CN113094290B - Program testing system and method - Google Patents

Program testing system and method Download PDF

Info

Publication number
CN113094290B
CN113094290B CN202110557373.9A CN202110557373A CN113094290B CN 113094290 B CN113094290 B CN 113094290B CN 202110557373 A CN202110557373 A CN 202110557373A CN 113094290 B CN113094290 B CN 113094290B
Authority
CN
China
Prior art keywords
login
terminal
test
verification
request
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110557373.9A
Other languages
Chinese (zh)
Other versions
CN113094290A (en
Inventor
刘志标
成朝晖
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Zhuhai Kingsoft Digital Network Technology Co Ltd
Original Assignee
Zhuhai Kingsoft Digital Network Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zhuhai Kingsoft Digital Network Technology Co Ltd filed Critical Zhuhai Kingsoft Digital Network Technology Co Ltd
Priority to CN202110557373.9A priority Critical patent/CN113094290B/en
Publication of CN113094290A publication Critical patent/CN113094290A/en
Application granted granted Critical
Publication of CN113094290B publication Critical patent/CN113094290B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application provides a program testing system and a program testing method, wherein the program testing method comprises the following steps: the test terminal is applied to a test terminal, and the test terminal is provided with a verification connector; receiving an operation instruction aiming at a target program, and operating the target program according to the operation instruction; under the condition of receiving a login request of the target program, establishing connection with an auxiliary verification connector in a tested terminal through the verification connector, and sending the login request to the tested terminal; and receiving a login verification result fed back by the tested terminal, and logging in the target program to test the target program under the condition that the login verification result is successful. The connection efficiency of the test terminal and the tested terminal is improved. In addition, the program test is carried out through the verification connector and the auxiliary verification connector without calling external network data, so that the data processing amount is reduced, the time consumption of the program test is greatly shortened, and the efficiency of the program test can be improved.

Description

Program testing system and method
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a program testing system and method. The application also relates to a test terminal, a tested terminal, a computing device and a computer readable storage medium.
Background
With the rapid development of computer technology, various applications are layered endlessly, wherein mobile phone applications have become a mainstream mode of network applications at present. In the existing application programs, the PC-end application program and the mobile phone-end application program are separated, the PC-end application program cannot log in through a mobile phone, and the mobile phone application program cannot log in only through the PC end. Therefore, the mobile phone application program cannot be tested by logging in directly through the PC end.
In the prior art, in order to test or debug a mobile phone application program through a PC end login, a debugger is usually connected between the PC end and the mobile phone, so as to debug the mobile phone application program and login with the mobile phone. However, the above method: or the mobile phone application program has a forbidden debugger, so that the test can not be performed; or all databases of the external network must be called, and because the capacity of the external network databases is often huge, a great deal of time and flow are consumed for calling the databases, so that the debugging speed of the debugger is low and the efficiency is low. Therefore, an effective solution is needed to solve the above-mentioned problems.
Disclosure of Invention
In view of the foregoing, embodiments of the present application provide a program testing system and method. The application relates to a test terminal, a tested terminal, a computing device and a computer readable storage medium, so as to solve the problems of long time consumption and low efficiency in the prior art.
According to a first aspect of embodiments of the present application, there is provided a program testing method applied to a test terminal configured with a verification connector, including:
receiving an operation instruction aiming at a target program, and operating the target program according to the operation instruction;
under the condition of receiving a login request of the target program, establishing connection with an auxiliary verification connector in a tested terminal through the verification connector, and sending the login request to the tested terminal;
and receiving a login verification result fed back by the tested terminal, and logging in the target program to test the target program under the condition that the login verification result is successful.
According to a second aspect of the embodiments of the present application, there is provided a program testing method applied to a terminal under test configured with an auxiliary authentication connector, including:
receiving a login request sent by a test terminal, and analyzing the login request;
determining a corresponding login mode according to the analysis result, and acquiring a login verification result corresponding to the login mode;
and feeding back the login verification result to the test terminal through the auxiliary verification connector.
According to a third aspect of embodiments of the present application, there is provided a program testing system, comprising:
A test terminal configured with a verification connector and a tested terminal configured with an auxiliary verification connector;
the test terminal is configured to receive an operation instruction for a target program, operate the target program according to the operation instruction, establish connection with an auxiliary verification connector in the tested terminal through the verification connector under the condition of receiving a login request of the target program, and send the login request to the tested terminal;
the tested terminal is configured to analyze the received login request, determine a corresponding login mode according to the analysis result, acquire a login verification result corresponding to the login mode, and feed back the login verification result to the test terminal through the auxiliary verification connector;
and the test terminal is further configured to log in the target program to test the target program under the condition that the received login verification result is successful.
According to a fourth aspect of embodiments of the present application, there is provided a test terminal configured with a validation connector, comprising:
the device comprises a receiving module, a control module and a control module, wherein the receiving module is configured to receive an operation instruction aiming at a target program and operate the target program according to the operation instruction;
A connection module configured to establish connection with an auxiliary authentication connector in a terminal under test through the authentication connector and send a login request to the terminal under test when receiving the login request of the target program;
and the login module is configured to receive a login verification result fed back by the tested terminal, and login the target program to test the target program under the condition that the login verification result is successful.
According to a fifth aspect of embodiments of the present application, there is provided a terminal under test configured with an auxiliary authentication connector, including:
the analysis module is configured to analyze the login request when receiving the login request sent by the test terminal;
the acquisition module is configured to determine a corresponding login mode according to the analysis result and acquire a login verification result corresponding to the login mode;
and the sending module is configured to feed back the login verification result to the test terminal through the auxiliary verification connector.
According to a sixth aspect of embodiments of the present application, there is provided a computing device comprising a memory, a processor and computer instructions stored on the memory and executable on the processor, the processor implementing the steps of the program test method when executing the computer instructions.
According to a seventh aspect of embodiments of the present application, there is provided a computer readable storage medium storing computer instructions which, when executed by a processor, implement the steps of the program testing method.
According to the program test system, the test terminal runs the target program by responding to the running instruction, connection is established between the test terminal and the auxiliary verification connector in the tested terminal through the verification connector when logging in, so that a login request is sent to the tested terminal, the tested terminal obtains a login verification result according to the login request, and the login verification result is fed back through the auxiliary verification connector, so that the test terminal can analyze the login verification result conveniently, the target program is logged in under the condition that the analysis result is successful, and the test is started. Therefore, the test terminal and the tested terminal are not required to be connected by external equipment, and the connection efficiency of the test terminal and the tested terminal is improved. In addition, the program test is carried out through the verification connector and the auxiliary verification connector without calling external network data, so that the data processing amount is reduced, the time consumption of the program test is greatly shortened, and the efficiency of the program test can be improved.
Drawings
FIG. 1 is a schematic diagram of a program testing system according to an embodiment of the present application;
fig. 2 is a process flow diagram of a program testing method for testing a terminal side according to an embodiment of the present application;
fig. 3 is a process flow diagram of a program testing method of a tested terminal side according to an embodiment of the present application;
FIG. 4 is a process flow diagram of a program testing method for use with a card game according to one embodiment of the present application;
FIG. 5 is a schematic structural diagram of a test terminal according to an embodiment of the present application;
fig. 6 is a schematic structural diagram of a tested terminal according to an embodiment of the present application;
FIG. 7 is a block diagram of a computing device according to one embodiment of the present application.
Detailed Description
In the following description, numerous specific details are set forth in order to provide a thorough understanding of the present application. This application is, however, susceptible of embodiment in many other ways than those herein described and similar generalizations can be made by those skilled in the art without departing from the spirit of the application and the application is therefore not limited to the specific embodiments disclosed below.
The terminology used in one or more embodiments of the application is for the purpose of describing particular embodiments only and is not intended to be limiting of one or more embodiments of the application. As used in this application in one or more embodiments and the appended claims, the singular forms "a," "an," and "the" are intended to include the plural forms as well, unless the context clearly indicates otherwise. It should also be understood that the term "and/or" as used in one or more embodiments of the present application refers to and encompasses any or all possible combinations of one or more of the associated listed items.
It should be understood that, although the terms first, second, etc. may be used in one or more embodiments of the present application to describe various information, these information should not be limited to these terms. These terms are only used to distinguish one type of information from another. For example, a first may also be referred to as a second, and similarly, a second may also be referred to as a first, without departing from the scope of one or more embodiments of the present application. The word "if" as used herein may be interpreted as "at … …" or "at … …" or "responsive to a determination", depending on the context.
In the present application, a program testing system and method are provided. The present application relates to a test terminal, a tested terminal, a computing device, and a computer-readable storage medium, which are described in detail in the following embodiments.
Fig. 1 shows a schematic structural diagram of a program testing system according to an embodiment of the present application, where the system includes:
a test terminal 102 configured with a validation connector and a terminal under test 104 configured with an auxiliary validation connector;
the test terminal 102 is configured to receive an operation instruction for a target program, operate the target program according to the operation instruction, and, when receiving a login request of the target program, establish a connection with an auxiliary verification connector in the tested terminal 104 through the verification connector, and send the login request to the tested terminal 104;
The tested terminal 104 is configured to analyze the received login request, determine a corresponding login mode according to the analysis result, obtain a login verification result corresponding to the login mode, and feed back the login verification result to the test terminal 102 through the auxiliary verification connector;
the test terminal 102 is further configured to log in the target program to test the target program when the received login verification result is successful, and to resend the login request to the tested terminal 104 when the received login verification result is failed.
Specifically, the verification connector refers to a functional module of the test terminal 102, and is used for connecting with the tested terminal 104; the test terminal 102 refers to a terminal for performing an order test, such as a computer; the auxiliary verification connector is a functional module of the tested terminal 104, and is used for connecting with the test terminal 102, and can be embedded in the source code of the target program through Unity 3D; the test terminal 102 refers to a terminal that passively performs program testing, such as a mobile phone. The target program refers to a program to be tested, which may be a video application program or other application programs, and the application is not limited to this, and it should be noted that the target program is a specific client in the tested terminal 104, and the target program is a code project, that is, a code, used for developing and debugging the program in the tested terminal 102; the login request refers to a request for a user to verify identity or account login before entering a program, namely, a process of displaying a login interface; the analysis is a process of decomposing and analyzing the login request or login verification result; the analysis result is a result after the login request or login verification result is analyzed; the login mode can be login through inputting an account number and a password, or can be login through third-party software, or can be code scanning login; the login verification result is a result of performing target program login on the tested terminal 104.
In practical application, when the test terminal 102 opens the target program and runs, that is, opens the code project corresponding to the target program and runs, the test terminal 102 will receive the running instruction for the target program. Then, the test terminal 102 responds to the operation instruction, runs the code engineering of the target program through the Unity3D, enters a login interface of the target program after initialization is completed, namely, the test terminal 102 receives a login request of the target program, at the moment, the test terminal 102 establishes connection with an auxiliary verification connector in the tested terminal 104 through the verification connector, and on the basis, the test terminal 102 forwards the login request to the tested terminal 104 through the verification connector.
For example, a tester needs to test the program a, where the program a has a client corresponding to a mobile phone end and no client corresponding to a PC end. When testing the program A through the code engineering of the program A in the PC end (test terminal), a tester starts the code engineering of the program A at the PC end first, and runs the program A through the code engineering of the program A in the Unity3D, namely, the PC receives the running instruction aiming at the program A and responds to the running instruction of the program A to run the target program A. In the running process, a login interface of the program A appears, namely, the PC receives a login request of the program A, triggers a forwarding request function of the program A, starts an auxiliary verification connector, establishes connection with an auxiliary verification connector of a mobile phone end (a tested terminal) through the verification connector of the PC end, and sends the login request of the program A to the mobile phone end.
On the basis that the test terminal 102 sends a login request to the tested terminal 104, the tested terminal 104 receives the login request through an auxiliary verification connector, that is, a login interface is displayed on the tested terminal 104, a user selects a corresponding login mode on the login interface, that is, the tested terminal 104 obtains the corresponding login mode after analyzing the login request, the user selects the login mode and then automatically performs login, then the tested terminal 104 receives a result of verification on login information, that is, a login verification result, and then feeds the verification result back to the test terminal 102.
Along the above example, the mobile phone receives the login request of the program a, i.e. displays the login interface of the program a, the user selects the third party software to log in on the login interface of the program a, at this time, the user jumps to the third party software and performs login verification by the server of the third party software, then returns the login verification result to the mobile phone, and the mobile phone sends the login verification result to the PC through the auxiliary verification connector.
Further, after receiving the login verification result fed back by the tested terminal 104, the test terminal 102 determines whether the login verification result is successful, and if so, the test terminal 102 logs in to the target program at this time, and can start to test the target program; if it fails, a login request needs to be sent again to the tested terminal 104 for the target program to test, so as to try to login the target program again.
Along the above example, when the PC receives the login verification result sent by the mobile phone, the PC analyzes the login verification result, determines that the analysis result is successful, and after the PC logs in the program a, the PC can test the program a, determines that the analysis result is failed, and sends the login request to the mobile phone again.
In the application, the test terminal runs the target program by responding to the running instruction, and establishes connection with the auxiliary verification connector in the tested terminal through the verification connector when logging in, so that a login request is sent to the tested terminal, the tested terminal obtains a login verification result according to the login request, and feeds back the login verification result through the auxiliary verification connector, so that the test terminal can analyze the login verification result conveniently, and the target program is logged in under the condition that the analysis result is successful, and the test is started. Therefore, the test terminal and the tested terminal are not required to be connected by external equipment, and the connection efficiency of the test terminal and the tested terminal is improved. In addition, the program test is carried out through the verification connector and the auxiliary verification connector without calling external network data, so that the data processing amount is reduced, the time consumption of the program test is greatly shortened, and the efficiency of the program test can be improved.
The test terminal 102 establishes a connection with the auxiliary validation connector in the tested terminal 104 through the validation connector, which may be as follows:
the test terminal 102 is further configured to generate a connection request for connecting the tested terminal 104, and send the connection request to the tested terminal 104 through the verification connector;
the tested terminal 104 is further configured to receive the connection request through the auxiliary verification connector, and feed back consent connection information to the test terminal 102;
the test terminal 102 is further configured to send the login request to the tested terminal 104 according to the received consent connection information.
Specifically, the connection request refers to a request sent by the test terminal 102 for establishing a connection to the tested terminal 104; the consent connection information refers to information generated by the tested terminal 104 for feeding back that the test terminal 102 can establish a connection.
In practical application, the test terminal 102 establishes connection with the auxiliary verification connector in the tested terminal through the verification connector, and the test terminal 102 is required to generate a connection request based on connection requirements and send the connection request to the auxiliary verification connector through the verification connector, namely to the tested terminal 104; then, the tested terminal 104 performs verification and check after receiving the connection request, and generates and sends consent connection information to the tested terminal 104 under the condition of meeting certain conditions; and then the test terminal 104 receives the connection approval information through the verification connector, namely the test terminal 102 and the tested device 104 are successfully connected, and the test terminal 102 sends a login request to the tested terminal 104 on the basis.
For example, the terminal T1 (test terminal) needs to connect with the terminal T2 (tested terminal), and at this time, the terminal T1 sends a handshake packet, i.e. a connection request, to the terminal T2 through the verification connector; the terminal T2 receives the connection request through the auxiliary verification connector, then detects whether the connection requirement or the connection condition is met, and generates agreeing connection information to feed back to the terminal T1 under the condition that the connection requirement or the connection condition is met, namely the terminal T1 and the terminal T2 are successfully connected at the moment. At this time, the terminal T1 may send a login request to the terminal T2.
In the application, the test terminal sends a connection request to the auxiliary verification connector through the verification connector, when receiving the consent connection information, the test terminal and the tested terminal are successfully connected, the connection reliability is guaranteed to a certain extent, in addition, the test terminal and the tested terminal are connected through the verification connector and the auxiliary verification connector, the connection is simple and easy to implement, the connection time is reduced, and the efficiency of program test is improved to a certain extent.
Before the test terminal 102 generates a connection request, the tested terminal 104 to be connected needs to be definitely determined, so that program test failure caused by connection to an incorrect terminal is avoided; the tested terminal 104 also needs to verify the connection request, which is as follows:
The test terminal 102 is further configured to determine a tested terminal 104 according to preset address information, generate a connection request according to the address information, and send the connection request to the tested terminal 104 through the verification connector;
the tested terminal 104 is further configured to receive the connection request through the auxiliary verification connector, determine whether the address information carried by the connection request is consistent with the local address information, if yes, feedback the consent connection information to the test terminal 102, and if no, feedback the refusal connection information to the test terminal 102.
Specifically, the address information refers to an internet protocol address, such as an IP address, and a logical address is allocated to each network and each host on the internet, so as to mask the difference of physical addresses; the connection rejection information is information generated by the tested terminal 104 and used for feeding back the connection failure established by the test terminal 102.
In practical application, a tester may preset address information characterizing the tested device 104 at the test terminal 102, and the test terminal 102 generates a connection request according to the preset address information and then sends the connection request to the tested device 104; after receiving the connection request, the tested device 104 extracts address information contained in the connection request, compares the address information with local address information, if the address information is consistent with the local address information, indicates that the test terminal 102 is to be connected with the tested device 104, and then feeds back connection approval information to the test terminal 102, wherein the connection is successful; if the connection rejection information is inconsistent, the test terminal 102 sends a connection request wrongly, and the test terminal 102 feeds back the connection rejection information to characterize the connection failure.
For example, there are 3 terminals: a first terminal, a second terminal and a third terminal; the first terminal generates a connection request according to preset address information (address information of the third terminal): after the terminal I sends the connection request to the terminal II, the terminal II compares the address information in the connection request with the address information of the terminal II to find the inconsistency and feeds back the inconsistent address information to the terminal I; after the terminal I sends the connection request to the terminal III, the terminal III compares the address information in the connection request with the address information of the terminal III to find the consistency, and feeds back the consistency to the terminal I to agree with the connection information.
According to the method and the device, the connection state can be rapidly determined by comparing the address information in the connection request with the address information of the tested equipment, and if the connection is successful, preparation is made for subsequent program login and test, and meanwhile, the test speed is improved; if the connection fails, the test terminal can find errors early to correct by feeding back the connection refusing information.
When the test terminal 102 establishes a connection with the tested terminal 104, on one hand, whether the address information is correct or not needs to be considered, and on the other hand, the network condition needs to be considered, which is specifically as follows:
The test terminal 102 is further configured to detect a current network speed, send the connection request to the tested terminal 104 through the verification connector when the current network speed is greater than a network speed threshold, and suspend sending the connection request when the current network speed is less than or equal to the network speed threshold;
the tested terminal 104 is further configured to receive the connection request through the auxiliary verification connector, detect a current network speed, feedback consent connection information to the test terminal 102 when the current network speed is greater than a network speed threshold, and feedback network anomaly information to the test terminal 102 when the current network speed is less than or equal to the network speed threshold.
Specifically, the network speed is abbreviated as network speed, and the higher the network speed is, the faster the data transmission speed is. In order to ensure the reliability and timeliness of the connection, the test terminal 102 detects the current network speed before sending the connection request, if the current network speed is greater than the network speed threshold, the network state is good, and the connection establishment requirement is met, at this time, the test terminal 102 sends the connection request to the tested terminal 104, and if the current network speed is less than or equal to the network speed threshold, the network state is poor, and effective connection cannot be performed. After the tested terminal 104 receives the connection request, it also needs to detect the network speed, and when the current network speed is greater than the network speed threshold, it feeds back the connection agreement information to the test terminal 102, and when the current network speed is less than or equal to the network speed threshold, it feeds back the network abnormality to the test terminal 102.
For example, before sending the connection request, the terminal T1 (test terminal) detects the current network speed, i.e. obtains the current network speed, which is 2Mbit/s, and since the network speed is greater than the preset network speed threshold value of 1Mbit/s, the terminal T1 sends the connection request to the terminal T2 through the verification connector. At this time, the terminal T2 receives the connection request through the auxiliary verification connector, and then, before feeding back the consent connection information, it is also required to detect the network speed, and the current network speed is detected to be 0.5Mbit/s, and at this time, the terminal T2 feeds back the network abnormality information to the terminal T1.
In the method, the network speed is detected, connection is established when the network speed reaches a certain value, and the effectiveness of connection is guaranteed, so that guarantee is provided for subsequent data transmission.
In the connection establishment process, i.e. after the test terminal 102 sends the connection request, it may happen that the test terminal receives no information fed back by the tested terminal, at this time, the test terminal 102 may try to send the connection request again, i.e. the test terminal 102 is further configured to send the connection request to the tested terminal 104 again through the verification connector if the connection approval information is not received within a preset time.
The preset time refers to a preset duration or time interval, such as 1 second, 5 seconds and 10 seconds. In practical application, after the test terminal 102 sends a connection request to the tested terminal 104 (the address information of the tested terminal 104 is consistent with the address information carried by the connection request), if the connection approval information fed back by the tested terminal 104 is not received within a preset time, the connection is indicated to be failed or the connection is overtime, in order to ensure the normal running of the subsequent program test, the test terminal 102 needs to try to connect with the tested terminal 104 again, that is, send the connection request to the tested terminal 104 again through the verification connector. In this way, the test terminal 102 is prevented from being in a waiting state for a long time, and the connection establishment process is simplified to a certain extent, so that the efficiency of program test is improved.
After obtaining the login verification result, the tested terminal 104 also needs to obtain login information, and sends the login information to the test terminal 102, that is, the tested terminal 104 is further configured to receive the login information, and send the login information and the login verification result to the test terminal 102 through the auxiliary verification connector, where the login information at least includes the name of the target server.
Specifically, the login information refers to the incidental information that needs to be selected when the program is logged in, for example, a server or a zone that is logged in. In practical application, after obtaining the login verification result, the tested terminal 104 needs to further obtain login information, where the login information includes the name of the target server to be logged in, and the tested terminal sends the login verification result and the obtained login information to the test terminal 102. In this way, the test terminal 102 can be effectively ensured to log in the target server when logging in the target program, so that the login failure of the test terminal 102 is avoided, and the data processing speed of the test terminal 102 can be effectively improved.
For example, after receiving the login verification result, the mobile phone terminal (the tested terminal) determines the target server to be logged in, that is, obtains the name of the target server, and then sends the name of the target server and the login verification result to the PC terminal (the testing device).
It should be noted that, the test terminal 102 may also fail the login verification result, and the login needs to be performed again at this time, that is, the test terminal 102 is further configured to resend the login request to the tested terminal 104 when the received login verification result is a failure.
In practical applications, when the result of analyzing the login verification result is failure, it is indicated that the login is unsuccessful, or that the login is problematic, etc., in order to ensure the normal running of the program test, it is necessary to perform the login again, that is, it is also necessary to send a login request to the tested terminal 104 again, and perform the login again.
According to the program test system, the test terminal responds to the running instruction to run the target program, connection is established between the test terminal and the auxiliary verification connector in the tested terminal through the verification connector when logging in, so that a login request is sent to the tested terminal, the tested terminal obtains a login verification result according to the login request, and the login verification result is fed back through the auxiliary verification connector, so that the test terminal can conveniently analyze the login verification result, the target program is logged in under the condition that the analysis result is successful, and the test is started. Therefore, the test terminal and the tested terminal are not required to be connected by external equipment, and the connection efficiency of the test terminal and the tested terminal is improved. In addition, the program test is carried out through the verification connector and the auxiliary verification connector without calling external network data, so that the data processing amount is reduced, the time consumption of the program test is greatly shortened, and the efficiency of the program test can be improved.
Fig. 2 shows a flowchart of a program testing method according to an embodiment of the present application, which is applied to a test terminal configured with a verification connector, as shown in fig. 2, and specifically includes the following steps:
step 202: and receiving an operation instruction aiming at a target program, and operating the target program according to the operation instruction.
Step 204: and under the condition of receiving a login request of the target program, establishing connection with an auxiliary verification connector in the tested terminal through the verification connector, and sending the login request to the tested terminal.
In an optional implementation manner of this embodiment, the establishing a connection with the auxiliary authentication connector in the tested terminal through the authentication connector, and the sending the login request to the tested terminal includes:
generating a connection request for connecting the tested terminal, and sending the connection request to the tested terminal through the verification connector;
and receiving the agreeing connection information fed back by the tested terminal, and sending the login request to the tested terminal according to the agreeing connection information.
In an optional implementation manner of this embodiment, the generating a connection request for connecting the tested terminal, and sending, by the verification connector, the connection request to the tested terminal includes:
And determining a tested terminal according to preset address information, generating a connection request according to the address information, and sending the connection request to the tested terminal through the verification connector.
In an optional implementation manner of this embodiment, the specific implementation process of sending, by the verification connector, the connection request to the tested terminal is:
and detecting the current network speed, and sending the connection request to the tested terminal through the verification connector when the current network speed is larger than a network speed threshold value.
Step 206: and receiving a login verification result fed back by the tested terminal, and logging in the target program to test the target program under the condition that the login verification result is successful.
It should be noted that, when the received login verification result is failure, the login request is resent to the tested terminal.
In order to avoid the invalid waiting time, it is necessary to monitor whether the test terminal receives the connection approval information, that is, if the connection approval information is not received within a preset time, the connection request is sent to the tested terminal again through the verification connector.
The program testing method is applied to a testing terminal, a target program is operated by responding to an operation instruction, connection is established between an authentication connector and an auxiliary authentication connector in the tested terminal when logging in, so that a logging in request is sent to the tested terminal, a received logging in authentication result is analyzed, the target program is logged in under the condition that the analysis result is successful, and testing is started. Therefore, the connection between the test terminal and the tested terminal can be realized rapidly without external equipment, and the connection efficiency of the test terminal and the tested terminal is improved. In addition, the program test is carried out through the verification connector and the auxiliary verification connector without calling external network data, so that the data processing amount is reduced, the time consumption of the program test is greatly shortened, and the efficiency of the program test can be improved.
The above is an exemplary scheme of a program test method applied to a test terminal provided with a verification connector of the present embodiment. It should be noted that, the technical solution of the program testing method and the technical solution of the program testing system belong to the same conception, and the details of the technical solution of the program testing method which are not described in detail can be referred to the description of the technical solution of the program testing system.
Fig. 3 shows a flowchart of a program testing method according to an embodiment of the present application, which is applied to a tested terminal configured with an auxiliary verification connector, as shown in fig. 3, and specifically includes the following steps:
step 302: and receiving a login request sent by the test terminal, and analyzing the login request.
Before receiving the login request, the auxiliary verification connector is required to receive a connection request, and the connection agreement information is fed back to the test terminal.
In an optional implementation manner of this embodiment, the receiving, by the auxiliary verification connector, a connection request, and feeding back, by the auxiliary verification connector, the connection agreement information to the test terminal is specifically implemented as follows:
receiving the connection request through the auxiliary verification connector, and judging whether the address information carried by the connection request is consistent with the local address information;
if yes, feeding back the consent connection information to the test terminal, and if not, feeding back the refusal connection information to the test terminal.
In an optional implementation manner of this embodiment, the specific implementation process of feeding back the connection agreement information to the test terminal is:
and detecting the current network speed, and feeding back consent connection information to the test terminal when the current network speed is greater than a network speed threshold value.
Step 304: and determining a corresponding login mode according to the analysis result, and obtaining a login verification result corresponding to the login mode.
Step 306: and feeding back the login verification result to the test terminal through the auxiliary verification connector.
In order to enable the test terminal to log in to the target server, the test terminal also needs to receive login information, and the login information and the login verification result are sent to the test terminal through the auxiliary verification connector, wherein the login information at least comprises the name of the target server.
The program test system is applied to the tested terminal, the auxiliary verification connector is connected with the verification connector in the test terminal, so that a login request sent by the tested terminal is received, a login verification result is obtained according to the login request, and the login verification result is fed back through the auxiliary verification connector, so that the test terminal can conveniently log in a target program and test the target program. Therefore, the test terminal and the tested terminal are not required to be connected by external equipment, and the connection efficiency of the test terminal and the tested terminal is improved. In addition, the program test is carried out through the verification connector and the auxiliary verification connector without calling external network data, so that the data processing amount is reduced, the time consumption of the program test is greatly shortened, and the efficiency of the program test can be improved.
The above is an exemplary scheme of a program test method applied to a terminal under test configured with an auxiliary authentication connector of the present embodiment. It should be noted that, the technical solution of the program testing method and the technical solution of the program testing system belong to the same conception, and the details of the technical solution of the program testing method which are not described in detail can be referred to the description of the technical solution of the program testing system.
The program test method provided in the present application is further described below with reference to fig. 4 by taking an application of the program test method to a card game as an example. Fig. 4 shows a process flow chart of a program testing method applied to a card game according to an embodiment of the present application, which specifically includes the following steps:
step 402: and the PC receives an operation instruction aiming at the target card game.
The PC terminal is a test terminal, and the PC terminal target card game is a game project of the target card game, namely a code.
Step 404: and the PC side operates the target card game according to the operation instruction.
Step 406: and the PC side receives a login request of the target card game.
Step 408: and the PC end generates a connection request for connecting the mobile phone end.
Step 410: and the PC end sends the connection request to the mobile phone end through the verification connector.
The mobile phone terminal is a tested terminal.
Step 412: and the mobile phone end feeds back the consent connection information to the PC end.
Step 414: and the PC end sends the login request to the mobile phone end.
Step 416: and the mobile phone end analyzes the login request and determines a corresponding login mode according to an analysis result.
Step 418: and the mobile phone end acquires a login verification result and login information corresponding to the login mode.
Step 420: and the mobile phone end sends the login verification result and the login information to the PC end.
Step 422: and the PC end judges whether the login verification result is successful or not.
If yes, go to step 424; if not, go to step 414.
Step 424: and the PC end logs in the target card game to test the target game.
According to the program testing system applied to the license plate games, the PC end responds to the running instruction to run the target license plate games, connection is established between the verification connector and the auxiliary verification connector of the mobile phone end when logging in, so that a login request is sent to the mobile phone end, the mobile phone end obtains a login verification result according to the login request, the login verification result is fed back through the auxiliary verification connector, so that the PC end can analyze the login verification result conveniently, the target license plate games are logged in under the condition that the analysis result is successful, and testing is started. Therefore, the PC end and the mobile phone end are not required to be connected by external equipment, and the connection efficiency of the PC end and the mobile phone end is improved. In addition, the program test is carried out through the verification connector and the auxiliary verification connector without calling external network data, so that the data processing amount is reduced, the time consumption of the program test is greatly shortened, and the efficiency of the program test can be improved.
Corresponding to the method embodiment, the present application further provides a test terminal embodiment, and fig. 5 shows a schematic structural diagram of a test terminal provided in an embodiment of the present application. As shown in fig. 5, the test terminal includes:
a receiving module 502 configured to receive an operation instruction for a target program, and to operate the target program according to the operation instruction;
a connection module 504 configured to, upon receiving a login request of the target program, establish a connection with an auxiliary authentication connector in a terminal under test through the authentication connector, and send the login request to the terminal under test;
and the login module 506 is configured to receive a login verification result fed back by the tested terminal, and login the target program to test the target program if the login verification result is successful.
In an optional implementation manner of this embodiment, the connection module 504 is further configured to:
generating a connection request for connecting the tested terminal, and sending the connection request to the tested terminal through the verification connector;
and receiving the agreeing connection information fed back by the tested terminal, and sending the login request to the tested terminal according to the agreeing connection information.
In an optional implementation manner of this embodiment, the connection module 504 is further configured to:
and determining a tested terminal according to preset address information, generating a connection request according to the address information, and sending the connection request to the tested terminal through the verification connector.
In an optional implementation manner of this embodiment, the connection module 504 is further configured to:
and detecting the current network speed, and sending the connection request to the tested terminal through the verification connector when the current network speed is larger than a network speed threshold value.
In an optional implementation manner of this embodiment, the test terminal further includes a monitoring module configured to:
and under the condition that the connection agreement information is not received within the preset time, the connection request is sent to the tested terminal again through the verification connector.
In an alternative implementation of this embodiment, the login module 506 is further configured to:
and re-sending the login request to the tested terminal under the condition that the received login verification result is failure.
According to the test terminal, the target program is operated by responding to the operation instruction, connection is established between the verification connector and the auxiliary verification connector in the tested terminal when logging in, so that a logging in request is sent to the tested terminal, the received logging in verification result is analyzed, the target program is logged in under the condition that the analysis result is successful, and the test is started. Therefore, the connection between the test terminal and the tested terminal can be realized rapidly without external equipment, and the connection efficiency of the test terminal and the tested terminal is improved. In addition, the program test is carried out through the verification connector and the auxiliary verification connector without calling external network data, so that the data processing amount is reduced, the time consumption of the program test is greatly shortened, and the efficiency of the program test can be improved.
The above is a schematic solution of a test terminal of the present embodiment. It should be noted that, the technical solution of the test terminal and the technical solution of the program test system belong to the same concept, and the details of the technical solution of the test terminal, which are not described in detail, can be referred to the description of the technical solution of the program test system.
Corresponding to the above method embodiment, the present application further provides a tested terminal embodiment, and fig. 6 shows a schematic structural diagram of a tested terminal provided in an embodiment of the present application. As shown in fig. 6, the terminal under test includes:
the analyzing module 602 is configured to receive a login request sent by the test terminal, and analyze the login request;
an obtaining module 604, configured to determine a corresponding login mode according to the analysis result, and obtain a login verification result corresponding to the login mode;
and a sending module 606 configured to feed back the login verification result to the test terminal through the auxiliary verification connector.
In an optional implementation manner of this embodiment, the tested terminal further includes a feedback module configured to:
and receiving a connection request through the auxiliary verification connector, and feeding back consent connection information to the test terminal.
In an optional implementation manner of this embodiment, the feedback module is further configured to:
receiving the connection request through the auxiliary verification connector, and judging whether the address information carried by the connection request is consistent with the local address information;
if yes, feeding back the consent connection information to the test terminal, and if not, feeding back the refusal connection information to the test terminal.
In an optional implementation manner of this embodiment, the feedback module is further configured to:
and detecting the current network speed, and feeding back consent connection information to the test terminal when the current network speed is greater than a network speed threshold value.
In an optional implementation manner of this embodiment, the sending module 606 is further configured to:
and receiving login information, and sending the login information and the login verification result to the test terminal through the auxiliary verification connector, wherein the login information at least comprises the name of the target server.
According to the tested terminal, the auxiliary verification connector is connected with the verification connector in the test terminal, so that a login request sent by the tested terminal is received, a login verification result is obtained according to the login request, and the login verification result is fed back through the auxiliary verification connector, so that the test terminal can conveniently log in a target program and test. Therefore, the test terminal and the tested terminal are not required to be connected by external equipment, and the connection efficiency of the test terminal and the tested terminal is improved. In addition, the program test is carried out through the verification connector and the auxiliary verification connector without calling external network data, so that the data processing amount is reduced, the time consumption of the program test is greatly shortened, and the efficiency of the program test can be improved.
The above is a schematic scheme of a tested terminal in this embodiment. It should be noted that, the technical solution of the tested terminal and the technical solution of the program testing system belong to the same conception, and the details of the technical solution of the tested terminal which are not described in detail can be referred to the description of the technical solution of the program testing system.
Fig. 7 illustrates a block diagram of a computing device 700 provided in accordance with one embodiment of the present description. The components of computing device 700 include, but are not limited to, memory 710 and processor 720. Processor 720 is coupled to memory 710 via bus 730, and database 750 is used to store data.
Computing device 700 also includes access device 740, access device 740 enabling computing device 700 to communicate via one or more networks 760. Examples of such networks include the Public Switched Telephone Network (PSTN), a Local Area Network (LAN), a Wide Area Network (WAN), a Personal Area Network (PAN), or a combination of communication networks such as the internet. The access device 740 may include one or more of any type of network interface, wired or wireless (e.g., a Network Interface Card (NIC)), such as an IEEE802.11 Wireless Local Area Network (WLAN) wireless interface, a worldwide interoperability for microwave access (Wi-MAX) interface, an ethernet interface, a Universal Serial Bus (USB) interface, a cellular network interface, a bluetooth interface, a Near Field Communication (NFC) interface, and so forth.
In one embodiment of the present description, the above-described components of computing device 700, as well as other components not shown in FIG. 7, may also be connected to each other, such as by a bus. It should be understood that the block diagram of the computing device illustrated in FIG. 7 is for exemplary purposes only and is not intended to limit the scope of the present description. Those skilled in the art may add or replace other components as desired.
Computing device 700 may be any type of stationary or mobile computing device including a mobile computer or mobile computing device (e.g., tablet, personal digital assistant, laptop, notebook, netbook, etc.), mobile phone (e.g., smart phone), wearable computing device (e.g., smart watch, smart glasses, etc.), or other type of mobile device, or a stationary computing device such as a desktop computer or PC. Computing device 700 may also be a mobile or stationary server.
Wherein the processor 720 performs the steps of the program testing method when executing the computer instructions.
The foregoing is a schematic illustration of a computing device of this embodiment. It should be noted that, the technical solution of the computing device and the technical solution of the program testing method belong to the same concept, and details of the technical solution of the computing device, which are not described in detail, can be referred to the description of the technical solution of the program testing method.
An embodiment of the present application also provides a computer-readable storage medium storing computer instructions that, when executed by a processor, implement the steps of the program testing method as described above.
The above is an exemplary version of a computer-readable storage medium of the present embodiment. It should be noted that, the technical solution of the storage medium and the technical solution of the program testing method belong to the same concept, and details of the technical solution of the storage medium which are not described in detail can be referred to the description of the technical solution of the program testing method.
The foregoing describes specific embodiments of the present application. Other embodiments are within the scope of the following claims. In some cases, the actions or steps recited in the claims can be performed in a different order than in the embodiments and still achieve desirable results. In addition, the processes depicted in the accompanying figures do not necessarily require the particular order shown, or sequential order, to achieve desirable results. In some embodiments, multitasking and parallel processing are also possible or may be advantageous.
The computer instructions include computer program code that may be in source code form, object code form, executable file or some intermediate form, etc. The computer readable medium may include: any entity or device capable of carrying the computer program code, a recording medium, a U disk, a removable hard disk, a magnetic disk, an optical disk, a computer Memory, a Read-Only Memory (ROM), a random access Memory (RAM, random Access Memory), an electrical carrier signal, a telecommunications signal, a software distribution medium, and so forth. It should be noted that the computer readable medium contains content that can be appropriately scaled according to the requirements of jurisdictions in which such content is subject to legislation and patent practice, such as in certain jurisdictions in which such content is subject to legislation and patent practice, the computer readable medium does not include electrical carrier signals and telecommunication signals.
It should be noted that, for the sake of simplicity of description, the foregoing method embodiments are all expressed as a series of combinations of actions, but it should be understood by those skilled in the art that the present application is not limited by the order of actions described, as some steps may be performed in other order or simultaneously in accordance with the present application. Further, those skilled in the art will also appreciate that the embodiments described in the specification are all preferred embodiments, and that the acts and modules referred to are not necessarily all necessary for the present application.
In the foregoing embodiments, the descriptions of the embodiments are emphasized, and for parts of one embodiment that are not described in detail, reference may be made to the related descriptions of other embodiments.
The above-disclosed preferred embodiments of the present application are provided only as an aid to the elucidation of the present application. Alternative embodiments are not intended to be exhaustive or to limit the invention to the precise form disclosed. Obviously, many modifications and variations are possible in light of the teaching of this application. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best understand and utilize the invention. This application is to be limited only by the claims and the full scope and equivalents thereof.

Claims (13)

1. A program testing method, applied to a test terminal configured with a verification connector, comprising:
receiving an operation instruction aiming at a target program, and operating the target program according to the operation instruction;
generating a connection request for connecting a tested terminal under the condition of receiving a login request of the target program, and sending the connection request to the tested terminal through the verification connector, wherein the login request is received through a login interface of the target program in the running process;
receiving agreeing connection information fed back by the tested terminal, and sending the login request to the tested terminal according to the agreeing connection information;
and receiving a login verification result fed back by the tested terminal, and logging in the target program to test the target program under the condition that the login verification result is successful, wherein the login verification result is a result of the tested terminal for verifying login information after a user selects a login mode to log in on a login interface displayed by the tested terminal.
2. The method of claim 1, wherein the generating a connection request for connecting the terminal under test, the connection request being sent to the terminal under test through the authentication connector, comprises:
And determining a tested terminal according to preset address information, generating a connection request according to the address information, and sending the connection request to the tested terminal through the verification connector.
3. The method according to claim 2, wherein said sending the connection request to the terminal under test through the authentication connector comprises:
and detecting the current network speed, and sending the connection request to the tested terminal through the verification connector when the current network speed is larger than a network speed threshold value.
4. The method as recited in claim 1, further comprising:
and under the condition that the connection agreement information is not received within the preset time, the connection request is sent to the tested terminal again through the verification connector.
5. The method as recited in claim 1, further comprising:
and re-sending the login request to the tested terminal under the condition that the received login verification result is failure.
6. A program testing method applied to a terminal under test equipped with an auxiliary authentication connector, comprising:
receiving a login request sent by a test terminal, and analyzing the login request, wherein the login request is received by the test terminal through a login interface of a target program in the running process, the login request is sent by the test terminal according to the consent connection information fed back by the tested terminal, the consent connection information is fed back to the test terminal by the connection request received by the tested terminal through the auxiliary verification connector, the connection request is generated by the test terminal when the login request of the target program is received, and the connection request is sent by the test terminal through the verification connector;
Determining a corresponding login mode according to an analysis result, and obtaining a login verification result corresponding to the login mode, wherein the login verification result is a result of verification of login information received by the tested terminal after a user selects the login mode for login on a login interface displayed by the tested terminal;
and feeding back the login verification result to the test terminal through the auxiliary verification connector.
7. The method of claim 6, wherein the receiving, by the auxiliary authentication connector, a connection request, and feeding back consent connection information to the test terminal, comprises:
receiving the connection request through the auxiliary verification connector, and judging whether the address information carried by the connection request is consistent with the local address information;
if yes, feeding back the consent connection information to the test terminal, and if not, feeding back the refusal connection information to the test terminal.
8. The method as recited in claim 6, further comprising:
and receiving login information, and sending the login information and the login verification result to the test terminal through the auxiliary verification connector, wherein the login information at least comprises the name of the target server.
9. A program testing system, comprising:
a test terminal configured with a verification connector and a tested terminal configured with an auxiliary verification connector;
the test terminal is configured to receive an operation instruction for a target program, operate the target program according to the operation instruction, generate a connection request for connecting a tested terminal under the condition of receiving a login request of the target program, send the connection request to the tested terminal through the verification connector, receive consent connection information fed back by the tested terminal, and send the login request to the tested terminal according to the consent connection information, wherein the login request is received through a login interface of the target program in the operation process;
the tested terminal is configured to analyze the received login request, determine a corresponding login mode according to an analysis result, acquire a login verification result corresponding to the login mode, and feed back the login verification result to the test terminal through the auxiliary verification connector, wherein the login verification result is a result of verification of login information received by the tested terminal after a user selects the login mode to log on a login interface displayed by the tested terminal;
And the test terminal is further configured to log in the target program to test the target program under the condition that the received login verification result is successful.
10. A test terminal, the test terminal being configured with a validation connector, comprising:
the device comprises a receiving module, a control module and a control module, wherein the receiving module is configured to receive an operation instruction aiming at a target program and operate the target program according to the operation instruction;
the connection module is configured to generate a connection request for connecting a tested terminal under the condition of receiving a login request of the target program, send the connection request to the tested terminal through the verification connector, receive consent connection information fed back by the tested terminal, and send the login request to the tested terminal according to the consent connection information, wherein the login request is received through a login interface of the target program in the running process;
and the login module is configured to receive a login verification result fed back by the tested terminal, and login the target program to test the target program under the condition that the login verification result is successful, wherein the login verification result is a result of verification of login information received by the tested terminal after a user selects a login mode to log on a login interface displayed by the tested terminal.
11. A terminal under test, wherein the terminal under test is configured with an auxiliary authentication connector, comprising:
the analysis module is configured to receive a login request sent by a test terminal and analyze the login request, wherein the login request is received by the test terminal through a login interface of a target program in an operation process, the login request is sent by the test terminal according to the consent connection information fed back by the tested terminal, the consent connection information is sent by the tested terminal through the auxiliary verification connector, the connection request is generated by the test terminal when the login request of the target program is received, and the connection request is sent by the test terminal through the verification connector;
the acquisition module is configured to determine a corresponding login mode according to the analysis result, and acquire a login verification result corresponding to the login mode, wherein the login verification result is a result of verification of login information received by the tested terminal after a user selects the login mode for login on a login interface displayed by the tested terminal;
And the sending module is configured to feed back the login verification result to the test terminal through the auxiliary verification connector.
12. A computing device comprising a memory, a processor, and computer instructions stored on the memory and executable on the processor, wherein the processor, when executing the computer instructions, performs the steps of the method of any one of claims 1-5 or 6-8.
13. A computer readable storage medium storing computer instructions which, when executed by a processor, implement the steps of the method of any one of claims 1-5 or 6-8.
CN202110557373.9A 2021-05-21 2021-05-21 Program testing system and method Active CN113094290B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110557373.9A CN113094290B (en) 2021-05-21 2021-05-21 Program testing system and method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110557373.9A CN113094290B (en) 2021-05-21 2021-05-21 Program testing system and method

Publications (2)

Publication Number Publication Date
CN113094290A CN113094290A (en) 2021-07-09
CN113094290B true CN113094290B (en) 2024-02-23

Family

ID=76664528

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110557373.9A Active CN113094290B (en) 2021-05-21 2021-05-21 Program testing system and method

Country Status (1)

Country Link
CN (1) CN113094290B (en)

Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009026020A (en) * 2007-07-19 2009-02-05 Hitachi Information Systems Ltd Load test system, load test data creation method, and program therefor
CN105320598A (en) * 2015-11-24 2016-02-10 广州华多网络科技有限公司 Software testing method and device
CN106547687A (en) * 2016-10-14 2017-03-29 深圳前海微众银行股份有限公司 Application testing method, device and system
CN107678935A (en) * 2017-05-10 2018-02-09 平安科技(深圳)有限公司 Data creation method, terminal and computer-readable recording medium
CN108664395A (en) * 2018-04-26 2018-10-16 武汉斗鱼网络科技有限公司 Applied program testing method, device, equipment and storage medium
CN109886014A (en) * 2019-02-28 2019-06-14 上海龙旗科技股份有限公司 A kind of method and apparatus logging in testing tool
WO2019205288A1 (en) * 2018-04-24 2019-10-31 平安科技(深圳)有限公司 Connection establishment method, system, and device, and computer readable storage medium
CN110838953A (en) * 2019-11-01 2020-02-25 北京字节跳动网络技术有限公司 Test method, test system, electronic equipment and storage medium
CN110889096A (en) * 2019-11-21 2020-03-17 望海康信(北京)科技股份公司 Login method, login device, computer equipment and storage medium
CN111045942A (en) * 2019-12-12 2020-04-21 同盾控股有限公司 Application testing method, system, storage medium and electronic equipment
CN111651347A (en) * 2020-04-28 2020-09-11 中国平安财产保险股份有限公司 Jump verification method, device, equipment and storage medium of test system
CN112291271A (en) * 2020-12-22 2021-01-29 畅捷通信息技术股份有限公司 Method, system and medium for automatically logging in server by mobile equipment
CN112579452A (en) * 2020-12-22 2021-03-30 平安银行股份有限公司 Software automation test method, device, equipment and storage medium

Family Cites Families (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP6458564B2 (en) * 2015-03-10 2019-01-30 セイコーエプソン株式会社 Display device and display device control method
KR102693699B1 (en) * 2019-09-06 2024-08-12 삼성전자 주식회사 Apparatus and method for improving runtime performance after application update in electronic device

Patent Citations (13)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
JP2009026020A (en) * 2007-07-19 2009-02-05 Hitachi Information Systems Ltd Load test system, load test data creation method, and program therefor
CN105320598A (en) * 2015-11-24 2016-02-10 广州华多网络科技有限公司 Software testing method and device
CN106547687A (en) * 2016-10-14 2017-03-29 深圳前海微众银行股份有限公司 Application testing method, device and system
CN107678935A (en) * 2017-05-10 2018-02-09 平安科技(深圳)有限公司 Data creation method, terminal and computer-readable recording medium
WO2019205288A1 (en) * 2018-04-24 2019-10-31 平安科技(深圳)有限公司 Connection establishment method, system, and device, and computer readable storage medium
CN108664395A (en) * 2018-04-26 2018-10-16 武汉斗鱼网络科技有限公司 Applied program testing method, device, equipment and storage medium
CN109886014A (en) * 2019-02-28 2019-06-14 上海龙旗科技股份有限公司 A kind of method and apparatus logging in testing tool
CN110838953A (en) * 2019-11-01 2020-02-25 北京字节跳动网络技术有限公司 Test method, test system, electronic equipment and storage medium
CN110889096A (en) * 2019-11-21 2020-03-17 望海康信(北京)科技股份公司 Login method, login device, computer equipment and storage medium
CN111045942A (en) * 2019-12-12 2020-04-21 同盾控股有限公司 Application testing method, system, storage medium and electronic equipment
CN111651347A (en) * 2020-04-28 2020-09-11 中国平安财产保险股份有限公司 Jump verification method, device, equipment and storage medium of test system
CN112291271A (en) * 2020-12-22 2021-01-29 畅捷通信息技术股份有限公司 Method, system and medium for automatically logging in server by mobile equipment
CN112579452A (en) * 2020-12-22 2021-03-30 平安银行股份有限公司 Software automation test method, device, equipment and storage medium

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
Android系统下O2O闭环应用的实现;高娜;《中国优秀硕士学位论文全文数据库 (信息科技辑)》;I138-501 *
On Effects of Mobility Management Signalling Based DoS Attacks Against LTE Terminals;Chuan Yu;《2019 IEEE 38th International Performance Computing and Communications Conference (IPCCC)》;1-5 *
基于QTP技术的自动化测试框架的研究及实现;欧洁;《中国优秀硕士学位论文全文数据库 (信息科技辑)》;I138-414 *
面向云服务的Android金融支付终端软件设计与实现;黄学勤;《万方》;1-67 *

Also Published As

Publication number Publication date
CN113094290A (en) 2021-07-09

Similar Documents

Publication Publication Date Title
CN110908909B (en) Automatic test method, device, storage medium and equipment
CN101605108B (en) Method, system and apparatus for instant communication
CN110719199B (en) Network automatic testing and fault positioning method and device
CN112291271B (en) Method, system and medium for automatically logging in server by mobile equipment
CN110119350B (en) Software development kit testing method, device and equipment and computer storage medium
CN111506497B (en) Business logic debugging method, device, equipment and computer readable storage medium
CN112448956B (en) Authority processing method and device of short message verification code and computer equipment
CN110688319B (en) Application keep-alive capability test method and related device
CN114338464A (en) Fault diagnosis method, device, equipment and computer readable storage medium
CN112506758A (en) Firmware refreshing method and device, computer equipment and storage medium
CN112699034A (en) Virtual login user construction method, device, equipment and storage medium
CN114090122B (en) Method, device, computer equipment and storage medium for configuring CPE by applet
CN113094290B (en) Program testing system and method
CN109214189B (en) Method, device, storage medium and electronic equipment for identifying program bugs
CN110134558B (en) Method and device for detecting server
CN116684489A (en) Remote test method, system, device and storage medium
CN116166536A (en) Test method, test device, electronic equipment and storage medium
CN114039797B (en) Multi-factor authentication escape method and cloud platform
CN113422784B (en) Login certificate updating method and device, computer equipment and storage medium
CN112469038B (en) Reliability test method, system and storage medium for web authentication access network
CN113987506A (en) Test method, device, test equipment and storage medium of authentication system
CN110704218B (en) Data processing method, data processing device, computer equipment and storage medium
CN111400057A (en) Method, device and medium for remotely controlling test process
CN112363931A (en) Web system testing method and device
CN113037526A (en) Security detection method, terminal, system and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
CB02 Change of applicant information
CB02 Change of applicant information

Address after: 519000 Room 102, 202, 302 and 402, No. 325, Qiandao Ring Road, Tangjiawan Town, high tech Zone, Zhuhai City, Guangdong Province, Room 102 and 202, No. 327 and Room 302, No. 329

Applicant after: Zhuhai Jinshan Digital Network Technology Co.,Ltd.

Address before: 519000 Room 102, 202, 302 and 402, No. 325, Qiandao Ring Road, Tangjiawan Town, high tech Zone, Zhuhai City, Guangdong Province, Room 102 and 202, No. 327 and Room 302, No. 329

Applicant before: ZHUHAI KINGSOFT ONLINE GAME TECHNOLOGY Co.,Ltd.

GR01 Patent grant
GR01 Patent grant