CN113360409A - Security testing method and system for mobile terminal application program - Google Patents

Security testing method and system for mobile terminal application program Download PDF

Info

Publication number
CN113360409A
CN113360409A CN202110807745.9A CN202110807745A CN113360409A CN 113360409 A CN113360409 A CN 113360409A CN 202110807745 A CN202110807745 A CN 202110807745A CN 113360409 A CN113360409 A CN 113360409A
Authority
CN
China
Prior art keywords
message
application program
mobile terminal
data
security
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202110807745.9A
Other languages
Chinese (zh)
Inventor
康剑萍
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shanghai Institute of Quality Inspection and Technical Research
Original Assignee
Individual
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Individual filed Critical Individual
Priority to CN202110807745.9A priority Critical patent/CN113360409A/en
Publication of CN113360409A publication Critical patent/CN113360409A/en
Pending legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3684Test management for test design, e.g. generating new test cases
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Telephone Function (AREA)

Abstract

The invention provides a security testing method and system for a mobile terminal application program, and relates to the field of computer software. A security testing method for a mobile terminal application program comprises the following steps: collecting a first message of an application program from a mobile terminal interface; displaying according to the first message and acquiring a second message, wherein the second message is message data adjusted based on the first message; acquiring a target safety test case corresponding to the type of the second message from a preset safety test library; and performing data interaction with the target safety test case based on the second message to obtain a safety test result. The method and the device can improve the safety testing efficiency of the interactive process between the mobile terminal and the server terminal in the service scene. In addition, the invention also provides a safety test system of the mobile terminal application program.

Description

Security testing method and system for mobile terminal application program
Technical Field
The invention relates to the field of computer software, in particular to a security testing method and system for a mobile terminal application program.
Background
At present, after the application applied to a domestic business scene is popularized to an international business scene, a security team cannot collect flow data of an international gateway for automatic vulnerability testing due to compliance reasons that online data cannot be exported and the like.
In this case, the interaction flow between the mobile terminal and the service terminal needs to be tested manually for safety. Manual testing consumes a lot of manpower and time, and the rapid development process also causes the difficulty of keeping up with the speed of business development. Therefore, how to provide a security testing method to test the interaction flow between the client and the server in the international business scenario, and ensure the secure interaction between the mobile terminal and the server, a further solution is still needed.
Disclosure of Invention
The invention aims to provide a safety test method for a mobile terminal application program, which can improve the safety test efficiency of an interaction process between a mobile terminal and a server terminal in a service scene.
Another objective of the present invention is to provide a security testing system for a mobile application, which is capable of running a security testing method for a mobile application.
The embodiment of the invention is realized by the following steps:
in a first aspect, an embodiment of the present application provides a method for testing security of an application program at a mobile terminal, including acquiring a first message associated with the application program from an interface of the mobile terminal; displaying according to the first message and acquiring a second message, wherein the second message is message data adjusted based on the first message; acquiring a target safety test case corresponding to the type of the second message from a preset safety test library; and performing data interaction with the target safety test case based on the second message to obtain a safety test result.
In some embodiments of the present invention, the collecting the first message associated with the application program from the mobile terminal interface includes: and collecting message data related to the application program from an interface of an operating system of the mobile terminal through a data collection program in the mobile terminal.
In some embodiments of the present invention, the above further includes: and searching a function address of a target function for realizing a reflection mechanism through a bottom interface of an application program, obtaining the function address of the target function, calling the target function according to the function address, and packaging the target function to form an operating system interface.
In some embodiments of the present invention, the displaying according to the first message and obtaining the second message, where the second message is the message data adjusted based on the first message, includes: and converting the binary data stream according to a preset data conversion mode to obtain a first message when the message data is the binary data stream through the acquired message data in the application program.
In some embodiments of the present invention, the above further includes: the method comprises the steps of obtaining a first message converted by a mobile terminal through binary data stream, preprocessing the first message to obtain a second message, wherein the second message is adjusted based on the first message.
In some embodiments of the present invention, the obtaining of the target security test case corresponding to the type of the second packet from the preset security test library includes: and sending the second message to a preset security test library through a data acquisition application program in the mobile terminal, and sending the message data to a data analysis engine through the preset security test library.
In some embodiments of the present invention, the performing data interaction with the target security test case based on the second packet to obtain the security test result includes: and performing security test on the second message based on the target security test case, and determining that the application program has a bug if the second message obtained through the test has a bug of a specified type.
In a second aspect, an embodiment of the present application provides a security testing system for a mobile application program, which includes an acquisition module, configured to acquire a first message associated with the application program from a mobile terminal interface;
the display module is used for displaying according to the first message and acquiring a second message, wherein the second message is message data adjusted based on the first message;
the test module is used for acquiring a target safety test case corresponding to the type of the second message from a preset safety test library;
and the result module is used for performing data interaction with the target safety test case based on the second message to obtain a safety test result.
In some embodiments of the invention, the above includes: at least one memory for storing computer instructions; at least one processor in communication with the memory, wherein the at least one processor, when executing the computer instructions, causes the system to: the device comprises an acquisition module, a display module, a test module and a result module.
In a third aspect, an embodiment of the present application provides a computer-readable storage medium, on which a computer program is stored, where the computer program, when executed by a processor, implements a method such as any one of the security testing methods for a mobile terminal application.
Compared with the prior art, the embodiment of the invention has at least the following advantages or beneficial effects:
the method can acquire the message data related to the application program from the interface of the application program, acquire the target safety test case corresponding to the type of the message data from a preset safety test case library, and perform safety test on the message data based on the target safety test case to obtain the safety test result of the application program. The application related data can be directly obtained from the interface of the operating system of the terminal equipment, so that the problem of data source when the application is subjected to security testing is solved, a universal security testing method is provided for various types of applications and different types of terminals, and the security testing requirements of different mobile terminal applications are met. In addition, corresponding safety test cases are set in advance based on different types of flow messages, and the safety test efficiency is improved.
Drawings
In order to more clearly illustrate the technical solutions of the embodiments of the present invention, the drawings needed to be used in the embodiments will be briefly described below, it should be understood that the following drawings only illustrate some embodiments of the present invention and therefore should not be considered as limiting the scope, and for those skilled in the art, other related drawings can be obtained according to the drawings without inventive efforts.
Fig. 1 is a schematic diagram illustrating steps of a security testing method for a mobile application according to an embodiment of the present invention;
fig. 2 is a detailed step diagram of a method for testing security of a mobile application according to an embodiment of the present invention;
fig. 3 is a schematic diagram of a security testing system module of a mobile application according to an embodiment of the present invention;
fig. 4 is an electronic device according to an embodiment of the present invention.
Icon: 10-an acquisition module; 20-a display module; 30-a test module; 40-a result module; 101-a memory; 102-a processor; 103-communication interface.
Detailed Description
In order to make the objects, technical solutions and advantages of the embodiments of the present application clearer, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are some embodiments of the present application, but not all embodiments. The components of the embodiments of the present application, generally described and illustrated in the figures herein, can be arranged and designed in a wide variety of different configurations.
Thus, the following detailed description of the embodiments of the present application, presented in the accompanying drawings, is not intended to limit the scope of the claimed application, but is merely representative of selected embodiments of the application. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
It should be noted that: like reference numbers and letters refer to like items in the following figures, and thus, once an item is defined in one figure, it need not be further defined and explained in subsequent figures.
It is to be noted that the term "comprises," "comprising," or any other variation thereof is intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising an … …" does not exclude the presence of other identical elements in a process, method, article, or apparatus that comprises the element.
Some embodiments of the present application will be described in detail below with reference to the accompanying drawings. The embodiments described below and the individual features of the embodiments can be combined with one another without conflict.
Example 1
Referring to fig. 1, fig. 1 is a schematic diagram illustrating steps of a security testing method for a mobile application according to an embodiment of the present invention, which is shown as follows:
step S100, collecting a first message of an application program from a mobile terminal interface;
in some embodiments, the operating system of the mobile terminal may include an operating system of a terminal device such as an Android operating system and an apple mobile phone (IOS) operating system. In order to mask differences between operating systems, one or more embodiments of the present disclosure may set corresponding data collection programs in advance according to different types of operating systems.
The data acquisition program is installed in the mobile terminal, and a first message related to the application program is acquired from an interface of an operating system of the mobile terminal through the data acquisition program. Collecting a first message related to an application program from an interface of an operating system of a mobile terminal, wherein the first message comprises: and acquiring a first message related to the application program from an interface of an operating system of the mobile terminal through a data acquisition program in the mobile terminal.
Step S110, displaying according to the first message and obtaining a second message, wherein the second message is message data adjusted based on the first message;
in some embodiments, the second message may be adjusted based on the first message, the adjustment may be to modify the original parameters, and so on. Or the mobile terminal may execute a corresponding adjustment function based on the first packet to perform the adjusted content. The mobile terminal displays the first message on the interface, a user can modify the content displayed on the interface through the operation terminal, and the terminal generates a second message according to the content input by the user. When the terminal displaying the first message is the same terminal as the terminal executing the application program to be tested, directly acquiring the content input by the user, generating a second message, when the terminal displaying the first message is a different terminal from the terminal executing the application program to be tested, inputting the modified content at the terminal displaying the first message by the user, generating the second message, sending the second message to the terminal executing the application program to be tested, and receiving the second message by the terminal executing the application program to be tested.
Step S120, a target safety test case corresponding to the type of the second message is obtained from a preset safety test library;
in some embodiments, the message data is sent to the central gateway through a data acquisition program in the mobile terminal; sending the message data to a data analysis engine through a central gateway; and acquiring a target safety test case corresponding to the type of the message data from a preset safety test case library through a data analysis engine.
In order to improve the determination efficiency of the target safety test case, the data analysis engine can match the corresponding vulnerability test rules according to message data in different formats, and generate the corresponding target safety test case according to the corresponding vulnerability test rules. And selecting the type of the corresponding test load to be issued based on different characteristics of the data flow message. The judgment of the selection can be made by the experience of safety operators or a trained artificial intelligence model. For example, if an html tag exists in the message data, the xss payload may be used for testing, and if an http request exists, the SSRF test payload may be used for vulnerability detection.
And step S130, performing data interaction with the target safety test case based on the second message to obtain a safety test result.
In some embodiments, a target security test case is issued to a case execution module through a data analysis engine; and performing safety test on the network flow message based on the target safety test case through a case execution module to obtain a safety test result of the application program. In order to quickly and accurately determine the possible bugs in the application program, the possible bug types can be preset, such as logic bypass bugs, sensitive information leakage bugs, SSRF bugs, XSS script attack bugs and the like. Specifically, the network traffic message is subjected to a security test based on the target security test case, and a security test result of the application program is obtained.
Example 2
Referring to fig. 2, fig. 2 is a detailed step diagram of a security testing method for a mobile application according to an embodiment of the present invention, which is shown as follows:
step S200, collecting message data related to the application program from the interface of the operating system of the mobile terminal through the data collection program in the mobile terminal.
Step S210, finding a function address of a target function implementing a reflection mechanism through a bottom interface of an application program, obtaining the function address of the target function, calling the target function according to the function address, and encapsulating the target function to form an operating system interface.
Step S220, converting the binary data stream according to a preset data conversion method when the message data is the binary data stream according to the obtained message data in the application program, so as to obtain a first message.
Step S230, obtaining a first message converted by the mobile terminal through the binary data stream, and preprocessing the first message to obtain a second message, where the second message is a message adjusted based on the first message.
Step S240, sending the second message to a preset security test library through a data collection application in the mobile terminal, and sending the message data to a data analysis engine through the preset security test library.
And step S250, carrying out security test on the second message based on the target security test case, and determining that the application program has a bug if the second message obtained by the test has a bug of a specified type.
In some embodiments, after the several data sources of the application program are obtained, firstly, code slicing is performed on the data sources through a data acquisition program, that is, a security tangent plane is performed on an interface of an operating system corresponding to each data source, so as to obtain an access right and a control right to the interface of the operating system; then, the collected data are sent to a central gateway through a data collection program, the central gateway stores the data in the central gateway after receiving the data, and the received data are sent to a data analysis engine; after receiving the data, the data analysis engine analyzes the data, determines a target security case corresponding to the type of the received data, and then issues the target security case to a case execution module; and after the case execution module receives the target security case, the data is subjected to replay test to obtain a data test result.
Example 3
Referring to fig. 3, fig. 3 is a schematic diagram of a security testing system module of a mobile application according to an embodiment of the present invention, which is shown as follows:
the acquisition module 10 is used for acquiring a first message related to an application program from a mobile terminal interface;
the display module 20 is configured to display according to the first message and obtain a second message, where the second message is message data that is adjusted based on the first message;
the test module 30 is configured to obtain a target security test case corresponding to the type of the second packet from a preset security test library;
and the result module 40 is configured to perform data interaction with the target security test case based on the second message to obtain a security test result.
As shown in fig. 4, an embodiment of the present application provides an electronic device, which includes a memory 101 for storing one or more programs; a processor 102. The one or more programs, when executed by the processor 102, implement the method of any of the first aspects as described above.
Also included is a communication interface 103, and the memory 101, processor 102 and communication interface 103 are electrically connected to each other, directly or indirectly, to enable transfer or interaction of data. For example, the components may be electrically connected to each other via one or more communication buses or signal lines. The memory 101 may be used to store software programs and modules, and the processor 102 executes the software programs and modules stored in the memory 101 to thereby execute various functional applications and data processing. The communication interface 103 may be used for communicating signaling or data with other node devices.
The Memory 101 may be, but is not limited to, a Random Access Memory 101 (RAM), a Read Only Memory 101 (ROM), a Programmable Read Only Memory 101 (PROM), an Erasable Read Only Memory 101 (EPROM), an electrically Erasable Read Only Memory 101 (EEPROM), and the like.
The processor 102 may be an integrated circuit chip having signal processing capabilities. The Processor 102 may be a general-purpose Processor 102, including a Central Processing Unit (CPU) 102, a Network Processor 102 (NP), and the like; but may also be a Digital Signal processor 102 (DSP), an Application Specific Integrated Circuit (ASIC), a Field Programmable Gate Array (FPGA) or other Programmable logic device, discrete Gate or transistor logic device, discrete hardware components.
In the embodiments provided in the present application, it should be understood that the disclosed method and system and method can be implemented in other ways. The method and system embodiments described above are merely illustrative, for example, the flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of methods and systems, methods and computer program products according to various embodiments of the present application. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams and/or flowchart illustration, and combinations of blocks in the block diagrams and/or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions.
In addition, functional modules in the embodiments of the present application may be integrated together to form an independent part, or each module may exist separately, or two or more modules may be integrated to form an independent part.
In another aspect, embodiments of the present application provide a computer-readable storage medium, on which a computer program is stored, which, when executed by the processor 102, implements the method according to any one of the first aspect described above. The functions, if implemented in the form of software functional modules and sold or used as a stand-alone product, may be stored in a computer readable storage medium. Based on such understanding, the technical solution of the present application or portions thereof that substantially contribute to the prior art may be embodied in the form of a software product stored in a storage medium and including instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the method according to the embodiments of the present application. And the aforementioned storage medium includes: a U-disk, a removable hard disk, a Read-Only Memory 101 (ROM), a Random Access Memory 101 (RAM), a magnetic disk or an optical disk, and other various media capable of storing program codes.
To sum up, the method and system for testing the security of the application program at the mobile terminal according to the embodiments of the present application can acquire the message data related to the application program from the interface of the application program, obtain the target security test case corresponding to the type of the message data from the preset security test case library, and perform the security test on the message data based on the target security test case to obtain the security test result of the application program. The application related data can be directly obtained from the interface of the operating system of the terminal equipment, so that the problem of data source when the application is subjected to security testing is solved, a universal security testing method is provided for various types of applications and different types of terminals, and the security testing requirements of different mobile terminal applications are met. In addition, corresponding safety test cases are set in advance based on different types of flow messages, and the safety test efficiency is improved.
The above is only a preferred embodiment of the present invention, and is not intended to limit the present invention, and various modifications and changes will occur to those skilled in the art. Any modification, equivalent replacement, or improvement made within the spirit and principle of the present invention should be included in the protection scope of the present invention.
It will be evident to those skilled in the art that the present application is not limited to the details of the foregoing illustrative embodiments, and that the present application may be embodied in other specific forms without departing from the spirit or essential attributes thereof. The present embodiments are therefore to be considered in all respects as illustrative and not restrictive, the scope of the application being indicated by the appended claims rather than by the foregoing description, and all changes which come within the meaning and range of equivalency of the claims are therefore intended to be embraced therein. Any reference sign in a claim should not be construed as limiting the claim concerned.

Claims (10)

1. A security testing method for a mobile terminal application program is characterized by comprising the following steps:
collecting a first message of an application program from a mobile terminal interface;
displaying according to the first message and acquiring a second message, wherein the second message is message data adjusted based on the first message;
acquiring a target safety test case corresponding to the type of the second message from a preset safety test library;
and performing data interaction with the target safety test case based on the second message to obtain a safety test result.
2. The method according to claim 1, wherein the collecting the first message associated with the application program from the mobile terminal interface comprises:
and collecting message data related to the application program from an interface of an operating system of the mobile terminal through a data collection program in the mobile terminal.
3. The method for security testing of an application program at a mobile terminal according to claim 2, further comprising:
and searching a function address of a target function for realizing a reflection mechanism through a bottom interface of an application program, obtaining the function address of the target function, calling the target function according to the function address, and packaging the target function to form an operating system interface.
4. The method according to claim 1, wherein the displaying according to the first message and obtaining the second message, the second message being a message data adjusted based on the first message, comprises:
and converting the binary data stream according to a preset data conversion mode to obtain a first message when the message data is the binary data stream through the acquired message data in the application program.
5. The method for security testing of an application program at a mobile terminal according to claim 4, further comprising:
the method comprises the steps of obtaining a first message converted by a mobile terminal through binary data stream, preprocessing the first message to obtain a second message, wherein the second message is adjusted based on the first message.
6. The method according to claim 1, wherein the obtaining the target security test case corresponding to the type of the second packet from the preset security test library comprises:
and sending the second message to a preset security test library through a data acquisition application program in the mobile terminal, and sending the message data to a data analysis engine through the preset security test library.
7. The method according to claim 1, wherein the performing data interaction with the target security test case based on the second packet to obtain the security test result comprises:
and performing security test on the second message based on the target security test case, and determining that the application program has a bug if the second message obtained through the test has a bug of a specified type.
8. A system for security testing of a mobile-end application, comprising:
the acquisition module is used for acquiring a first message of an application program from a mobile terminal interface;
the display module is used for displaying according to the first message and acquiring a second message, wherein the second message is message data adjusted based on the first message;
the test module is used for acquiring a target safety test case corresponding to the type of the second message from a preset safety test library;
and the result module is used for performing data interaction with the target safety test case based on the second message to obtain a safety test result.
9. The system for security testing of mobile applications according to claim 8, comprising:
at least one memory for storing computer instructions;
at least one processor in communication with the memory, wherein the at least one processor, when executing the computer instructions, causes the system to perform: the device comprises an acquisition module, a display module, a test module and a result module.
10. A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the method according to any one of claims 1-7.
CN202110807745.9A 2021-07-16 2021-07-16 Security testing method and system for mobile terminal application program Pending CN113360409A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110807745.9A CN113360409A (en) 2021-07-16 2021-07-16 Security testing method and system for mobile terminal application program

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110807745.9A CN113360409A (en) 2021-07-16 2021-07-16 Security testing method and system for mobile terminal application program

Publications (1)

Publication Number Publication Date
CN113360409A true CN113360409A (en) 2021-09-07

Family

ID=77539750

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110807745.9A Pending CN113360409A (en) 2021-07-16 2021-07-16 Security testing method and system for mobile terminal application program

Country Status (1)

Country Link
CN (1) CN113360409A (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110363009A (en) * 2019-07-17 2019-10-22 腾讯科技(深圳)有限公司 Application security test method, device and computer readable storage medium
CN111163067A (en) * 2019-12-18 2020-05-15 支付宝(杭州)信息技术有限公司 Safety testing method and device and electronic equipment
CN112486806A (en) * 2020-11-18 2021-03-12 中信银行股份有限公司 Test case execution method and device, electronic equipment and readable storage medium

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110363009A (en) * 2019-07-17 2019-10-22 腾讯科技(深圳)有限公司 Application security test method, device and computer readable storage medium
CN111163067A (en) * 2019-12-18 2020-05-15 支付宝(杭州)信息技术有限公司 Safety testing method and device and electronic equipment
CN112486806A (en) * 2020-11-18 2021-03-12 中信银行股份有限公司 Test case execution method and device, electronic equipment and readable storage medium

Similar Documents

Publication Publication Date Title
CN107844421B (en) Interface testing method and device, computer equipment and storage medium
CN113987074A (en) Distributed service full-link monitoring method and device, electronic equipment and storage medium
CN112148674A (en) Log data processing method and device, computer equipment and storage medium
CN112311617A (en) Configured data monitoring and alarming method and system
CN111163067B (en) Safety testing method and device and electronic equipment
CN108134708B (en) Method and device for monitoring third-party interface
CN111858113B (en) Application program repairing method and device, service system and storage medium
CN113114680B (en) Detection method and detection device for file uploading vulnerability
CN112232881A (en) Data detection method and device, electronic equipment and storage medium
CN111371581A (en) Method, device, equipment and medium for detecting business abnormity of Internet of things card
CN112069425A (en) Log management method and device, electronic equipment and readable storage medium
CN113419971B (en) Android system service vulnerability detection method and related device
CN112256557B (en) Program regression testing method, device, system, computer equipment and storage medium
CN113535577A (en) Application testing method and device based on knowledge graph, electronic equipment and medium
CN113778800B (en) Error information processing method, device, system, equipment and storage medium
CN113360409A (en) Security testing method and system for mobile terminal application program
CN113094268B (en) Test method, test device, test equipment and test medium
CN115203178A (en) Data quality inspection method and device, electronic equipment and storage medium
CN115374207A (en) Service processing method and device, electronic equipment and computer readable storage medium
CN115113898A (en) Dynamic updating method and device for micro application, computer equipment and storage medium
CN110532186B (en) Method, device, electronic equipment and storage medium for testing by using verification code
CN113726779A (en) Rule false alarm test method and device, electronic equipment and computer storage medium
CN115391127A (en) Dial testing method and device, storage medium and chip
CN112230891A (en) Interface document integration method and device, server and computer storage medium
CN112579325A (en) Business object processing method and device, electronic equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20220701

Address after: 200000 No. 381, Cangwu Road, Xuhui District, Shanghai

Applicant after: SHANGHAI INSTITUTE OF QUALITY INSPECTION AND TECHNICAL RESEARCH

Address before: Room 502, No. 123, Lane 1321, Yixian Road, Baoshan District, Shanghai 200001

Applicant before: Kang Jianping

RJ01 Rejection of invention patent application after publication
RJ01 Rejection of invention patent application after publication

Application publication date: 20210907