CN113138888A - Function detection method and device, electronic equipment and storage medium - Google Patents

Function detection method and device, electronic equipment and storage medium Download PDF

Info

Publication number
CN113138888A
CN113138888A CN202110479178.9A CN202110479178A CN113138888A CN 113138888 A CN113138888 A CN 113138888A CN 202110479178 A CN202110479178 A CN 202110479178A CN 113138888 A CN113138888 A CN 113138888A
Authority
CN
China
Prior art keywords
function
detection
information
target device
target
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110479178.9A
Other languages
Chinese (zh)
Inventor
孙贺然
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Sensetime Technology Development Co Ltd
Original Assignee
Beijing Sensetime Technology Development Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Sensetime Technology Development Co Ltd filed Critical Beijing Sensetime Technology Development Co Ltd
Priority to CN202110479178.9A priority Critical patent/CN113138888A/en
Publication of CN113138888A publication Critical patent/CN113138888A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/22Detection or location of defective computer hardware by testing during standby operation or during idle time, e.g. start-up testing
    • G06F11/26Functional testing

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • User Interface Of Digital Computer (AREA)

Abstract

The present disclosure relates to a method and an apparatus for detecting a function, an electronic device, and a storage medium, where the method is used to detect a function of a target device, and the method includes: in response to an authorization detection operation for the target device, obtaining verification information in a configuration file; verifying the authorization information in the target equipment based on the verification information to obtain a verification result; and under the condition that the verification result is successful, responding to the function detection operation aiming at the target equipment, and detecting at least one function in the target equipment based on the configuration information of at least one function in the configuration file to obtain a function detection result. The present disclosure can improve the safety and efficiency of detection.

Description

Function detection method and device, electronic equipment and storage medium
Technical Field
The present disclosure relates to the field of computer technologies, and in particular, to a method and an apparatus for function detection, an electronic device, and a storage medium.
Background
With the development of science and technology, algorithms built in various processing devices are more complex, and the functions which can be realized by the processing devices are more comprehensive and complete.
In order to control the quality of the processing equipment, it is necessary to detect the function of the equipment that is produced. However, how to safely and conveniently detect the functions of the device is a problem to be solved urgently.
Disclosure of Invention
The present disclosure provides a technical solution for function detection.
According to an aspect of the present disclosure, there is provided a function detection method for detecting a function of a target device, the method including: in response to an authorization detection operation for the target device, obtaining verification information in a configuration file; verifying the authorization information in the target equipment based on the verification information to obtain a verification result; and under the condition that the verification result is successful, responding to the function detection operation aiming at the target equipment, and detecting at least one function in the target equipment based on the configuration information of at least one function in the configuration file to obtain a function detection result.
In a possible implementation manner, the verifying the authorization information in the target device based on the verification information to obtain a verification result includes: obtaining authorization information in the target device; and matching the verification information with the authorization information to obtain the verification result, wherein the verification result is successful under the condition of successful matching.
In a possible implementation manner, the target device includes an encryption chip, and the authorization information is stored in the encryption chip; the verifying the authorization information in the target device based on the verification information to obtain a verification result includes: reading data in the encryption chip to acquire authorization information in the encryption chip; and matching the verification information with the authorization information to obtain the verification result, wherein the verification result is successful under the condition of successful matching.
In one possible implementation, the method further includes: and responding to the situation that the data in the encryption chip cannot be read successfully or the verification result is failure when the verification information is unsuccessfully matched with the authorization information.
In a possible implementation manner, the detecting at least one function in the target device based on the configuration information of the at least one function in the configuration file to obtain a function detection result includes: determining a function to be detected in at least one function according to configuration information of the at least one function in the configuration file, wherein the function to be detected comprises one or more of a face detection function, an attribute detection function, a human body detection function and an action detection function; and detecting the function to be detected, and obtaining a function detection result according to the detection result of the function to be detected.
In one possible implementation manner, the functions to be detected include a plurality of functions to be detected; treat the detection function and detect, according to the testing result of function of waiting to detect obtains the function test result, include: respectively detecting the multiple functions to be detected to obtain multiple detection results; and obtaining the function detection result based on the multiple detection results, wherein the function detection result is successful under the condition that the multiple detection results are successful results, and otherwise, the function detection result is failed.
In one possible implementation, before obtaining the verification information in the configuration file in response to the authorization detection operation for the target device, the method further includes: responding to the connection detection operation aiming at the target equipment, and acquiring the connection type information in the configuration file; detecting the connection state of the target equipment based on the connection type information to obtain a connection detection result; wherein the connection state comprises: a network connection state, or a universal serial bus, USB, connection state.
In one possible implementation, before obtaining the verification information in the configuration file in response to the authorization detection operation for the target device, the method further includes: acquiring a first identifier of the target device, wherein the first identifier is used for distinguishing different target devices; and/or determining a second identification of the target device, wherein the second identification is used for representing the device condition of the target device.
In one possible implementation, the target device includes an image acquisition device, and the method further includes: responding to image acquisition detection operation aiming at the target equipment, and acquiring an image acquired by the target equipment based on the configuration file; and responding to the evaluation operation aiming at the image, and obtaining an image acquisition detection result according to the evaluation result indicated by the evaluation operation.
In one possible implementation, the method further includes: and visually displaying the verification result and/or the function detection result obtained by the target equipment in the detection.
In one possible implementation, the method further includes: recording the condition of the target equipment in detection through a log file, and adjusting the target equipment according to the log file; and/or recording a verification result and/or a function detection result of at least one target device in a target file, and screening the target device according to the target file.
According to an aspect of the present disclosure, there is provided a function detection apparatus for detecting a function of a target device, the apparatus including: an obtaining module, configured to obtain, in response to an authorization detection operation for the target device, verification information in a configuration file; the verification module is used for verifying the authorization information in the target equipment based on the verification information to obtain a verification result; and the function detection module is used for responding to the function detection operation aiming at the target equipment under the condition that the verification result is successful, and detecting at least one function in the target equipment based on the configuration information of at least one function in the configuration file to obtain a function detection result.
In one possible implementation, the verification module is configured to: obtaining authorization information in the target device; and matching the verification information with the authorization information to obtain the verification result, wherein the verification result is successful under the condition of successful matching.
In a possible implementation manner, the target device includes an encryption chip, and the authorization information is stored in the encryption chip; the verification module is to: reading data in the encryption chip to acquire authorization information in the encryption chip; and matching the verification information with the authorization information to obtain the verification result, wherein the verification result is successful under the condition of successful matching.
In one possible implementation, the apparatus is further configured to: and responding to the situation that the data in the encryption chip cannot be read successfully or the verification result is failure when the verification information is unsuccessfully matched with the authorization information.
In one possible implementation manner, the function detection module is configured to: determining a function to be detected in at least one function according to configuration information of the at least one function in the configuration file, wherein the function to be detected comprises one or more of a face detection function, an attribute detection function, a human body detection function and an action detection function; and detecting the function to be detected, and obtaining a function detection result according to the detection result of the function to be detected.
In one possible implementation manner, the functions to be detected include a plurality of functions to be detected; the function detection module is further configured to: respectively detecting the multiple functions to be detected to obtain multiple detection results; and obtaining the function detection result based on the multiple detection results, wherein the function detection result is successful under the condition that the multiple detection results are successful results, and otherwise, the function detection result is failed.
In a possible implementation manner, before the obtaining module, the apparatus is further configured to: responding to the connection detection operation aiming at the target equipment, and acquiring the connection type information in the configuration file; detecting the connection state of the target equipment based on the connection type information to obtain a connection detection result; wherein the connection state comprises: a network connection state, or a universal serial bus, USB, connection state.
In a possible implementation manner, before the obtaining module, the apparatus is further configured to: acquiring a first identifier of the target device, wherein the first identifier is used for distinguishing different target devices; and/or determining a second identification of the target device, wherein the second identification is used for representing the device condition of the target device.
In one possible implementation, the target device includes an image capturing device, and the apparatus is further configured to: responding to image acquisition detection operation aiming at the target equipment, and acquiring an image acquired by the target equipment based on the configuration file; and responding to the evaluation operation aiming at the image, and obtaining an image acquisition detection result according to the evaluation result indicated by the evaluation operation.
In one possible implementation, the apparatus is further configured to: and visually displaying the verification result and/or the function detection result obtained by the target equipment in the detection.
In one possible implementation, the apparatus is further configured to: recording the condition of the target equipment in detection through a log file, and adjusting the target equipment according to the log file; and/or recording a verification result and/or a function detection result of at least one target device in a target file, and screening the target device according to the target file.
According to an aspect of the present disclosure, there is provided an electronic device including: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to invoke the memory-stored instructions to perform the above-described method.
According to an aspect of the present disclosure, there is provided a computer readable storage medium having stored thereon computer program instructions which, when executed by a processor, implement the above-described method.
In the embodiment of the disclosure, in response to the authorization detection operation for the target device, the authorization information in the target device may be verified based on the verification information in the acquired configuration file to obtain a verification result, and in the case that the verification result is successful, in response to the function detection operation for the target device, the at least one function in the target device may be detected based on the configuration information of the at least one function in the configuration file to obtain a function detection result. Through the process, the function detection can be carried out under the condition that the authorization information in the target equipment passes the verification, so that the authorization condition of the target equipment is authenticated, the detection is realized, and the safety of the algorithm corresponding to each function in the detected target equipment is improved; and each function in the target equipment is automatically detected based on the configuration information of at least one function in the configuration file, so that the detection efficiency is further improved.
It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the disclosure. Other features and aspects of the present disclosure will become apparent from the following detailed description of exemplary embodiments, which proceeds with reference to the accompanying drawings.
Drawings
The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate embodiments consistent with the present disclosure and, together with the description, serve to explain the principles of the disclosure.
Fig. 1 shows a flow chart of a function detection method according to an embodiment of the present disclosure.
Fig. 2 illustrates an operational schematic diagram responsive to detection of authorization for a target device in accordance with an embodiment of the disclosure.
Fig. 3 shows a first schematic diagram of obtaining a verification result according to an embodiment of the present disclosure.
Fig. 4 shows a schematic diagram two of obtaining a verification result according to an embodiment of the present disclosure.
Fig. 5 shows a schematic diagram of a function detection result according to an embodiment of the present disclosure.
Fig. 6 shows a first display diagram of a connection detection result according to an embodiment of the present disclosure.
Fig. 7 shows a second display diagram of a connection detection result according to an embodiment of the present disclosure.
Fig. 8 illustrates a schematic diagram of obtaining a first identifier and a second identifier of a target device according to an embodiment of the present disclosure.
Fig. 9 shows a schematic diagram of an evaluation operation for an image according to an embodiment of the present disclosure.
FIG. 10 shows a schematic diagram of an object file according to an embodiment of the present disclosure.
Fig. 11 shows a block diagram of a function detection apparatus according to an embodiment of the present disclosure.
Fig. 12 shows a schematic diagram of an application example according to the present disclosure.
Fig. 13 illustrates a block diagram of an electronic device 800 in accordance with an embodiment of the disclosure.
Fig. 14 illustrates a block diagram of an electronic device 1900 in accordance with an embodiment of the disclosure.
Detailed Description
Various exemplary embodiments, features and aspects of the present disclosure will be described in detail below with reference to the accompanying drawings. In the drawings, like reference numbers can indicate functionally identical or similar elements. While the various aspects of the embodiments are presented in drawings, the drawings are not necessarily drawn to scale unless specifically indicated.
The word "exemplary" is used exclusively herein to mean "serving as an example, embodiment, or illustration. Any embodiment described herein as "exemplary" is not necessarily to be construed as preferred or advantageous over other embodiments.
The term "and/or" herein is merely an association describing an associated object, meaning that three relationships may exist, e.g., a and/or B, may mean: a exists alone, A and B exist simultaneously, and B exists alone. In addition, the term "at least one" herein means any one of a plurality or any combination of at least two of a plurality, for example, including at least one of A, B, C, and may mean including any one or more elements selected from the group consisting of A, B and C.
Furthermore, in the following detailed description, numerous specific details are set forth in order to provide a better understanding of the present disclosure. It will be understood by those skilled in the art that the present disclosure may be practiced without some of these specific details. In some instances, methods, means, elements and circuits that are well known to those skilled in the art have not been described in detail so as not to obscure the present disclosure.
Fig. 1 shows a flowchart of a function detection method according to an embodiment of the present disclosure, which may be applied to a function detection apparatus, which may be a terminal device, a server, or other processing device. The terminal device may be a User Equipment (UE), a mobile device, a User terminal, a cellular phone, a cordless phone, a Personal Digital Assistant (PDA), a handheld device, a computing device, a vehicle-mounted device, a wearable device, or the like. In one example, the function detection method can be applied to a cloud server or a local server, and the cloud server can be a public cloud server or a private cloud server, and can be flexibly selected according to actual conditions.
In some possible implementations, the function detection method may also be implemented by a processor calling computer readable instructions stored in a memory.
As shown in fig. 1, in a possible implementation manner, the function detecting method may be used to detect a function of a target device, and includes:
step S11, in response to the authorization detection operation for the target device, acquires the verification information in the configuration file.
In some possible implementation manners, the target device may be an artificial intelligence processing device, the artificial intelligence processing device may implement a processing device with partial or all functions in the device by using an artificial intelligence related processing method, and the implementation manner of the artificial intelligence processing device may be flexibly determined according to an actual situation, and is not limited to the following disclosure embodiments. In one possible implementation, the artificial intelligence processing device may be a Printed Circuit Board (PCBA) burned with an artificial intelligence related processing method; in a possible implementation manner, the artificial intelligence processing device may be an artificial intelligence processing device after being packaged, such as a face recognition device that realizes face recognition based on artificial intelligence, and an intelligent home device that realizes based on artificial intelligence, such as an intelligent sound box, an intelligent lamp, or an intelligent air conditioner.
The configuration file may be a related file for detecting the target device, and the configuration information included in the configuration file may be flexibly changed according to the difference between the detected target devices and the difference between the detection conditions, which is described in the following disclosure embodiments and is not expanded herein.
The manner of obtaining the configuration file is not limited in the embodiments of the present disclosure, and may be flexibly determined according to actual situations. In a possible implementation manner, the configuration file transmitted to the function detection device may be received, or the configuration file may be actively read. The obtaining timing of the configuration file is not limited in the embodiment of the present disclosure, and may be to obtain the configuration file and the verification information in the configuration file in response to an authorization detection operation for the target device, or may be to read the verification information from the configuration file in response to an authorization detection operation for the target device after obtaining the configuration file.
The authorization detection operation for the target device may include a request operation for verifying authorization information in the target device, and how to perform the authorization detection operation for the target device may be flexibly determined according to an actual situation. For example, a request for verifying the authorization information in the target device may be sent to the function detection apparatus by clicking or selecting a detection interface in the human-computer interaction interface of the function detection apparatus. Fig. 2 illustrates an operational schematic diagram responsive to detection of authorization for a target device according to an embodiment of the present disclosure. As shown in fig. 2, a display interface of the function detection apparatus may display a plurality of operation options, where the "read cryptographic chip test" may be an authorized detection operation for the target device, and after the user selects the function entry of the "read cryptographic chip test" by clicking or the like, the function detection apparatus obtains the verification information in the configuration file in response to the authorized detection operation.
The verification information may be information configured in a configuration file, and the verification information may be used to detect an authorization condition of the target device. The information form of the authentication information may be flexibly determined according to actual situations, and in one example, the authentication information may be a key corresponding to the target device.
And step S12, verifying the authorization information in the target device based on the verification information to obtain a verification result.
The authorization information in the target device may be information authorizing an algorithm or a function in the target device, and the form and the location of information storage are not limited in the embodiments of the present disclosure, and are not limited to the following implementations disclosed below. For example, the authorization information may be a license agreement (license) for an algorithm stored in the target device, and the license agreement may be stored in a memory or the like in the target device.
The method for verifying the authorization information in the target device based on the verification information may be flexibly determined according to the verification information and the actual situation of the authorization information, for example, the verification may be implemented by matching the verification information in the configuration file with the authorization information in the target device, which is described in the following text and is not expanded first.
And step S13, in the case that the verification result is successful, responding to the function detection operation aiming at the target equipment, and detecting at least one function in the target equipment based on the configuration information of at least one function in the configuration file to obtain a function detection result.
In case that the verification result is successful, it may indicate that the target device includes the authorized information passing the verification. In this case, one or more functions in the target device may be detected through step S13.
As shown in fig. 2, the operation options displayed in the display interface of the function detection apparatus may include, for example, a "software function test" operation, which may be a function detection operation for the target device, and after the user triggers the "software function test" function, the function detection apparatus detects at least one function in the target device in response to the function detection operation for the target device. Similarly, the function detection process may be triggered in the manner described above for other operation options.
At least one function in the target device may be one or more functions implemented for the target device, and specifically includes several functions and which function items, and may be flexibly determined according to the actual situation of the target device. For example, the detected functions may be functions based on an artificial intelligence algorithm implemented by a neural network, and the implementation form of the neural network is not limited in the embodiment of the present disclosure. For another example, the detected function may include both a function realized by a neural network and a basic function unrelated to an artificial intelligence algorithm such as a neural network.
The configuration file may include configuration information for one or more functions. The configuration information of the function is used for indicating which item or items of the target device need to be detected, and the implementation form of the configuration information of the function can be flexibly determined according to the actual situation. The mode of function detection can be flexibly determined according to the configuration information of the function and the actual condition of the function, and is described in detail below, and is not expanded at first.
The authentication result obtained by authenticating the authorization information may be success or failure. When the verification result indicates that the verification fails, the current target device may not burn or may not burn the authorization information successfully, and in order to improve the detection efficiency, the detection operation may be directly ended. Of course, the function detection operation may be continuously performed to obtain the conditions of the target device more comprehensively. The choice of which implementation or implementations can be flexibly determined according to the actual situation, and is not limited herein.
In the embodiment of the disclosure, in response to the authorization detection operation for the target device, the authorization information in the target device may be verified based on the verification information in the acquired configuration file to obtain a verification result, and in the case that the verification result is successful, in response to the function detection operation for the target device, the at least one function in the target device may be detected based on the configuration information of the at least one function in the configuration file to obtain a function detection result. Through the process, the function detection can be carried out under the condition that the authorization information in the target equipment passes the verification, so that the authorization condition of the target equipment is authenticated, the detection is realized, and the safety of the algorithm corresponding to each function in the detected target equipment is improved; and each function in the target equipment is automatically detected based on the configuration information of at least one function in the configuration file, so that the detection efficiency is further improved.
In one possible implementation, step S12 may include:
obtaining authorization information in target equipment;
and matching the verification information with the authorization information, and recording the verification result as success under the condition of successful matching.
The implementation forms of the authorization information and the verification information may refer to the above disclosed embodiments, and are not described herein again. In a possible implementation manner, the verification information may be a key corresponding to authorization information in the target device, the verification information is matched with the authorization information, and if the matching is successful, it may be determined that the target device includes the authorization information, and the authorization information is authorization information that the target device should be burned, so that the verification result may be recorded as successful.
When the matching fails, it may be that the authorization information is not successfully burned into the target device, so that the target device does not contain the authorization information; it may also be that wrong authorization information is burned into the target device, so that the authorization information in the target device cannot be correspondingly matched with the verification information in the configuration file. In a possible implementation manner, no matter what reason the matching fails, the verification result may be recorded as a failure, and the reason of the matching failure is automatically recorded in a log file generated in the detection process.
By acquiring the authorization information in the target equipment, matching the verification information with the authorization information and recording the verification result as success under the condition of successful matching, the process can be used for effectively verifying whether the target equipment contains correct authorization information or not, so that the authorization information is stored in the detected target equipment, and the safety of the algorithm corresponding to each function in the detected target equipment is improved.
In one possible implementation, the target device may include a cryptographic chip, and the cryptographic chip stores the authorization information, in which case step S12 may include:
reading data in an encryption chip to acquire authorization information in the encryption chip;
and matching the verification information with the authorization information to obtain a verification result, wherein the verification result is successful under the condition of successful matching.
The encryption chip may be a chip with various internal integrated symmetric and asymmetric algorithms, has a security level, and may be in any form, so as to reduce the possibility that the key and the information data stored inside are illegally read and tampered, and the specific implementation form is not limited in the embodiment of the present disclosure. In a possible implementation manner, the authorization information in the target device may be stored in the encryption chip, so as to improve the storage security of the authorization information.
In this case, the process of verifying the authorization information through step S12 may be as described in the above disclosed embodiments, and in one possible implementation, in response to the authorization detection operation for the target device, data of the cryptographic chip in the target device may be read to determine whether the cryptographic chip is successfully integrated in the target device or whether the authorization information is stored in the cryptographic chip in the target device.
The way of reading the data in the encryption chip is not limited in the embodiment of the present disclosure, and can be flexibly determined according to the actual situation of the encryption chip.
In a possible implementation manner, when the encryption chip needs to pass encryption authentication, the configuration file may further include authentication information matched with the encryption chip, and based on the authentication information in the configuration file, the stored authorization information may be acquired from the encryption chip through authentication of the encryption chip.
After the authorization information in the encryption chip is obtained, the verification information included in the configuration file may be matched with the authorization information in the encryption chip, where the form and the matching manner of the verification information may refer to the above-described embodiments, and details are not repeated here.
And under the condition of successful matching, the encrypted chip of the target device can be determined to contain the authorization information which needs to be burned, and the verification result can be recorded as success.
The authorization information is stored in the encryption chip, so that the data in the encryption chip in the target device is read to obtain the authorization information in the encryption chip, and the verification information is matched with the authorization information to obtain a verification result. Through the process, the safety of the target equipment passing the detection can be further improved.
In one possible implementation, step S12 may further include:
and in response to the failure of successfully reading the data in the encryption chip or the failure of matching the verification information with the authorization information, obtaining a failure verification result.
When the data in the encryption chip cannot be successfully read, the verification result can be directly recorded as failure to indicate that the encryption chip storing the authorization information is not successfully integrated in the target device or the encryption chip in the target device does not store the authorization information.
And in the case of a failed matching, it may be that the authorization information is not successfully burned into the encryption chip, it may also be that wrong authorization information is burned into the encryption chip, and the like. No matter what reason the verification result is recorded as failure, the reason that the verification result is failure can be automatically recorded in a log file generated in the detection process for subsequent investigation.
The data in the encryption chip is read first, then the authorization information in the encryption chip is verified, the verification result is recorded as failure under the condition that the encryption chip is not read, the step of detecting the target equipment under the condition that the encryption chip is not read can be saved, and the detection efficiency is improved.
Fig. 3 shows a first schematic diagram of obtaining a verification result according to an embodiment of the present disclosure, and fig. 4 shows a second schematic diagram of obtaining a verification result according to an embodiment of the present disclosure, as shown in the drawing, in an example, the function detection apparatus verifies the authorization information in the encryption chip in the target device in response to the authorization detection operation for the target device to obtain a verification result, and in case that the verification result is successful, a success interface as shown in fig. 3 may be displayed to indicate that the encryption chip is read and the authorization information is successfully verified; if the verification result is failure, a failure interface as shown in fig. 4 may be displayed, which indicates that the authorization information is not successfully verified and the encrypted chip is not successfully read.
In one possible implementation, step S13 may include:
determining a function to be detected in at least one function according to configuration information of at least one function in the configuration file, wherein the at least one function comprises one or more of a face detection function, an attribute detection function, a human body detection function and an action detection function;
and detecting the function to be detected, and obtaining a function detection result according to the detection result of the function to be detected.
The function to be detected may be a function that needs to be detected in the target device according to a preset requirement. In some possible implementation manners, in the process of detecting the target device, all functions included in the device may be detected, or a part of functions included in the device may be detected. Thus, in one possible implementation, the function to be detected of the at least one function may be determined from the configuration file.
As described in the foregoing disclosure embodiments, at least one function included in the target device may be flexibly determined according to an actual situation, and in one possible implementation manner, the at least one function may include a face detection function, an attribute detection function, a human body detection function, an action detection function, and the like that are implemented by a neural network, where the face detection function may be a function of detecting whether a face is included in an image or a video; the attribute detection function may be to determine the related attributes of the object detected in the image or video, such as a gender attribute, an age attribute, or a clothing color attribute; the human body detection function may be a function of detecting whether a human body object is included in an image or a video; the action detection function can be a function for judging whether an object in an image or a video executes various actions or not, and the content of various actions can be flexibly set according to actual conditions, for example, various head or limb actions such as turning head, lifting hands, kicking legs or bending waist can be included.
As described in the foregoing disclosure embodiments, the configuration file may include configuration information for detecting at least one function in the target device, and the function to be detected may be determined according to the configuration information of the at least one function. In one example, the textual content of the configuration file may be:
{
"manufacturer": xx// device vendor of target device
"face": 1// face detection function, 1 denotes this function
"body": 0// human body detection function, 0 means no such function
"attribute": 0// attribute detect function, 0 indicating no such function
"hand dup": 0// lift detection function, 0 indicating no such function
"usbsspeed": 1// configured as USB host computer version series, 1 is
"tcpspeed": 0// configured as a network version module version series, 0 indicates no
"video": 1// is configured to initiate the video preview function test, 1 means is
"version": "v0.4.0.2"// software version of target device
}
It can be seen from the above contents that the configuration file may include configuration information of each function, where if the configuration information of a certain function is 1, it indicates that the function is a function to be detected that needs to be detected; if the configuration information of a certain function is 0, it indicates that the function does not need to be detected and does not belong to the function to be detected, and as can be seen from the figure, in one example, according to the configuration file, it can be determined that the face detection function (face) belongs to the function to be detected, and the human body detection function (body), the attribute detection function (attribute), the hand lifting detection function (hand lifting) in the action detection function, and the like do not belong to the function to be detected.
After the function to be detected is determined according to the configuration information of at least one function in the configuration file, the function to be detected can be detected, and therefore a function detection result is obtained according to the detection result of the function to be detected. In a possible implementation, the function to be detected may comprise only one function, in which case the detection result of the function to be detected may be directly used as the function detection result. In a possible implementation manner, the function to be detected may include multiple functions, and in this case, the detection manner may be described in detail in the following disclosure embodiments, which are not first expanded.
According to the method, the function to be detected in the at least one function is determined according to the configuration information of the at least one function in the configuration file, the function to be detected is detected, and the function detection result is obtained according to the detection result of the function to be detected.
As described in the above-mentioned disclosed embodiment, in a possible implementation manner, the function to be detected may include a plurality of functions to be detected, in which case the function to be detected is detected, and according to the detection result of the function to be detected, a function detection result is obtained, including:
respectively detecting a plurality of functions to be detected to obtain a plurality of detection results;
and obtaining a function detection result based on a plurality of detection results, wherein the function detection result is successful under the condition that the plurality of detection results are successful results, and otherwise, the function detection result is failed.
According to the disclosed embodiment, when the functions to be detected comprise a plurality of functions to be detected, the plurality of functions to be detected can be detected respectively to obtain a plurality of detection results corresponding to the plurality of functions to be detected respectively, and when the plurality of detection results are successful results, the function detection results can be recorded as success; if the plurality of detection results include one or more failures, the functional detection result can be recorded as a failure because the functional detection is determined to be entirely failed.
Fig. 5 is a schematic diagram illustrating function detection results according to an embodiment of the disclosure, and as shown in the figure, in one example, the function detection apparatus detects all of the face detection function, the attribute detection function, the human body detection function, and the hand lifting detection function of the target device in response to the function detection operation for the target device, wherein although the detection results of the face detection and the attribute detection are both successful, the overall function detection result is recorded as a failure because the detection results of the human body detection and the hand lifting detection are both failed.
Through the above process, under the condition that the functions to be detected comprise multiple functions, all the functions can be detected, the overall function detection result is fed back based on the detection results of all the functions to be detected, and the comprehensiveness of the detection result is improved.
In one possible implementation, before step S11, the method may further include:
responding to a connection detection operation aiming at the target equipment, and acquiring connection type information in a configuration file;
detecting the connection state of the target equipment based on the connection type information to obtain a connection detection result; wherein the connection state includes: a network connection state, or a Universal Serial Bus (USB) connection state.
The connection detection operation for the target device may include a request operation for detecting a connection state between the target device and the function detection apparatus, and how to specifically perform the connection detection operation for the target device may be flexibly determined according to an actual situation.
In a possible implementation manner, the configuration file may include connection type information configured by the target device, and the form of the connection type information may be flexibly determined according to the actual situation of the target device. As shown in the configuration file in the above disclosed embodiment, the product family configured in the configuration file may reflect the connection type of the target device, and as can be seen from the figure, in an example, in a case where the product family is configured as a USB upper computer version family, that is, the parameter usbspeed is configured as 1, the configured connection type information is a USB connection type, and the parameter tcpspeed is configured as 0, which indicates that the product family of the target device is not configured as a network version module, that is, the connection type of the target device is not configured as a network connection type.
With the difference of the connection type information configured in the configuration file, the detection content for detecting the connection state of the target device may also change correspondingly, and in a possible implementation manner, the detected connection state may be a USB connection state when the connection type information is a USB connection type; in the case where the connection type of the connection type information is a network connection type, the detected connection state may be a network connection state.
In a possible implementation manner, when the connection state is a network connection state, the connection detection result may be determined according to a comparison result between a network transmission speed and a network connection speed threshold configured in the connection type information, where the network transmission speed may include a transmission speed and/or a reception speed, and if the network transmission speed is not lower than the network connection speed threshold, the connection detection result may be recorded as a success, and otherwise, the connection result may be recorded as a failure; in a possible implementation manner, in a case that the connection status is the USB connection status, the connection detection result may be determined according to a comparison result between a current USB read-write speed and a USB connection speed threshold configured in the connection type information, where the USB read-write speed may include a read speed and/or a write speed, and if the USB read-write speed is not lower than the USB connection speed threshold, the connection detection result may be recorded as a success, otherwise, the connection detection result may be recorded as a failure. In a possible implementation manner, if the connection between the target device and the function detection apparatus is not successful, the connection detection result may be directly recorded as a failure.
As shown in fig. 2 in the foregoing disclosed embodiments, in an example, a plurality of operation options may be displayed in a display interface of the function detection apparatus, where the "network connection test" and the "USB connection test" may be connection detection operations for the target device, and after the user clicks the "network connection test" and/or the "USB connection test", the function detection apparatus detects a connection state of the target device in response to the connection detection operations for the target device. In one example, a "connection test" may be displayed on the display interface of the function detection apparatus as a connection detection operation for the target device, and after the user clicks the "connection test", the function detection apparatus detects the connection state of the target device in response to the connection detection operation for the target device.
Fig. 6 is a first schematic view illustrating a display of a connection detection result according to an embodiment of the present disclosure, as shown in the figure, in an example, the function detection apparatus detects a current network connection state of the target device in response to a connection detection operation for the target device, and obtains the connection detection result, as shown in the figure, in an example, in a case that a sending speed and a receiving speed in the network transmission speed are not lower than a network connection speed threshold, the connection detection result may be recorded as successful. In one example, if the target device fails to be successfully connected to the function detection apparatus, both the transmission speed and the reception speed of the network transmission speed may be displayed as 0, and the connection detection result is recorded as a failure.
Fig. 7 is a second schematic view illustrating a display of a connection detection result according to an embodiment of the present disclosure, as shown in the figure, in an example, the function detection apparatus detects a USB connection state of the target device in response to a connection detection operation for the target device, and obtains the connection detection result, as shown in the figure, in an example, in a case that neither a read speed nor a write speed in the USB read-write speed is lower than a USB connection speed threshold, the connection detection result may be recorded as successful. In one example, if the target device fails to be successfully connected to the function detection apparatus, both the read speed and the write speed of the USB read/write speed may be displayed as 0, and the connection detection result is recorded as a failure.
By responding to the connection detection operation aiming at the target equipment and based on the acquired connection type information in the configuration file, the connection state of the target equipment is detected to obtain a connection detection result.
In one possible implementation, before step S11, the method may further include:
acquiring a first identifier of target equipment, wherein the first identifier is used for distinguishing different target equipment; and/or the presence of a gas in the gas,
and determining a second identification of the target device, wherein the second identification is used for representing the device condition of the target device.
The first identifier may correspond to the target devices one to one, and is used to distinguish different target devices. The form of the first identifier of the target device may be flexibly determined according to actual situations, such as a unique identifier or code of the device, and in one example, the first identifier may be a Serial Number (SN) of the device.
The manner of obtaining the first identifier is not limited in the embodiment of the present disclosure, and may be flexibly determined according to the form of the first identifier, and in an example, in the case that the first identifier is an SN number, the first identifier may be obtained through manual entry or a code scanning manner for the SN number on the target device.
In a possible implementation manner, after the first identifier is obtained, the second identifier of the target device may be automatically determined based on a corresponding relationship between the first identifier and the target device. In a possible implementation manner, the second identifier may include a device model corresponding to the target device and/or a manufacturer of the target device, and the like.
In a possible implementation manner, the function detection apparatus may also automatically read the second identifier after connecting with the target device, and in this case, the second identifier of the target device may also be determined when the first identifier of the target device is not obtained.
Fig. 8 is a schematic diagram illustrating obtaining a first identifier and a second identifier of a target device according to an embodiment of the present disclosure, as shown in the drawing, in an example, a function detection apparatus may include a customized page displaying an identifier of a target device, an input position of an SN number may be displayed in the page, the function detection apparatus may scan the SN number of the target device to be detected by a code scanning gun, and then the SN number obtained after the scanning may be displayed in the page as the first identifier of the target device; on the other hand, the function detection device can read the connected target equipment to be detected, automatically acquire a second identifier such as the equipment model and the manufacturer information of the target equipment and display the second identifier; in one example, in the customized page, the user can also enter a display interface displaying a plurality of operation options as shown in fig. 2 by clicking a button of "start test" to perform subsequent detection.
By acquiring the first identifier and/or the second identifier of the target device, the identity of the target device can be confirmed before the target device is detected, so that the subsequent detection results correspond to the target device, the target device can be conveniently detected in batches, and the detection efficiency is improved.
In a possible implementation manner, the target device may further include an image acquisition device, and the function detection method provided in the embodiment of the present disclosure may further include:
responding to image acquisition detection operation aiming at the target equipment, and acquiring an image acquired by the target equipment based on the configuration file;
and responding to the evaluation operation aiming at the image, and obtaining an image acquisition detection result according to the selected evaluation.
In a possible implementation manner, the target device may further include an image capturing device for capturing an image, and an implementation form of the image capturing device is not limited in the embodiment of the present disclosure and may be a camera or the like for capturing a video or an image.
In the case where the target device includes an image capture device, the quality of the image or video captured by the target device may also be detected based on the profile in response to an image capture detection operation for the target device.
The image acquisition detection operation for the target device may include a request operation for detecting the quality of an image or video acquired by the target device, how to perform the image acquisition detection operation may be flexibly determined according to an actual situation, and in a possible implementation manner, reference may be made to an implementation manner for each operation in each of the above-described disclosed embodiments, which is not described herein again.
As shown in fig. 2 in the foregoing disclosed embodiments, in an example, a plurality of operation options may be displayed in a display interface of the function detection apparatus, where the "video preview test" may be an image capture detection operation for the target device, and after the user clicks the "video preview test", the function detection apparatus may obtain an image captured by the target device based on the configuration file in response to the image capture detection operation for the target device.
In one possible implementation, the configuration file may include whether to start a video preview test, that is, start image capture detection for the target device, as shown in the configuration files in the above disclosed embodiments, in one example, 1 indicates that the image capture detection is started, and 0 indicates that the image capture detection is not started. Under the condition that the configuration file is configured to start image acquisition detection, responding to image acquisition detection operation, and acquiring an image acquired by target equipment by the function detection device; in the case where the configuration file is configured not to start image capture detection, the function detection apparatus may also stop acquiring an image captured by the target device, i.e., terminate image capture detection, in response to an image capture detection operation.
The image collected by the target equipment can be a static image or a dynamic image, and the form of the image can be flexibly determined according to the actual situation. In a possible implementation manner, the function detection device may automatically detect or evaluate the acquired image to obtain an image acquisition detection result. In a possible implementation manner, the function detection device may also display only the acquired image, and obtain the image capturing detection result according to the selected evaluation in response to the evaluation operation for the image.
The evaluation operation for the image may be an operation for evaluating the quality of the image, and the implementation form of the operation may also refer to the implementation forms of the above various operations. In a possible implementation manner, the function detection device may display the image acquired by the target device, display the selectable evaluation on the display interface or the human-computer interaction interface, and obtain the image acquisition detection result according to the selected evaluation. Fig. 9 is a schematic diagram illustrating an evaluation operation for an image according to an embodiment of the present disclosure, and as shown in the drawing, in an example, the function detection apparatus may display a check sign and an error sign while displaying the image, where the check sign indicates that the image capturing detection result is successful, and the error sign indicates that the image capturing detection result is failed, and the image capturing detection result is obtained according to a symbol selected by a user.
By responding to the image acquisition detection operation aiming at the target equipment, acquiring the image acquired by the target equipment based on the configuration file, responding to the evaluation operation aiming at the image, and obtaining the image acquisition detection result according to the selected evaluation, the comprehensive detection can be further improved, and the function detection is realized while the function detection is carried out, and the function of combining software and hardware is further detected.
In a possible implementation manner, the method provided by the embodiment of the present disclosure may further include:
and visually displaying the verification result and/or the function detection result obtained by the target equipment in the detection.
In a possible implementation manner, the function detection method provided in the embodiment of the present disclosure may further perform visual display on each detection result obtained by the detection in the detection process, and the visual display on which detection results are displayed may be flexibly determined according to an actual situation, such as one or more of the verification result, the function detection result, the connection detection result, the unique identity information, the related identity information, and the image acquisition detection result mentioned in the above-described embodiment.
The visual display mode can be flexibly determined according to the actual situation, and in a possible implementation mode, the visual display mode can be displayed through a visual display interface of the function detection device; in a possible implementation manner, the detection results may also be visually displayed through a display device connected to the function detection apparatus, such as a display screen or a projection device. The display mode can refer to fig. 3, fig. 4, fig. 5 to fig. 9, and the like in each of the above disclosed embodiments.
The visual display is carried out on the verification result and/or the function detection result obtained by the target equipment in the detection process, the detection process can be displayed in time, and the intuition and the convenience of the detection process are improved.
In a possible implementation manner, the function detection method provided in the embodiment of the present disclosure may further include:
recording the condition of the target equipment in the detection process through the log file, and adjusting the target equipment according to the log file; and/or the presence of a gas in the gas,
and recording the verification result and/or the function detection result of at least one target device in the target file, and screening the target devices according to the target file.
In one possible implementation manner, the log file may be a log file, and the log file may record conditions of various detection processes, such as an authorization information verification process, a function detection process, a connection detection process, and an image acquisition detection process, in a detection process, so as to subsequently adjust the target device according to the log file, where the adjustment may include troubleshooting problems of the target device, and/or detecting a hardware condition of the target device.
The implementation form of the target file can also be flexibly determined according to the actual situation, in a possible implementation manner, the target file may be a csv file or an Excel file, and the specific selection of which form is not limited in the embodiment of the present disclosure. The target file may record various detection results obtained by the target device in the detection process, such as one or more of a verification result, a function detection result, a connection detection result, a first identifier, a second identifier, and an image acquisition detection result. In a possible implementation manner, the same target file may record various detection results of one target device; in one possible implementation, the same target file may record the detection results of multiple target devices, such as target devices of a production batch. Fig. 10 is a schematic diagram of an object file according to an embodiment of the disclosure, as shown in the figure, in an example, the object file may record each detection result of the object devices in the same batch and an overall detection result, where the overall detection result may be determined according to each detection result, and in a possible implementation, in a case that each detection result is successful, the overall detection result may be successful; in a possible implementation manner, in a case where one detection result included in the detection results is a failure, the overall detection result may be a failure.
According to the target file, the target devices which fail to pass the detection can be screened out from the plurality of target devices, so that the target devices can be screened out.
The log file and the target file are used for recording various detection results in the function detection process and obtained detection results respectively, so that various detection results can be conveniently and visually obtained, and follow-up troubleshooting on various problems in the target equipment is facilitated.
Fig. 11 shows a block diagram of a function detecting apparatus 20 according to an embodiment of the present disclosure, as shown, the apparatus is used for detecting a function of a target device, and the apparatus includes:
an obtaining module 21, configured to obtain the verification information in the configuration file in response to an authorization detection operation for the target device.
And the verification module 22 is configured to verify the authorization information in the target device based on the verification information to obtain a verification result.
And the function detection module 23 is configured to, in response to a function detection operation for the target device if the verification result is successful, detect at least one function in the target device based on the configuration information of the at least one function in the configuration file, and obtain a function detection result.
In one possible implementation, the verification module is configured to: obtaining authorization information in target equipment; and matching the verification information with the authorization information to obtain a verification result, wherein the verification result is successful under the condition of successful matching.
In one possible implementation manner, the target device includes an encryption chip, and the encryption chip stores the authorization information; the verification module is to: reading data in the encryption chip to acquire authorization information in the encryption chip; and matching the verification information with the authorization information to obtain a verification result, wherein the verification result is successful under the condition of successful matching.
In one possible implementation, the apparatus is further configured to: and in response to the failure of successfully reading the data in the encryption chip or the failure of matching the verification information with the authorization information, obtaining a failure verification result.
In one possible implementation, the function detection module is configured to: determining a function to be detected in at least one function according to configuration information of at least one function in the configuration file, wherein the function to be detected comprises one or more of a face detection function, an attribute detection function, a human body detection function and an action detection function; and detecting the function to be detected, and obtaining a function detection result according to the detection result of the function to be detected.
In one possible implementation, the functions to be detected include a plurality of functions to be detected; the function detection module is further configured to: respectively detecting a plurality of functions to be detected to obtain a plurality of detection results; and obtaining a function detection result based on a plurality of detection results, wherein the function detection result is successful under the condition that the plurality of detection results are successful results, and otherwise, the function detection result is failed.
In one possible implementation, before the obtaining module, the apparatus is further configured to: responding to a connection detection operation aiming at the target equipment, and acquiring connection type information in a configuration file; detecting the connection state of the target equipment based on the connection type information to obtain a connection detection result; wherein the connection state includes: a network connection state, or a universal serial bus, USB, connection state.
In one possible implementation, before the obtaining module, the apparatus is further configured to: acquiring a first identifier of target equipment, wherein the first identifier is used for distinguishing different target equipment; and/or determining a second identification of the target device, wherein the second identification is used for representing the device condition of the target device.
In one possible implementation, the target device includes an image capturing device, and the apparatus is further configured to: responding to image acquisition detection operation aiming at the target equipment, and acquiring an image acquired by the target equipment based on the configuration file; and responding to the evaluation operation aiming at the image, and obtaining an image acquisition detection result according to the evaluation result indicated by the evaluation operation.
In one possible implementation, the apparatus is further configured to: and visually displaying the verification result and/or the function detection result obtained by the target equipment in the detection.
In one possible implementation, the apparatus is further configured to: recording the condition of the target equipment in the detection process through the log file, and adjusting the target equipment according to the log file; and/or recording the verification result and/or the function detection result of at least one target device in the target file, and screening the target devices according to the target file.
In some embodiments, functions of or modules included in the apparatus provided in the embodiments of the present disclosure may be used to execute the method described in the above method embodiments, and specific implementation thereof may refer to the description of the above method embodiments, and for brevity, will not be described again here.
Application scenario example
The disclosed application example provides a function detection method, which realizes detection of various functions in target equipment through a function detection device, wherein in the disclosed application example, the function detection device can be a device such as an upper computer, and the target equipment can be PCBA equipment with an artificial intelligence related algorithm burned therein. The function detection method provided by the application example of the disclosure may include the following processes:
first, a configuration file is obtained
The function detection device in the application example of the present disclosure can detect the PCBA device through the USB connection mode and the network connection mode, before the detection starts, the connection mode with the PCBA device can be determined through the configuration file, and meanwhile, different functions and the like that need to be detected and verified on the target device are determined through the configuration file.
Second, identify information of PCBA equipment is determined
After the first page of the interface is displayed by the function detection device, the PCBA customized page is defaulted to determine the identity information of the PCBA equipment, wherein the identity information such as the equipment model, the manufacturer information and the like can be directly read from the connected PCBA equipment and cannot be modified, and the SN number can be written into the function detection device by scanning the code through the code scanning gun. After writing, clicking to start testing, and entering a subsequent automatic testing process. In one possible implementation manner, such as "PCBA test" displayed in the display interface of the click function detection device, the previous test condition of each PCBA device can be checked.
Step three, automatic testing link
The automatic testing link can comprise a network connection test, a USB connection test, a read encryption chip test, a software function test, a video preview test and the like, wherein the network connection test and the USB connection test can be used for detecting the connection state provided in each disclosed embodiment; the read encryption chip test can be corresponding to the verification of the authorization information in each public embodiment; the software function test may correspond to the detection of at least one function proposed in the above-described disclosed embodiments; the video preview test may correspond to the image capture detection operations set forth in the various disclosed embodiments above. Each test can be performed by checking the test result through the display interface of the function testing device, and the display modes are shown in fig. 3, fig. 4, fig. 5 to fig. 9 and the like in the above-mentioned embodiments. In a possible implementation manner, if the PCBA device is successfully connected to the function detection apparatus, a connection success may be displayed, and fig. 12 is a schematic diagram of an application example according to the present disclosure, and as can be seen from the diagram, in an example, in the case that the PCBA device is not successfully connected to the function detection apparatus, the device may be displayed in a display interface of the function detection apparatus to be disconnected.
Fourthly, checking the test result of each function
After the automatic test process is completed, whether each item of test was successful or failed can be displayed. As can be seen based on FIG. 6, in one example, a network connection test may be clicked to see the network transmission speed, which may show a failure if the requirements of the profile configuration are not met; as can be seen from fig. 7, in one example, the USB connection test may be clicked to display the USB read-write speed, and an effect prompt may be given by success or failure; as can be seen from fig. 3 and 4, in an example, the test of reading the cryptographic chip may be clicked, and the display interface of the function detection apparatus may display the state of whether the cryptographic chip is successfully read; based on fig. 5, in an example, a software function test may be clicked to check whether various functions of the PCBA device are normal, such as functions of face detection, attribute detection, human body detection, hand lifting detection, and the like, and display an abnormal capability on a display interface of the function detection apparatus; based on fig. 9, it can be seen that, in an example, a video preview test may be clicked to check whether the real-time image quality preview of the video collected by the PCBA device meets the requirement, and if the real-time image quality preview does not meet the requirement, the video cannot be clicked, and if the real-time image quality preview does not meet the requirement, the video can be clicked.
After each of the above tests, a test report may be generated. If no link of video preview test exists, a test report can be automatically generated after the automatic test is finished. As shown in fig. 10, the test report content may include information such as the SN number of the device, the result of the connection test, the result of the cryptographic chip reading test, the result of the software function test, the result of the video preview test, the result of the overall test, and the test time. In one example, when there is a csv file with a test report in the current directory of the storage location in the function detection device, each item of test data obtained by the current test may be added to the csv file, and if different production batches require a plurality of different test reports, the csv file corresponding to the generated batch may be removed from the current directory of the storage location in the function detection device after the production and the test in the same batch are completed.
In one example, log generation can be performed according to the state of each detection item in the detection process, and the test condition of each item is recorded, so that problems can be conveniently checked, and the hardware condition can be detected.
The application example of the disclosure provides a visual function detection method, which is convenient for verifying whether the quality and the function of each device reach the standard or not under the condition of batch production of target devices, and is more convenient and intuitive compared with the related technology.
The function detection method proposed in the application example of the present disclosure can be further extended to be applied to detection of other devices besides detection of target devices, and is not limited to the above-described embodiments.
It is understood that the above-mentioned method embodiments of the present disclosure can be combined with each other to form a combined embodiment without departing from the logic of the principle, which is limited by the space, and the detailed description of the present disclosure is omitted.
It will be understood by those skilled in the art that in the method of the present invention, the order of writing the steps does not imply a strict order of execution and any limitations on the implementation, and the specific order of execution of the steps should be determined by their function and possible inherent logic.
Embodiments of the present disclosure also provide a computer-readable storage medium having stored thereon computer program instructions, which when executed by a processor, implement the above-mentioned method. The computer readable storage medium may be a non-volatile computer readable storage medium.
An embodiment of the present disclosure further provides an electronic device, including: a processor; a memory for storing processor-executable instructions; wherein the processor is configured to invoke the memory-stored instructions to perform the above-described method.
The disclosed embodiments also provide a computer program product comprising computer readable code, which when run on a device, a processor in the device executes instructions for implementing the neural network generation method provided in any of the above embodiments.
The embodiments of the present disclosure also provide another computer program product for storing computer readable instructions, which when executed cause a computer to perform the operations of the neural network generation method provided in any one of the embodiments.
The electronic device may be provided as a terminal, server, or other form of device.
Fig. 13 illustrates a block diagram of an electronic device 800 in accordance with an embodiment of the disclosure. For example, the electronic device 800 may be a mobile phone, a computer, a digital broadcast terminal, a messaging device, a game console, a tablet device, a medical device, a fitness device, a personal digital assistant, or the like terminal.
Referring to fig. 13, electronic device 800 may include one or more of the following components: processing component 802, memory 804, power component 806, multimedia component 808, audio component 810, input/output (I/O) interface 812, sensor component 814, and communication component 816.
The processing component 802 generally controls overall operation of the electronic device 800, such as operations associated with display, telephone calls, data communications, camera operations, and recording operations. The processing components 802 may include one or more processors 820 to execute instructions to perform all or a portion of the steps of the methods described above. Further, the processing component 802 can include one or more modules that facilitate interaction between the processing component 802 and other components. For example, the processing component 802 can include a multimedia module to facilitate interaction between the multimedia component 808 and the processing component 802.
The memory 804 is configured to store various types of data to support operations at the electronic device 800. Examples of such data include instructions for any application or method operating on the electronic device 800, contact data, phonebook data, messages, pictures, videos, and so forth. The memory 804 may be implemented by any type or combination of volatile or non-volatile memory devices such as Static Random Access Memory (SRAM), electrically erasable programmable read-only memory (EEPROM), erasable programmable read-only memory (EPROM), programmable read-only memory (PROM), read-only memory (ROM), magnetic memory, flash memory, magnetic or optical disks.
The power supply component 806 provides power to the various components of the electronic device 800. The power components 806 may include a power management system, one or more power supplies, and other components associated with generating, managing, and distributing power for the electronic device 800.
The multimedia component 808 includes a screen that provides an output interface between the electronic device 800 and a user. In some embodiments, the screen may include a Liquid Crystal Display (LCD) and a Touch Panel (TP). If the screen includes a touch panel, the screen may be implemented as a touch screen to receive an input signal from a user. The touch panel includes one or more touch sensors to sense touch, slide, and gestures on the touch panel. The touch sensor may not only sense the boundary of a touch or slide action, but also detect the duration and pressure associated with the touch or slide operation. In some embodiments, the multimedia component 808 includes a front facing camera and/or a rear facing camera. The front camera and/or the rear camera may receive external multimedia data when the electronic device 800 is in an operation mode, such as a shooting mode or a video mode. Each front camera and rear camera may be a fixed optical lens system or have a focal length and optical zoom capability.
The audio component 810 is configured to output and/or input audio signals. For example, the audio component 810 includes a Microphone (MIC) configured to receive external audio signals when the electronic device 800 is in an operational mode, such as a call mode, a recording mode, and a voice recognition mode. The received audio signals may further be stored in the memory 804 or transmitted via the communication component 816. In some embodiments, audio component 810 also includes a speaker for outputting audio signals.
The I/O interface 812 provides an interface between the processing component 802 and peripheral interface modules, which may be keyboards, click wheels, buttons, etc. These buttons may include, but are not limited to: a home button, a volume button, a start button, and a lock button.
The sensor assembly 814 includes one or more sensors for providing various aspects of state assessment for the electronic device 800. For example, the sensor assembly 814 may detect an open/closed state of the electronic device 800, the relative positioning of components, such as a display and keypad of the electronic device 800, the sensor assembly 814 may also detect a change in the position of the electronic device 800 or a component of the electronic device 800, the presence or absence of user contact with the electronic device 800, orientation or acceleration/deceleration of the electronic device 800, and a change in the temperature of the electronic device 800. Sensor assembly 814 may include a proximity sensor configured to detect the presence of a nearby object without any physical contact. The sensor assembly 814 may also include a light sensor, such as a Complementary Metal Oxide Semiconductor (CMOS) or Charge Coupled Device (CCD) image sensor, for use in imaging applications. In some embodiments, the sensor assembly 814 may also include an acceleration sensor, a gyroscope sensor, a magnetic sensor, a pressure sensor, or a temperature sensor.
The communication component 816 is configured to facilitate wired or wireless communication between the electronic device 800 and other devices. The electronic device 800 may access a wireless network based on a communication standard, such as a wireless network (WiFi), a second generation mobile communication technology (2G) or a third generation mobile communication technology (3G), a Long Term Evolution (Long Term Evolution, LTE) or a fifth generation mobile communication technology (5G), or a combination thereof. In an exemplary embodiment, the communication component 816 receives a broadcast signal or broadcast related information from an external broadcast management system via a broadcast channel. In an exemplary embodiment, the communication component 816 further includes a Near Field Communication (NFC) module to facilitate short-range communications. For example, the NFC module may be implemented based on Radio Frequency Identification (RFID) technology, infrared data association (IrDA) technology, Ultra Wideband (UWB) technology, Bluetooth (BT) technology, and other technologies.
In an exemplary embodiment, the electronic device 800 may be implemented by one or more Application Specific Integrated Circuits (ASICs), Digital Signal Processors (DSPs), Digital Signal Processing Devices (DSPDs), Programmable Logic Devices (PLDs), Field Programmable Gate Arrays (FPGAs), controllers, micro-controllers, microprocessors or other electronic components for performing the above-described methods.
In an exemplary embodiment, a non-transitory computer-readable storage medium, such as the memory 804, is also provided that includes computer program instructions executable by the processor 820 of the electronic device 800 to perform the above-described methods.
Fig. 14 illustrates a block diagram of an electronic device 1900 in accordance with an embodiment of the disclosure. For example, the electronic device 1900 may be provided as a server. Referring to fig. 14, electronic device 1900 includes a processing component 1922 further including one or more processors and memory resources, represented by memory 1932, for storing instructions, e.g., applications, executable by processing component 1922. The application programs stored in memory 1932 may include one or more modules that each correspond to a set of instructions. Further, the processing component 1922 is configured to execute instructions to perform the above-described method.
The electronic device 1900 may also include a power component 1926 configured to perform power management of the electronic device 1900, a wired or wireless network interface 1950 configured to connect the electronic device 1900 to a network, and an input/output (I/O) interface 1958. The electronic device 1900 may operate based on an operating system, such as the Microsoft Server operating system (Windows Server), stored in the memory 1932TM) Apple Inc. of the present application based on the graphic user interface operating System (Mac OS X)TM) Multi-user, multi-process computer operating system (Unix)TM) Free and open native code Unix-like operating System (Linux)TM) Open native code Unix-like operating System (FreeBSD)TM) Or the like.
In an exemplary embodiment, a non-transitory computer readable storage medium, such as the memory 1932, is also provided that includes computer program instructions executable by the processing component 1922 of the electronic device 1900 to perform the above-described methods.
The present disclosure may be systems, methods, and/or computer program products. The computer program product may include a computer-readable storage medium having computer-readable program instructions embodied thereon for causing a processor to implement various aspects of the present disclosure.
The computer readable storage medium may be a tangible device that can hold and store the instructions for use by the instruction execution device. The computer readable storage medium may be, for example, but is not limited to, an electronic memory device, a magnetic memory device, an optical memory device, an electromagnetic memory device, a semiconductor memory device, or any suitable combination of the foregoing. More specific examples (a non-exhaustive list) of the computer readable storage medium would include the following: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a Static Random Access Memory (SRAM), a portable compact disc read-only memory (CD-ROM), a Digital Versatile Disc (DVD), a memory stick, a floppy disk, a mechanical coding device, such as punch cards or in-groove projection structures having instructions stored thereon, and any suitable combination of the foregoing. Computer-readable storage media as used herein is not to be construed as transitory signals per se, such as radio waves or other freely propagating electromagnetic waves, electromagnetic waves propagating through a waveguide or other transmission medium (e.g., optical pulses through a fiber optic cable), or electrical signals transmitted through electrical wires.
The computer-readable program instructions described herein may be downloaded from a computer-readable storage medium to a respective computing/processing device, or to an external computer or external storage device via a network, such as the internet, a local area network, a wide area network, and/or a wireless network. The network may include copper transmission cables, fiber optic transmission, wireless transmission, routers, firewalls, switches, gateway computers and/or edge servers. The network adapter card or network interface in each computing/processing device receives computer-readable program instructions from the network and forwards the computer-readable program instructions for storage in a computer-readable storage medium in the respective computing/processing device.
The computer program instructions for carrying out operations of the present disclosure may be assembler instructions, Instruction Set Architecture (ISA) instructions, machine-related instructions, microcode, firmware instructions, state setting data, or source or object code written in any combination of one or more programming languages, including an object oriented programming language such as Smalltalk, C + + or the like and conventional procedural programming languages, such as the "C" programming language or similar programming languages. The computer-readable program instructions may execute entirely on the user's computer, partly on the user's computer, as a stand-alone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the case of a remote computer, the remote computer may be connected to the user's computer through any type of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet service provider). In some embodiments, the electronic circuitry that can execute the computer-readable program instructions implements aspects of the present disclosure by utilizing the state information of the computer-readable program instructions to personalize the electronic circuitry, such as a programmable logic circuit, a Field Programmable Gate Array (FPGA), or a Programmable Logic Array (PLA).
Various aspects of the present disclosure are described herein with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems) and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/or block diagrams, and combinations of blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer-readable program instructions.
These computer-readable program instructions may be provided to a processor of a general purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. These computer-readable program instructions may also be stored in a computer-readable storage medium that can direct a computer, programmable data processing apparatus, and/or other devices to function in a particular manner, such that the computer-readable medium storing the instructions comprises an article of manufacture including instructions which implement the function/act specified in the flowchart and/or block diagram block or blocks.
The computer readable program instructions may also be loaded onto a computer, other programmable data processing apparatus, or other devices to cause a series of operational steps to be performed on the computer, other programmable apparatus or other devices to produce a computer implemented process such that the instructions which execute on the computer, other programmable apparatus or other devices implement the functions/acts specified in the flowchart and/or block diagram block or blocks.
The flowchart and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of instructions, which comprises one or more executable instructions for implementing the specified logical function(s). In some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
The computer program product may be embodied in hardware, software or a combination thereof. In an alternative embodiment, the computer program product is embodied in a computer storage medium, and in another alternative embodiment, the computer program product is embodied in a Software product, such as a Software Development Kit (SDK), or the like.
Having described embodiments of the present disclosure, the foregoing description is intended to be exemplary, not exhaustive, and not limited to the disclosed embodiments. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope and spirit of the described embodiments. The terminology used herein is chosen in order to best explain the principles of the embodiments, the practical application, or improvements made to the technology in the marketplace, or to enable others of ordinary skill in the art to understand the embodiments disclosed herein.

Claims (14)

1. A method for detecting a function of a target device, the method comprising:
in response to an authorization detection operation for the target device, obtaining verification information in a configuration file;
verifying the authorization information in the target equipment based on the verification information to obtain a verification result;
and under the condition that the verification result is successful, responding to the function detection operation aiming at the target equipment, and detecting at least one function in the target equipment based on the configuration information of at least one function in the configuration file to obtain a function detection result.
2. The method of claim 1, wherein the verifying the authorization information in the target device based on the verification information to obtain a verification result comprises:
obtaining authorization information in the target device;
and matching the verification information with the authorization information to obtain the verification result, wherein the verification result is successful under the condition of successful matching.
3. The method according to claim 1 or 2, wherein the target device comprises a cryptographic chip, and the cryptographic chip stores the authorization information therein;
the verifying the authorization information in the target device based on the verification information to obtain a verification result includes:
reading data in the encryption chip to acquire authorization information in the encryption chip;
and matching the verification information with the authorization information to obtain the verification result, wherein the verification result is successful under the condition of successful matching.
4. The method of claim 3, further comprising:
and responding to the situation that the data in the encryption chip cannot be read successfully or the verification result is failure when the verification information is unsuccessfully matched with the authorization information.
5. The method according to any one of claims 1 to 4, wherein the detecting at least one function in the target device based on the configuration information of the at least one function in the configuration file to obtain a function detection result comprises:
determining a function to be detected in at least one function according to configuration information of the at least one function in the configuration file, wherein the function to be detected comprises one or more of a face detection function, an attribute detection function, a human body detection function and an action detection function;
and detecting the function to be detected, and obtaining a function detection result according to the detection result of the function to be detected.
6. The method of claim 5, wherein the functions to be detected comprise a plurality of functions to be detected;
treat the detection function and detect, according to the testing result of function of waiting to detect obtains the function test result, include:
respectively detecting the multiple functions to be detected to obtain multiple detection results;
and obtaining the function detection result based on the multiple detection results, wherein the function detection result is successful under the condition that the multiple detection results are successful results, and otherwise, the function detection result is failed.
7. The method of any of claims 1 to 6, wherein prior to obtaining the authentication information in the configuration file in response to the authorization detection operation for the target device, the method further comprises:
responding to the connection detection operation aiming at the target equipment, and acquiring the connection type information in the configuration file;
detecting the connection state of the target equipment based on the connection type information to obtain a connection detection result; wherein the connection state comprises:
a network connection state, or a universal serial bus, USB, connection state.
8. The method of any of claims 1 to 7, wherein prior to obtaining the authentication information in the configuration file in response to the authorization detection operation for the target device, the method further comprises:
acquiring a first identifier of the target device, wherein the first identifier is used for distinguishing different target devices; and/or the presence of a gas in the gas,
and determining a second identification of the target device, wherein the second identification is used for representing the device condition of the target device.
9. The method of any one of claims 1 to 8, wherein the target device comprises an image acquisition device, the method further comprising:
responding to image acquisition detection operation aiming at the target equipment, and acquiring an image acquired by the target equipment based on the configuration file;
and responding to the evaluation operation aiming at the image, and obtaining an image acquisition detection result according to the evaluation result indicated by the evaluation operation.
10. The method according to any one of claims 1 to 9, further comprising:
and visually displaying the verification result and/or the function detection result obtained by the target equipment in the detection.
11. The method according to any one of claims 1 to 10, further comprising:
recording the condition of the target equipment in detection through a log file, and adjusting the target equipment according to the log file; and/or the presence of a gas in the gas,
and recording a verification result and/or a function detection result of at least one target device in a target file, and screening the target device according to the target file.
12. A function detecting apparatus, for detecting a function of a target device, the apparatus comprising:
an obtaining module, configured to obtain, in response to an authorization detection operation for the target device, verification information in a configuration file;
the verification module is used for verifying the authorization information in the target equipment based on the verification information to obtain a verification result;
and the function detection module is used for responding to the function detection operation aiming at the target equipment under the condition that the verification result is successful, and detecting at least one function in the target equipment based on the configuration information of at least one function in the configuration file to obtain a function detection result.
13. An electronic device, comprising:
a processor;
a memory for storing processor-executable instructions;
wherein the processor is configured to invoke the memory-stored instructions to perform the method of any of claims 1 to 11.
14. A computer readable storage medium having computer program instructions stored thereon, which when executed by a processor implement the method of any one of claims 1 to 11.
CN202110479178.9A 2021-04-30 2021-04-30 Function detection method and device, electronic equipment and storage medium Pending CN113138888A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110479178.9A CN113138888A (en) 2021-04-30 2021-04-30 Function detection method and device, electronic equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110479178.9A CN113138888A (en) 2021-04-30 2021-04-30 Function detection method and device, electronic equipment and storage medium

Publications (1)

Publication Number Publication Date
CN113138888A true CN113138888A (en) 2021-07-20

Family

ID=76816521

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110479178.9A Pending CN113138888A (en) 2021-04-30 2021-04-30 Function detection method and device, electronic equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113138888A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116520788A (en) * 2023-07-03 2023-08-01 深圳市微克科技有限公司 Automatic production control method and system for wearable equipment and readable storage medium

Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102455961A (en) * 2010-10-29 2012-05-16 鸿富锦精密工业(深圳)有限公司 System and method for managing and controlling mainboard testing process
JP2012226658A (en) * 2011-04-21 2012-11-15 Fujitsu Semiconductor Ltd Test device, verification model development method, and program
JP2014217186A (en) * 2013-04-25 2014-11-17 富士電機株式会社 Electronic equipment, verification method and verification program
CN104978265A (en) * 2014-04-09 2015-10-14 罗森伯格(上海)通信技术有限公司 PCBA test method and PCBA test system
CN105512043A (en) * 2015-12-24 2016-04-20 百度在线网络技术(北京)有限公司 Test method and device
CN108400902A (en) * 2018-01-15 2018-08-14 阿里巴巴集团控股有限公司 A kind of method, apparatus and equipment of gray scale test
CN109800119A (en) * 2018-12-25 2019-05-24 深圳市元征科技股份有限公司 A kind of product function test method and device
CN111177732A (en) * 2019-12-23 2020-05-19 杭州宇泛智能科技有限公司 System debugging mode control method and system and electronic equipment
CN111984476A (en) * 2020-06-29 2020-11-24 百度在线网络技术(北京)有限公司 Test method and device
CN112100954A (en) * 2020-08-31 2020-12-18 北京百度网讯科技有限公司 Method and device for verifying chip and computer storage medium
CN112698876A (en) * 2019-10-21 2021-04-23 上海博泰悦臻电子设备制造有限公司 Vehicle-mounted terminal engineering mode entering method and system, storage medium and vehicle-mounted terminal

Patent Citations (11)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102455961A (en) * 2010-10-29 2012-05-16 鸿富锦精密工业(深圳)有限公司 System and method for managing and controlling mainboard testing process
JP2012226658A (en) * 2011-04-21 2012-11-15 Fujitsu Semiconductor Ltd Test device, verification model development method, and program
JP2014217186A (en) * 2013-04-25 2014-11-17 富士電機株式会社 Electronic equipment, verification method and verification program
CN104978265A (en) * 2014-04-09 2015-10-14 罗森伯格(上海)通信技术有限公司 PCBA test method and PCBA test system
CN105512043A (en) * 2015-12-24 2016-04-20 百度在线网络技术(北京)有限公司 Test method and device
CN108400902A (en) * 2018-01-15 2018-08-14 阿里巴巴集团控股有限公司 A kind of method, apparatus and equipment of gray scale test
CN109800119A (en) * 2018-12-25 2019-05-24 深圳市元征科技股份有限公司 A kind of product function test method and device
CN112698876A (en) * 2019-10-21 2021-04-23 上海博泰悦臻电子设备制造有限公司 Vehicle-mounted terminal engineering mode entering method and system, storage medium and vehicle-mounted terminal
CN111177732A (en) * 2019-12-23 2020-05-19 杭州宇泛智能科技有限公司 System debugging mode control method and system and electronic equipment
CN111984476A (en) * 2020-06-29 2020-11-24 百度在线网络技术(北京)有限公司 Test method and device
CN112100954A (en) * 2020-08-31 2020-12-18 北京百度网讯科技有限公司 Method and device for verifying chip and computer storage medium

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN116520788A (en) * 2023-07-03 2023-08-01 深圳市微克科技有限公司 Automatic production control method and system for wearable equipment and readable storage medium

Similar Documents

Publication Publication Date Title
US20170053149A1 (en) Method and apparatus for fingerprint identification
US20160028741A1 (en) Methods and devices for verification using verification code
TWI761843B (en) Access control method and device, electronic device and storage medium
CN104484593B (en) terminal verification method and device
CN103957103A (en) Safety authentication method and device and mobile terminal
CN110765434A (en) Identity authentication method and device, electronic equipment and storage medium
CN110941942A (en) Method, device and system for checking circuit schematic diagram
EP3176719A1 (en) Methods and devices for acquiring certification document
CN106453802A (en) Cipher verification method and device, and terminal
CN104010094A (en) Information sending method and device in voice services
CN104158665A (en) Method and device of verification
CN106815502A (en) The method and apparatus for checking message
CN106775834A (en) Brush machine verification method and device
CN113138888A (en) Function detection method and device, electronic equipment and storage medium
CN110008668B (en) Data processing method, device and storage medium
CN106412481A (en) Prompt method and device, and terminals based on VoLTE video call
CN114124462B (en) Verification code transmission method and device, electronic equipment and storage medium
CN113726905B (en) Data acquisition method, device and equipment based on home terminal equipment
CN111723353A (en) Identity authentication method, device, terminal and storage medium based on face recognition
CN106446827B (en) Iris recognition function detection method and device
CN110708427B (en) Information processing method, device and storage medium
CN110490285B (en) Method, device and storage medium for simulating card
CN113742689A (en) Automatic driving method and device with participation of security officer, electronic equipment and storage medium
CN112020059B (en) NFC instruction processing method, NFC instruction processing device and storage medium
CN111240875B (en) Network exception handling method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination