CN113766323B - Set top box network detection method, device, equipment and storage medium - Google Patents

Set top box network detection method, device, equipment and storage medium Download PDF

Info

Publication number
CN113766323B
CN113766323B CN202111148784.9A CN202111148784A CN113766323B CN 113766323 B CN113766323 B CN 113766323B CN 202111148784 A CN202111148784 A CN 202111148784A CN 113766323 B CN113766323 B CN 113766323B
Authority
CN
China
Prior art keywords
information
top box
set top
configuration information
network
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111148784.9A
Other languages
Chinese (zh)
Other versions
CN113766323A (en
Inventor
潘晟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Shenzhen Xiaopai Technology Co ltd
Original Assignee
Shenzhen Xiaopai Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Shenzhen Xiaopai Technology Co ltd filed Critical Shenzhen Xiaopai Technology Co ltd
Priority to CN202111148784.9A priority Critical patent/CN113766323B/en
Publication of CN113766323A publication Critical patent/CN113766323A/en
Application granted granted Critical
Publication of CN113766323B publication Critical patent/CN113766323B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • H04N21/44209Monitoring of downstream path of the transmission network originating from a server, e.g. bandwidth variations of a wireless network
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04NPICTORIAL COMMUNICATION, e.g. TELEVISION
    • H04N21/00Selective content distribution, e.g. interactive television or video on demand [VOD]
    • H04N21/40Client devices specifically adapted for the reception of or interaction with content, e.g. set-top-box [STB]; Operations thereof
    • H04N21/43Processing of content or additional data, e.g. demultiplexing additional data from a digital video stream; Elementary client operations, e.g. monitoring of home network or synchronising decoder's clock; Client middleware
    • H04N21/442Monitoring of processes or resources, e.g. detecting the failure of a recording device, monitoring the downstream bandwidth, the number of times a movie has been viewed, the storage space available from the internal hard disk
    • H04N21/44227Monitoring of local network, e.g. connection or bandwidth variations; Detecting new devices in the local network

Abstract

The invention belongs to the technical field of network detection and discloses a set top box network detection method, a set top box network detection device, set top box network detection equipment and a storage medium. The method comprises the following steps: when a network test request from a set top box is received, encryption configuration information is generated; the encryption configuration information is sent to the set top box, so that the set top box accesses the target address according to the encryption configuration information, and the access result information is fed back; checking the access result information to obtain an information checking result; and visually displaying according to the access result information and the information verification result. By the method, the encryption configuration information can be generated after the network test request of the set top box is received and sent to the set top box, so that the set top box can access the target address and feed back access result information, then the access result information is checked to obtain the information check result, and finally the visual display is carried out, the set top box is directly connected with the server and the network quality is measured, and the real network condition of the set top box can be accurately measured.

Description

Set top box network detection method, device, equipment and storage medium
Technical Field
The present invention relates to the field of network detection technologies, and in particular, to a set top box network detection method, device, equipment, and storage medium.
Background
At present, with the rapid development of internet technology and the upgrade of set top box equipment, the content and functions carried by the set top box are increased, so that users can watch highlight program content through the set top box, and can play cloud games, interact with various equipment such as cameras, mobile phones, tablets, cloud platforms and the like through the set top box, and the reliability and the safety of the network are very important.
However, at present, the network ring where the user is located is different in quality, the network problem is complex and changeable, the link from the set top box to the server is long, even if the server is requested by the distributed machine room, the request is only between two points or a small number of nodes, the real condition of the request of the user is difficult to be clearly and reliably quantized and reflected, and the test on the real condition of the network of the set top box is not accurate enough.
The foregoing is provided merely for the purpose of facilitating understanding of the technical solutions of the present invention and is not intended to represent an admission that the foregoing is prior art.
Disclosure of Invention
The invention mainly aims to provide a set top box network detection method, device, equipment and storage medium, and aims to solve the technical problem that the actual network condition of a set top box is not accurate enough in the prior art.
In order to achieve the above object, the present invention provides a set-top box network detection method, which includes the following steps:
when a network test request from a set top box is received, encryption configuration information is generated;
the encryption configuration information is sent to the set top box, so that the set top box accesses a target address according to the encryption configuration information and feeds back access result information;
checking the access result information to obtain an information checking result;
and visually displaying according to the access result information and the information verification result.
Optionally, the generating encryption configuration information when receiving the network test request from the set top box includes:
when a network test request from a set top box is received, obtaining set top box configuration information corresponding to the set top box according to the network test request;
acquiring original configuration information;
and obtaining encryption configuration information according to the set top box configuration information and the original configuration information.
Optionally, the obtaining the encrypted configuration information according to the configuration information of the set top box and the original configuration information includes:
obtaining classification configuration information according to the set top box configuration information;
signing the original configuration information through an encryption algorithm to obtain signature configuration information;
and obtaining encryption configuration information according to the classification configuration information and the signature configuration information.
Optionally, the verifying the access result information to obtain an information verification result includes:
obtaining network information to be tested according to the access result information;
obtaining encryption information to be tested according to the network information to be tested;
and checking the encryption information to be tested to obtain an information checking result.
Optionally, the verifying the encrypted information to be tested to obtain an information verification result includes:
obtaining first check information according to the encryption configuration information;
obtaining second check information according to the encryption information to be tested;
and checking the second checking information according to the first checking information to obtain an information checking result.
Optionally, the visually displaying according to the access result information and the information verification result includes:
when the information verification result is that verification is passed, extracting original network data from the access result information;
classifying the original network data to obtain classified network data;
carrying out quantization statistics on the classified network data to obtain display network information;
and carrying out visual display according to the display network information.
Optionally, the visually displaying according to the access result information and the information verification result includes:
when the information verification result is that verification fails, extracting original network data from the access result information;
generating abnormal early warning information according to the original network data;
and visually displaying according to the abnormal early warning information.
In addition, in order to achieve the above object, the present invention further provides a set-top box network detection device, where the set-top box network detection device includes:
the generation module is used for generating encryption configuration information when receiving a network test request from the set top box;
the sending module is used for sending the encryption configuration information to the set top box so that the set top box can access the target address according to the encryption configuration information and feed back access result information;
the verification module is used for verifying the access result information to obtain an information verification result;
and the display module is used for visually displaying according to the access result information and the information verification result.
In addition, in order to achieve the above object, the present invention further provides a set-top box network detection device, where the set-top box network detection device includes: the system comprises a memory, a processor and a set top box network detection program stored on the memory and capable of running on the processor, wherein the set top box network detection program is configured to realize the steps of the set top box network detection method.
In addition, in order to achieve the above object, the present invention also proposes a storage medium on which a set-top box network detection program is stored, which when executed by a processor implements the steps of the set-top box network detection method as described above.
When a network test request from a set top box is received, encryption configuration information is generated; the encryption configuration information is sent to the set top box, so that the set top box accesses a target address according to the encryption configuration information and feeds back access result information; checking the access result information to obtain an information checking result; and visually displaying according to the access result information and the information verification result. By the method, the encryption configuration information can be generated after the network test request of the set top box is received and sent to the set top box, so that the set top box can access the target address and feed back access result information, then the access result information is checked to obtain an information check result, and finally visual display is carried out, the set top box is directly connected with the server and network quality is measured, and the real network condition of the set top box can be accurately measured.
Drawings
Fig. 1 is a schematic structural diagram of a set-top box network detection device in a hardware running environment according to an embodiment of the present invention;
fig. 2 is a flowchart of a first embodiment of a network detection method of a set top box according to the present invention;
fig. 3 is a flowchart of a second embodiment of a set-top box network detection method according to the present invention;
fig. 4 is a block diagram of a first embodiment of a network detection device for a set top box according to the present invention.
The achievement of the objects, functional features and advantages of the present invention will be further described with reference to the accompanying drawings, in conjunction with the embodiments.
Detailed Description
It should be understood that the specific embodiments described herein are for purposes of illustration only and are not intended to limit the scope of the invention.
Referring to fig. 1, fig. 1 is a schematic structural diagram of a set-top box network detection device in a hardware running environment according to an embodiment of the present invention.
As shown in fig. 1, the set-top box network detection device may include: a processor 1001, such as a central processing unit (Central Processing Unit, CPU), a communication bus 1002, a user interface 1003, a network interface 1004, a memory 1005. Wherein the communication bus 1002 is used to enable connected communication between these components. The user interface 1003 may include a Display, an input unit such as a Keyboard (Keyboard), and the optional user interface 1003 may further include a standard wired interface, a wireless interface. The network interface 1004 may optionally include a standard wired interface, a Wireless interface (e.g., a Wireless-Fidelity (Wi-Fi) interface). The Memory 1005 may be a high-speed random access Memory (Random Access Memory, RAM) Memory or a stable nonvolatile Memory (NVM), such as a disk Memory. The memory 1005 may also optionally be a storage device separate from the processor 1001 described above.
Those skilled in the art will appreciate that the architecture shown in fig. 1 is not limiting of the set-top box network detection device and may include more or fewer components than shown, or may combine certain components, or may be a different arrangement of components.
As shown in fig. 1, an operating system, a network communication module, a user interface module, and a set-top box network detection program may be included in the memory 1005 as one type of storage medium.
In the set-top box network detection device shown in fig. 1, the network interface 1004 is mainly used for data communication with a network server; the user interface 1003 is mainly used for data interaction with a user; the processor 1001 and the memory 1005 in the set top box network detection device of the present invention may be disposed in the set top box network detection device, where the set top box network detection device invokes the set top box network detection program stored in the memory 1005 through the processor 1001, and executes the set top box network detection method provided by the embodiment of the present invention.
The embodiment of the invention provides a set top box network detection method, referring to fig. 2, fig. 2 is a flow chart of a first embodiment of the set top box network detection method of the invention.
In this embodiment, the set top box network detection method includes the following steps:
step S10: when a network test request from the set top box is received, encryption configuration information is generated.
It should be noted that, the execution body of the embodiment is a controller, mainly a controller for controlling the set-top box network detection method, and the controller is installed in a server, and may be any device capable of implementing this function, which is not limited in this embodiment.
It should be understood that the network test request refers to a request issued by the set-top box for testing the network quality, the network speed, the network fluctuation, and other network states of the set-top box, and may be any type of request capable of implementing this function, which is not limited in this embodiment.
In a specific implementation, the encrypted configuration information refers to encrypted configuration information containing a network state for testing the set top box, and may include a request configuration list, where the request configuration list includes a request mode: may be Ping, telnet, http, tcp; request frequency: the next time the interval required for configuration information is requested; request address, i.e. target address: domain name or ip address of the request; request signature random string: a random character string is generated as an interference item for avoiding guessing encryption; request signature: the above configurations are spliced into a json string in sequence, and then encrypted signed with a public key using the RSA algorithm.
Further, in order to be able to generate valid encryption configuration information, step S10 includes: when a network test request from a set top box is received, obtaining set top box configuration information corresponding to the set top box according to the network test request; acquiring original configuration information; and obtaining encryption configuration information according to the set top box configuration information and the original configuration information.
It should be noted that, the set-top box configuration information is information related to the configuration of the set-top box, and may include: the region, model, network type, etc. of the set-top box, or other configuration information related to the set-top box, which is not limited in this embodiment.
It should be understood that the original configuration information refers to configuration information that is automatically generated by the server, is not encrypted, and includes a request configuration list that is not encrypted, and information in the request configuration list.
In a specific implementation, obtaining the encrypted configuration information according to the set top box configuration information and the original configuration information refers to: after the set top box configuration information and the original configuration information are obtained, an encryption mode is determined according to the set top box configuration information, and then the original configuration information is encrypted to obtain encrypted information.
By the method, the set top box configuration information and the original configuration information can be obtained according to the network test request, and the encryption mode is determined by combining the set top box configuration information and the original configuration information to finally obtain the encryption configuration information, so that the encryption configuration information is safer.
Further, in order to make the encryption configuration information safer, the step of obtaining the encryption configuration information according to the set top box configuration information and the original configuration information includes: obtaining classification configuration information according to the set top box configuration information; signing the original configuration information through an encryption algorithm to obtain signature configuration information; and obtaining encryption configuration information according to the classification configuration information and the signature configuration information.
It should be noted that the classification configuration information refers to a partition category to which the current set top box is determined according to information such as a region, a model, a network type, and the like of the set top box in the set top box configuration information, and then the partition category related information of the current set top box is used as the classification configuration information.
It should be understood that obtaining the classification configuration information according to the set top box configuration information means that determining the partition category of the set top box according to the set top box configuration information, and finally obtaining the classification configuration information. And determining different encryption modes of the encryption configuration information according to the classification configuration information.
In a specific implementation, the signature configuration information refers to a result obtained after the original configuration information is signed by an encryption algorithm, and specifically, signature verification is performed by an RSA asymmetric encryption algorithm.
It should be noted that, obtaining the encryption configuration information according to the classification configuration information and the signature configuration information refers to: after signature configuration information is obtained, the partition type of the set top box which sends out the network test request currently is determined according to the classification configuration information, and then different encryption configuration information is generated according to different combination signature configuration information of the partition type.
By the method, the original configuration information is encrypted by using an encryption algorithm, the security row is improved, and the partitioned issuing of the encrypted configuration information is realized, so that the method is more careful.
Step S20: and sending the encryption configuration information to the set top box so that the set top box accesses a target address according to the encryption configuration information and feeds back access result information.
It should be noted that, the access result information refers to information related to an access result collected after the set top box accesses the target address, and may include: recording request information and request conditions, including self ip of the set top box, dns response time, using dns, analyzing a target address ip, requesting response time, requesting to obtain network request information such as content size data and the like. Several request means may also be included, such as Ping: network reachability verification for a request address. Telnet: the request for requesting the corresponding interface in the address can be used for network application service verification. Http: for interface reliability verification, the interface reliability of server nodes in different regions can be verified by distinguishing (such as 404, 500, etc.) different return states. Tcp link: the method and the device are used for requesting the corresponding port request of the corresponding server in the request address and can be used for network application verification.
It should be understood that sending the encryption configuration information to the set top box, so that the set top box accesses a target address according to the encryption configuration information, and feeding back access result information refers to: after the encryption configuration information is sent to the set top box, the set top box accesses a target address in the encryption configuration information according to the encryption configuration information, and then access result information is obtained through access and test.
Step S30: and checking the access result information to obtain an information checking result.
In specific implementation, the information verification result refers to a result obtained after verification of the access result information, and valid and reliable data is obtained by signature verification of the access result information and is used as the information verification result.
Step S40: and visually displaying according to the access result information and the information verification result.
The visual display means that the display is performed by a display device, which may be a mobile phone, a personal computer, or a monitor.
It should be understood that the visual presentation according to the access result information and the information verification result refers to: and processing data by using the access result information and the information verification result through a real-time big data means to carry out quantitative statistical analysis, and displaying the visual result by using data visualization tools (such as superSet and forever flood Bi). The request response speed and the reliability result of each area of the whole country can be intuitively seen. Whether an abnormal request result exists or not, such as inconsistent returned content, incorrect dns resolution, incapability of normal request of a server and the like.
Further, in order to enable detailed visual presentation of the access result information and the information verification result when the information verification result is verification pass, step S40 includes: when the information verification result is that verification is passed, extracting original network data from the access result information; classifying the original network data to obtain classified network data; carrying out quantization statistics on the classified network data to obtain display network information; and carrying out visual display according to the display network information.
In a specific implementation, the original network data refers to the data related to the actual network state of the set top box in the access result information.
It should be noted that, classifying the original network data to obtain classified network data refers to data sorting the original network data to obtain original network data classified into various categories, that is, classified network data.
It should be understood that performing quantization statistics on the classified network data to obtain the display network information means that the classified network data is processed by a real-time big data means, and the data of the same class is sorted and quantized, so that the final result is the display network information.
In a specific implementation, the visual display according to the display network information refers to: and after the display network information is obtained, visually displaying the display network information through the display equipment.
By the method, the access result information can be classified and displayed after the data of quantitative statistics are processed, so that the visual display result is more detailed and visual, and the use experience of a user is improved.
The embodiment generates encryption configuration information when a network test request from a set top box is received; the encryption configuration information is sent to the set top box, so that the set top box accesses a target address according to the encryption configuration information and feeds back access result information; checking the access result information to obtain an information checking result; and visually displaying according to the access result information and the information verification result. By the method, the encryption configuration information can be generated after the network test request of the set top box is received and sent to the set top box, so that the set top box can access the target address and feed back access result information, then the access result information is checked to obtain an information check result, and finally visual display is carried out, the set top box is directly connected with the server and network quality is measured, and the real network condition of the set top box can be accurately measured.
Referring to fig. 3, fig. 3 is a flowchart of a second embodiment of a set-top box network detection method according to the present invention.
Based on the first embodiment, the set-top box network detection method in this embodiment includes:
step S301: and obtaining the network information to be tested according to the access result information.
It should be noted that, the network information to be tested refers to the information about the network state of the set top box extracted from the access result information, which may include the information about the network quality, the network speed, the delay, etc. of the set top box, or other information about the network state of the set top box, which is not limited in this embodiment.
Step S302: and obtaining the encryption information to be tested according to the network information to be tested.
It should be understood that the encrypted information to be measured refers to information related to encryption, such as an encryption mode, a signature, and the like, of the network information to be measured, which is obtained according to the network information to be measured.
Step S303: and checking the encryption information to be tested to obtain an information checking result.
In a specific implementation, the step of verifying the encryption information to be tested to obtain an information verification result refers to that after the encryption information to be tested is obtained, the encryption information to be tested is compared with encryption configuration information to obtain the information verification result.
It should be noted that, the information verification result is divided into passing and non-passing, when the information verification result is passing, the signature comparison of the encrypted information to be tested and the encrypted configuration information issued by the server is successful, otherwise, the signature comparison is unsuccessful.
Further, in order to accurately verify the encrypted information to be tested, the step of verifying the encrypted information to be tested to obtain an information verification result includes: obtaining first check information according to the encryption configuration information; obtaining second check information according to the encryption information to be tested; and checking the second checking information according to the first checking information to obtain an information checking result.
It should be understood that obtaining the first verification information from the encryption configuration information refers to: and extracting information related to encryption such as an encryption mode, a signature and the like for verifying the encryption information to be tested from the encryption configuration information issued by the server as a verification comparison item, namely the first verification information.
In a specific implementation, obtaining the second verification information according to the to-be-detected encryption information refers to that the encryption mode, signature and other information which are removed from the to-be-detected encryption information and respectively correspond to the information in the first verification information are taken as the second verification information.
The step of verifying the second verification information according to the first verification information to obtain an information verification result refers to comparing signature information and other encryption related information in the first verification information and the second verification information to obtain an information verification result.
It should be understood that after the signature verification is successful, the information verification result is checked to pass, or else, the information verification result is checked to pass.
By the method, the encryption information to be detected can be accurately compared with the signature of the encryption configuration information issued by the previous server, and the information verification result is more accurate.
Further, in order to prompt a user when the information verification result is that the verification fails, the step of visually displaying according to the access result information and the information verification result includes: when the information verification result is that verification is passed, extracting original network data from the access result information; classifying the original network data to obtain classified network data; carrying out quantization statistics on the classified network data to obtain display network information; and carrying out visual display according to the display network information.
In a specific implementation, when the information verification result is that the verification fails, extracting the original network data from the access result information refers to extracting the data related to the real network state of the set top box in the access result information from the access result information as the original network data when the information verification result is that the verification fails, that is, the signature verification fails.
The generation of the abnormality early warning information according to the original network data means that the related information of the cause of the verification failure, which needs to be displayed to the user, is generated according to the original network data, and is used as the abnormality early warning information.
It should be understood that performing visual display according to the abnormal early warning information means that after the abnormal early warning information is obtained, the abnormal early warning information is visually displayed through a display device so as to display relevant information such as a verification failure reason to a user.
By the method, when the information verification result is that verification fails, the verification failure result, the reason and other related information can be displayed to the user, and the use experience of the user is improved.
According to the embodiment, the network information to be tested is obtained according to the access result information; obtaining encryption information to be tested according to the network information to be tested; and checking the encryption information to be tested to obtain an information checking result. By the method, the access result information can be accurately checked according to the encryption information to be detected, and the encryption mode is accurately checked, so that the information to be compared is reduced, and the checking accuracy is higher.
In addition, the embodiment of the invention also provides a storage medium, wherein the storage medium stores a set top box network detection program, and the set top box network detection program realizes the steps of the set top box network detection method when being executed by a processor.
The storage medium adopts all the technical solutions of all the embodiments, so that the storage medium has at least all the beneficial effects brought by the technical solutions of the embodiments, and is not described in detail herein.
Referring to fig. 4, fig. 4 is a block diagram of a first embodiment of a network detection device for a set top box according to the present invention.
As shown in fig. 4, a set top box network detection device provided by an embodiment of the present invention includes:
the generating module 10 is configured to generate encryption configuration information when receiving a network test request from a set top box.
And the sending module 20 is configured to send the encryption configuration information to the set top box, so that the set top box accesses a target address according to the encryption configuration information, and feeds back access result information.
And the verification module 30 is used for verifying the access result information to obtain an information verification result.
And the display module 40 is configured to visually display the access result information and the information verification result.
It should be understood that the foregoing is illustrative only and is not limiting, and that in specific applications, those skilled in the art may set the invention as desired, and the invention is not limited thereto.
In the embodiment, when a network test request from a set top box is received through the generation module 10, encryption configuration information is generated; the sending module 20 sends the encryption configuration information to the set top box, so that the set top box accesses a target address according to the encryption configuration information and feeds back access result information; the verification module 30 verifies the access result information to obtain an information verification result; the display module 40 performs visual display according to the access result information and the information verification result. By the method, the encryption configuration information can be generated after the network test request of the set top box is received and sent to the set top box, so that the set top box can access the target address and feed back access result information, then the access result information is checked to obtain an information check result, and finally visual display is carried out, the set top box is directly connected with the server and network quality is measured, and the real network condition of the set top box can be accurately measured.
The device adopts all the technical schemes of all the embodiments, so that the device has at least all the beneficial effects brought by the technical schemes of the embodiments, and the description is omitted here.
In an embodiment, the generating module 10 is further configured to obtain, when a network test request from a set-top box is received, set-top box configuration information corresponding to the set-top box according to the network test request; acquiring original configuration information; and obtaining encryption configuration information according to the set top box configuration information and the original configuration information.
In an embodiment, the generating module 10 is further configured to obtain classification configuration information according to the set top box configuration information; signing the original configuration information through an encryption algorithm to obtain signature configuration information; and obtaining encryption configuration information according to the classification configuration information and the signature configuration information.
In an embodiment, the verification module 30 is further configured to obtain network information to be tested according to the access result information; obtaining encryption information to be tested according to the network information to be tested; and checking the encryption information to be tested to obtain an information checking result.
In an embodiment, the verification module 30 is further configured to obtain first verification information according to the encryption configuration information; obtaining second check information according to the encryption information to be tested; and checking the second checking information according to the first checking information to obtain an information checking result.
In an embodiment, the display module 40 is further configured to extract the original network data from the access result information when the information verification result is that the verification is passed; classifying the original network data to obtain classified network data; carrying out quantization statistics on the classified network data to obtain display network information; and carrying out visual display according to the display network information.
In an embodiment, the display module 40 is further configured to extract the original network data from the access result information when the information verification result is that the verification fails; generating abnormal early warning information according to the original network data; and visually displaying according to the abnormal early warning information.
It should be noted that the above-described working procedure is merely illustrative, and does not limit the scope of the present invention, and in practical application, a person skilled in the art may select part or all of them according to actual needs to achieve the purpose of the embodiment, which is not limited herein.
In addition, technical details not described in detail in the present embodiment may refer to the set top box network detection method provided in any embodiment of the present invention, which is not described herein.
Furthermore, it should be noted that, in this document, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or system that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or system. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or system that comprises the element.
The foregoing embodiment numbers of the present invention are merely for the purpose of description, and do not represent the advantages or disadvantages of the embodiments.
From the above description of the embodiments, it will be clear to those skilled in the art that the above-described embodiment method may be implemented by means of software plus a necessary general hardware platform, but of course may also be implemented by means of hardware, but in many cases the former is a preferred embodiment. Based on such understanding, the technical solution of the present invention may be embodied essentially or in a part contributing to the prior art in the form of a software product stored in a storage medium (e.g. Read Only Memory)/RAM, magnetic disk, optical disk) and including several instructions for causing a terminal device (which may be a mobile phone, a computer, a server, or a network device, etc.) to perform the method according to the embodiments of the present invention.
The foregoing description is only of the preferred embodiments of the present invention, and is not intended to limit the scope of the invention, but rather is intended to cover any equivalents of the structures or equivalent processes disclosed herein or in the alternative, which may be employed directly or indirectly in other related arts.

Claims (10)

1. The set top box network detection method is characterized by comprising the following steps of:
when a network test request from a set top box is received, encryption configuration information is generated;
the encryption configuration information is sent to the set top box, so that the set top box accesses a target address according to the encryption configuration information and feeds back access result information;
checking the access result information to obtain an information checking result;
and visually displaying according to the access result information and the information verification result.
2. The method of claim 1, wherein generating encryption configuration information when a network test request is received from a set top box comprises:
when a network test request from a set top box is received, obtaining set top box configuration information corresponding to the set top box according to the network test request;
acquiring original configuration information;
and obtaining encryption configuration information according to the set top box configuration information and the original configuration information.
3. The method of claim 2, wherein said obtaining encrypted configuration information from said set top box configuration information and said original configuration information comprises:
obtaining classification configuration information according to the set top box configuration information;
signing the original configuration information through an encryption algorithm to obtain signature configuration information;
and obtaining encryption configuration information according to the classification configuration information and the signature configuration information.
4. The method of claim 1, wherein the verifying the access result information to obtain an information verification result comprises:
obtaining network information to be tested according to the access result information;
obtaining encryption information to be tested according to the network information to be tested;
and checking the encryption information to be tested to obtain an information checking result.
5. The method of claim 4, wherein the verifying the encrypted information to be tested to obtain an information verification result comprises:
obtaining first check information according to the encryption configuration information;
obtaining second check information according to the encryption information to be tested;
and checking the second checking information according to the first checking information to obtain an information checking result.
6. The method of claim 1, wherein the visually displaying according to the access result information and the information verification result comprises:
when the information verification result is that verification is passed, extracting original network data from the access result information;
classifying the original network data to obtain classified network data;
carrying out quantization statistics on the classified network data to obtain display network information;
and carrying out visual display according to the display network information.
7. The method according to any one of claims 1 to 6, wherein the visually displaying according to the access result information and the information verification result includes:
when the information verification result is that verification fails, extracting original network data from the access result information;
generating abnormal early warning information according to the original network data;
and visually displaying according to the abnormal early warning information.
8. A set-top box network detection device, characterized in that the set-top box network detection device comprises:
the generation module is used for generating encryption configuration information when receiving a network test request from the set top box;
the sending module is used for sending the encryption configuration information to the set top box so that the set top box can access the target address according to the encryption configuration information and feed back access result information;
the verification module is used for verifying the access result information to obtain an information verification result;
and the display module is used for visually displaying according to the access result information and the information verification result.
9. A set top box network detection device, the device comprising: a memory, a processor, and a set-top box network detection program stored on the memory and executable on the processor, the set-top box network detection program configured to implement the set-top box network detection method of any one of claims 1 to 7.
10. A storage medium, wherein the storage medium has stored thereon a set-top box network detection program, which when executed by a processor implements the set-top box network detection method according to any one of claims 1 to 7.
CN202111148784.9A 2021-09-28 2021-09-28 Set top box network detection method, device, equipment and storage medium Active CN113766323B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111148784.9A CN113766323B (en) 2021-09-28 2021-09-28 Set top box network detection method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111148784.9A CN113766323B (en) 2021-09-28 2021-09-28 Set top box network detection method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN113766323A CN113766323A (en) 2021-12-07
CN113766323B true CN113766323B (en) 2023-11-07

Family

ID=78798218

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111148784.9A Active CN113766323B (en) 2021-09-28 2021-09-28 Set top box network detection method, device, equipment and storage medium

Country Status (1)

Country Link
CN (1) CN113766323B (en)

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107396183A (en) * 2017-07-20 2017-11-24 烽火通信科技股份有限公司 The start network detecting method and system of convergent terminal equipment
CN108616389A (en) * 2018-04-10 2018-10-02 深信服科技股份有限公司 Network estimation method, equipment, storage medium based on Cloud Server and device
CN110072101A (en) * 2018-01-24 2019-07-30 北京视联动力国际信息技术有限公司 A kind of test method and device of Network status
CN110290010A (en) * 2019-07-03 2019-09-27 福建广电网络集团股份有限公司 A kind of broadband dress dimension auxiliary system
CN111510341A (en) * 2020-03-13 2020-08-07 视联动力信息技术股份有限公司 Network testing method and device for video network
WO2021003975A1 (en) * 2019-07-11 2021-01-14 深圳壹账通智能科技有限公司 Gateway interface test method, terminal device, storage medium and apparatus
CN112738117A (en) * 2020-12-31 2021-04-30 青岛海尔科技有限公司 Data transmission method, device and system, storage medium and electronic device

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8327408B2 (en) * 2007-08-29 2012-12-04 At&T Intellectual Property I, Lp System and method for troubleshooting a set top box
US9292368B2 (en) * 2010-12-27 2016-03-22 Verizon Patent And Licensing Inc. Method and apparatus for invoking native functions of a mobile device to control a set-top box
US9141647B2 (en) * 2012-04-26 2015-09-22 Sap Se Configuration protection for providing security to configuration files

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107396183A (en) * 2017-07-20 2017-11-24 烽火通信科技股份有限公司 The start network detecting method and system of convergent terminal equipment
CN110072101A (en) * 2018-01-24 2019-07-30 北京视联动力国际信息技术有限公司 A kind of test method and device of Network status
CN108616389A (en) * 2018-04-10 2018-10-02 深信服科技股份有限公司 Network estimation method, equipment, storage medium based on Cloud Server and device
CN110290010A (en) * 2019-07-03 2019-09-27 福建广电网络集团股份有限公司 A kind of broadband dress dimension auxiliary system
WO2021003975A1 (en) * 2019-07-11 2021-01-14 深圳壹账通智能科技有限公司 Gateway interface test method, terminal device, storage medium and apparatus
CN111510341A (en) * 2020-03-13 2020-08-07 视联动力信息技术股份有限公司 Network testing method and device for video network
CN112738117A (en) * 2020-12-31 2021-04-30 青岛海尔科技有限公司 Data transmission method, device and system, storage medium and electronic device

Also Published As

Publication number Publication date
CN113766323A (en) 2021-12-07

Similar Documents

Publication Publication Date Title
CN109241343B (en) System, method and device for identifying brush amount user
CN111325463A (en) Data quality detection method, device, equipment and computer readable storage medium
CN107040535B (en) Method, device and system for monitoring login of mobile application channel and storage medium
CN107145440B (en) Application program testing method and device and computer equipment
CN110730107A (en) Test data generation method and device, computer equipment and storage medium
CN106528393A (en) Method and device for Mock testing of WebService
CN105245489B (en) Verification method and device
CN110188159B (en) Credit data access method, device, equipment and computer readable storage medium
CN111506497B (en) Business logic debugging method, device, equipment and computer readable storage medium
US20160232338A1 (en) User verifying method, terminal device, server and storage medium
CN112866051B (en) Vulnerability processing method, vulnerability processing device, server and medium
CN110138800A (en) Interface alternation and its verification method, log on request generation and verification method and device
CN105117340B (en) URL detection methods and device for iOS browser application quality evaluations
CN107168844A (en) A kind of method and device of performance monitoring
CN112615873B (en) Internet of things equipment safety detection method, equipment, storage medium and device
CN113766323B (en) Set top box network detection method, device, equipment and storage medium
CN114697079B (en) Method and system for detecting illegal user of application client
WO2023108833A1 (en) Terminal anomalous behavior detection method and apparatus, device, and storage medium
Antunes et al. Recycling test cases to detect security vulnerabilities
CN114564387A (en) Scene type automatic testing method and system for OpenStack cloud platform
CN112506765A (en) Software testing method, device, equipment and storage medium
CN112363931A (en) Web system testing method and device
CN110532186A (en) Method, apparatus, electronic equipment and the storage medium tested using identifying code
CN114827085B (en) Root server correctness monitoring method, device, equipment and storage medium
CN115935410A (en) Method, device, equipment and medium for verifying accuracy of database algorithm model

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant