CN113536318B - Information processing method and related device - Google Patents

Information processing method and related device Download PDF

Info

Publication number
CN113536318B
CN113536318B CN202110745556.3A CN202110745556A CN113536318B CN 113536318 B CN113536318 B CN 113536318B CN 202110745556 A CN202110745556 A CN 202110745556A CN 113536318 B CN113536318 B CN 113536318B
Authority
CN
China
Prior art keywords
target
test
installation package
software installation
node
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202110745556.3A
Other languages
Chinese (zh)
Other versions
CN113536318A (en
Inventor
王云
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beijing Ziguang Zhanrui Communication Technology Co Ltd
Original Assignee
Beijing Ziguang Zhanrui Communication Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beijing Ziguang Zhanrui Communication Technology Co Ltd filed Critical Beijing Ziguang Zhanrui Communication Technology Co Ltd
Priority to CN202110745556.3A priority Critical patent/CN113536318B/en
Publication of CN113536318A publication Critical patent/CN113536318A/en
Application granted granted Critical
Publication of CN113536318B publication Critical patent/CN113536318B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/03Indexing scheme relating to G06F21/50, monitoring users, programs or devices to maintain the integrity of platforms
    • G06F2221/033Test or assess software

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Computer Security & Cryptography (AREA)
  • General Engineering & Computer Science (AREA)
  • Software Systems (AREA)
  • Theoretical Computer Science (AREA)
  • Computing Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Stored Programmes (AREA)

Abstract

The embodiment of the application discloses an information processing method and a related device, wherein the method comprises the following steps: the testing system tests a target software installation package according to a target testing strategy to obtain a target testing result, if the target testing result is abnormal, target vulnerability information of the target software installation package is obtained, the target vulnerability information is used for indicating the target vulnerability of the target software installation package at a target program node, the target program node is a program node of the target software installation package under the abnormal condition in the testing process of the target testing strategy, then the target vulnerability information is sent to a target object, and the target object is user equipment of a vulnerability processing user of the target program node or a target module of the vulnerability processing user is distributed to the target program node. According to the method and the device, the vulnerability information generated in the testing process of the software installation package can be timely sent to the corresponding object, so that vulnerabilities can be timely processed through the object, and vulnerability processing efficiency of the software installation package is improved.

Description

Information processing method and related device
Technical Field
The present application relates to the field of software installation package testing technologies, and in particular, to an information processing method and a related apparatus.
Background
With the continuous development of the software installation package testing field, the software installation package testing system can track the states and the testing results of all testing stages of the software installation package, quickly locate the position where the testing fails, and effectively improve the working efficiency. However, there are still some problems with software installation package test systems:
1. the test exception can be divided into two types, namely, the test case failure and the exception caused by a system reason, the exception caused by any reason involves more stages, the problem can be solved only by checking the exception by a corresponding specially-assigned person after the exception is specific, the problem is initially positioned and promoted manually at present, the efficiency is low, and the repeated work is not significant.
2. Many links are incomplete in mechanism, and testing is always in the process of waiting, so that resources are always occupied, for example, compiling of a software installation package is always in a running state, available equipment for waiting for testing is always in a waiting state, and the link of the software installation package is always obtained, so that the testing efficiency is seriously influenced, and the software installation package testing system is paralyzed.
Disclosure of Invention
The embodiment of the application provides an information processing method and a related device, aiming to expand and improve the vulnerability processing efficiency of a software installation package.
In a first aspect, an embodiment of the present application provides an information processing method, which is applied to a test system, and the method includes:
testing a target software installation package according to a target test strategy to obtain a target test result, wherein the target test strategy is any one test strategy in a test strategy set, and the test strategy set comprises a plurality of test strategies for testing the software installation package;
if the target test result is abnormal, obtaining target vulnerability information of the target software installation package, wherein the target vulnerability information is used for indicating the target vulnerability condition of the target software installation package at a target program node, and the target program node is a program node of the target software installation package under the abnormal condition in the test process of the target test strategy;
and sending the target vulnerability information to a target object, wherein the target object is user equipment or a target module of a target user corresponding to the target program node, the target user is a vulnerability processing user of the target program node, and the target module is a module for distributing the vulnerability processing user for the target program node.
In a second aspect, an embodiment of the present application provides an information processing apparatus, which is applied to a test system, and the apparatus includes:
the test result acquisition unit is used for testing a target software installation package according to a target test strategy to obtain a target test result, wherein the target test strategy is any one test strategy in a test strategy set, and the test strategy set comprises a plurality of test strategies for testing the software installation package;
a vulnerability information obtaining unit, configured to obtain target vulnerability information of the target software installation package if the target test result is that the target test result is abnormal, where the target vulnerability information is used to indicate a target vulnerability condition of the target software installation package at a target program node, and the target program node is a program node of the target software installation package in an abnormal condition in a test process of the target test policy;
the communication unit is used for sending the target vulnerability information to a target object, wherein the target object is user equipment or a target module of a target user corresponding to the target program node, the target user is a vulnerability processing user of the target program node, and the target module is a module for distributing the vulnerability processing user for the target program node.
In a third aspect, an embodiment of the present application provides a test system, including a processor, a memory, a communication interface, and one or more programs, where the one or more programs are stored in the memory and configured to be executed by the processor, and the program includes instructions for executing steps in any method of the first aspect of the embodiment of the present application.
In a fourth aspect, the present application provides a computer-readable storage medium, where the computer-readable storage medium stores a computer program for electronic data exchange, where the computer program makes a computer perform part or all of the steps described in any one of the methods of the first aspect of the present application.
In a fifth aspect, the present application provides a computer program product, wherein the computer program product includes a non-transitory computer-readable storage medium storing a computer program, and the computer program is operable to cause a computer to perform some or all of the steps as described in any one of the methods of the first aspect of the embodiments of the present application. The computer program product may be a software installation package.
It can be seen that, in the embodiment of the present application, a test system performs a test according to a target test policy for a target software installation package to obtain a target test result, and if the target test result is a test exception, obtains target vulnerability information of the target software installation package, where the target vulnerability information is used to indicate a condition of a target vulnerability of the target software installation package at a target program node in a test process of the target test policy, where the target program node is a condition of a target vulnerability of a target program node of the target software installation package at an exception condition in the test process of the target test policy, and then sends the target vulnerability information to a target object, where the target object is user equipment of a vulnerability processing user of the target program node or a target module of the vulnerability processing user is allocated to the target program node. According to the method and the device, the corresponding object can be set for the program node at each stage of the software testing process in advance, and the vulnerability information generated in the software installation package testing process can be sent to the corresponding object in time, so that vulnerabilities can be processed in time through the object, and vulnerability processing efficiency of the software installation package is improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings used in the description of the embodiments or the prior art will be briefly described below, it is obvious that the drawings in the following description are only some embodiments of the present application, and for those skilled in the art, other drawings can be obtained according to the drawings without creative efforts.
Fig. 1 is a schematic flowchart of an information processing method provided in an embodiment of the present application;
fig. 2 is a schematic view of an application scenario of another information processing method provided in an embodiment of the present application;
FIG. 3 is a schematic structural diagram of a test system according to an embodiment of the present disclosure;
fig. 4 is a block diagram of functional units of an information processing apparatus according to an embodiment of the present application.
Detailed Description
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments obtained by a person of ordinary skill in the art based on the embodiments in the present application without making any creative effort belong to the protection scope of the present application.
The terms "first," "second," and the like in the description and claims of the present application and in the foregoing drawings are used for distinguishing between different objects and not for describing a particular sequential order. Furthermore, the terms "include" and "have," as well as any variations thereof, are intended to cover non-exclusive inclusions. For example, processes, methods, apparatus, systems, and storage media, products, or devices that comprise a list of steps or elements are not limited to those listed but may alternatively include other steps or elements not listed or inherent to such processes, methods, products, or devices.
Reference herein to "an embodiment" means that a particular feature, structure, or characteristic described in connection with the embodiment can be included in at least one embodiment of the application. The appearances of the phrase in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. It is explicitly and implicitly understood by one skilled in the art that the embodiments described herein may be combined with other embodiments.
In order to make the technical solutions of the present application better understood, the technical solutions in the embodiments of the present application will be clearly and completely described below with reference to the drawings in the embodiments of the present application, and it is obvious that the described embodiments are only a part of the embodiments of the present application, and not all of the embodiments. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present application.
At present, the test exception can be divided into two types, namely, the test case failure and the exception caused by a system reason, the number of stages involved in the exception caused by any reason is large, the problem can be solved only by checking the exception by a corresponding specially-assigned person after the exception is specific, the problem is initially positioned and pushed manually at present, the efficiency is low, and the repeated work is not meaningful.
In addition, many links are imperfect in mechanism, and testing is always in the process of waiting, so that resources are always occupied, for example, compiling of a software installation package is always in a running state, available equipment for waiting for testing is always in a waiting state, and obtaining of a software installation package link is always in a running state, so that testing efficiency is seriously affected, and a software installation package testing system is paralyzed.
In view of the foregoing problems, embodiments of the present invention provide an information processing method, which is described in detail as follows.
An information processing method in the embodiment of the present application is described below with reference to fig. 1, where fig. 1 is a schematic flow chart of the information processing method provided in the embodiment of the present application, and the method specifically includes the following steps:
s101, testing a target software installation package according to a target test strategy to obtain a target test result, wherein the target test strategy is any one test strategy in a test strategy set, and the test strategy set comprises a plurality of test strategies for testing the software installation package.
Wherein the target test result comprises test exception and test normality.
The number of test strategies in the test set is not specifically limited, and the test strategies may be set in the test system in advance.
And S102, if the target test result is abnormal, acquiring target vulnerability information of the target software installation package, wherein the target vulnerability information is used for indicating the target vulnerability condition of the target software installation package at a target program node, and the target program node is a program node of the target software installation package under the abnormal condition in the test process of the target test strategy.
The target vulnerability information includes but is not limited to at least one of the target program node where the target vulnerability appears, the possible reason for the target vulnerability to appear, the response time of a vulnerability processing user of the target vulnerability and the urgency of the target vulnerability to be repaired.
The response time is used for prompting a person in charge of the target program node, namely, the vulnerability processing user needs to process the target vulnerability at the response time.
Further, the target vulnerability information includes response time of a vulnerability processing user of the target vulnerability, and the obtaining of the target vulnerability information of the target software installation package includes: acquiring the emergency degree of the target bug of the target program node where the target software installation package is located needing to be repaired; and determining the response time corresponding to the emergency degree according to the emergency degree and a mapping relation, wherein the mapping relation comprises the corresponding relation between the emergency degree and the response time.
Setting emergency degree for each possible bug in the test process in advance, and setting response time of the bug of each emergency degree according to the working requirement, namely setting mapping relation in advance. It can be understood that the higher the urgency of the vulnerability, the shorter the corresponding response time, that is, the responsible person or target module corresponding to the program node where the vulnerability is located should process the vulnerability before the response time.
As can be seen, in this example, the vulnerability information can be sent to the responsible person or the target module of the program node where the vulnerability is located, so that the responsible person can know the program node where the vulnerability is located, the possible reason for the vulnerability to appear, and the response time of the vulnerability, and the vulnerability can be processed based on the possible reason for the vulnerability and the program node where the vulnerability is located before the response time.
103, sending the target vulnerability information to a target object, where the target object is user equipment or a target module of a target user corresponding to the target program node, the target user is a vulnerability processing user of the target program node, and the target module is a module for distributing the vulnerability processing user to the target program node.
After the target module receives the target vulnerability information, corresponding responsible persons are distributed to the target vulnerability information, so that processing of vulnerabilities reflected by the target vulnerability information is achieved.
It can be seen that, in the embodiment of the present application, a test system tests a target software installation package according to a target test policy to obtain a target test result, and if the target test result is abnormal, target vulnerability information of the target software installation package is obtained, where the target vulnerability information is used to indicate a situation of a target vulnerability of a target program node, which is in an abnormal situation, of the target software installation package in a test process of the target test policy, and then the target vulnerability information is sent to a target object, where the target object is user equipment of a vulnerability processing user of the target program node or a target module of a vulnerability processing user is allocated to the target program node. According to the method and the device, the corresponding object can be set for the program node at each stage of the software testing process in advance, and the vulnerability information generated in the software installation package testing process can be sent to the corresponding object in time, so that vulnerabilities can be processed in time through the object, and vulnerability processing efficiency of the software installation package is improved.
In one possible example, the performing, according to the target test policy, the test on the target software installation package to obtain a target test result includes: acquiring the current target time length of a current program node of the target software installation package, wherein the current program node comprises but is not limited to at least one of a compiling node, an operating equipment distribution node and an operating test node of the target software installation package; judging whether the current target time length is smaller than the preset time length of the current program node or not; if the current target time length is greater than or equal to the preset time length, determining that the target test result is abnormal; if the current target time length is less than the preset time length, acquiring the current target time length of the current program node of the target software installation package, and judging whether the current target time length is less than the preset time length of the current program node.
The current target time length of the current program node refers to the current target time length of the target software installation package in the current program node.
For example, referring to fig. 2, when the current program node is a compiling node of the target pac package, obtaining a current target time length of the current program node of the target pac package, and determining whether the current target time length is smaller than a preset time length (time in the corresponding graph) T1 of the current program node; if the current target duration is greater than or equal to T1, determining that the target test result is abnormal; if the current target time length is smaller than T1, the current target time length of the current program node of the target pac packet is obtained, and whether the current target time length is smaller than the preset time length T1 of the current program node is judged. When the current program node is the distribution node of the running equipment, acquiring the current target time length of the current program node of the target pac packet, and judging whether the current target time length is smaller than the preset time length (time in a corresponding graph) T2 of the current program node; if the current target duration is greater than or equal to T2, determining that the target test result is abnormal; if the current target time length is less than T2, acquiring the current target time length of the current program node of the target pac packet, and judging whether the current target time length is less than the preset time length T2 of the current program node. When the current program node is the operation test node, acquiring the current target time length of the current program node of the target pac packet, and judging whether the current target time length is less than a preset time length (time in a corresponding graph) T3 of the current program node; if the current target duration is greater than or equal to T3, determining that the target test result is abnormal; if the current target time length is less than T3, acquiring the current target time length of the current program node of the target pac packet, and judging whether the current target time length is less than the preset time length T3 of the current program node.
And presetting corresponding preset time length for each program node in the test process, wherein the preset time length refers to the reference time length for normally completing the test of the program node by the target software installation package.
In one possible example, the obtaining the current target time length of the current program node of the target software installation package includes: judging whether a target task in the current program node of the target software installation package is completed or not; and if the target task is not finished, acquiring the current target time length of the current program node of the target software installation package after a first time interval.
It should be noted that different target tasks correspond to different first time intervals, and a corresponding first time interval is set in advance for each target task in the test process.
For example, referring to fig. 2, when the current program node is a compiling node of the target pac package, and a target task of the node is to complete software installation pac package compiling, the time length of the target pac package at the current target of the current program node includes: and judging whether the compiling of the pac packet is finished, if not, obtaining the current target time length of the target pac packet at the current program node after waiting for the time interval N1. When the current program node allocates a node to the running device, and a target task of the node is allocation of a completing device (a device running the pac packet), the time length of the target pac packet at the current target of the current program node includes: and judging whether the equipment allocation is finished, if not, acquiring the current target time length of the target pac packet in the current program node after the waiting time interval N2. When the current program node is the running test node, and the target task of the node is to complete the test, the current target duration of the target pac packet at the current program node includes: and judging whether the pac compiling is finished, if not, acquiring the current target time length of the target pac packet in the current program node after the waiting time interval N3.
In one possible example, the performing a test on the target software installation package according to the target test policy to obtain a target test result includes: judging whether the target task in the current program node of the target software installation package is successful or not; and if the target task is not successful, determining that the target test result is abnormal.
In one possible example, the method further comprises: and if the target task is successful, determining that the target test result is normal.
In one possible example, the current program node includes, but is not limited to, at least one of the following: the system comprises a compiling node of the target software installation package, an operating equipment distribution node of the target software installation package, a link obtaining node of the target software installation package, a copying node of the target software installation package, a refreshing node of the target software installation package, an operating test node of the target software installation package and an operating test result analysis node of the target software installation package.
In specific implementation, the program nodes in the test process can be set as required, the number of the program nodes of the software installation package and the setting mode of the program nodes are not specifically limited, and a user can set the program nodes as required.
In one possible example, the performing, according to the target test policy, the test on the target software installation package to obtain a target test result includes: if the first indication information is detected, monitoring whether second indication information exists in a second time interval, wherein the first indication information is used for indicating that a first program node of the target software installation package ends, the second indication information is used for indicating that the target software installation package enters a second program node, the second time interval is a time interval corresponding to the first program node and the second program node, and the second program node is a first program node of the first program node if the target software installation package enters the second program node in the second time interval; if the second indication information exists in a second time interval, determining that the target test result is successful; and if the second indication information does not exist in a second time interval, determining that the target test result is abnormal.
The user may set the second time interval between program nodes, the time interval between different program nodes, as desired.
In one possible example, the detecting a test anomaly includes: and if the duration of the current test in the waiting state exceeds the preset duration, determining that the target test result is abnormal.
In other words, by setting the timeout detection mechanism, when a certain program node exceeds a certain time, it is determined that the target test result is a test exception.
In one possible example, the performing, according to the target test policy, the test on the target software installation package to obtain a target test result includes: obtaining a test case result and/or a test coverage rate result of the target software installation package; and if the test case result is test case failure or the test coverage rate result is that the test coverage rate does not reach the standard, determining that the test result is abnormal test.
In one possible example, the sending the target vulnerability information to the target object includes: if the test case result corresponding to the test exception is a test case failure or the test coverage rate result is that the test coverage rate does not reach the standard, sending the target prompt information to a target module; and if the test exception corresponds to other conditions except that the test case result is a test case failure or the test coverage rate result is that the test coverage rate does not reach the standard, sending the target prompt information to user equipment of a target user corresponding to a target program node where the test exception is located.
For example, referring to fig. 2, when the current program node is a compiling node of the target software installation package. And when the current program node is a distribution node of the operating equipment of the target software installation package, compiling the target task pac package, judging whether the pac package is compiled successfully, if not, testing abnormity, and raising bugs to A responsible persons. And when the current program node is a link acquisition node of the target software installation package, the target task is to acquire a pac link, whether the pac package link is acquired successfully is judged, if the pac package link is not acquired successfully, the test is abnormal, and the bug is lifted to the D person in charge. And when the current program node is a copy node of the target software installation package, the target task is a copy pac package, whether the copy pac package is obtained successfully is judged, if the copy pac package is not successful, the test is abnormal, and the bug is lifted to an E responsible person. And when the current program node is a flashing node of the target software installation package, the target task is a pac package flashing, whether the pac package flashing is successful is judged, if the pac package flashing is not successful, the test is abnormal, and bug is promoted to the F responsible person. When the current program node is an operation test node of the target software installation package and an operation test result analysis node of the target software installation package, the target task is to test a pac package, or the analysis coverage rate reaches the standard, whether the pac package test is successful or not is judged, or the coverage rate reaches the standard, if the pac package test is unsuccessful or the coverage rate reaches the standard, the test is abnormal, a bug is lifted to a module corresponding to the bug, and the bug passes through a responsible person of the module bug.
In one possible example, before the target software installation package is tested according to the target test policy and a target test result is obtained, the method further includes: and sending test time information to user equipment of a tester of the target software installation package, wherein the test time information comprises the time length required by each program node of the target software installation package in the test process of the target test strategy and the total test time length aiming at the target software installation package.
Even when the test is started, the time required by each program node in the test process and the total test time of the target software installation package are provided for the tester, so that the tester can estimate the result in the test process without waiting for any purpose.
In accordance with the embodiment shown in fig. 1, please refer to fig. 3, fig. 3 is a schematic structural diagram of a test system 300 provided in the embodiment of the present application, as shown, the test system 300 includes an application processor 310, a memory 320, a communication interface 330, and one or more programs 321, where the one or more programs 321 are stored in the memory 320 and configured to be executed by the application processor 310, and the one or more programs 321 include instructions for performing the following steps;
testing a target software installation package according to a target test strategy to obtain a target test result, wherein the target test strategy is any one test strategy in a test strategy set, and the test strategy set comprises a plurality of test strategies for testing the software installation package;
if the target test result is abnormal, acquiring target vulnerability information of the target software installation package, wherein the target vulnerability information is used for indicating the target vulnerability condition of the target software installation package at a target program node, and the target program node is a program node of the target software installation package under the abnormal condition in the test process of the target test strategy;
and sending the target vulnerability information to a target object, wherein the target object is user equipment or a target module of a target user corresponding to the target program node, the target user refers to a vulnerability processing user of the target program node, and the target module refers to a module for distributing the vulnerability processing user to the target program node.
It can be seen that, in the embodiment of the present application, a test system tests a target software installation package according to a target test policy to obtain a target test result, and if the target test result is abnormal, target vulnerability information of the target software installation package is obtained, where the target vulnerability information is used to indicate a situation of a target vulnerability of the target software installation package at a target program node, the target program node is a program node of the target software installation package in an abnormal situation during a test process of the target test policy, and then sends the target vulnerability information to a target object, and the target object is user equipment of a vulnerability handling user of the target program node or a target module of a vulnerability handling user allocated to the target program node. According to the method and the device, the corresponding object can be set for the program node in each stage of the software testing process in advance, the vulnerability information generated in the software installation package testing process can be sent to the corresponding object in time, so that vulnerabilities can be processed in time through the object, and vulnerability processing efficiency of the software installation package is improved.
In a possible embodiment, the target vulnerability information includes at least one of the target program node where the target vulnerability occurs, a possible reason for the target vulnerability to occur, response time of a vulnerability processing user of the target vulnerability, and an urgency of the target vulnerability to be repaired.
In a possible embodiment, the target vulnerability information includes response time of a vulnerability processing user of the target vulnerability, and in the aspect of obtaining the target vulnerability information of the target software installation package, the instructions in the one or more programs 321 are specifically configured to:
acquiring the emergency degree of the target bug of the target program node where the target software installation package is located needing to be repaired;
and determining the response time corresponding to the emergency degree according to the emergency degree and a mapping relation, wherein the mapping relation comprises the corresponding relation between the emergency degree and the response time.
In a possible embodiment, in the aspect that the target software installation package is tested according to the target test policy to obtain the target test result, the instructions in the one or more programs 321 are specifically configured to:
acquiring the current target time length of a current program node of the target software installation package, wherein the current program node comprises at least one of a compiling node, an operating equipment distribution node and an operating test node of the target software installation package;
judging whether the current target time length is smaller than the preset time length of the current program node or not;
if the current target time length is greater than or equal to the preset time length, determining that the target test result is abnormal;
if the current target time length is less than the preset time length, acquiring the current target time length of the current program node of the target software installation package, and judging whether the current target time length is less than the preset time length of the current program node.
In one possible embodiment, in terms of the current target duration of the current program node obtaining the target software installation package, the instructions in the one or more programs 321 are specifically configured to:
judging whether a target task in the current program node of the target software installation package is completed or not;
and if the target task is not finished, acquiring the current target time length of the current program node of the target software installation package after a first time interval.
In a possible embodiment, in the aspect that the target software installation package is tested according to the target test policy to obtain the target test result, the instructions in the one or more programs 321 are specifically configured to:
judging whether the target task in the current program node of the target software installation package is completed successfully or not;
and if the target task is not successful, determining that the target test result is abnormal.
In one possible embodiment, the instructions in the one or more programs 321 are further operable to:
and if the target task is finished, determining that the target test result is normal.
In one possible embodiment, the current program node comprises at least one of the following nodes: the system comprises a compiling node of the target software installation package, an operating equipment distribution node of the target software installation package, a link obtaining node of the target software installation package, a copying node of the target software installation package, a refreshing node of the target software installation package, an operating test node of the target software installation package and an operating test result analysis node of the target software installation package.
In a possible embodiment, in the aspect that the target software installation package is tested according to the target test policy to obtain the target test result, the instructions in the one or more programs 321 are specifically configured to:
if the first indication information is detected, monitoring whether second indication information exists in a second time interval, wherein the first indication information is used for indicating that a first program node of the target software installation package ends, the second indication information is used for indicating that the target software installation package enters a second program node, the second time interval is a time interval corresponding to the first program node and the second program node, and the second program node is a first program node of the first program node if the target software installation package enters the second program node in the second time interval;
if the second indication information exists in a second time interval, determining that the target test result is successful;
and if the second indication information does not exist in a second time interval, determining that the target test result is abnormal.
In a possible embodiment, in the aspect that the target software installation package is tested according to the target test policy to obtain the target test result, the instructions in the one or more programs 321 are specifically configured to: and if the duration of the current test in the waiting state exceeds the preset duration, determining that the target test result is abnormal.
In a possible embodiment, in the aspect that the target software installation package is tested according to the target test policy to obtain the target test result, the instructions in the one or more programs 321 are specifically configured to:
obtaining a test case result and/or a test coverage rate result of the target software installation package;
and if the test case result is that the test case fails or the test coverage rate result is that the test coverage rate does not reach the standard, determining that the test result is abnormal.
In one possible embodiment, in the aspect of sending the target vulnerability information to the target object, the instructions in the one or more programs 321 are specifically configured to: if the test case result corresponding to the test exception is a test case failure or the test coverage rate result is that the test coverage rate does not reach the standard, sending the target prompt information to a target module;
and if the test exception corresponds to other conditions except that the test case result is a test case failure or the test coverage rate result is that the test coverage rate does not reach the standard, sending the target prompt information to user equipment of a target user corresponding to a target program node where the test exception is located.
In one possible embodiment, the instructions in the one or more programs 321 are further operable to: before the target software installation package is tested according to the target test strategy to obtain a target test result, sending test time information to user equipment of a tester of the target software installation package, wherein the test time information comprises the time length required by each program node of the target software installation package in the test process of the target test strategy and the total test time length aiming at the target software installation package.
The above description has introduced the solution of the embodiment of the present application mainly from the perspective of the method-side implementation process. It is understood that the electronic device comprises corresponding hardware structures and/or software modules for performing the respective functions in order to realize the above-mentioned functions. Those of skill in the art will readily appreciate that the various illustrative elements and algorithm steps described in connection with the embodiments provided herein may be implemented as hardware or combinations of hardware and computer software. Whether a function is performed as hardware or computer software drives hardware depends upon the particular application and design constraints imposed on the solution. Skilled artisans may implement the described functionality in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the present application.
In the embodiment of the present application, the electronic device may be divided into the functional units according to the method example, for example, each functional unit may be divided corresponding to each function, or two or more functions may be integrated into one processing unit. The integrated unit can be realized in a form of hardware, and can also be realized in a form of a software functional unit. It should be noted that the division of the unit in the embodiment of the present application is schematic, and is only a logic function division, and there may be another division manner in actual implementation.
Fig. 4 is a block diagram showing functional units of an information processing apparatus 400 according to an embodiment of the present application. The information processing apparatus 400 is applied to a test system, and includes:
a test result obtaining unit 401, configured to perform a test according to a target test policy for a target software installation package to obtain a target test result, where the target test policy is any one test policy in a test policy set, and the test policy set includes multiple test policies for testing the software installation package;
a vulnerability information obtaining unit 402, configured to obtain target vulnerability information of the target software installation package if the target test result is a test exception, where the target vulnerability information is used to indicate a target vulnerability condition of the target software installation package at a target program node, and the target program node is a program node of the target software installation package in an exception condition in a test process of the target test policy;
a communication unit 403, configured to send the target vulnerability information to a target object, where the target object is a user equipment or a target module of a target user corresponding to the target program node, the target user is a vulnerability processing user of the target program node, and the target module is a module that allocates the vulnerability processing user to the target program node.
The information processing apparatus 400 may further include a storage unit 404 for storing program codes and data of the information processing apparatus. The communication unit 403 may be a touch display screen or a transceiver, and the storage unit 404 may be a memory.
It can be seen that, in the embodiment of the present application, a test system performs a test according to a target test policy for a target software installation package to obtain a target test result, and if the target test result is a test exception, obtains target vulnerability information of the target software installation package, where the target vulnerability information is used to indicate a condition of a target vulnerability of the target software installation package at a target program node, where the target program node is a program node of the target software installation package in an exception condition in a test process of the target test policy, and then sends the target vulnerability information to a target object, where the target object is a user device of a vulnerability processing user of the target program node or a target module of a processing user is allocated to the target program node. According to the method and the device, the corresponding object can be set for the program node at each stage of the software testing process in advance, and the vulnerability information generated in the software installation package testing process can be sent to the corresponding object in time, so that vulnerabilities can be processed in time through the object, and vulnerability processing efficiency of the software installation package is improved.
In a possible embodiment, the target vulnerability information includes at least one of the target program node where the target vulnerability occurs, a possible reason for the target vulnerability to occur, response time of a vulnerability processing user of the target vulnerability, and an urgency of the target vulnerability to be repaired.
In a possible embodiment, the target vulnerability information includes response time of a vulnerability processing user of the target vulnerability, and in the aspect of acquiring the target vulnerability information of the target software installation package, the vulnerability information acquiring unit 402 is specifically configured to:
acquiring the emergency degree of the target vulnerability of the target program node where the target software installation package is currently located, wherein the emergency degree needs to be repaired;
and determining the response time corresponding to the emergency degree according to the emergency degree and a mapping relation, wherein the mapping relation comprises the corresponding relation between the emergency degree and the response time.
In a possible embodiment, in terms of obtaining a target test result by performing a test on the target software installation package according to the target test policy, the test result obtaining unit 401 is specifically configured to:
acquiring the current target time length of a current program node of the target software installation package, wherein the current program node comprises at least one of a compiling node, an operating equipment distribution node and an operating test node of the target software installation package;
judging whether the current target time length is smaller than the preset time length of the current program node or not;
if the current target time length is greater than or equal to the preset time length, determining that the target test result is abnormal;
if the current target time length is less than the preset time length, acquiring the current target time length of the current program node of the target software installation package, and judging whether the current target time length is less than the preset time length of the current program node.
In a possible embodiment, in terms of the current target duration of the current program node of the target software installation package, the test result obtaining unit 401 is specifically configured to:
judging whether the target task in the current program node of the target software installation package is completed or not;
if the target task is not completed, acquiring the current target time length of the current program node of the target software installation package after a first time interval.
In a possible embodiment, in the aspect that the target software installation package is tested according to the target test policy to obtain the target test result, the test result obtaining unit 401 is specifically configured to:
judging whether the target task in the current program node of the target software installation package is successful or not;
and if the target task is not successful, determining that the target test result is abnormal.
In a possible embodiment, the test result obtaining unit 401 is further configured to:
and if the target task is finished, determining that the target test result is normal.
In one possible embodiment, the current program node comprises at least one of the following nodes: the compiling node of the target software installation package, the running equipment distribution node of the target software installation package, the link acquisition node of the target software installation package, the copying node of the target software installation package, the flashing node of the target software installation package, the running test node of the target software installation package and the running test result analysis node of the target software installation package.
In a possible embodiment, in terms of obtaining a target test result by performing a test on the target software installation package according to the target test policy, the test result obtaining unit 401 is specifically configured to:
if the first indication information is detected, monitoring whether second indication information exists in a second time interval, wherein the first indication information is used for indicating that a first program node of the target software installation package ends, the second indication information is used for indicating that the target software installation package enters a second program node, the second time interval is a time interval corresponding to the first program node and the second program node, and the second program node is a first program node of the first program node if the target software installation package enters the second program node in the second time interval;
if the second indication information exists in a second time interval, determining that the target test result is successful;
and if the second indication information does not exist in a second time interval, determining that the target test result is abnormal.
In a possible embodiment, in terms of obtaining a target test result by performing a test on the target software installation package according to the target test policy, the test result obtaining unit 401 is specifically configured to:
and if the duration of the current test in the waiting state exceeds the preset duration, determining that the target test result is abnormal.
In a possible embodiment, in terms of obtaining a target test result by performing a test on the target software installation package according to the target test policy, the test result obtaining unit 401 is specifically configured to:
obtaining a test case result and/or a test coverage rate result of the target software installation package;
and if the test case result is that the test case fails or the test coverage rate result is that the test coverage rate does not reach the standard, determining that the test result is abnormal.
In a possible embodiment, in terms of sending the target vulnerability information to the target object, the communication unit 403 is specifically configured to:
if the test case result corresponding to the test exception is a test case failure or the test coverage rate result is a test coverage rate not up to standard, sending the target prompt information to a target module;
and if the test exception corresponds to other conditions except that the test case result is a test case failure or the test coverage rate result is that the test coverage rate does not reach the standard, sending the target prompt information to user equipment of a target user corresponding to a target program node where the test exception is located.
In one possible embodiment, the communication unit 403 is further configured to: before the target software installation package is tested according to the target test strategy to obtain a target test result, sending test time information to user equipment of a tester of the target software installation package, wherein the test time information comprises the time length required by each program node of the target software installation package in the test process of the target test strategy and the total test time length aiming at the target software installation package.
Embodiments of the present application also provide a computer storage medium, where the computer storage medium stores a computer program for electronic data exchange, the computer program enabling a computer to execute part or all of the steps of any one of the methods described in the above method embodiments, and the computer includes an electronic device.
Embodiments of the present application also provide a computer program product comprising a non-transitory computer readable storage medium storing a computer program operable to cause a computer to perform some or all of the steps of any of the methods as described in the above method embodiments. The computer program product may be a software installation package, the computer comprising an electronic device.
It should be noted that for simplicity of description, the above-mentioned embodiments of the method are described as a series of acts, but those skilled in the art should understand that the present application is not limited by the described order of acts, as some steps may be performed in other orders or simultaneously according to the present application. Further, those skilled in the art will recognize that the embodiments described in this specification are preferred embodiments and that acts or modules referred to are not necessarily required for this application.
In the foregoing embodiments, the descriptions of the respective embodiments have respective emphasis, and for parts that are not described in detail in a certain embodiment, reference may be made to related descriptions of other embodiments.
In the embodiments provided in the present application, it should be understood that the disclosed apparatus may be implemented in other manners. For example, the above-described embodiments of the apparatus are merely illustrative, and for example, the above-described division of the units is only one type of division of logical functions, and other divisions may be realized in practice, for example, a plurality of units or components may be combined or integrated into another system, or some features may be omitted, or not executed. In addition, the shown or discussed coupling or direct coupling or communication connection between each other may be through some interfaces, indirect coupling or communication connection between devices or units, and may be in an electrical or other form.
The units described as separate parts may or may not be physically separate, and parts displayed as units may or may not be physical units, may be located in one place, or may be distributed on a plurality of network units. Some or all of the units can be selected according to actual needs to achieve the purpose of the solution of the embodiment.
In addition, functional units in the embodiments of the present application may be integrated into one processing unit, or each unit may exist alone physically, or two or more units are integrated into one unit. The integrated unit may be implemented in the form of hardware, or may also be implemented in the form of a software functional unit.
The integrated unit may be stored in a computer readable memory if it is implemented in the form of a software functional unit and sold or used as a stand-alone product. Based on such understanding, the technical solution of the present application may be substantially implemented or a part of or all or part of the technical solution contributing to the prior art may be embodied in the form of a software product stored in a memory, and including several instructions for causing a computer device (which may be a personal computer, a server, or a network device) to execute all or part of the steps of the above-mentioned method of the embodiments of the present application. And the aforementioned memory comprises: a U-disk, a Read-Only Memory (ROM), a Random Access Memory (RAM), a removable hard disk, a magnetic or optical disk, and other various media capable of storing program codes.
Those skilled in the art will appreciate that all or part of the steps in the methods of the above embodiments may be implemented by associated hardware instructed by a program, which may be stored in a computer-readable memory, which may include: flash Memory disks, read-Only memories (ROMs), random Access Memories (RAMs), magnetic or optical disks, and the like.
The foregoing embodiments have been described in detail, and specific examples are used herein to explain the principles and implementations of the present application, where the above description of the embodiments is only intended to help understand the method and its core ideas of the present application; meanwhile, for a person skilled in the art, according to the idea of the present application, the specific implementation manner and the application scope may be changed, and in summary, the content of the present specification should not be construed as a limitation to the present application.

Claims (28)

1. An information processing method, applied to a test system, the method comprising:
testing a target software installation package according to a target test strategy to obtain a target test result, wherein the target test strategy is any one test strategy in a test strategy set, and the test strategy set comprises a plurality of test strategies for testing the software installation package;
if the target test result is abnormal, obtaining target vulnerability information of the target software installation package, wherein the target vulnerability information is used for indicating the target vulnerability condition of the target software installation package at a target program node, and the target program node is a program node of the target software installation package under the abnormal condition in the test process of the target test strategy;
and sending the target vulnerability information to a target object, wherein the target object is user equipment or a target module of a target user corresponding to the target program node, the target user is a vulnerability processing user of the target program node, and the target module is a module for distributing the vulnerability processing user for the target program node.
2. The method of claim 1, wherein the target vulnerability information includes at least one of the target program node where the target vulnerability occurs, a possible cause of the target vulnerability, a response time of a vulnerability handling user of the target vulnerability, and an urgency of the target vulnerability to be fixed.
3. The method of claim 2, wherein the target vulnerability information includes response time of a vulnerability processing user of the target vulnerability, and wherein the obtaining target vulnerability information of the target software installation package includes:
acquiring the emergency degree of the target vulnerability of the target program node where the target software installation package is currently located, wherein the emergency degree needs to be repaired;
and determining the response time corresponding to the emergency degree according to the emergency degree and a mapping relation, wherein the mapping relation comprises the corresponding relation between the emergency degree and the response time.
4. The method of claim 1, wherein the testing the target software installation package according to the target test policy to obtain the target test result comprises:
acquiring the current target time length of the current program node of the target software installation package, wherein the current program node comprises at least one of a compiling node, an operating equipment distribution node and an operating test node of the target software installation package;
judging whether the current target time length is smaller than the preset time length of the current program node or not;
if the current target time length is greater than or equal to the preset time length, determining that the target test result is abnormal;
if the current target time length is less than the preset time length, acquiring the current target time length of the current program node of the target software installation package, and judging whether the current target time length is less than the preset time length of the current program node.
5. The method of claim 4, wherein obtaining the current target duration of the current program node of the target software installation package comprises:
judging whether the target task in the current program node of the target software installation package is completed or not;
and if the target task is not finished, acquiring the current target time length of the current program node of the target software installation package after a first time interval.
6. The method as claimed in claim 1, wherein the testing the target software installation package according to the target test policy to obtain the target test result comprises:
judging whether the target task in the current program node of the target software installation package is successful or not;
and if the target task is not successful, determining that the target test result is abnormal.
7. The method of claim 5, further comprising:
and if the target task is finished, determining that the target test result is normal.
8. The method of claim 5, wherein the current program node comprises at least one of: the compiling node of the target software installation package, the running equipment distribution node of the target software installation package, the link acquisition node of the target software installation package, the copying node of the target software installation package, the flashing node of the target software installation package, the running test node of the target software installation package and the running test result analysis node of the target software installation package.
9. The method as claimed in claim 1, wherein the testing the target software installation package according to the target test policy to obtain the target test result comprises:
if the first indication information is detected, monitoring whether second indication information exists in a second time interval, wherein the first indication information is used for indicating that a first program node of the target software installation package ends, the second indication information is used for indicating that the target software installation package enters a second program node, the second time interval is a time interval corresponding to the first program node and the second program node, and the second program node is a first program node of the first program node if the target software installation package enters the second program node in the second time interval;
if the second indication information exists in a second time interval, determining that the target test result is successful;
and if the second indication information does not exist in a second time interval, determining that the target test result is abnormal.
10. The method as claimed in claim 1, wherein the testing the target software installation package according to the target test policy to obtain the target test result comprises:
and if the duration of the current test in the waiting state exceeds the preset duration, determining that the target test result is abnormal.
11. The method as claimed in claim 1, wherein the testing the target software installation package according to the target test policy to obtain the target test result comprises:
obtaining a test case result and/or a test coverage rate result of the target software installation package;
and if the test case result is that the test case fails or the test coverage rate result is that the test coverage rate does not reach the standard, determining that the test result is abnormal.
12. The method of claim 11, wherein sending the target vulnerability information to a target object comprises:
if the test case result corresponding to the test exception is a test case failure or the test coverage rate result is that the test coverage rate does not reach the standard, sending target prompt information to a target module;
and if the test exception corresponds to other conditions except that the test case result is a test case failure or the test coverage rate result is that the test coverage rate does not reach the standard, sending the target prompt information to user equipment of a target user corresponding to a target program node where the test exception is located.
13. The method of claim 1, wherein before the target software installation package is tested according to the target test policy and the target test result is obtained, the method further comprises:
and sending test time information to user equipment of a tester of the target software installation package, wherein the test time information comprises the time length required by each program node of the target software installation package in the test process of the target test strategy and the total test time length aiming at the target software installation package.
14. An information processing apparatus, applied to a test system, comprising:
the test result acquisition unit is used for testing a target software installation package according to a target test strategy to obtain a target test result, wherein the target test strategy is any one test strategy in a test strategy set, and the test strategy set comprises a plurality of test strategies for testing the software installation package;
a vulnerability information obtaining unit, configured to obtain target vulnerability information of the target software installation package if the target test result is a test exception, where the target vulnerability information is used to indicate a target vulnerability condition of the target software installation package at a target program node, and the target program node is a program node of the target software installation package in an exception condition in a test process of the target test policy;
the communication unit is used for sending the target vulnerability information to a target object, wherein the target object is user equipment or a target module of a target user corresponding to the target program node, the target user is a vulnerability processing user of the target program node, and the target module is a module for distributing the vulnerability processing user for the target program node.
15. The apparatus of claim 14, wherein the target vulnerability information comprises the target program node where the target vulnerability occurs, a possible cause of the target vulnerability, a response time of a vulnerability handling user of the target vulnerability and a response time of a vulnerability handling user of the target vulnerability.
16. The apparatus according to claim 15, wherein the target vulnerability information includes response time of a vulnerability processing user of the target vulnerability, and in the acquiring the target vulnerability information of the target software installation package, the vulnerability information acquiring unit is specifically configured to:
acquiring the emergency degree of the target vulnerability of the target program node where the target software installation package is currently located, wherein the emergency degree needs to be repaired;
and determining the response time of the vulnerability processing user of the target vulnerability corresponding to the emergency degree according to the emergency degree and the mapping relation, wherein the mapping relation comprises the corresponding relation between the emergency degree and the response time of the vulnerability processing user of the target vulnerability.
17. The apparatus of claim 14, wherein in the aspect that the target software installation package is tested according to the target test policy to obtain the target test result, the test result obtaining unit is specifically configured to:
acquiring the current target time length of a current program node of the target software installation package, wherein the current program node comprises at least one of a compiling node, an operating equipment distribution node and an operating test node of the target software installation package;
judging whether the current target time length is smaller than the preset time length of the current program node or not;
if the current target time length is greater than or equal to the preset time length, determining that the target test result is abnormal;
if the current target time length is less than the preset time length, the current target time length of the current program node of the target software installation package is obtained, and whether the current target time length is less than the preset time length of the current program node or not is judged.
18. The apparatus of claim 17, wherein in terms of the obtaining of the current target duration of the current program node of the target software installation package, the test result obtaining unit is specifically configured to:
judging whether the target task in the current program node of the target software installation package is completed or not;
if the target task is not completed, acquiring the current target time length of the current program node of the target software installation package after a first time interval.
19. The apparatus of claim 14, wherein in the aspect that the target software installation package is tested according to the target test policy to obtain the target test result, the test result obtaining unit is specifically configured to:
judging whether the target task in the current program node of the target software installation package is successful or not;
and if the target task is not successful, determining that the target test result is abnormal.
20. The apparatus of claim 18, wherein the test result obtaining unit is further configured to:
and if the target task is finished, determining that the target test result is normal.
21. The apparatus of claim 19, wherein the current program node comprises at least one of: the compiling node of the target software installation package, the running equipment distribution node of the target software installation package, the link acquisition node of the target software installation package, the copying node of the target software installation package, the flashing node of the target software installation package, the running test node of the target software installation package and the running test result analysis node of the target software installation package.
22. The apparatus according to claim 14, wherein in the aspect that the target software installation package is tested according to the target test policy to obtain the target test result, the test result obtaining unit is specifically configured to:
if the first indication information is detected, monitoring whether second indication information exists in a second time interval, wherein the first indication information is used for indicating that a first program node of the target software installation package ends, the second indication information is used for indicating that the target software installation package enters a second program node, the second time interval is a time interval corresponding to the first program node and the second program node, and the second program node is a first program node of the first program node if the target software installation package enters the second program node in the second time interval;
if the second indication information exists in a second time interval, determining that the target test result is successful;
and if the second indication information does not exist in a second time interval, determining that the target test result is abnormal.
23. The apparatus according to claim 14, wherein in the aspect that the target software installation package is tested according to the target test policy to obtain the target test result, the test result obtaining unit is specifically configured to:
and if the duration of the current test in the waiting state exceeds the preset duration, determining that the target test result is abnormal.
24. The apparatus according to claim 14, wherein in the aspect that the target software installation package is tested according to the target test policy to obtain the target test result, the test result obtaining unit is specifically configured to:
obtaining a test case result and/or a test coverage rate result of the target software installation package;
and if the test case result is that the test case fails or the test coverage rate result is that the test coverage rate does not reach the standard, determining that the test result is abnormal.
25. The apparatus according to claim 24, wherein in the aspect of sending the target vulnerability information to a target object, the communication unit is specifically configured to:
if the test case result corresponding to the test exception is a test case failure or the test coverage rate result is that the test coverage rate does not reach the standard, sending target prompt information to a target module;
and if the test exception corresponds to other conditions except that the test case result is a test case failure or the test coverage rate result is that the test coverage rate does not reach the standard, sending the target prompt information to user equipment of a target user corresponding to a target program node where the test exception is located.
26. The apparatus of claim 14, wherein the communication unit is further configured to: before the target software installation package is tested according to the target test strategy to obtain a target test result, sending test time information to user equipment of a tester of the target software installation package, wherein the test time information comprises the time length required by each program node of the target software installation package in the test process of the target test strategy and the total test time length aiming at the target software installation package.
27. A test system comprising a processor, a memory, a communication interface, and one or more programs stored in the memory and configured to be executed by the processor, the programs including instructions for performing the steps in the method of any of claims 1-13.
28. A computer-readable storage medium, characterized in that it stores a computer program for electronic data exchange, wherein the computer program causes a computer to perform the method according to any one of claims 1-13.
CN202110745556.3A 2021-06-30 2021-06-30 Information processing method and related device Active CN113536318B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202110745556.3A CN113536318B (en) 2021-06-30 2021-06-30 Information processing method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202110745556.3A CN113536318B (en) 2021-06-30 2021-06-30 Information processing method and related device

Publications (2)

Publication Number Publication Date
CN113536318A CN113536318A (en) 2021-10-22
CN113536318B true CN113536318B (en) 2022-12-09

Family

ID=78097578

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202110745556.3A Active CN113536318B (en) 2021-06-30 2021-06-30 Information processing method and related device

Country Status (1)

Country Link
CN (1) CN113536318B (en)

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN105046155B (en) * 2015-06-24 2018-05-08 北京系统工程研究所 Software systems loophole methods of risk assessment and device
CN109032923A (en) * 2018-06-21 2018-12-18 深圳壹账通智能科技有限公司 Method for testing software, device based on call chain, terminal
CN110737586A (en) * 2019-09-06 2020-01-31 浙江无极互联科技有限公司 computer software test system with short test period
CN112988587A (en) * 2021-03-26 2021-06-18 清华大学 Program detection method and device

Also Published As

Publication number Publication date
CN113536318A (en) 2021-10-22

Similar Documents

Publication Publication Date Title
US10534915B2 (en) System for virtual patching security vulnerabilities in software containers
CN109409096B (en) Kernel vulnerability repairing method, device, server and system
CN110545220B (en) Automobile diagnosis protocol detection method and related product
CN112241350B (en) Micro-service evaluation method and device, computing device and micro-service detection system
CN109739527B (en) Method, device, server and storage medium for client gray scale release
CN110881059A (en) Application deployment system and method, release engine and computer equipment
CN104809046B (en) A kind of application program networking control method and application program networking control device
CN111124911A (en) Automatic testing method, device, equipment and readable storage medium
CN107621963B (en) Software deployment method, software deployment system and electronic equipment
CN110618853B (en) Detection method, device and equipment for zombie container
CN110096305B (en) Gray scale distribution method, device, equipment and storage medium
CN114968646A (en) Functional fault processing system and method
CN113608908B (en) Server fault processing method, system, equipment and readable storage medium
CN107590389B (en) Security testing method and device, electronic equipment and computer storage medium
CN105843675B (en) Thread exit method and device
CN113536318B (en) Information processing method and related device
CN111651350B (en) Test case processing method, device, equipment and computer readable storage medium
CN112634973A (en) Data rereading method and system of storage medium, terminal device and storage medium
CN109726124B (en) Test system, test method, management device, test device and computing equipment
CN110888799B (en) Software testing method and device
CN109857615B (en) Method and device for detecting memory leakage
CN108845932B (en) Unit testing method and device of network library, storage medium and terminal
CN112199282B (en) Fuzzy test method, device and equipment for office software
CN111190701A (en) Method and device for detecting data migration integrity of virtualization platform
CN109255233B (en) Vulnerability detection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant