CN115952079A - Method and system for recording mobile application automation behaviors and analyzing and positioning defects - Google Patents
Method and system for recording mobile application automation behaviors and analyzing and positioning defects Download PDFInfo
- Publication number
- CN115952079A CN115952079A CN202211549891.7A CN202211549891A CN115952079A CN 115952079 A CN115952079 A CN 115952079A CN 202211549891 A CN202211549891 A CN 202211549891A CN 115952079 A CN115952079 A CN 115952079A
- Authority
- CN
- China
- Prior art keywords
- test
- screenshot
- touch event
- touch
- information
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Images
Classifications
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y02—TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
- Y02D—CLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
- Y02D10/00—Energy efficient computing, e.g. low power processors, power management or thermal management
Landscapes
- Debugging And Monitoring (AREA)
Abstract
The invention relates to a method and a system for recording mobile application automation behaviors and analyzing and positioning defects. If the test has problems, the problem is traced back to generate a test flow trace back graph, and the whole test process can be reproduced. And analyzing data of the problems encountered in the test, and providing data for verifying the repaired program to be detected. After the program to be detected is repaired, whether the repaired program to be detected is successfully repaired is automatically verified. Therefore, the invention can record and analyze the behavior of the tester aiming at the mobile application device and has a functional method of automatic reproduction and verification aiming at the problem of difficult reproduction.
Description
Technical Field
The invention relates to the technical field of automatic program testing, in particular to a method and a system for recording automatic behaviors of mobile applications and analyzing and positioning defects.
Background
In the application test process of the mobile terminal, most of the defects are caused by a series of operations when testers encounter the defects, and the problems are difficult to reproduce, locate and verify.
The existing method is as follows:
the problem reproduction and positioning are difficult to carry out by recalling the operation done by the user if the user cannot remember the operation; the server-side log is relied on, but the server-side interface call caused by which operation cannot be determined; business knowledge of developers and testers and documents of the background interface are required to search to speculate the recurring operational steps. Therefore, the existing mobile terminal application test process has no comprehensive method and system for recording and analyzing the behavior of the tester aiming at the mobile application device, and simultaneously has no automatic reproduction and verification functional method aiming at the difficult reproduction problem.
Disclosure of Invention
In order to solve the defects of the prior art, the invention provides a method and a system for automatically recording behaviors of mobile applications and analyzing and positioning defects. After the defects are met, the test behavior can be played back for operation, a complete link for reproducing the problems can be provided, and meanwhile, automatic verification is carried out.
In order to achieve the above purpose, the technical scheme adopted by the invention comprises the following steps:
a method for recording, analyzing and positioning defects of mobile application automation behaviors comprises the following steps:
s1, starting a test of a program to be detected, and monitoring a touch event of a client, wherein the test comprises the following steps:
acquiring touch coordinate information;
screenshot is carried out on a client screen page with a touch event, and a screen page screenshot corresponding to the touch event is obtained;
the method comprises the steps of safely encrypting a screenshot of a screen page corresponding to a touch event, and storing the encrypted screenshot of the screen page corresponding to the touch event to a local memory of a client in a folder mode to obtain a user test process recording folder;
generating a hash set by taking the acquired touch coordinate information as a key and taking a screenshot of a screen page corresponding to the encrypted touch event as a value;
s2, if the test encounters a problem, performing problem backtracking to generate a test flow backtracking graph, which comprises the following steps:
positioning to a corresponding user test process recording folder through a user account with a problem and the time for starting the test;
safely decrypting the screen page screenshot corresponding to the encrypted touch event in the user test process record folder to obtain the decrypted screen page screenshot corresponding to the touch event;
identifying touch coordinates in a form of coordinate points in the decrypted screenshot of the screen page corresponding to the touch event according to the corresponding relation between the touch coordinate information in the hash set and the encrypted screenshot of the screen page corresponding to the touch event, and obtaining the screenshot of the screen page corresponding to the decrypted touch event with the identified touch coordinate points;
integrating screen page screenshots corresponding to the decrypted touch events marked with the touch coordinate points into a test flow backtracking graph according to a time sequence;
s3, analyzing data of the problems encountered in the test, and providing data for the program to be detected after verification and repair, wherein the data comprises the following steps:
on a screenshot of a screen page corresponding to the decrypted touch event marked with a touch coordinate point, taking the coordinate point as a center to perform screenshot according to a preset key pixel range to obtain first picture data;
recognizing character information in the first picture data through an image recognition technology to obtain first picture data information;
on a screenshot of a screen page corresponding to the decrypted touch event marked with the touch coordinate point, performing screenshot in a preset pixel range of a header bar at the top of the picture to obtain second picture data;
recognizing character information in the second picture data through an image recognition technology to obtain second picture data information;
and S4, verifying whether the repaired program to be detected is successfully repaired.
Further, the step S4 includes:
s41, performing event operation on the first picture information by using the first picture data information as a parameter through a click method in Devices and Object classes provided by an automatic source-opening frame uiautomater to obtain a verification page;
s42, confirming whether the information of the verification page contains second picture data information or not by using an alert assertion method;
s43, if the information of the verification page contains the second picture data information, the repairing is successful;
and S44, if the information of the verification page does not contain the second picture data information, the repair is failed.
Further, the user test process records the folder, the starting test time is used as the name of the folder, and if the user performs login operation, the name of the folder is modified into the starting test time, the user account and the password.
Further, the encryption method for securely encrypting the screenshot of the screen page corresponding to the touch event is base64 encoding.
Further, the touch event includes: touch, click, slide, lift, and multi-fingered events.
Further, the image identification technology is tesseract-ocr open-source image identification technology.
The invention also provides a system for recording the mobile application automatic behavior and analyzing and positioning the defects, which is characterized by comprising the following steps:
the touch event monitoring module is used for starting the test of the program to be detected and monitoring the touch event of the client;
the problem backtracking module is used for backtracking the problems and generating a test flow backtracking graph if the problems are encountered in the test;
the data analysis module is used for carrying out data analysis on problems encountered in the test and providing data for the program to be detected after verification and repair;
and the repair verification module is used for verifying whether the repaired program to be detected is successfully repaired.
The invention also provides a computer-readable storage medium, which is characterized in that the storage medium stores a computer program, and the computer program is executed by a processor to implement the above method for recording the mobile application automation behavior and analyzing and positioning the defect.
The invention also provides electronic equipment which is characterized by comprising a processor and a memory;
the memory is used for storing a user test process record folder and a hash set;
the processor is used for executing the mobile application automation behavior recording and defect analyzing and positioning method by calling the user test process recording folder and the hash set.
The present invention further provides a computer program product comprising a computer program and/or instructions, wherein the computer program and/or instructions, when executed by a processor, implement the steps of the above-mentioned method for mobile application automated behavior recording and defect location analysis.
The invention has the beneficial effects that:
by adopting the method and the system for recording the mobile application automation behaviors and analyzing the positioning defects, when a user operates the client or a tester carries out manual test, the touch event of the client is monitored in real time, the touch coordinate information is obtained, screenshot is carried out on the client screen page with the touch event, partition storage is carried out according to a specific mode, and the coordinate information is associated with the screenshot of the client screen page. If the test has problems, the problem is traced back to generate a test flow tracing back diagram, and the whole test process can be reproduced. And analyzing data of the problems encountered in the test, and providing data for verifying the repaired program to be detected. After the program to be detected is repaired, whether the repaired program to be detected is successfully repaired is automatically verified. Therefore, the method and the system for automatically recording the behaviors of the mobile application and analyzing and positioning the defects can record and analyze the behaviors of the testers aiming at the mobile application device, and have the function of automatically reproducing and verifying aiming at the problem of difficult reproduction.
Drawings
Fig. 1 is a schematic diagram of a method for recording automated behaviors of a mobile application and analyzing and locating defects according to the present invention.
FIG. 2 is a diagram of a system for automated behavior recording and analyzing and locating defects for mobile applications according to the present invention.
Detailed Description
For a clearer understanding of the contents of the present invention, reference will be made to the accompanying drawings and examples.
Fig. 1 is a schematic diagram of a method for recording, analyzing and positioning defects of mobile application automation behaviors, which includes the following steps:
s1, starting a test of a program to be detected, and monitoring a touch event of a client;
according to an android event distribution mechanism, three methods of dipatchouchent distribution user touch screen events, onInterceptTouchent and onTouchent are rewritten to acquire touch (touch), click (click), slide (move/slide), lift (up) and multi-finger (multi-finger) events of a user on a screen. Specifically, the method comprises the following steps:
acquiring a touch event through a motionevent.
Acquiring touch coordinate information; if the touch event is pressed, recording the current coordinates through MotionEvent.getX () and MotionEvent.getY (), and recording the coordinates when the finger is lifted after the lifting event is received, wherein the method is the same as the above method.
Screenshot is carried out on a client terminal screen page with a touch event, and a screen page screenshot corresponding to the touch event is obtained; and after the uplift event is received, calling an interface of the screenshot of the android system through reflection to complete screenshot generation of the current screen state and the button position. And carrying out security encryption on the screenshot of the screen page corresponding to the touch event, carrying out base64 encoding (based on security encryption processing), finishing converting the bitmap type of the screenshot into a base64 format by calling the BitmapFactory and FileOutputStream type api, and finally writing flush into a local storage directory.
Storing the encrypted screen page screenshot corresponding to the touch event to a local memory of the client in a folder mode to obtain a user test process record folder;
the creation of the directory is by way of example as follows:
for example, if the current time after the monitoring device is turned on is 20211223100401, a picture directory creation name is 20211223100401 in the device, a tester operates on the device to be tested, a login account name A, namely, a 19911110000 password is 111111, after login is clicked, a screenshot is placed under a 20211223100401 picture directory, whether image analysis is a login page or not is performed, namely whether a login button exists or not is determined, if the login account name A is the 19911110000 password, a directory file is modified to be 20211200400401 +19911110000+111111, subsequent testers perform scene test work, different buttons are clicked to enter different pages, and the screenshot is placed under the 20211223100401+19911110000+111111 directory each time;
the tester quits logging in, logs in the account B again, namely, the 19911000001 password is 222222, after the logging in is clicked, the screenshot is placed under a 20211200401 picture directory, whether image analysis is a login page or not is performed, namely, whether a login button exists or not is determined, if the login button exists, a new directory is created, and the current moment 20211203001 +19911000001+222222 is determined, and the rest is done, so that a plurality of picture folders with the moment and the username password as names can be generated.
Generating a hash set by taking the acquired touch coordinate information as a key and taking a screenshot of a screen page corresponding to the encrypted touch event as a value; a Hash set is generated in the memory, and the corresponding coordinate position under each screenshot is recorded, so that the subsequent backtracking verification operation is facilitated. For example: { key: value } { (x, y): base64 coding }.
And S2, if the test has problems, performing problem backtracking to generate a test flow backtracking graph.
Firstly, searching a specific file directory by using the user dimension + at the moment of problem occurrence. I.e. by the user account that has encountered the problem and the time the test was initiated, to the corresponding user test procedure log folder.
Safely decrypting the screen page screenshot corresponding to the encrypted touch event in the user test process record folder to obtain the decrypted screen page screenshot corresponding to the touch event; and converting the base64 file into bitmap for picture display through the Android owned type bitmap.
After a group of pictures are decoded, the pictures are placed into an internal memory, caching is carried out through an Android native class Lrucache, the size of the whole cache is counted, and synthesis of a plurality of pictures is supported through user-defined View.
And identifying the touch coordinates in the screen page screenshot corresponding to the decrypted touch event in a coordinate point form according to the corresponding relation between the touch coordinate information in the hash set and the encrypted screen page screenshot corresponding to the touch event, so as to obtain the screen page screenshot corresponding to the decrypted touch event with the identified touch coordinate points. Setting a picture selection range of the coordinate points in an opengl mode (namely clicking a coordinate frame generated by touch), rewriting onMeasure, onLayout and onDraw methods of the user-defined View, and drawing the red points on the current picture View.
Integrating screen page screenshots corresponding to the decrypted touch events marked with the touch coordinate points into a test flow backtracking graph according to a time sequence; and generating a final complete flow picture in a bitmap factory mode after rendering, and storing the final complete flow picture in a problem backtracking directory.
And S3, analyzing data of the problems encountered in the test, and providing data for the program to be detected after the program to be detected is verified and repaired.
And identifying a login account and a password on a login page according to an image identification technology for identifying a tesseract-ocr open source.
On a screenshot of a screen page corresponding to the decrypted touch event marked with a touch coordinate point, taking the coordinate point as a center to perform screenshot according to a preset key pixel range to obtain first picture data; the predetermined key pixel range is 200 pixels long and 200 pixels wide. I.e. enlarging the coordinate red point position by length (pixel): 200. width (pixel): 200 The area of (conventional button size of the application under test) is pictured at 1.Png.
Recognizing character information in the first picture data through an image recognition technology to obtain first picture data information; that is, through tesseract-ocr open source image recognition technology, the characters in the picture 1.Png are recognized, that is, the name of the clicked area of the tester is recognized, for example, the information is recognized: touch-info transaction details and the like.
On a screenshot of a screen page corresponding to the decrypted touch event marked with the touch coordinate point, performing screenshot in a pixel range of a title bar at the top of a preset picture to obtain second picture data; the pixel range of the preset picture top title bar is X (0-1024) and Y (0-220). I.e. the top regions X (0-1024), Y (0-220) (1024 is the width of the resolution of the device) for each picture in the gallery, i.e. the top bar (almost every page will have a top header for the features of our application under test), the picture is truncated.
And recognizing the character information in the second picture data through an image recognition technology to obtain second picture data information. I.e., identifying title information, title-info my account, etc. for the page.
And if the image identification does not obtain the final result, finishing acquiring the data of the user click area by adopting the coordinates in the hash set stored in the previous step.
By way of illustration of the above process:
after the user inputs an account number at 10 am in 3, 14 and 2022 years, clicks all applications, clicks the account application, clicks transaction details and reports an error. The finished process products are then:
the name of the folder is: 20220314100001+19911000001+111111
And (3) storing:
{(x1,y1),image1-base64},{(x2,y2),image2-base64},{(x3,y3),image3-base64},{(x4,y4),image4-base64}
the acquired data information is as follows:
logging in an account name account:19911000001 password:111111
The operation process comprises the following steps:
touch-info (1): accession title-for (1): null (landing page without title)
touch-info (2): all title-info (2): null (post-login page without title)
touch-info (3): account title-info (3) search function/product/site
touch-info (4): transaction detail title-in for (4): my Account
And S4, after the problems encountered in the testing process are repaired, verifying whether the repaired program to be tested is successfully repaired.
Acquiring a user account, a password and an operation flow through a data analysis function, and performing event operation on first picture information by using the first picture data information as a parameter through a click method in Devices and Object classes provided by an automatic open source framework uiautomater to obtain a verification page;
confirming whether the information of the verification page contains second picture data information or not by using an alert assertion method;
if the information of the verification page contains the second picture data information, the repairing is successful;
and if the information of the verification page does not contain the second picture data information, the repair fails.
Another aspect of the present invention relates to a system for recording, analyzing and locating defects in mobile application automation behavior, which has a structure as shown in fig. 2, and includes:
the touch event monitoring module is used for starting the test of the program to be detected and monitoring the touch event of the client;
the problem backtracking module is used for backtracking the problems and generating a test flow backtracking graph if the problems are encountered in the test;
the data analysis module is used for carrying out data analysis on problems encountered in the test and providing data for the program to be detected after verification and repair;
and the repair verification module is used for verifying whether the repaired program to be detected is successfully repaired.
By using this system, the above-described arithmetic processing method can be executed and a corresponding technical effect can be achieved.
Embodiments of the present invention also provide a computer-readable storage medium capable of implementing all the steps of the method in the above embodiments, the computer-readable storage medium having stored thereon a computer program which, when executed by a processor, implements all the steps of the method in the above embodiments.
Embodiments of the present invention further provide an electronic device for executing the method, as an implementation apparatus of the method, the electronic device at least has a processor and a memory, and particularly, the memory stores data and related computer programs, such as a user test procedure recording folder and a hash set, etc., required for executing the method, and the processor calls the data and programs in the memory to execute all steps of implementing the method, and obtains corresponding technical effects.
Preferably, the electronic device may comprise a bus architecture, which may include any number of interconnected buses and bridges linking together various circuits including one or more processors and memory. The bus may also link various other circuits such as peripherals, voltage regulators, power management circuits, and the like, which are well known in the art, and therefore, will not be described any further herein. A bus interface provides an interface between the bus and the receiver and transmitter. The receiver and transmitter may be the same element, i.e., a transceiver, providing a means for communicating with various other systems over a transmission medium. The processor is responsible for managing the bus and general processing, while the memory may be used for storing data used by the processor in performing operations.
Additionally, the electronic device may further include a communication module, an input unit, an audio processor, a display, a power source, and the like. The processor (or controller, operation control) may include a microprocessor or other processor device and/or logic device, which receives input and controls the operation of various components of the electronic device; the memory may be one or more of a buffer, a flash memory, a hard drive, a removable medium, a volatile memory, a non-volatile memory or other suitable devices, and may store the above-mentioned related data information, and may also store a program for executing the related information, and the processor may execute the program stored in the memory to realize information storage or processing, etc.; the input unit is used for providing input to the processor, and can be a key or touch input device; the power supply is used for supplying power to the electronic equipment; the display is used for displaying display objects such as images and characters, and may be an LCD display, for example. The communication module is a transmitter/receiver that transmits and receives signals via an antenna. The communication module (transmitter/receiver) is coupled to the processor to provide an input signal and receive an output signal, which may be the same as in the case of a conventional mobile communication terminal. Based on different communication technologies, a plurality of communication modules, such as a cellular network module, a bluetooth module, and/or a wireless local area network module, may be disposed in the same electronic device. The communication module (transmitter/receiver) is also coupled to a speaker and a microphone via an audio processor to provide audio output via the speaker and receive audio input from the microphone to implement the usual telecommunication functions. The audio processor may include any suitable buffers, decoders, amplifiers and so forth. In addition, the audio processor is also coupled to the central processor, so that recording on the local machine can be performed through the microphone, and sound stored on the local machine can be played through the loudspeaker.
As will be appreciated by one skilled in the art, embodiments of the present invention may be provided as a method, system, or computer program product. Accordingly, the present invention may take the form of an entirely hardware embodiment, an entirely software embodiment or an embodiment combining software and hardware aspects. Furthermore, the present invention may take the form of a computer program product embodied on one or more computer-usable storage media (including, but not limited to, disk storage, CD-ROM, optical storage, and the like) having computer-usable program code embodied therein.
The present invention is described with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the invention. It will be understood that each flow and/or block of the flowchart illustrations and/or block diagrams, and combinations of flows and/or blocks in the flowchart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general purpose computer, special purpose computer, embedded processor, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create a system for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be stored in a computer-readable memory that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable memory produce an article of manufacture including an instruction system which implement the function specified in the flowchart flow or flows and/or block diagram block or blocks.
These computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer implemented process such that the instructions which execute on the computer or other programmable apparatus provide steps for implementing the functions specified in the flowchart flow or flows and/or block diagram block or blocks. While preferred embodiments of the present invention have been described, additional variations and modifications in those embodiments may occur to those skilled in the art once they learn of the basic inventive concepts. Therefore, it is intended that the appended claims be interpreted as including the preferred embodiment and all changes and modifications that fall within the scope of the invention.
The above description is only for the preferred embodiment of the present invention, but the scope of the present invention is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present invention are included in the scope of the present invention. Therefore, the protection scope of the present invention shall be subject to the protection scope of the claims.
Claims (10)
1. A method for recording, analyzing and positioning defects of mobile application automation behaviors is characterized by comprising the following steps:
s1, starting a test of a program to be detected, and monitoring a touch event of a client, wherein the test comprises the following steps:
acquiring touch coordinate information;
screenshot is carried out on a client screen page with a touch event, and a screen page screenshot corresponding to the touch event is obtained;
the screen page screenshot corresponding to the touch event is safely encrypted, and the encrypted screen page screenshot corresponding to the touch event is stored in a local memory of the client in a folder mode to obtain a user test process recording folder;
generating a hash set by taking the obtained touch coordinate information as a key and taking a screenshot of a screen page corresponding to the encrypted touch event as a value;
s2, if the test encounters a problem, performing problem backtracking to generate a test flow backtracking diagram, including:
positioning to a corresponding user test process recording folder through a user account with problems and the time for starting the test;
safely decrypting the screenshot of the screen page corresponding to the encrypted touch event in the user test process recording folder to obtain the screenshot of the screen page corresponding to the decrypted touch event;
identifying touch coordinates in the decrypted screenshot of the touch event in a form of coordinate points according to the corresponding relation between the touch coordinate information in the hash set and the encrypted screenshot of the screen page corresponding to the touch event, and obtaining the screenshot of the decrypted touch event, which is identified with the touch coordinate points;
integrating screen page screenshots corresponding to the decrypted touch events marked with the touch coordinate points into a test flow backtracking graph according to a time sequence;
s3, analyzing data of the problems encountered in the test, and providing data for the program to be detected after verification and repair, wherein the data comprises the following steps:
on the screenshot of the screen page corresponding to the decrypted touch event marked with the touch coordinate point, taking the coordinate point as a center to perform screenshot according to a preset key pixel range to obtain first picture data;
recognizing the character information in the first picture data through an image recognition technology to obtain first picture data information;
on the screenshot of the screen page corresponding to the decrypted touch event marked with the touch coordinate point, performing screenshot in a pixel range of a title bar at the top of a preset picture to obtain second picture data;
recognizing the character information in the second picture data through an image recognition technology to obtain second picture data information;
and S4, verifying whether the repaired program to be detected is successfully repaired.
2. The method of claim 1, wherein the step S4 comprises:
s41, by means of a click method in Devices and Object types provided by an automatic source-opening frame uiautomater, taking the first picture data information as a parameter, and performing event operation on the first picture information to obtain a verification page;
s42, confirming whether the information of the verification page contains the second picture data information or not by an assert method;
s43, if the information of the verification page contains the second picture data information, the repairing is successful;
and S44, if the information of the verification page does not contain the second picture data information, the repair is failed.
3. The method of claim 1, wherein the user test procedure records the folder, the start test time is used as the name of the folder, and if the user performs a login operation, the name of the folder is modified to the start test time, the user account and the password.
4. The method of claim 1, wherein the encryption method for securely encrypting the screenshot corresponding to the touch event is base64 encoding.
5. The method of claim 1, wherein the touch event comprises: touch, click, slide, lift, and multi-fingered events.
6. The method of claim 1, wherein the image recognition technique is a tesseract-ocr open source image recognition technique.
7. A mobile application automated behavior recording and analysis localization flaw system, comprising:
the touch event monitoring module is used for starting the test of the program to be detected and monitoring the touch event of the client;
the problem backtracking module is used for backtracking the problems and generating a test flow backtracking graph if the problems are encountered in the test;
the data analysis module is used for carrying out data analysis on problems encountered in the test and providing data for verifying the repaired program to be detected;
and the repair verification module is used for verifying whether the repaired program to be detected is successfully repaired.
8. A computer-readable storage medium, wherein a computer program is stored on the storage medium, and when executed by a processor, the computer program implements the method for mobile application automated behavior recording and analysis localization of defects according to any of claims 1 to 6.
9. An electronic device comprising a processor and a memory;
the memory is used for storing a user test process record folder and a hash set;
the processor is used for executing the mobile application automation behavior recording and analyzing and positioning defect method of any one of claims 1 to 6 by calling a user test procedure recording folder and a hash set.
10. A computer program product comprising a computer program and/or instructions, characterized in that the computer program and/or instructions, when executed by a processor, implement the steps of the mobile application automated behavior recording and analysis localization defect method of any of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211549891.7A CN115952079A (en) | 2022-12-05 | 2022-12-05 | Method and system for recording mobile application automation behaviors and analyzing and positioning defects |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202211549891.7A CN115952079A (en) | 2022-12-05 | 2022-12-05 | Method and system for recording mobile application automation behaviors and analyzing and positioning defects |
Publications (1)
Publication Number | Publication Date |
---|---|
CN115952079A true CN115952079A (en) | 2023-04-11 |
Family
ID=87289876
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202211549891.7A Pending CN115952079A (en) | 2022-12-05 | 2022-12-05 | Method and system for recording mobile application automation behaviors and analyzing and positioning defects |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN115952079A (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116823599A (en) * | 2023-08-29 | 2023-09-29 | 湖北微模式科技发展有限公司 | Operation record traceability method based on picture steganography |
-
2022
- 2022-12-05 CN CN202211549891.7A patent/CN115952079A/en active Pending
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116823599A (en) * | 2023-08-29 | 2023-09-29 | 湖北微模式科技发展有限公司 | Operation record traceability method based on picture steganography |
CN116823599B (en) * | 2023-08-29 | 2023-11-17 | 湖北微模式科技发展有限公司 | Operation record traceability method based on picture steganography |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106844217B (en) | Method and device for embedding point of applied control and readable storage medium | |
US20190227917A1 (en) | Adaptive system for mobile device testing | |
US10184882B2 (en) | System and method for providing user guidance for electronic device processing | |
US10289375B2 (en) | Verification of shared display integrity in a desktop sharing system | |
CN111078547A (en) | Automatic testing framework system for PYTHON general APP software | |
CN114003451B (en) | Interface testing method, device, system and medium | |
CN105279196A (en) | Test script generation method and apparatus | |
CN115952079A (en) | Method and system for recording mobile application automation behaviors and analyzing and positioning defects | |
CN113760611B (en) | System site switching method and device, electronic equipment and storage medium | |
CN112905460B (en) | Device and method for simulating three-party receipt by automatic interface test | |
US10169216B2 (en) | Simulating sensors | |
CN116662193A (en) | Page testing method and device | |
CN107295142A (en) | terminal processing method, device and server | |
CN114448775B (en) | Equipment fault information processing method and device, electronic equipment and storage medium | |
CN105653445A (en) | Implementation method capable of meeting DO-178C test result | |
CN111949510A (en) | Test processing method and device, electronic equipment and readable storage medium | |
CN110806981B (en) | Application program testing method, device, equipment and storage medium | |
CN115587371A (en) | Method and device for generating secret key in test process, computer equipment and storage medium | |
CN111984543B (en) | Instruction testing method, device and system | |
CN113886221A (en) | Test script generation method and device, storage medium and electronic equipment | |
CN108628750B (en) | Test code processing method and device | |
CN112685306A (en) | Test method, test device, user terminal and storage medium | |
CN113115032A (en) | Batch testing method and device for smart television equipment and electronic equipment | |
CN114661609B (en) | Artificial intelligence medical automation test integrated system | |
CN116434043A (en) | Image processing method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination |