CN113094290A - Program test system and method - Google Patents

Program test system and method Download PDF

Info

Publication number
CN113094290A
CN113094290A CN202110557373.9A CN202110557373A CN113094290A CN 113094290 A CN113094290 A CN 113094290A CN 202110557373 A CN202110557373 A CN 202110557373A CN 113094290 A CN113094290 A CN 113094290A
Authority
CN
China
Prior art keywords
terminal
login
test
verification
connector
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN202110557373.9A
Other languages
Chinese (zh)
Other versions
CN113094290B (en
Inventor
刘志标
成朝晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Kingsoft Online Game Technology Co Ltd
Original Assignee
Zhuhai Kingsoft Online Game Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Kingsoft Online Game Technology Co Ltd filed Critical Zhuhai Kingsoft Online Game Technology Co Ltd
Priority to CN202110557373.9A priority Critical patent/CN113094290B/en
Publication of CN113094290A publication Critical patent/CN113094290A/en
Application granted granted Critical
Publication of CN113094290B publication Critical patent/CN113094290B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites

Abstract

The application provides a program testing system and a program testing method, wherein the program testing method comprises the following steps: the method is applied to a test terminal, and the test terminal is provided with a verification connector; receiving an operation instruction aiming at a target program, and operating the target program according to the operation instruction; under the condition of receiving a login request of the target program, establishing connection with an auxiliary verification connector in a tested terminal through the verification connector, and sending the login request to the tested terminal; and receiving a login verification result fed back by the tested terminal, and logging in the target program to test the target program under the condition that the login verification result is successful. The connection efficiency of the test terminal and the tested terminal is improved. In addition, the program test is carried out through the verification connector and the auxiliary verification connector without calling external network data, so that the data processing amount is reduced, the time consumption of the program test is greatly shortened, and the efficiency of the program test can be improved.

Description

Program test system and method
Technical Field
The present application relates to the field of computer technologies, and in particular, to a program testing system and method. The application also relates to a test terminal, a tested terminal, a computing device and a computer readable storage medium.
Background
With the rapid development of computer technology, various applications are developed, wherein a mobile phone application has become a mainstream mode of a network application at present. In the existing application program, a PC end application program and a mobile phone end application program are separated, the PC end application program cannot log in through a mobile phone, and the mobile phone application program cannot log in only through the PC end. Therefore, the mobile phone application program cannot be tested by directly logging in the PC terminal.
In the prior art, in order to test or debug a mobile phone application program through PC end login, a debugger is usually connected between a PC end and a mobile phone, so as to debug the mobile phone application program and log in with the mobile phone. However, the above method: or the mobile phone application program has a forbidden debugger and cannot be tested; or all databases of the external network must be called, and since the capacity of the external network database is often very large, a large amount of time and traffic are consumed for calling the database, so that the debugger is slow in debugging speed and low in efficiency. Therefore, an effective solution to solve the above problems is needed.
Disclosure of Invention
In view of the above, the present disclosure provides a program testing system and method. The application also relates to a test terminal, a tested terminal, a computing device and a computer readable storage medium, which are used for solving the problems of long time consumption and low efficiency in the prior art.
According to a first aspect of the embodiments of the present application, there is provided a program testing method applied to a test terminal configured with a verification connector, including:
receiving an operation instruction aiming at a target program, and operating the target program according to the operation instruction;
under the condition of receiving a login request of the target program, establishing connection with an auxiliary verification connector in a tested terminal through the verification connector, and sending the login request to the tested terminal;
and receiving a login verification result fed back by the tested terminal, and logging in the target program to test the target program under the condition that the login verification result is successful.
According to a second aspect of the embodiments of the present application, there is provided a program testing method applied to a terminal under test configured with an auxiliary verification connector, including:
receiving a login request sent by a test terminal, and analyzing the login request;
determining a corresponding login mode according to the analysis result, and acquiring a login verification result corresponding to the login mode;
and feeding back the login verification result to the test terminal through the auxiliary verification connector.
According to a third aspect of embodiments of the present application, there is provided a program test system including:
the system comprises a test terminal configured with a verification connector and a tested terminal configured with an auxiliary verification connector;
the test terminal is configured to receive an operation instruction for a target program, operate the target program according to the operation instruction, establish connection with an auxiliary verification connector in the terminal to be tested through the verification connector under the condition of receiving a login request of the target program, and send the login request to the terminal to be tested;
the tested terminal is configured to analyze the received login request, determine a corresponding login mode according to an analysis result, obtain a login verification result corresponding to the login mode, and feed the login verification result back to the testing terminal through the auxiliary verification connector;
the test terminal is further configured to log in the target program to test the target program under the condition that the received login verification result is successful.
According to a fourth aspect of embodiments of the present application, there is provided a test terminal configured with a verification connector, comprising:
the receiving module is configured to receive an operation instruction aiming at a target program, and the target program is operated according to the operation instruction;
the connection module is configured to establish connection with an auxiliary verification connector in a tested terminal through the verification connector and send the login request to the tested terminal under the condition of receiving the login request of the target program;
and the login module is configured to receive a login verification result fed back by the tested terminal, and log in the target program to test the target program under the condition that the login verification result is successful.
According to a fifth aspect of the embodiments of the present application, there is provided a terminal under test configured with a secondary verification connector, including:
the analysis module is configured to analyze the login request after receiving the login request sent by the test terminal;
the acquisition module is configured to determine a corresponding login mode according to the analysis result and acquire a login verification result corresponding to the login mode;
the sending module is configured to feed back the login authentication result to the test terminal through the auxiliary authentication connector.
According to a sixth aspect of embodiments herein, there is provided a computing device comprising a memory, a processor and computer instructions stored on the memory and executable on the processor, the processor implementing the steps of the program testing method when executing the computer instructions.
According to a seventh aspect of embodiments of the present application, there is provided a computer-readable storage medium storing computer instructions which, when executed by a processor, implement the steps of the program testing method.
According to the program testing system, the testing terminal runs the target program through responding to the running instruction, connection is established with the auxiliary verification connector in the tested terminal through the verification connector when login is conducted, so that the login request is sent to the tested terminal, the tested terminal obtains the login verification result according to the login request, the login verification result is fed back through the auxiliary verification connector, the testing terminal can conveniently analyze the login verification result, the target program is logged in under the condition that the analysis result is successful, and testing is started. Therefore, the test terminal and the tested terminal are not required to be connected by means of external equipment, and the connection efficiency of the test terminal and the tested terminal is improved. In addition, the program test is carried out through the verification connector and the auxiliary verification connector without calling external network data, so that the data processing amount is reduced, the time consumption of the program test is greatly shortened, and the efficiency of the program test can be improved.
Drawings
Fig. 1 is a schematic structural diagram of a program testing system according to an embodiment of the present application;
fig. 2 is a flowchart illustrating a process of a program testing method at a testing terminal according to an embodiment of the present application;
fig. 3 is a flowchart illustrating a program testing method at a tested terminal according to an embodiment of the present application;
FIG. 4 is a process flow diagram of a process testing method applied to a card game according to an embodiment of the present application;
FIG. 5 is a schematic structural diagram of a test terminal according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a terminal under test according to an embodiment of the present application;
fig. 7 is a block diagram of a computing device according to an embodiment of the present application.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application. This application is capable of implementation in many different ways than those herein set forth and of similar import by those skilled in the art without departing from the spirit of this application and is therefore not limited to the specific implementations disclosed below.
The terminology used in the one or more embodiments of the present application is for the purpose of describing particular embodiments only and is not intended to be limiting of the one or more embodiments of the present application. As used in one or more embodiments of the present application and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present application refers to and encompasses any and all possible combinations of one or more of the associated listed items.
It will be understood that, although the terms first, second, etc. may be used herein in one or more embodiments of the present application to describe various information, these information should not be limited by these terms. These terms are only used to distinguish one type of information from another. For example, a first aspect may be termed a second aspect, and, similarly, a second aspect may be termed a first aspect, without departing from the scope of one or more embodiments of the present application. The word "if" as used herein may be interpreted as "at … …" or "when … …" or "in response to a determination", depending on the context.
In the present application, a program test system and method are provided. The present application also relates to a test terminal, a terminal under test, a computing device, and a computer-readable storage medium, which are described in detail in the following embodiments one by one.
Fig. 1 is a schematic structural diagram illustrating a program testing system according to an embodiment of the present application, where the system includes:
a test terminal 102 configured with a verification connector and a terminal under test 104 configured with a secondary verification connector;
the test terminal 102 is configured to receive an operation instruction for a target program, operate the target program according to the operation instruction, establish connection with an auxiliary verification connector in the terminal 104 to be tested through the verification connector and send the login request to the terminal 104 to be tested when the login request of the target program is received;
the tested terminal 104 is configured to analyze the received login request, determine a corresponding login manner according to an analysis result, obtain a login verification result corresponding to the login manner, and feed back the login verification result to the testing terminal 102 through the auxiliary verification connector;
the test terminal 102 is further configured to log in the target program to test the target program if the received login verification result is successful, and send the login request to the terminal 104 under test again if the received login verification result is failed.
Specifically, the verification connector is a functional module of the test terminal 102, and is used for connecting with the terminal 104 to be tested; the test terminal 102 refers to a terminal for performing a program test, such as a computer; the auxiliary verification connector is a functional module of the terminal under test 104, is used for connecting with the test terminal 102, and can be embedded in the source code of the target program through Unity 3D; the test terminal 102 refers to a terminal that passively performs a program test, such as a mobile phone. The target program refers to a program that needs to be tested, and may be a video application program, or may be another application program, which is not limited in this application, and it should be noted that the target program is a specific client in the tested terminal 104, and the target program is a code project, i.e., a code, used for developing and debugging the program in the testing terminal 102; the login request refers to a request for user authentication or account login before entering a program, namely a process of displaying a login interface; the analysis is a process of decomposing and analyzing the login request or the login verification result; the analysis result is a result obtained after the login request or the login verification result is analyzed; the login mode can be login by inputting an account number and a password, or login by third-party software, or code scanning login; the login verification result is a result of performing target program login on the terminal 104 to be tested.
In practical application, when a tester opens and runs a target program at the test terminal 102, that is, opens and runs a code project corresponding to the target program, the test terminal 102 receives an operation instruction for the target program. Then, the test terminal 102 responds to the operation instruction, runs the code engineering of the target program through the Unity3D, enters a login interface of the target program after initialization is completed, that is, the test terminal 102 receives a login request of the target program, at this time, the test terminal 102 establishes connection with an auxiliary verification connector in the terminal 104 to be tested through a verification connector, and on the basis, the test terminal 102 forwards the login request to the terminal 104 to be tested through the verification connector.
For example, a tester needs to test a program a, and a client corresponding to a mobile phone end of the program a does not have a client corresponding to a PC end. When a tester tests a program a through a code project of the program a in a PC (test terminal), the code project of the program a at the PC is started first, and the code project of the program a is run through Unity3D, that is, the PC receives an operation instruction for the program a and runs a target program a in response to the operation instruction of the program a. In the operation process, a login interface of the program A appears, namely, the PC end receives a login request of the program A, a forwarding request function of the program A is triggered, the auxiliary verification connector is started, at the moment, the connection is established between the verification connector of the PC end and the auxiliary verification connector of the mobile phone end (the terminal to be tested), and the login request of the program A is sent to the mobile phone end.
On the basis that the test terminal 102 sends the login request to the tested terminal 104, the tested terminal 104 receives the login request through the auxiliary verification connector, that is, a login interface is displayed on the tested terminal 104, a user selects a corresponding login mode on the login interface, that is, the tested terminal 104 analyzes the login request to obtain the corresponding login mode, the user automatically logs in after selecting the login mode, and then the tested terminal 104 receives a result of verifying the login information, that is, a login verification result, and feeds the verification result back to the test terminal 102.
According to the above example, the mobile phone end receives the login request of the program A, namely, the login interface of the program A is displayed, the user selects the third-party software to log in on the login interface of the program A, at the moment, the third-party software jumps to the third-party software and is subjected to login verification by the server of the third-party software, then the login verification result is returned to the mobile phone end, and the mobile phone end sends the login verification result to the PC end through the auxiliary verification connector.
Further, after receiving the login verification result fed back by the tested terminal 104, the testing terminal 102 determines whether the login verification result is successful, and if the login verification result is successful, the testing terminal 102 logs in the target program at this time, and can start to test the target program; if the target program fails, the login request needs to be sent to the tested terminal 104 again for the purpose of testing the target program, so as to try to login the target program again.
In the above example, after receiving the login verification result sent by the mobile phone, the PC analyzes the login verification result, and determines that the analysis result is successful, and after the PC logs in the program a, the PC can test the program a, and determines that the analysis result is failed, and the PC sends the login request to the mobile phone again.
In the application, the test terminal runs the target program by responding to the running instruction, and when logging in, the test terminal establishes connection with the auxiliary verification connector in the tested terminal through the verification connector, so that the login request is sent to the tested terminal, the tested terminal obtains the login verification result according to the login request, and feeds back the login verification result through the auxiliary verification connector, so that the test terminal can analyze the login verification result, and the target program is logged in under the condition that the analysis result is successful, and the test is started. Therefore, the test terminal and the tested terminal are not required to be connected by means of external equipment, and the connection efficiency of the test terminal and the tested terminal is improved. In addition, the program test is carried out through the verification connector and the auxiliary verification connector without calling external network data, so that the data processing amount is reduced, the time consumption of the program test is greatly shortened, and the efficiency of the program test can be improved.
The test terminal 102 establishes a connection with the auxiliary verification connector in the terminal under test 104 through the verification connector, which may be as follows:
the test terminal 102 is further configured to generate a connection request for connecting the terminal under test 104, and send the connection request to the terminal under test 104 through the verification connector;
the tested terminal 104 is further configured to receive the connection request through the auxiliary verification connector and feed back connection approval information to the testing terminal 102;
the test terminal 102 is further configured to send the login request to the terminal under test 104 according to the received connection approval information.
Specifically, the connection request refers to a request sent by the test terminal 102 for establishing a connection with the terminal under test 104; the connection agreement information refers to information generated by the tested terminal 104 and used for feeding back that the testing terminal 102 can establish connection.
In practical application, the test terminal 102 establishes a connection with the auxiliary verification connector in the terminal under test through the verification connector, and first, the test terminal 102 needs to generate a connection request based on a connection requirement and send the connection request to the auxiliary verification connector through the verification connector, that is, to the terminal under test 104; then the tested terminal 104 receives the connection request, verifies and checks the connection request, generates connection agreement information and sends the connection agreement information to the testing terminal 104 under the condition of meeting a certain condition; after the test terminal 104 receives the connection approval information through the verification connector, that is, the test terminal 102 and the device under test 104 are successfully connected at this time, on the basis of which the test terminal 102 sends a login request to the terminal under test 104.
For example, the terminal T1 (test terminal) needs to connect with the terminal T2 (terminal under test), and at this time, the terminal T1 first sends a handshake packet, i.e., a connection request, to the terminal T2 through the verification connector; the terminal T2 receives the connection request through the auxiliary authentication connector, then detects whether the connection requirement or the connection condition is satisfied, and if so, generates connection approval information to be fed back to the terminal T1, that is, the terminal T1 and the terminal T2 are successfully connected. At this time, the terminal T1 can transmit a login request to the terminal T2.
In the application, the test terminal sends the connection request to the auxiliary verification connector through the verification connector, when connection agreement information is received, the test terminal and the tested terminal are successfully connected, the connection reliability is guaranteed to a certain extent, in addition, the test terminal and the tested terminal are connected through the verification connector and the auxiliary verification connector, simplicity and feasibility are achieved, and the efficiency of program testing is improved to a certain extent when the connection is reduced.
Before the test terminal 102 generates the connection request, the terminal 104 to be connected needs to be specified, so as to avoid the failure of the program test caused by the connection to the wrong terminal; the terminal 104 under test also needs to verify the connection request, which is as follows:
the test terminal 102 is further configured to determine a terminal under test 104 according to preset address information, generate a connection request according to the address information, and send the connection request to the terminal under test 104 through the verification connector;
the tested terminal 104 is further configured to receive the connection request through the auxiliary verification connector, determine whether address information carried in the connection request is consistent with local address information, feed back connection approval information to the test terminal 102 if the address information carried in the connection request is consistent with the local address information, and feed back connection rejection information to the test terminal 102 if the address information carried in the connection request is not consistent with the local address information.
Specifically, the address information refers to an internet protocol address, such as an IP address, and a logical address is allocated to each network and each host on the internet, so as to mask the difference of physical addresses; the connection rejection information is information generated by the terminal under test 104 and used for feeding back the connection establishment failure of the test terminal 102.
In practical application, a tester can preset address information representing the tested device 104 at the test terminal 102, and the test terminal 102 generates a connection request according to the preset address information and then sends the connection request to the tested device 104; after receiving the connection request, the device under test 104 extracts address information contained in the connection request, compares the address information with local address information, and if the address information is consistent with the local address information, indicates that the test terminal 102 is to be connected with the device under test 104, and then feeds back connection approval information to the test terminal 102, wherein the connection is successful at this time; if the connection request is inconsistent with the connection request, the test terminal 102 sends the connection request incorrectly, and the test terminal 102 feeds back connection rejection information to represent connection failure.
For example, there are 3 terminals: a first terminal, a second terminal and a third terminal; the terminal generates a connection request according to preset address information (address information of the third terminal): after the first terminal sends the connection request to the second terminal, the second terminal compares the address information in the connection request with the address information of the second terminal, finds inconsistency and feeds back the inconsistency to the first terminal to reject the connection information; after the first terminal sends the connection request to the third terminal, the third terminal compares the address information in the connection request with the address information of the third terminal, finds the address information is consistent, and feeds back the address information to the third terminal to obtain the same intended connection information.
According to the method and the device, the connection state can be quickly determined by comparing the address information in the connection request with the address information of the tested device, if the connection is successful, preparation is made for subsequent program login and test, and meanwhile, the test speed is improved; if the connection fails, the test terminal can find errors early to correct the errors by feeding back the connection rejection information.
When the test terminal 102 establishes a connection with the terminal 104 to be tested, on one hand, whether address information is correct or not needs to be considered, and on the other hand, network conditions need to be considered, which is specifically as follows:
the test terminal 102 is further configured to detect a current network speed, send the connection request to the terminal 104 through the verification connector when the current network speed is greater than a network speed threshold, and suspend sending the connection request when the current network speed is less than or equal to the network speed threshold;
the terminal 104 under test is further configured to receive the connection request through the auxiliary verification connector, detect a current network speed, feed back connection approval information to the test terminal 102 when the current network speed is greater than a network speed threshold, and feed back network anomaly information to the test terminal 102 when the current network speed is less than or equal to the network speed threshold.
Specifically, the network speed is referred to as network speed for short, and the higher the network speed is, the faster the data transmission speed is. In order to ensure the reliability and timeliness of the connection, the test terminal 102 detects the current network speed before sending the connection request, if the current network speed is greater than the network speed threshold, it indicates that the network state is good, and the requirement of establishing the connection is met, at this time, the test terminal 102 sends the connection request to the tested terminal 104, and if the current network speed is less than or equal to the network speed threshold, it indicates that the network state is not good, and effective connection cannot be performed. After receiving the connection request, the terminal 104 to be tested also needs to detect the network speed, and when the current network speed is greater than the network speed threshold, the connection approval information is fed back to the test terminal 102, and when the current network speed is less than or equal to the network speed threshold, the network exception is fed back to the test terminal 102.
For example, the terminal T1 (test terminal) detects the current network speed before sending the connection request, i.e. obtains the current network speed as 2Mbit/s, and since the network speed is greater than the preset network speed threshold value 1Mbit/s, the terminal T1 sends the connection request to the terminal T2 through the verification connector. At this time, the terminal T2 receives the connection request through the auxiliary verification connector, and before feeding back the connection approval information, it is also necessary to detect the network speed, and when it is detected that the current network speed is 0.5Mbit/s, the terminal T2 feeds back the network abnormality information to the terminal T1.
According to the method and the device, the connection is established only when the network speed reaches a certain value through detection of the network speed, the validity of the connection is guaranteed, and therefore guarantee is provided for subsequent data transmission.
In the process of establishing a connection, that is, after the test terminal 102 sends a connection request, it may happen that the test terminal does not receive information fed back by the terminal under test, at this time, the test terminal 102 may try to send the connection request again, that is, the test terminal 102 is further configured to send the connection request to the terminal under test 104 through the verification connector again in the case that the connection approval information is not received within a preset time.
The preset time refers to a preset time duration or time interval, such as 1 second, 5 seconds, 10 seconds. In practical applications, after the test terminal 102 sends the connection request to the terminal 104 to be tested (the address information of the terminal 104 to be tested is consistent with the address information carried in the connection request), if the connection approval information fed back by the terminal 104 to be tested is not received within a preset time, it indicates that the connection fails or the connection is overtime, and in order to ensure normal performance of the subsequent program test, the test terminal 102 needs to try connection with the terminal 104 again, that is, the connection request is sent to the terminal 104 to be tested through the verification connector again. In this way, the test terminal 102 is prevented from being in a waiting state for a long time, and the process of establishing connection is simplified to some extent, thereby improving the efficiency of program test.
After obtaining the login verification result, the terminal under test 104 needs to obtain login information, and sends the login information to the test terminal 102, that is, the terminal under test 104 is further configured to receive the login information, and send the login information and the login verification result to the test terminal 102 through the auxiliary verification connector, where the login information at least includes the name of the target server.
Specifically, the login information is additional information that needs to be selected when the program is logged in, and is, for example, a server or an area to be logged in. In practical applications, after obtaining the login verification result, the terminal 104 under test needs to further obtain login information, where the login information includes the name of the target server that needs to be logged in, and the terminal under test sends the login verification result and the obtained login information to the test terminal 102. Therefore, the test terminal 102 can be effectively ensured to log in the target server when the target program is logged in, the login failure of the test terminal 102 is avoided, and the data processing speed of the test terminal 102 can be effectively improved.
For example, after receiving the login verification result, the mobile phone terminal (the terminal under test) determines the target server to be logged in, that is, obtains the name of the target server, and then sends the name of the target server and the login verification result to the PC terminal (the test device).
It should be noted that the test terminal 102 may also fail to verify the login result, and at this time, the login needs to be performed again, that is, the test terminal 102 is further configured to resend the login request to the terminal under test 104 when the received login verification result is a failure.
In practical applications, when the result of analyzing the login verification result is failure, it is indicated that the login is unsuccessful, or the login is in trouble, and so on, and in order to ensure normal program test, the login needs to be performed again, that is, the login request needs to be sent to the terminal 104 to be tested again to perform the login again.
The application provides a program test system, test terminal response operation instruction operation object program, when logging in through verify the connector with supplementary verification connector in the terminal under test establishes the connection to with login request transmission to the terminal under test, the terminal under test acquires login verification result according to login request, and through supplementary verification connector feedback login verification result, so that test terminal analyzes the login verification result, login object program under the condition that the analysis result is successful, begin the test. Therefore, the test terminal and the tested terminal are not required to be connected by means of external equipment, and the connection efficiency of the test terminal and the tested terminal is improved. In addition, the program test is carried out through the verification connector and the auxiliary verification connector without calling external network data, so that the data processing amount is reduced, the time consumption of the program test is greatly shortened, and the efficiency of the program test can be improved.
Fig. 2 is a flowchart of a program testing method according to an embodiment of the present application, applied to a test terminal configured with a verification connector, as shown in fig. 2, specifically including the following steps:
step 202: receiving an operation instruction aiming at a target program, and operating the target program according to the operation instruction.
Step 204: and under the condition of receiving the login request of the target program, establishing connection with an auxiliary verification connector in the tested terminal through the verification connector, and sending the login request to the tested terminal.
In an optional implementation manner of this embodiment, the establishing a connection between the verification connector and an auxiliary verification connector in the terminal to be tested, and the sending the login request to the terminal to be tested specifically includes:
generating a connection request for connecting the tested terminal, and sending the connection request to the tested terminal through the verification connector;
and receiving connection agreement information fed back by the tested terminal, and sending the login request to the tested terminal according to the connection agreement information.
In an optional implementation manner of this embodiment, the specific implementation process of generating the connection request for connecting the terminal under test and sending the connection request to the terminal under test through the verification connector includes:
determining a tested terminal according to preset address information, generating a connection request according to the address information, and sending the connection request to the tested terminal through the verification connector.
In an optional implementation manner of this embodiment, the specific implementation process of sending the connection request to the terminal under test through the verification connector includes:
and detecting the current network speed, and when the current network speed is greater than the network speed threshold value, sending the connection request to the tested terminal through the verification connector.
Step 206: and receiving a login verification result fed back by the tested terminal, and logging in the target program to test the target program under the condition that the login verification result is successful.
It should be noted that, when the received login authentication result is a failure, the login request is retransmitted to the terminal under test.
In order to avoid the invalid waiting time, whether the test terminal receives connection agreement information needs to be monitored, that is, the connection request is sent to the tested terminal through the verification connector again under the condition that the connection agreement information is not received within the preset time.
The program testing method is applied to a testing terminal, a target program is operated through a response operation instruction, connection is established between a verification connector and an auxiliary verification connector in the tested terminal when login is carried out, a login request is sent to the tested terminal, a received login verification result is analyzed, the target program is logged in under the condition that the analysis result is successful, and testing is started. Therefore, the connection between the test terminal and the tested terminal can be realized quickly without the help of external equipment, and the connection efficiency between the test terminal and the tested terminal is improved. In addition, the program test is carried out through the verification connector and the auxiliary verification connector without calling external network data, so that the data processing amount is reduced, the time consumption of the program test is greatly shortened, and the efficiency of the program test can be improved.
The above is an illustrative scheme of a program test method applied to a test terminal configured with a verification connector of the present embodiment. It should be noted that the technical solution of the program testing method and the technical solution of the program testing system belong to the same concept, and details that are not described in detail in the technical solution of the program testing method can be referred to the description of the technical solution of the program testing system.
Fig. 3 is a flowchart of a program testing method according to an embodiment of the present application, applied to a terminal under test configured with an auxiliary verification connector, and as shown in fig. 3, the method specifically includes the following steps:
step 302: and receiving a login request sent by the test terminal, and analyzing the login request.
Before receiving the login request, the test terminal needs to receive a connection request through the auxiliary verification connector and feed back connection approval information to the test terminal.
In an optional implementation manner of this embodiment, the specific implementation process of receiving, by the auxiliary verification connector, the connection request and feeding back the connection approval information to the test terminal includes:
receiving the connection request through the auxiliary verification connector, and judging whether address information carried by the connection request is consistent with local address information;
if yes, feeding back connection approval information to the test terminal, and if not, feeding back connection refusal information to the test terminal.
In an optional implementation manner of this embodiment, a specific implementation process of feeding back the consent connection information to the test terminal is as follows:
and detecting the current network speed, and feeding back connection agreement information to the test terminal when the current network speed is greater than a network speed threshold value.
Step 304: and determining a corresponding login mode according to the analysis result, and acquiring a login verification result corresponding to the login mode.
Step 306: and feeding back the login verification result to the test terminal through the auxiliary verification connector.
In order to enable the test terminal to log in to the target server, the test terminal further needs to receive login information, and send the login information and the login verification result to the test terminal through the auxiliary verification connector, wherein the login information at least comprises the name of the target server.
The program testing system is applied to a tested terminal, and is connected with a verification connector in the testing terminal through an auxiliary verification connector, so that a login request sent by the tested terminal is received, a login verification result is obtained according to the login request, and the login verification result is fed back through the auxiliary verification connector, so that the testing terminal can conveniently log in a target program and test the target program. Therefore, the test terminal and the tested terminal are not required to be connected by means of external equipment, and the connection efficiency of the test terminal and the tested terminal is improved. In addition, the program test is carried out through the verification connector and the auxiliary verification connector without calling external network data, so that the data processing amount is reduced, the time consumption of the program test is greatly shortened, and the efficiency of the program test can be improved.
The above is an illustrative scheme of a program test method applied to a terminal under test configured with a secondary verification connector according to the present embodiment. It should be noted that the technical solution of the program testing method and the technical solution of the program testing system belong to the same concept, and details that are not described in detail in the technical solution of the program testing method can be referred to the description of the technical solution of the program testing system.
The following description will further describe the application of the program testing method provided in the present application to a card game by taking the application as an example with reference to fig. 4. Fig. 4 shows a processing flow chart of a program testing method applied to a card game according to an embodiment of the present application, which specifically includes the following steps:
step 402: the PC receives a running instruction for the target card game.
The PC end is a test terminal, and the PC end target card game is a game project of the target card game, namely a code.
Step 404: and the PC terminal operates the target card game according to the operation instruction.
Step 406: and the PC receives a login request of the target card game.
Step 408: and the PC terminal generates a connection request for connecting the mobile phone terminal.
Step 410: and the PC terminal sends the connection request to the mobile phone terminal through the verification connector.
The mobile phone end is a tested terminal.
Step 412: and the mobile phone end feeds back connection agreement information to the PC end.
Step 414: and the PC end sends the login request to the mobile phone end.
Step 416: and the mobile phone terminal analyzes the login request and determines a corresponding login mode according to an analysis result.
Step 418: and the mobile phone end acquires a login verification result and login information corresponding to the login mode.
Step 420: and the mobile phone end sends the login verification result and the login information to the PC end.
Step 422: and the PC terminal judges whether the login verification result is successful.
If yes, go to step 424; if not, go to step 414.
Step 424: and the PC terminal logs in the target card game to test the target game.
The application provides a be applied to program test system of card game, PC end response operation instruction operation target card game, pass through the verification connector when logging in with the supplementary verification connector of cell-phone end establishes the connection to with login request transmission to the cell-phone end, the cell-phone end obtains login verification result according to login request, and feedback login verification result through supplementary verification connector, so that PC end carries out the analysis to login verification result, login target card game under the condition that analysis result is successful, begin the test. Therefore, the PC end and the mobile phone end do not need to be connected by means of external equipment, and the connection efficiency of the PC end and the mobile phone end is improved. In addition, the program test is carried out through the verification connector and the auxiliary verification connector without calling external network data, so that the data processing amount is reduced, the time consumption of the program test is greatly shortened, and the efficiency of the program test can be improved.
Corresponding to the above method embodiment, the present application further provides a test terminal embodiment, and fig. 5 shows a schematic structural diagram of a test terminal provided in an embodiment of the present application. As shown in fig. 5, the test terminal includes:
a receiving module 502 configured to receive an operation instruction for a target program, and operate the target program according to the operation instruction;
a connection module 504, configured to, in a case where a login request of the target program is received, establish a connection with an auxiliary authentication connector in a terminal to be tested through the authentication connector, and send the login request to the terminal to be tested;
and the login module 506 is configured to receive a login verification result fed back by the terminal to be tested, and login the target program to test the target program if the login verification result is successful.
In an optional implementation manner of this embodiment, the connection module 504 is further configured to:
generating a connection request for connecting the tested terminal, and sending the connection request to the tested terminal through the verification connector;
and receiving connection agreement information fed back by the tested terminal, and sending the login request to the tested terminal according to the connection agreement information.
In an optional implementation manner of this embodiment, the connection module 504 is further configured to:
determining a tested terminal according to preset address information, generating a connection request according to the address information, and sending the connection request to the tested terminal through the verification connector.
In an optional implementation manner of this embodiment, the connection module 504 is further configured to:
and detecting the current network speed, and when the current network speed is greater than the network speed threshold value, sending the connection request to the tested terminal through the verification connector.
In an optional implementation manner of this embodiment, the test terminal further includes a monitoring module configured to:
and under the condition that the connection approval information is not received within the preset time, the connection request is sent to the tested terminal through the verification connector again.
In an optional implementation manner of this embodiment, the login module 506 is further configured to:
and under the condition that the received login verification result is failure, the login request is retransmitted to the tested terminal.
According to the test terminal, the target program is operated through the response operation instruction, connection is established through the verification connector and the auxiliary verification connector in the tested terminal when login is conducted, so that the login request is sent to the tested terminal, the received login verification result is analyzed, the target program is logged under the condition that the analysis result is successful, and testing is started. Therefore, the connection between the test terminal and the tested terminal can be realized quickly without the help of external equipment, and the connection efficiency between the test terminal and the tested terminal is improved. In addition, the program test is carried out through the verification connector and the auxiliary verification connector without calling external network data, so that the data processing amount is reduced, the time consumption of the program test is greatly shortened, and the efficiency of the program test can be improved.
The above is a schematic scheme of a test terminal of the present embodiment. It should be noted that the technical solution of the test terminal belongs to the same concept as the technical solution of the program test system, and details that are not described in detail in the technical solution of the test terminal can be referred to the description of the technical solution of the program test system.
Corresponding to the above method embodiment, the present application further provides an embodiment of a terminal to be tested, and fig. 6 shows a schematic structural diagram of a terminal to be tested provided in an embodiment of the present application. As shown in fig. 6, the terminal under test includes:
the analysis module 602 is configured to receive a login request sent by a test terminal, and analyze the login request;
an obtaining module 604, configured to determine a corresponding login manner according to the analysis result, and obtain a login verification result corresponding to the login manner;
a sending module 606 configured to feed back the login authentication result to the test terminal through the auxiliary authentication connector.
In an optional implementation manner of this embodiment, the terminal to be tested further includes a feedback module configured to:
and receiving a connection request through the auxiliary verification connector, and feeding back connection approval information to the test terminal.
In an optional implementation manner of this embodiment, the feedback module is further configured to:
receiving the connection request through the auxiliary verification connector, and judging whether address information carried by the connection request is consistent with local address information;
if yes, feeding back connection approval information to the test terminal, and if not, feeding back connection refusal information to the test terminal.
In an optional implementation manner of this embodiment, the feedback module is further configured to:
and detecting the current network speed, and feeding back connection agreement information to the test terminal when the current network speed is greater than a network speed threshold value.
In an optional implementation manner of this embodiment, the sending module 606 is further configured to:
and receiving login information, and sending the login information and the login verification result to the test terminal through the auxiliary verification connector, wherein the login information at least comprises the name of the target server.
According to the tested terminal, the connection with the verification connector in the testing terminal is established through the auxiliary verification connector, so that a login request sent by the tested terminal is received, a login verification result is obtained according to the login request, and the login verification result is fed back through the auxiliary verification connector, so that the testing terminal can conveniently log in a target program and test. Therefore, the test terminal and the tested terminal are not required to be connected by means of external equipment, and the connection efficiency of the test terminal and the tested terminal is improved. In addition, the program test is carried out through the verification connector and the auxiliary verification connector without calling external network data, so that the data processing amount is reduced, the time consumption of the program test is greatly shortened, and the efficiency of the program test can be improved.
The above is a schematic scheme of the terminal under test according to this embodiment. It should be noted that the technical solution of the terminal under test and the technical solution of the program test system described above belong to the same concept, and details that are not described in detail in the technical solution of the terminal under test can be referred to the description of the technical solution of the program test system described above.
FIG. 7 illustrates a block diagram of a computing device 700 provided in accordance with one embodiment of the present description. The components of the computing device 700 include, but are not limited to, memory 710 and a processor 720. Processor 720 is coupled to memory 710 via bus 730, and database 750 is used to store data.
Computing device 700 also includes access device 740, access device 740 enabling computing device 700 to communicate via one or more networks 760. Examples of such networks include the Public Switched Telephone Network (PSTN), a Local Area Network (LAN), a Wide Area Network (WAN), a Personal Area Network (PAN), or a combination of communication networks such as the internet. Access device 740 may include one or more of any type of network interface, e.g., a Network Interface Card (NIC), wired or wireless, such as an IEEE802.11 Wireless Local Area Network (WLAN) wireless interface, a worldwide interoperability for microwave access (Wi-MAX) interface, an ethernet interface, a Universal Serial Bus (USB) interface, a cellular network interface, a bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the present description, the above-described components of computing device 700, as well as other components not shown in FIG. 7, may also be connected to each other, such as by a bus. It should be understood that the block diagram of the computing device architecture shown in FIG. 7 is for purposes of example only and is not limiting as to the scope of the present description. Those skilled in the art may add or replace other components as desired.
Computing device 700 may be any type of stationary or mobile computing device, including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), mobile phone (e.g., smartphone), wearable computing device (e.g., smartwatch, smartglasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 700 may also be a mobile or stationary server.
Wherein, the steps of the program testing method are implemented when the computer instructions are executed by the processor 720.
The above is an illustrative scheme of a computing device of the present embodiment. It should be noted that the technical solution of the computing device and the technical solution of the program testing method belong to the same concept, and details that are not described in detail in the technical solution of the computing device can be referred to the description of the technical solution of the program testing method.
An embodiment of the present application further provides a computer readable storage medium, which stores computer instructions, and the computer instructions, when executed by a processor, implement the steps of the program testing method as described above.
The above is an illustrative scheme of a computer-readable storage medium of the present embodiment. It should be noted that the technical solution of the storage medium belongs to the same concept as the technical solution of the program testing method described above, and details that are not described in detail in the technical solution of the storage medium can be referred to the description of the technical solution of the program testing method described above.
The foregoing description of specific embodiments of the present application has been presented. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims may be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing may also be possible or may be advantageous.
The computer instructions comprise computer program code which may be in the form of source code, object code, an executable file or some intermediate form, or the like. The computer-readable medium may include: any entity or device capable of carrying the computer program code, recording medium, usb disk, removable hard disk, magnetic disk, optical disk, computer Memory, Read-Only Memory (ROM), Random Access Memory (RAM), electrical carrier wave signals, telecommunications signals, software distribution medium, and the like. It should be noted that the computer readable medium may contain content that is subject to appropriate increase or decrease as required by legislation and patent practice in jurisdictions, for example, in some jurisdictions, computer readable media does not include electrical carrier signals and telecommunications signals as is required by legislation and patent practice.
It should be noted that, for the sake of simplicity, the above-mentioned method embodiments are described as a series of acts or combinations, but those skilled in the art should understand that the present application is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present application. Further, those skilled in the art should also appreciate that the embodiments described in the specification are preferred embodiments and that the acts and modules referred to are not necessarily required in this application.
In the above embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
The preferred embodiments of the present application disclosed above are intended only to aid in the explanation of the application. Alternative embodiments are not exhaustive and do not limit the invention to the precise embodiments described. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the application and its practical applications, to thereby enable others skilled in the art to best understand and utilize the application. The application is limited only by the claims and their full scope and equivalents.

Claims (15)

1. A program testing method is applied to a test terminal configured with a verification connector, and comprises the following steps:
receiving an operation instruction aiming at a target program, and operating the target program according to the operation instruction;
under the condition of receiving a login request of the target program, establishing connection with an auxiliary verification connector in a tested terminal through the verification connector, and sending the login request to the tested terminal;
and receiving a login verification result fed back by the tested terminal, and logging in the target program to test the target program under the condition that the login verification result is successful.
2. The method according to claim 1, wherein the establishing the connection with the auxiliary authentication connector in the terminal under test through the authentication connector, and the sending the login request to the terminal under test comprises:
generating a connection request for connecting the tested terminal, and sending the connection request to the tested terminal through the verification connector;
and receiving connection agreement information fed back by the tested terminal, and sending the login request to the tested terminal according to the connection agreement information.
3. The method according to claim 2, wherein the generating a connection request for connecting the terminal under test, the sending the connection request to the terminal under test through the verification connector, comprises:
determining a tested terminal according to preset address information, generating a connection request according to the address information, and sending the connection request to the tested terminal through the verification connector.
4. The method of claim 3, wherein sending the connection request to the terminal under test via the verification connector comprises:
and detecting the current network speed, and when the current network speed is greater than the network speed threshold value, sending the connection request to the tested terminal through the verification connector.
5. The method of claim 2, further comprising:
and under the condition that the connection approval information is not received within the preset time, the connection request is sent to the tested terminal through the verification connector again.
6. The method of claim 1, further comprising:
and under the condition that the received login verification result is failure, the login request is retransmitted to the tested terminal.
7. A program testing method is applied to a tested terminal configured with an auxiliary verification connector, and comprises the following steps:
receiving a login request sent by a test terminal, and analyzing the login request;
determining a corresponding login mode according to the analysis result, and acquiring a login verification result corresponding to the login mode;
and feeding back the login verification result to the test terminal through the auxiliary verification connector.
8. The method of claim 7, further comprising:
and receiving a connection request through the auxiliary verification connector, and feeding back connection approval information to the test terminal.
9. The method of claim 8, wherein receiving a connection request through the secondary verification connector and feeding back approval connection information to the test terminal comprises:
receiving the connection request through the auxiliary verification connector, and judging whether address information carried by the connection request is consistent with local address information;
if yes, feeding back connection approval information to the test terminal, and if not, feeding back connection refusal information to the test terminal.
10. The method of claim 7, further comprising:
and receiving login information, and sending the login information and the login verification result to the test terminal through the auxiliary verification connector, wherein the login information at least comprises the name of the target server.
11. A program test system, comprising:
the system comprises a test terminal configured with a verification connector and a tested terminal configured with an auxiliary verification connector;
the test terminal is configured to receive an operation instruction for a target program, operate the target program according to the operation instruction, establish connection with an auxiliary verification connector in the terminal to be tested through the verification connector under the condition of receiving a login request of the target program, and send the login request to the terminal to be tested;
the tested terminal is configured to analyze the received login request, determine a corresponding login mode according to an analysis result, obtain a login verification result corresponding to the login mode, and feed the login verification result back to the testing terminal through the auxiliary verification connector;
the test terminal is further configured to log in the target program to test the target program under the condition that the received login verification result is successful.
12. A test terminal, wherein the test terminal is configured with a verification connector, comprising:
the receiving module is configured to receive an operation instruction aiming at a target program, and the target program is operated according to the operation instruction;
the connection module is configured to establish connection with an auxiliary verification connector in a tested terminal through the verification connector and send the login request to the tested terminal under the condition of receiving the login request of the target program;
and the login module is configured to receive a login verification result fed back by the tested terminal, and log in the target program to test the target program under the condition that the login verification result is successful.
13. A terminal under test configured with a secondary verification connector, comprising:
the analysis module is configured to receive a login request sent by the test terminal and analyze the login request;
the acquisition module is configured to determine a corresponding login mode according to the analysis result and acquire a login verification result corresponding to the login mode;
the sending module is configured to feed back the login authentication result to the test terminal through the auxiliary authentication connector.
14. A computing device comprising a memory, a processor, and computer instructions stored on the memory and executable on the processor, wherein the processor implements the steps of the method of any one of claims 1-6 or 7-10 when executing the computer instructions.
15. A computer-readable storage medium storing computer instructions, which when executed by a processor, perform the steps of the method of any one of claims 1 to 6 or 7 to 10.
CN202110557373.9A 2021-05-21 2021-05-21 Program testing system and method Active CN113094290B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110557373.9A CN113094290B (en) 2021-05-21 2021-05-21 Program testing system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110557373.9A CN113094290B (en) 2021-05-21 2021-05-21 Program testing system and method

Publications (2)

Publication Number Publication Date
CN113094290A true CN113094290A (en) 2021-07-09
CN113094290B CN113094290B (en) 2024-02-23

Family

ID=76664528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110557373.9A Active CN113094290B (en) 2021-05-21 2021-05-21 Program testing system and method

Country Status (1)

Country Link
CN (1) CN113094290B (en)

Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009026020A (en) * 2007-07-19 2009-02-05 Hitachi Information Systems Ltd Load test system, load test data creation method, and program therefor
CN105320598A (en) * 2015-11-24 2016-02-10 广州华多网络科技有限公司 Software testing method and device
US20160269390A1 (en) * 2015-03-10 2016-09-15 Seiko Epson Corporation Display apparatus and control method for display apparatus
CN106547687A (en) * 2016-10-14 2017-03-29 深圳前海微众银行股份有限公司 Application testing method, apparatus and system
CN107678935A (en) * 2017-05-10 2018-02-09 平安科技(深圳)有限公司 Data creation method, terminal and computer-readable recording medium
CN108664395A (en) * 2018-04-26 2018-10-16 武汉斗鱼网络科技有限公司 Applied program testing method, device, equipment and storage medium
CN109886014A (en) * 2019-02-28 2019-06-14 上海龙旗科技股份有限公司 A kind of method and apparatus logging in testing tool
WO2019205288A1 (en) * 2018-04-24 2019-10-31 平安科技(深圳)有限公司 Connection establishment method, system, and device, and computer readable storage medium
CN110838953A (en) * 2019-11-01 2020-02-25 北京字节跳动网络技术有限公司 Test method, test system, electronic equipment and storage medium
CN110889096A (en) * 2019-11-21 2020-03-17 望海康信(北京)科技股份公司 Login method, login device, computer equipment and storage medium
CN111045942A (en) * 2019-12-12 2020-04-21 同盾控股有限公司 Application testing method, system, storage medium and electronic equipment
CN111651347A (en) * 2020-04-28 2020-09-11 中国平安财产保险股份有限公司 Jump verification method, device, equipment and storage medium of test system
CN112291271A (en) * 2020-12-22 2021-01-29 畅捷通信息技术股份有限公司 Method, system and medium for automatically logging in server by mobile equipment
US20210072971A1 (en) * 2019-09-06 2021-03-11 Samsung Electronics Co., Ltd. Method and apparatus for improving runtime performance after application update in electronic device
CN112579452A (en) * 2020-12-22 2021-03-30 平安银行股份有限公司 Software automation test method, device, equipment and storage medium

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009026020A (en) * 2007-07-19 2009-02-05 Hitachi Information Systems Ltd Load test system, load test data creation method, and program therefor
US20160269390A1 (en) * 2015-03-10 2016-09-15 Seiko Epson Corporation Display apparatus and control method for display apparatus
CN105320598A (en) * 2015-11-24 2016-02-10 广州华多网络科技有限公司 Software testing method and device
CN106547687A (en) * 2016-10-14 2017-03-29 深圳前海微众银行股份有限公司 Application testing method, apparatus and system
CN107678935A (en) * 2017-05-10 2018-02-09 平安科技(深圳)有限公司 Data creation method, terminal and computer-readable recording medium
WO2019205288A1 (en) * 2018-04-24 2019-10-31 平安科技(深圳)有限公司 Connection establishment method, system, and device, and computer readable storage medium
CN108664395A (en) * 2018-04-26 2018-10-16 武汉斗鱼网络科技有限公司 Applied program testing method, device, equipment and storage medium
CN109886014A (en) * 2019-02-28 2019-06-14 上海龙旗科技股份有限公司 A kind of method and apparatus logging in testing tool
US20210072971A1 (en) * 2019-09-06 2021-03-11 Samsung Electronics Co., Ltd. Method and apparatus for improving runtime performance after application update in electronic device
CN110838953A (en) * 2019-11-01 2020-02-25 北京字节跳动网络技术有限公司 Test method, test system, electronic equipment and storage medium
CN110889096A (en) * 2019-11-21 2020-03-17 望海康信(北京)科技股份公司 Login method, login device, computer equipment and storage medium
CN111045942A (en) * 2019-12-12 2020-04-21 同盾控股有限公司 Application testing method, system, storage medium and electronic equipment
CN111651347A (en) * 2020-04-28 2020-09-11 中国平安财产保险股份有限公司 Jump verification method, device, equipment and storage medium of test system
CN112291271A (en) * 2020-12-22 2021-01-29 畅捷通信息技术股份有限公司 Method, system and medium for automatically logging in server by mobile equipment
CN112579452A (en) * 2020-12-22 2021-03-30 平安银行股份有限公司 Software automation test method, device, equipment and storage medium

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
CHUAN YU: "On Effects of Mobility Management Signalling Based DoS Attacks Against LTE Terminals", 《2019 IEEE 38TH INTERNATIONAL PERFORMANCE COMPUTING AND COMMUNICATIONS CONFERENCE (IPCCC)》, pages 1 - 5 *
佚名: "APP应用测试方法以及测试思路", pages 1 - 4, Retrieved from the Internet <URL:《https://zhuanlam.zhihu.com/p/82857339》> *
佚名: "记一次多端用户登录测试的过程", pages 1 - 4, Retrieved from the Internet <URL:《 https://www.cnblogs.com/tengjiang/p/14388163.html》> *
欧洁: "基于QTP技术的自动化测试框架的研究及实现", 《中国优秀硕士学位论文全文数据库 (信息科技辑)》, pages 138 - 414 *
高娜: "Android系统下O2O闭环应用的实现", 《中国优秀硕士学位论文全文数据库 (信息科技辑)》, pages 138 - 501 *
黄学勤: "面向云服务的Android金融支付终端软件设计与实现", 《万方》, pages 1 - 67 *

Also Published As

Publication number Publication date
CN113094290B (en) 2024-02-23

Similar Documents

Publication Publication Date Title
US10153957B2 (en) Fault diagnosis method, device, and fault diagnosis system
CN110908909B (en) Automatic test method, device, storage medium and equipment
CN110719199B (en) Network automatic testing and fault positioning method and device
CN112291271B (en) Method, system and medium for automatically logging in server by mobile equipment
US20200007385A1 (en) Compromised network node detection system
CN109683997B (en) Method for accessing application program interface through sandbox, sandbox and sandbox equipment
CN109273045B (en) Storage device online detection method, device, equipment and readable storage medium
CN111327588A (en) Network access security detection method, system, terminal and readable storage medium
CN115242894A (en) Data processing method, data processing device, storage medium and computer equipment
CN113038499B (en) Terminal Wi-Fi compatibility testing method, device, system, equipment and medium
CN111130929B (en) Method and system for automatically testing WIFI throughput
CN115276844B (en) Communication module testing method and device, storage medium and electronic equipment
CN113094290A (en) Program test system and method
CN116684489A (en) Remote test method, system, device and storage medium
CN116166536A (en) Test method, test device, electronic equipment and storage medium
CN116260643A (en) Security testing method, device and equipment for web service of Internet of things
CN115168236A (en) Automatic testing method, electronic device and storage medium
CN113037526B (en) Security detection method, terminal, system and storage medium
CN111200512B (en) Network connection disaster recovery method, terminal equipment, storage medium and electronic equipment
CN111400057A (en) Method, device and medium for remotely controlling test process
CN111107089A (en) Method and device for protecting data transmission safety of Android system
CN115037664B (en) Network connection testing method and device, repeater and storage medium
CN117331754B (en) Abnormality problem reduction method, abnormality problem reduction system, electronic device, and computer storage medium
CN117675633B (en) Intelligent hardware equipment testing method and system
CN115426301B (en) Device detection method, device, equipment and storage medium based on self-generated message

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information

Address after: 519000 Room 102, 202, 302 and 402, No. 325, Qiandao Ring Road, Tangjiawan Town, high tech Zone, Zhuhai City, Guangdong Province, Room 102 and 202, No. 327 and Room 302, No. 329

Applicant after: Zhuhai Jinshan Digital Network Technology Co.,Ltd.

Address before: 519000 Room 102, 202, 302 and 402, No. 325, Qiandao Ring Road, Tangjiawan Town, high tech Zone, Zhuhai City, Guangdong Province, Room 102 and 202, No. 327 and Room 302, No. 329

Applicant before: ZHUHAI KINGSOFT ONLINE GAME TECHNOLOGY Co.,Ltd.

CB02 Change of applicant information
GR01 Patent grant
GR01 Patent grant