the intelligent television, and the detection report is automatically output, so that the security performance of the intelligent television is visualized, and the security of the intelligent television can be improved.
Example two
As shown in fig. 9, the present embodiment provides a terminal, including a processor 11, and a memory 12 connected to the processor 11, where the memory 12 stores a security detection program, and the security detection program is used to implement the operation of the security detection method described in the first embodiment when executed by the processor 11; as described in detail above.
Example III
As shown in fig. 8, the present embodiment provides a security detection system, including: the terminal 10, the smart tv 20, and the server 30 described in the second embodiment; the terminal 10 is connected with the server 30 and the smart television 20 through a wired network or a wireless network, respectively;
the terminal 10 is configured to obtain test item information in a detection interface, and detect the smart television 20 according to a test script sent by the server 30; the test result of the test script is sent to the server 30, and a detection report is generated according to the analysis result of the server 30;
the smart television 20 is configured to execute the test script, and send a detection result of the test script to the terminal 10;
the server 30 is configured to receive an authentication instruction of the terminal 10, and authenticate the authentication instruction; and for generating the test script and transmitting the test script to the terminal 10.
Example IV
The present embodiment provides a storage medium storing a security detection program for implementing the operations of the security detection method described in the first embodiment when executed by a processor; as described in detail above.
In summary, the invention provides a security detection method, a terminal, a system and a storage medium, which enable a server to automatically generate a test script according to test item information by acquiring the test item information in a detection interface and sending the test item information to the server; when a test script sent by a server is received, the intelligent television is detected by the test script, so that the safety of the intelligent television is visualized, and a user can intuitively know the safety condition of the intelligent television; according to the method, the security detection is carried out on the system, the loophole, the data, the network, the application and the like of the intelligent television, and the detection report is automatically output, so that the security performance of the intelligent television is visualized, and the security of the intelligent television is improved.
Of course, those skilled in the art will appreciate that implementing all or part of the above-described methods may be implemented by a computer program for instructing relevant hardware (such as a processor, a controller, etc.), where the program may be stored in a computer-readable storage medium, and where the program may include the steps of the above-described method embodiments when executed. The storage medium may be a memory, a magnetic disk, an optical disk, or the like.
It is to be understood that the invention is not limited in its application to the examples described above, but is capable of modification and variation in light of the above teachings by those skilled in the art, and that all such modifications and variations are intended to be included within the scope of the appended claims.
Claims (7)
1. A security detection method, comprising the steps of:
under the condition of entering a detection interface, acquiring test item information in the detection interface, and sending the test item information to a server;
receiving a test script sent by the server, and detecting the intelligent television through the test script; the test script is automatically generated by the server according to the test item information;
transmitting the test result of the test script to the server, and generating a detection report according to the analysis result of the server;
the security detection method further comprises the following steps:
acquiring an authentication instruction and sending the authentication instruction to the server;
receiving an authentication result fed back by the server, and determining whether to enter a detection interface according to the authentication result; the authentication result is obtained by the server according to the authentication instruction;
under the condition of entering a detection interface, acquiring test item information in the detection interface and transmitting the test item information to a server, wherein the method specifically comprises the following steps of:
under the condition of entering the detection interface, establishing protocol communication with the server through a socket;
acquiring the test item information in the detection interface, and sending the test item information to the server through a hypertext protocol request;
the steps of receiving the test script sent by the server and detecting the intelligent television through the test script specifically comprise the following steps:
receiving a test script sent by the server, and establishing serial communication with the intelligent television;
starting a thread in the test script and acquiring a log of the intelligent television;
selecting a corresponding test command from the test script, and detecting the intelligent television through the test command;
the selecting a corresponding test command from the test script, and detecting the intelligent television through the test command specifically comprises the following steps:
selecting a corresponding test command from the test script according to the test item information;
detecting a system, loopholes, data, a network and applications of the intelligent television according to the test command;
the server is divided into a front end and a rear end, and the terminal sends the authentication instruction input by the user to the front end of the server for authentication and feeds back an authentication result; when the terminal and the server successfully establish communication, the terminal sends the test item information to the rear end of the server for analysis and generates a test script for testing the intelligent television.
2. The security detection method according to claim 1, wherein after the thread in the test script is started and the log of the smart tv is obtained, the method further comprises the steps of:
analyzing the log, and sending the analyzed log data to the server.
3. The security detection method according to claim 1, wherein the step of transmitting the test result of the test script to the server and generating a detection report according to the analysis result of the server specifically comprises the steps of:
acquiring data output by a serial port in the intelligent television, and sending the data output by the serial port to the server;
receiving an analysis result sent by the server, and generating a detection report according to the analysis result; the analysis result is generated by the server according to the data output by the serial port.
4. The security detection method according to claim 1, wherein after the test result of the test script is sent to the server and a detection report is generated according to the analysis result of the server, the method further comprises the steps of:
and repairing the system, the loopholes, the data, the network and the anomalies in the application of the intelligent television according to the detection report and the analysis result.
5. A terminal, comprising: a processor, and a memory coupled to the processor, the memory storing a security detection program that when executed by the processor is configured to implement the security detection method of any of claims 1-4.
6. A security detection system, comprising: the terminal, the smart television and the server according to claim 5; the terminal is respectively connected with the server and the intelligent television through a wired network or a wireless network;
the terminal is used for acquiring test item information in a detection interface and detecting the intelligent television according to a test script sent by the server; the test result of the test script is sent to the server, and a detection report is generated according to the analysis result of the server;
the intelligent television is used for executing the test script and sending the detection result of the test script to the terminal;
the server is used for receiving the authentication instruction of the terminal and authenticating the authentication instruction; and the terminal is used for generating the test script and sending the test script to the terminal.
7. A storage medium storing a security detection program which, when executed by a processor, is adapted to carry out the security detection method of any one of claims 1 to 4.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911350628.3A CN113037526B (en) | 2019-12-24 | 2019-12-24 | Security detection method, terminal, system and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201911350628.3A CN113037526B (en) | 2019-12-24 | 2019-12-24 | Security detection method, terminal, system and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113037526A CN113037526A (en) | 2021-06-25 |
CN113037526B true CN113037526B (en) | 2023-05-26 |
Family
ID=76452069
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201911350628.3A Active CN113037526B (en) | 2019-12-24 | 2019-12-24 | Security detection method, terminal, system and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113037526B (en) |
Families Citing this family (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113835028B (en) * | 2021-09-15 | 2024-08-27 | 深圳创维-Rgb电子有限公司 | Automatic detection method, terminal and computer readable storage medium for pan-tilt motor |
CN116488894B (en) * | 2023-04-21 | 2024-09-24 | 清华大学 | Internet of things equipment safety test system and method based on software definition |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107592524A (en) * | 2017-08-24 | 2018-01-16 | 康佳集团股份有限公司 | Intelligent television automation test method, system and storage device based on matrix |
CN108874659A (en) * | 2018-04-19 | 2018-11-23 | 杭州嘉楠耘智信息科技有限公司 | Test method, test system and server of digital currency computing equipment |
CN110532141A (en) * | 2019-08-30 | 2019-12-03 | 峰米(北京)科技有限公司 | A kind of automatization test system and method, a kind of storage medium of intelligent display terminal |
-
2019
- 2019-12-24 CN CN201911350628.3A patent/CN113037526B/en active Active
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107592524A (en) * | 2017-08-24 | 2018-01-16 | 康佳集团股份有限公司 | Intelligent television automation test method, system and storage device based on matrix |
CN108874659A (en) * | 2018-04-19 | 2018-11-23 | 杭州嘉楠耘智信息科技有限公司 | Test method, test system and server of digital currency computing equipment |
CN110532141A (en) * | 2019-08-30 | 2019-12-03 | 峰米(北京)科技有限公司 | A kind of automatization test system and method, a kind of storage medium of intelligent display terminal |
Also Published As
Publication number | Publication date |
---|---|
CN113037526A (en) | 2021-06-25 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110908909B (en) | Automatic test method, device, storage medium and equipment | |
US9654490B2 (en) | System and method for fuzzing network application program | |
CN111813696B (en) | Application testing method, device and system and electronic equipment | |
CN108052474B (en) | Data format conversion method, device, equipment and computer readable storage medium | |
CN112291271B (en) | Method, system and medium for automatically logging in server by mobile equipment | |
CN113037526B (en) | Security detection method, terminal, system and storage medium | |
CN111026645A (en) | User interface automatic testing method and device, storage medium and electronic equipment | |
CN111783096B (en) | Method and device for detecting security hole | |
CN112906011B (en) | Vulnerability discovery method, testing method, security testing method, related device and platform | |
CN109560996B (en) | Automatic testing system and method for terminal of Internet of things | |
CN111555920B (en) | Intelligent operation and maintenance method, system, equipment and user side | |
CN105897807A (en) | Mobile intelligent terminal abnormal code cloud detection method based on behavioral characteristics | |
CN111554219A (en) | Display equipment testing method and device, electronic product and storage medium | |
CN112990495A (en) | Method, device and system for vehicle after-sale diagnosis and storage medium | |
CN108540491B (en) | Semi-automatic penetration testing system and method based on passive scanning | |
CN106972983B (en) | Automatic testing device and method for network interface | |
CN115150377A (en) | Method and device for calling and processing simulation interface | |
CN112685319A (en) | Automatic testing method, device, medium, electronic equipment and system | |
CN111552967A (en) | Application software security vulnerability detection method | |
CN105243015B (en) | Method and system for automatically testing software | |
US9628364B2 (en) | Test automation system and method for detecting change in signature of internet application traffic protocol | |
CN116684489A (en) | Remote test method, system, device and storage medium | |
CN113395235B (en) | IoT system remote testing method, system and equipment | |
CN116166536A (en) | Test method, test device, electronic equipment and storage medium | |
CN111064794B (en) | Fault detection method, device, equipment and storage medium of terminal equipment |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |