CN117453131A - Detection method and related device - Google Patents

Detection method and related device Download PDF

Info

Publication number
CN117453131A
CN117453131A CN202311432784.0A CN202311432784A CN117453131A CN 117453131 A CN117453131 A CN 117453131A CN 202311432784 A CN202311432784 A CN 202311432784A CN 117453131 A CN117453131 A CN 117453131A
Authority
CN
China
Prior art keywords
equipment
detected
detection
factory
result
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202311432784.0A
Other languages
Chinese (zh)
Inventor
巫文杰
游锦
姚炜鹏
卢鑫畅
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN202311432784.0A priority Critical patent/CN117453131A/en
Publication of CN117453131A publication Critical patent/CN117453131A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0602Interfaces specially adapted for storage systems specifically adapted to achieve a particular effect
    • G06F3/062Securing storage systems
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F3/00Input arrangements for transferring data to be processed into a form capable of being handled by the computer; Output arrangements for transferring data from processing unit to output unit, e.g. interface arrangements
    • G06F3/06Digital input from, or digital output to, record carriers, e.g. RAID, emulated record carriers or networked record carriers
    • G06F3/0601Interfaces specially adapted for storage systems
    • G06F3/0628Interfaces specially adapted for storage systems making use of a particular technique
    • G06F3/0638Organizing or formatting or addressing of data
    • G06F3/0644Management of space entities, e.g. partitions, extents, pools

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • Human Computer Interaction (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Storage Device Security (AREA)

Abstract

The application discloses a detection method and a related device, wherein, firstly, a detection result of equipment to be detected is obtained by running factory detection software, and the detection result is stored in a designated storage space of the equipment to be detected. And then the formula result inquiry equipment establishes appointed connection with the equipment to be detected, and provides permission for the result inquiry equipment to access the appointed storage space of the equipment to be detected. And finally, when the detection result is successfully read from the appointed storage space by the result inquiry equipment, canceling the access authority of the result inquiry equipment. By storing the detection result of the equipment to be detected in the designated storage space, the result query equipment can only access the designated storage space and can not access other space data during the designated connection duration of the equipment to be detected and the result query equipment, so that the possibility that the equipment to be detected is maliciously tampered and implanted during the delivery detection is effectively eliminated, the manual influence is removed during the automatic delivery detection, and the detection efficiency and the detection precision are improved.

Description

Detection method and related device
Technical Field
The present disclosure relates to the field of data processing, and in particular, to a detection method and related apparatus.
Background
Before the equipment leaves the factory, the equipment needs to be detected in normalization and the like, and after the equipment is detected to be qualified, the software and the hardware of the equipment can be determined to provide normal service functions, so that the equipment can be subjected to factory treatment.
In the related art, factory detection mainly depends on manual work, and a detector detects equipment to be detected through a detection device connected with the equipment to be detected, and judges whether the equipment to be detected has factory conditions according to detection results. In the detection process, in order to meet the detection requirement, for the equipment to be detected, a higher access right is required to be opened for the detection personnel to enable the detection personnel to acquire equipment parameters required by detection.
The higher access authority enables the detection personnel to have the capability of carrying out various abnormal settings on the equipment to be detected, so that the equipment security is difficult to guarantee during factory detection.
Disclosure of Invention
In order to solve the technical problems, the application provides a detection method and a related device, which can ensure the safety of equipment during factory detection and improve the efficiency of factory detection.
The embodiment of the application discloses the following technical scheme:
in one aspect, an embodiment of the present application provides a detection method, including:
Obtaining a detection result of equipment to be detected by running factory detection software, wherein the factory detection software is configured in the equipment to be detected, and the detection result is used for identifying whether the equipment to be detected meets the qualified factory standard;
storing the detection result in a designated storage space of the equipment to be detected;
in response to determining that the result query device establishes a designated connection with the device to be detected, setting the access authority of the result query device to the device to be detected to allow access to the designated storage space;
and responding to the detection result which is successfully read by the result inquiry equipment from the appointed storage space, and canceling the access right of the result inquiry equipment to the equipment to be detected.
In another aspect, an embodiment of the present application provides a detection apparatus, including: the device comprises an acquisition module, a storage module, a connection establishment module and a permission cancellation module;
the acquisition module is used for acquiring a detection result of the equipment to be detected by running factory detection software, the factory detection software is configured in the equipment to be detected, and the detection result is used for identifying whether the equipment to be detected meets the qualified factory standard;
The storage module is used for storing the detection result in a designated storage space of the equipment to be detected;
the connection establishment module is used for establishing appointed connection between the result inquiry equipment and the equipment to be detected in response to the determination result, and setting the access authority of the result inquiry equipment to the equipment to be detected as permission to access the appointed storage space;
and the permission cancellation module is used for canceling the access permission of the result query equipment to the equipment to be detected in response to the detection result being successfully read from the appointed storage space by the result query equipment.
In one possible implementation manner, the connection establishment module is specifically configured to:
the appointed storage space is a virtual mounted disk drive generated based on the storage space of the equipment to be detected; when the result inquiry equipment and the equipment to be detected are connected in a specified mode, the equipment to be detected is identified as a mountable universal serial bus disk, and the storage space of the universal serial bus disk is the specified storage space.
In one possible implementation, the apparatus is specifically configured to:
and responding to the detection result being successfully read from the appointed storage space by the result inquiry equipment, and canceling the virtual of the virtual mounted disk drive.
In one possible implementation, the apparatus is specifically configured to:
when the equipment to be detected establishes data connection with the result inquiry equipment through a universal serial bus interface, determining that the result inquiry equipment establishes specified connection with the equipment to be detected.
In one possible implementation manner, the device to be detected is an internet of things device, and the obtaining module is specifically configured to:
requesting to establish data connection to the Internet of things server by running factory detection software;
in response to the successful establishment of the data connection, acquiring equipment parameters of the equipment to be detected by the factory detection software, wherein the equipment parameters are at least one of software parameters or hardware parameters for factory detection;
a factory detection request is sent to the internet of things server through the data connection, and the factory detection request is used for indicating the internet of things server to carry out factory detection on the equipment to be detected based on the equipment parameters carried by the factory detection request;
and acquiring the detection result returned by the Internet of things server through the data connection.
In one possible implementation manner, the acquiring module is specifically configured to:
Responding to the successful establishment of the data connection, and inquiring factory registration information of the equipment to be detected from the Internet of things server;
responding to the factory registration information to indicate that the equipment to be detected has completed registration in the internet of things server through factory detection, and determining that the equipment to be detected has passed factory detection;
and responding to the factory registration information to indicate that the equipment to be detected is not registered in the Internet of things server, and executing the operation of collecting the equipment parameters of the equipment to be detected through the factory detection software.
In one possible implementation manner, the acquiring module is specifically configured to:
responding to the factory registration information to indicate that the equipment to be detected is not registered in the Internet of things server, and acquiring authorization information, wherein the authorization information is used for identifying a factory detection environment;
and responding to the fact that the factory detection environment meets the safety requirement based on the authorization authentication information, and executing the operation of collecting the equipment parameters of the equipment to be detected through the factory detection software.
In one possible implementation manner, the acquiring module is specifically configured to:
and calling the camera module of the equipment to be detected to scan the detection authorization code, and acquiring authorization authentication information carried by the detection authorization code.
In one possible implementation manner, the acquiring module is specifically configured to:
in response to failing to establish the data connection after attempting the connection a predetermined number of times, performing connection establishment failure prompts by factory detection software, wherein the connection establishment failure prompts comprise image prompts or voice prompts.
In one possible implementation, the apparatus is specifically configured to:
and the detection result is used for displaying the result when being read, and the displayed result comprises whether the equipment to be detected reaches the qualified factory standard or not and the equipment problem that the qualified factory standard is not reached when the equipment to be detected does not reach the qualified factory standard.
In one possible implementation, the apparatus is specifically configured to:
and the management authority of the equipment to be detected is kept closed in the process of factory detection, and the management authority is used for modifying equipment parameters of the equipment to be detected.
In yet another aspect, embodiments of the present application provide a computer device comprising a processor and a memory:
the memory is used for storing the computer program and transmitting the computer program to the processor;
the processor is configured to perform the method according to the above aspect according to a computer program.
In yet another aspect. Embodiments of the present application provide a computer readable storage medium storing a computer program for executing the method described in the above aspect.
In yet another aspect, embodiments of the present application provide a computer program product comprising a computer program which, when run on a computer device, causes the computer device to perform the method of the above aspect.
According to the technical scheme, when the equipment to be detected needs to be subjected to factory detection, the corresponding detection result can be automatically obtained by running factory detection software configured in the equipment to be detected, and because the detection result needs to be uniformly recorded, in order to avoid the possibility that other information of the equipment to be detected is acquired or parameters of the equipment to be detected are changed when the external equipment reads the detection result, the detection result is stored in a designated storage space of the equipment to be detected, and when the designated connection between the result query equipment and the equipment to be detected is established, only the permission for allowing access to the designated storage space is provided for the result query equipment, and after the detection result is read, the access permission of the result query equipment to the equipment to be detected is cancelled. Therefore, in the duration of the appointed connection, the result query equipment can only access the appointed storage space and can not access other space data, and the detection result is read to cancel all access rights of the result query equipment, so that the safety of the equipment to be detected can be ensured even if the appointed connection is not interrupted, the possibility that the equipment to be detected is maliciously tampered and implanted in the factory detection period is effectively eliminated, the artificial influence is removed in the automatic factory detection, and the detection efficiency and the detection precision are improved.
Drawings
In order to more clearly illustrate the embodiments of the present application or the technical solutions in the prior art, the drawings that are required in the embodiments or the description of the prior art will be briefly described below, it being obvious that the drawings in the following description are only some embodiments of the present application, and that other drawings may be obtained according to these drawings without inventive effort for a person skilled in the art.
Fig. 1 is a schematic diagram of a detection scenario provided in an embodiment of the present application;
fig. 2 is a method flowchart of a detection method according to an embodiment of the present application;
fig. 3 is a schematic diagram of establishing a designated connection between a result query device and the device to be detected according to an embodiment of the present application;
FIG. 4 is a schematic diagram of a specific connection established by using a USB line according to an embodiment of the present application;
fig. 5 is a schematic diagram of a wireless connection according to an embodiment of the present application;
fig. 6a is a schematic diagram showing a detection result provided in an embodiment of the present application;
FIG. 6b is a schematic diagram showing a further detection result according to an embodiment of the present disclosure;
FIG. 7 is a schematic diagram of a failure indication provided in an embodiment of the present application;
Fig. 8 is a flowchart of factory detection on a device to be detected according to an embodiment of the present application;
fig. 9 is a flowchart of prompting to scan and detect an authorization code and performing factory detection according to an embodiment of the present application;
fig. 10 is a schematic diagram of a detection method in an application scenario provided in an embodiment of the present application;
fig. 11 is a schematic device diagram of a detection device according to an embodiment of the present application;
fig. 12 is a block diagram of a terminal device according to an embodiment of the present application;
fig. 13 is a block diagram of a server according to an embodiment of the present application.
Detailed Description
Embodiments of the present application are described below with reference to the accompanying drawings.
Before the equipment leaves the factory, a series of normalization detection, equipment availability detection and the like are generally required. When the detection result of the equipment is qualified, the equipment is determined to be capable of providing normal software and hardware service functions, and then the equipment is subjected to factory processing. In the related art, factory detection of a device needs to be performed manually, and normalization test, usability test and the like performed on the device often need to be performed manually by a tester. When a tester wants to obtain a test result, the test result needs to be realized by opening permission for the tester, for example: adb (Android debug bridge ) rights, etc., parameters in the device can be modified at will when a tester obtains such rights, which can lead to difficulty in ensuring the security of the device.
Therefore, the embodiment of the application provides the detection method and the related device, the detection result of the equipment can be stored in the appointed storage space of the equipment, when the inquiry of the detection result is needed, the permission only for accessing the appointed storage space can be provided for the equipment, and the permission is cancelled after the inquiry of the detection result is finished, so that the higher access permission is prevented from being granted to a detector to obtain the detection result of the equipment, the safety of the equipment is ensured, and the possibility of malicious tampering and implantation of the equipment in the factory detection period is effectively eliminated.
The detection method provided by the embodiment of the application can be implemented through computer equipment, and the computer equipment can be terminal equipment or a server, wherein the server can be an independent physical server, a server cluster or a distributed system formed by a plurality of physical servers, or a cloud server for providing cloud computing service. Terminal devices include, but are not limited to, cell phones, computers, intelligent voice interaction devices, intelligent home appliances, vehicle terminals, aircraft, and the like. The terminal device and the server may be directly or indirectly connected through wired or wireless communication, which is not limited herein.
Several terms which may be referred to in the embodiments below in this application are explained first.
And (3) factory detection: refers to a series of tests and tests performed on the software of the device to be tested before it leaves the factory. These tests and tests are intended to ensure the quality and stability of the device software to be tested and its compatibility with hardware.
Embedded type: the method refers to the technical and application fields of embedding the computer system into other devices or systems to enable the computer system to have computing and control capabilities, and in the embodiment of the application, the device to be detected can be an embedded device.
O2 device: the second generation of palm brushing equipment code number, embedded system design and low-cost design module can be one of equipment to be detected in the embodiment of the application.
UMS: UMS (USB Mass Storage) is a type of USB device.
Fig. 1 is a schematic diagram of a detection scenario provided in the embodiment of the present application, where the foregoing computer device is a device to be detected in the embodiment of the present application, and specific description is given here by taking the computer device as a palm brushing device as an example.
The above-mentioned palm brushing device refers to a device that photographs a palm image through a camera and recognizes the palm image.
The palm brushing device in the embodiment of the application comprises factory detection software and a designated storage space, when the palm brushing device is required to be subjected to factory detection, the detection result of the palm brushing device is required to be obtained by running the factory detection software, and then the detection result is stored in the designated storage space of the palm brushing device. When the result query device needs to acquire the detection result of the palm brushing device, the result query device needs to establish designated connection with the palm brushing device, and at the moment, the result query device can acquire the authority for accessing the designated storage space of the palm brushing device. Then, the result inquiry device can acquire the detection result of the palm brushing device from the designated storage space of the palm brushing device. And after the result query device finishes the acquisition of the detection result, canceling the access right of the result query device to the palm brushing device.
The above-mentioned result query devices may include, but are not limited to, notebook computers, desktop computers, smart phones, tablet computers, and the like. The mode of establishing the appointed connection between the palm brushing device and the result inquiring device can be wired connection or wireless connection. The wired connection is understood to be a connection made by using an entity cable, and the wireless connection is understood to be a connection relationship between the palm brushing device and the result inquiring device established through some network signals. The right of the palm brushing device to access the appointed storage space of the result inquiring device can be understood to be one-time right, namely, the right can be used once, and the right can be cancelled after the access is finished, so that the safety of the device to be detected can be ensured, and the possibility that the device to be detected is tampered and implanted maliciously during the delivery detection is effectively avoided. Meanwhile, factory detection software is adopted for factory detection of the palm brushing equipment, so that the artificial influence is removed, and the detection precision of the palm brushing equipment can be improved to a certain extent.
Fig. 2 is a flowchart of a method of detecting method provided in the embodiment of the present application, where the method may be performed by a computer device, and in this embodiment, the computer device is taken as an example of a terminal device to be described.
The method comprises the following steps:
s201: and obtaining a detection result of the equipment to be detected by running factory detection software.
The factory detection software can be configured in the device to be detected, and the factory detection software can be understood as software for carrying out factory detection on the device to be detected. The method can be used for acquiring the equipment parameters of the equipment to be detected in the factory detection software, or setting the detection rule of the equipment to be detected in the factory detection software, and can directly or indirectly acquire the detection result of the equipment to be detected through the factory detection software, wherein the detection result can be used for identifying whether the equipment to be detected meets the qualified factory standard. The above-mentioned rules for detecting the device to be detected may include whether the hardware configuration meets the specification, whether the software version is correct, whether the sensor data is within a normal range, and the like.
The method for obtaining the detection result of the device to be detected by running the factory detection software of the device to be detected may include, but is not limited to, the following two methods:
(1) The equipment to be detected comprises equipment parameters, and the equipment to be detected is operated according to the equipment parameters by using factory detection software, so that a factory detection result of the equipment to be detected can be obtained.
(2) The device parameters of the device to be detected can be obtained through the factory detection software in the device to be detected, then the device parameters are sent to other devices, the other devices execute the factory detection of the device to be detected according to the device parameters of the device to be detected, and finally the detection result of the device to be detected is obtained.
The first and second methods mentioned above may be applied to different scenarios. The first method can be used for the scene of saving resources and reducing cost in the process of carrying out factory detection, and the factory detection of the equipment to be detected can be finished by adopting the first method only by relying on the equipment to be detected, so that the cost can be saved without the help of other equipment; the second method can be applied to the situation that the remote delivery detection is required, the delivery detection information is obtained through the delivery detection software in the equipment to be detected, then the delivery detection information is sent to the remote equipment, and the remote equipment carries out the delivery detection. The detection process can be realized in a wireless mode, so that remote delivery detection can be realized.
The factory detection software provided by the application can realize automatic factory detection of the equipment to be detected, and meanwhile, the factory detection software can only realize the functions of the equipment to be detected before the equipment to be detected leaves the factory. That is, after the device to be detected passes the factory detection and leaves the factory, the function of the factory detection software needs to be quiesced or destroyed by itself. The silence state of the factory detection software can be realized by setting high-level authority to the factory detection software, or can be realized by hiding the factory detection software. Therefore, the user can be prevented from triggering the factory detection software when using the equipment to be detected, and the inconvenience in use is further avoided.
S202: and storing the detection result in a designated storage space of the equipment to be detected.
The designated storage space may be a storage space of the device to be detected, in which a detection result of the device to be detected leaving the factory may be stored, where the designated storage space may be understood as a sub-storage space in an original storage space (may refer to a storage device such as a hard disk) of the device to be detected. Meanwhile, the size of the designated storage space is not limited, and the minimum size is not lower than the size of the space which needs to be occupied by the detection result. The designated storage space can be used for storing not only the detection result of the equipment to be detected when leaving the factory, but also other relevant information of the equipment to be detected when leaving the factory, such as: a process of performing a factory inspection, a sequence of the factory inspection, and the like.
In one possible implementation, the specified storage space may be a virtual mounted disk drive generated based on the storage space of the device itself to be detected; when the result inquiry device establishes a designated connection with the device to be detected, the device to be detected can be identified as a mountable universal serial bus disk. At this time, the storage space of the usb disk is the designated storage space.
Specifically, the virtual mounted disk drive generated by the device to be detected can be used as the designated storage space of the device to be detected, namely, the designated storage space of the device to be detected can be virtual and mountable, wherein the mounting refers to connecting a top-level directory in a device file to a certain directory under a Linux root directory, and accessing the directory is equivalent to accessing the device file. When the designated storage space of the equipment to be detected is mountable, the detection result in the equipment to be detected can be accessed and can be acquired by other equipment. The virtual mounted disk drive mentioned above may be a virtual usb disk, and UMS may be one type of virtual usb disk. UMS may allow the device to be detected to appear as a disk drive that is mountable in the operating system so that users can conveniently access and manage files and data stored on the device. When the designated storage space is a virtual USB flash disk and the result query device establishes designated connection with the device to be detected, the result query device can identify the device to be detected as the USB flash disk, and can not identify the device to be detected as the original device type.
S203: and in response to determining that the result query device establishes a designated connection with the device to be detected, setting the access authority of the result query device to the device to be detected to allow access to the designated storage space.
When the result inquiry device establishes a designated connection with the device to be detected, the device to be detected can be identified as a mountable universal serial bus disk. That is, when the result inquiry device and the device to be detected establish connection, the device to be detected to which connection is made is recognized at the result inquiry device as a mountable universal serial bus disk (which may be understood as a usb disk), and the device to be detected is not recognized as the type of the device to be detected. For example, assuming that the device to be detected is a palm-brushing device and the result query device is a cloud server, then by establishing a designated connection between the palm-brushing device and the cloud server, the palm-brushing device with which the connection is established is identified at the cloud server as a usb flash device instead of a palm-brushing device. Then this means that the result querying device can only read the content stored in the specified storage space of the device to be detected, i.e. the mountable usb disk.
Fig. 3 is a schematic diagram of establishing a designated connection between a result query device and a device to be detected according to an embodiment of the present application, where, as shown in fig. 3, the device to be detected includes a virtual mounted disk drive, and the virtual mounted disk drive (i.e. a virtual U disk) includes a detection result file, and a detection result of the device to be detected is stored in the detection result file. After the result inquiry equipment and the equipment to be detected are connected in a specified mode, the equipment to be detected is identified as a USB flash disk in the result inquiry equipment, the storage space corresponding to the USB flash disk is the specified storage space of the equipment to be detected, and the obtained detection result file (U flash disk file in the figure) of the equipment to be detected is displayed in the specified storage space.
By arranging the virtual mounted disk driver in the equipment to be detected, the equipment type of the equipment to be detected can be changed when the equipment to be detected is connected with the result query equipment, the equipment type of the equipment to be detected is displayed in the result query equipment only in a disk form, and the result query equipment can only acquire the content stored in the disk at the moment and cannot acquire the content which is not stored in the virtual mounted disk driver in the equipment to be detected, so that the safety of the equipment to be detected is ensured to a certain extent, and other information of the equipment to be detected is prevented from being maliciously acquired and tampered.
The above mentioned result inquiry device establishes a specified connection with the device to be detected, and the specific connection mode may be wired connection or wireless connection. The wired connection may include a bus connection, a wire connection, or other physical connection, without limitation. Wireless connection is understood to be a non-tangible way of connection, i.e. a way that does not require a direct connection of a physical cable, such as: through internet of things, local area network, etc.
When the appointed connection mode between the result inquiry equipment and the equipment to be detected is the wired connection mode, the method means that only the result inquiry equipment which is connected with the equipment to be detected in the wired mode can obtain the authority of accessing the appointed storage space of the equipment to be detected, and further obtains the detection result in the appointed storage space. The result inquiry device connected with the device to be detected in a wireless manner cannot obtain the access right of the designated storage space of the device to be detected, and therefore cannot obtain the detection result of the device to be detected. The method for appointed connection can exclude the equipment with part not provided with the appointed storage space access qualification for the equipment to be detected, so that the accuracy of permission grant of the equipment to be detected can be ensured to a certain extent, further, the storage content in the appointed storage space of the equipment to be detected can be ensured not to be acquired by other irrelevant equipment, and the safety of the data of the equipment to be detected is improved.
When the result query device and the device to be detected are determined to establish the designated connection, the access permission is set for the result query device, and the result query device needs to query the detection result based on the acquired permission. The content of the access right may be: the result inquiry device is allowed to access the designated storage space of the device to be detected. When the result query device obtains the access right, the designated storage space of the device to be detected can be accessed, and the data of the detection result stored in the designated storage space can be obtained. Meanwhile, it can be understood that, since the device to be detected only grants the permission for the result query device to allow access to the designated storage space, during the designated connection duration, the result query device can only access the designated storage space and cannot access other space data, so that when the result query device finishes reading the detection result, the security of the device to be detected can be ensured when the designated connection with the device to be detected is not released yet.
S204: and responding to the detection result which is successfully read by the result inquiry equipment from the appointed storage space, and canceling the access right of the result inquiry equipment to the equipment to be detected.
After the result query device obtains the detection result from the designated storage space of the device to be detected, the device to be detected cancels the access right granted to the result query device, and the result query device is prevented from accessing the designated storage space of the device to be detected for multiple times.
The time node when the device to be detected performs access permission cancellation on the result query device can occur when the device to be detected recognizes that the result query device finishes detecting the reading of the result, and can also occur when the device to be detected recognizes that the result query device breaks the designated connection with the device to be detected.
As can be seen from the above description, in the embodiment of the present application, the access right provided by the device to be detected to the result query device is a single right. From the perspective of the device, in one access process, the result query device can already acquire the detection result of the device to be detected, and the need of multiple accesses does not exist. From the aspect of security, if the permission granted to the device to be detected for the result query device is multiple access permission, the result query device can access the device to be detected multiple times by using the access permission, and the risk caused by the greater number of times of access is greater, so that the security of the device to be detected is not facilitated.
As can be seen from the foregoing description, in the embodiment of the present application, the virtual mounted disk drive may be understood as a virtual U disk, which is used to store the detection result of the device to be detected, and when the result query device is connected to the device to be detected, the device to be detected may be identified as a U disk and the detection result may be obtained from the storage space of the device to be detected, so when the result query device successfully obtains the detection result, the virtual mounted disk drive also completes its operation, and cannot play other roles, and then the existence of the virtual mounted disk drive has no value at this time, and may cancel its function.
In one possible implementation, the virtualization of the virtually mounted disk drive may be canceled after the detection result is successfully read from the designated storage space by the result querying device.
The above-mentioned cancellation of the virtual mount disk drive may be understood as ending the function of the virtual mount disk drive, that is, not existing as a virtual storage disk; it is also understood that the virtual mounted disk drive is deleted because it has completed the current task of identifying the device to be detected as a mountable usb disk at the result query device when the result query device and the device to be detected establish the designated connection. When the device to be detected needs to establish the appointed connection with other devices, a new virtual mounted disk drive can be established and generated again in the device to be detected.
The virtual purpose of canceling the virtual mounting disk drive is to avoid that when other devices are connected with the device to be detected, the device to be detected is identified as a USB flash disk again because the virtual mounting disk drive exists in the device to be detected, so that the normal function of the device to be detected cannot be used by a user. Meanwhile, the virtual mounted disk drive can save the storage space inside the equipment to be detected after the function is finished, and resources of the equipment to be detected are saved. In addition, canceling the virtual mounting of the disk drive can ensure that the designated storage space of the device to be detected can be accessed only once, and when the virtual mounting of the disk drive is finished, the designated storage space of the device to be detected can not be established with other devices any more, and data information can not be acquired by other devices any more, so that the safety of the device to be detected can be ensured.
In the embodiment of the present application, the manner of establishing the designated connection between the device to be detected and the result query device may include wired connection and wireless connection.
In one possible implementation, when the device to be detected establishes a data connection with the result query device through the universal serial bus interface, it is determined that the result query device establishes a specified connection with the device to be detected.
In particular, the use of a serial bus interface connection is understood to be one way of connecting the device to be tested to the result querying device by wire, i.e. by means of a USB wire.
Fig. 4 is a schematic diagram of establishing a designated connection by using a USB cable according to an embodiment of the present application, as shown in fig. 4, in which ports between a device to be detected and a result query device are connected by using the USB cable.
The connection mode is suitable for the situation that the safety requirement of the equipment to be detected is high and the efficiency requirement of the result query equipment on the acquisition of the detection result is high. The method is characterized in that the method of using the wired connection can make the process of establishing the appointed connection between the equipment to be detected and the result query equipment simpler and more convenient, and the method can be completed only by connecting the cables of the entity through the entity interface. The method does not need to carry out additional adjustment and modification of a bottom layer protocol or operations such as debugging of an interface, ensures the convenience of appointed connection, can better ensure the safety of equipment to be detected as the bottom layer logic and program modification are not needed, and improves the connection efficiency of the equipment to be detected and the result query equipment.
Since the application scene is that the equipment to be detected performs factory detection, when wired connection is used, the distance between the equipment to be detected and the result query equipment is often relatively short and can be generally located in the same factory area, and at the moment, the identity legitimacy of the result query equipment can be ensured to a certain extent due to controllable range and proximity of the distance, so that the safety of the equipment to be detected can be improved, and the possibility of being invaded by illegal equipment and maliciously tampered is reduced.
In one possible implementation manner, the manner of establishing the designated connection between the device to be detected and the result query device may also be wireless connection, where the wireless connection refers to that the device to be detected and the result query device are connected without a physical entity cable, and the wireless connection may be understood to be a connection performed through a non-entity line such as the internet of things, a local area network, and the like. In the embodiment of the application, the wireless connection mode can be applied to the situation that the distance between the equipment to be detected and the result query equipment is far away, and the wired connection mode cannot be realized or is too high in cost. By using a wireless connection mode, remote cloud connection between equipment to be detected and result query equipment can be realized, the conversion process of a communication protocol can be involved in the specific connection process, the security of the equipment to be detected can be ensured in the conversion process by a permission setting mode, and meanwhile, multiple paths of data can be simultaneously acquired in a parallel mode by using a wired connection mode, so that the detection results of a plurality of equipment to be detected can be simultaneously acquired, and the efficiency of acquiring the detection results can be improved. Meanwhile, as the connection of physical cables is not needed, the cost can be reduced compared with the wired connection. Fig. 5 is a schematic diagram of wireless connection provided in the embodiment of the present application, where, as shown in the drawing, a device to be detected and a result query device are connected through a cloud network, and there is no direct connection of a physical entity cable.
According to the detection method, when the factory detection of the equipment to be detected is finished to obtain the detection result, the detection result is stored in the appointed storage space of the equipment to be detected, and the appointed connection between the equipment to be detected and the result inquiry equipment is established, so that the result inquiry equipment can directly read the detection result in the appointed storage space of the equipment to be detected. The storage mode of the detection result can avoid additional high-authority acquisition when the result query device queries the detection result, so that the safety of the device to be detected can be ensured, and the malicious tampering of the data of the device can not occur due to the grant of authority. Meanwhile, when the result query device finishes the detection result reading of the designated storage space, the access authority of the result query device to the device to be detected is ended, so that the limited access authority of the result query device to the device to be detected can be ensured, and the safety of the device to be detected can be improved. The acquisition of other data information by the result query equipment is avoided, and the data security of the equipment to be detected is ensured to a certain extent.
In S204, it is mentioned that the detection result is successfully read from the designated storage space by the result query device, and when the detection result is read, the result needs to be displayed, and the displayed content may include whether the device to be detected reaches the qualified factory standard, and when the device to be detected does not meet the factory standard, the problem of the device that does not meet the factory standard needs to be displayed. Fig. 6a is a schematic diagram of display of a detection result provided in an embodiment of the present application, where as shown in the drawing, the device to be detected passes a factory detection and can be shipped. Fig. 6b is a schematic diagram of another display of a detection result provided in the embodiment of the present application, where as shown in the drawing, the device to be detected does not pass the factory detection, and the cause of the failure of the factory detection is displayed at the interface. The aim of displaying the detection result is that relevant personnel can conveniently and timely determine whether the equipment to be detected meets the factory standard or not, meanwhile, the problems of the equipment which does not meet the factory standard can be timely known, and further, the aim of pertinently solving is achieved, and the efficiency of factory detection of the equipment to be detected can be improved.
When the result query device establishes the designated connection with the device to be detected, the device to be detected grants permission for the result query device to allow access to the designated storage space of the device to be detected, so as to ensure the security of the device to be detected, prevent the device to be detected from being invaded by other devices and destroy data. In addition to granting rights to other devices, the device to be detected has some inherent system or management rights, which are often in higher level, and when the device to be detected opens the rights, it means that other devices or users can be allowed to modify original data (device parameters) in the device to be detected, even the underlying logic. When the factory is detected, the permission is opened, so that a great safety risk is brought to the equipment to be detected.
In one possible implementation, the management rights of the device to be tested are therefore kept closed during the factory test. The aforementioned management rights may be used to modify device parameters of the device to be detected.
For example, the management authority may be an adb (Android debug bridge ) authority, if the adb authority of the device to be detected is in an open state in the process of factory detection, then other devices and users may obtain the device parameters of the device to be detected under the condition that no authority resistance exists, and meanwhile, the device parameters may be modified or illegal codes may be implanted naturally, which is extremely unfavorable for the security of the device to be detected.
By closing the management authority of the equipment to be detected when the equipment to be detected is subjected to factory detection, malicious invasion of other equipment and users can be avoided to a certain extent, which is equivalent to establishing a safety defense line for the equipment to be detected, and is beneficial to guaranteeing the safety of the equipment to be detected.
In S201, it is mentioned that "the detection result of the device to be detected is obtained by running factory detection software", and in this embodiment, the device to be detected is specifically described by taking the internet of things device as an example.
In one possible implementation manner, the method for obtaining the detection result of the device to be detected specifically may include:
s701: and requesting the Internet of things server to establish data connection by running the factory detection software.
The internet of things server can be understood as a server capable of realizing communication for terminal equipment belonging to different local area networks, and in the embodiment of the application, data connection is established between the internet of things server and equipment to be detected, so that factory detection of the equipment to be detected can be automatically performed at a cloud.
In the above description, it is mentioned that the factory detection software is configured in the device to be detected, and the function of the factory detection software in the embodiment of the application may include that a data connection channel with the internet of things server is established by running the factory detection software. The device to be detected can transmit data to the Internet of things server based on the basis of the interaction relation generated between the device to be detected and the Internet of things server, and can obtain data feedback of the Internet of things server.
When the device to be detected sends a data connection establishment request to the internet of things server, two results may occur: one of the results is that the data connection between the equipment to be detected and the server of the Internet of things is successfully established, and the other result is that the data connection between the equipment to be detected and the server of the Internet of things is failed, and when one connection failure occurs, the data connection attempt can be selected to be continued for the rated times. Based on this, in one possible implementation, the connection establishment failure prompt is made by the factory detection software in response to failing to establish the data connection after attempting the connection a predetermined number of times.
The above-mentioned predetermined number of times can be freely set by those skilled in the art according to actual situations and application scenarios, and is not limited herein. In general, the number of times is not too high, because connection cannot be successfully established after several attempts to establish the connection, sporadic poor connection can be eliminated, and it is proved that a factor which substantially influences the establishment of data connection between the device to be detected and the server of the internet of things exists between the device to be detected and the server of the internet of things. At this time, the repeated attempts are not helpful for successfully establishing the data connection between the equipment to be detected and the server of the internet of things, but waste of resources is caused, the actual solving progress of the reasons of failure of the data connection is affected, and the efficiency of the equipment to be detected in factory detection is further affected.
After completing the predetermined number of attempts to establish the data connection, the user may be prompted for a connection failure using factory detection software, and the connection failure prompt may include an image prompt or an audio prompt. Wherein the image prompt may be directed to a device to be detected having a display function and the audible prompt may be directed to a device to be detected having no display function. Fig. 7 is a schematic diagram of a failure prompt provided in an embodiment of the present application, where the schematic diagram includes a device to be detected without a display function and a device to be detected with a display function, and data connection between two devices to be detected and an internet of things server is failed to be established. At this time, the device to be detected with the display function can display the data connection establishment failure on the screen, and the device to be detected without the display function can output the data connection establishment failure in a voice broadcasting mode.
The connection failure condition is prompted, so that the connection state of the equipment to be detected can be known in time, and then the equipment to be detected is processed in time, and the problem of the establishment of data connection between the equipment to be detected and the Internet of things server is solved as soon as possible.
S702: and responding to the successful establishment of the data connection, and acquiring the equipment parameters of the equipment to be detected through the factory detection software.
When the data connection between the equipment to be detected and the internet of things server is established, the equipment parameters of the equipment to be detected can be acquired by using factory detection software. The instruction generator for collecting the device parameters of the device to be detected may be the device to be detected or the server of the internet of things, which is not limited herein. The above-mentioned device parameter may be at least one of a software parameter or a hardware parameter for factory detection, and specifically may include, but is not limited to, a hardware configuration, a software version, sensor data, and the like.
S703: and sending a factory detection request to the Internet of things server through the data connection.
After the factory detection software completes the collection of the equipment parameters of the equipment to be detected, the equipment to be detected can send a factory detection request to the Internet of things server through the established data connection. The factory detection request can be used for indicating the internet of things server to carry out factory detection on the equipment to be detected based on the equipment parameters carried by the factory detection request.
That is, the factory detection request sent by the device to be detected to the internet of things server may include information of the device parameter of the device to be detected. Therefore, the Internet of things server can conveniently carry out targeted delivery detection according to the equipment parameters of the equipment to be detected.
S704: and acquiring the detection result returned by the Internet of things server through the data connection.
After the internet of things server completes factory detection of the equipment to be detected, the detection result is returned to the equipment to be detected through data connection.
By the method for acquiring the detection result of the equipment to be detected, the data connection between the equipment to be detected and the Internet of things server can be established by running the factory detection software, so that the factory detection of the equipment to be detected has the possibility of carrying out automatic detection on line. The detection result of the equipment to be detected leaving the factory can be obtained through the data interaction between the equipment to be detected and the server of the Internet of things, and the automatic leaving the factory detection also removes the artificial influence, so that the detection efficiency and the detection precision are improved.
In the process of carrying out factory detection on equipment to be detected, the condition of carrying out repeated detection on equipment to be detected can occur, and the condition can influence the efficiency of carrying out factory detection on the equipment to be detected, so that whether the equipment to be detected has completed the factory detection or not needs to be determined before the equipment to be detected carries out the factory detection. Based on this, in one possible implementation manner, first, in response to successful establishment of the data connection, factory registration information of the device to be detected is queried from the internet of things server, then, in response to the factory registration information, the device to be detected is indicated to have completed registration in the internet of things server through factory detection, and it is determined that the device to be detected has passed the factory detection. And responding to the factory registration information to indicate that the equipment to be detected is not registered in the internet of things server, and executing the operation of collecting the equipment parameters of the equipment to be detected through factory detection software.
Specifically, after the data connection between the device to be detected and the internet of things server is established successfully, factory registration information of the device to be detected needs to be queried from the internet of things server before the device parameters of the device to be detected are acquired through factory detection software. Whether the equipment to be detected passes the factory detection can be determined according to the existence of the factory registration information, and when the factory registration information of the equipment to be detected exists at the server of the Internet of things, the equipment to be detected can be determined to pass the factory detection and finish registration at the server of the Internet of things. Otherwise, the equipment to be detected is determined to not pass the factory detection, and the operation of the factory detection is required to be executed on the equipment to be detected.
Before the equipment to be detected is subjected to the factory detection, whether the equipment to be detected passes the factory detection can be judged in advance by inquiring whether the equipment to be detected has factory registration information or not from the internet of things server, and whether the equipment to be detected is subjected to the factory detection operation is determined according to the judging result. Therefore, repeated detection of the equipment to be detected which passes through the factory detection can be avoided, waste of resources of the factory detection can be avoided, and the efficiency of the factory detection is improved.
After the above inquiry of the factory registration information is completed, the equipment to be detected which does not pass the factory detection is determined, and the factory detection operation is required to be executed on the equipment to be detected at this time, but in order to ensure the security of the environment where the equipment to be detected performs the factory detection, in one possible implementation manner, after the factory registration information is determined to indicate that the equipment to be detected is not registered in the internet of things server, authorization authentication information is required to be acquired, and the factory detection environment is determined to meet the security requirement based on the authorization authentication information. And finally, executing the operation of collecting the equipment parameters of the equipment to be detected through the factory detection software and the subsequent other operations.
The above mentioned authorization authentication information is used to identify the factory detection environment, and whether the factory detection environment for factory detection of the device to be detected accords with the security can be determined by acquiring the authorization authentication information. The authorization authentication information comprises the requirements of the factory detection environment, and whether the factory detection environment of the equipment to be detected meets the requirements can be judged according to the acquired authorization authentication information. When the requirements are met, the factory detection environment can be determined to be in accordance with the safety requirements, and the equipment to be detected can carry out factory detection in the factory detection environment. Otherwise, determining that the factory detection environment is not in accordance with the safety requirement, wherein the equipment to be detected cannot perform factory detection in the factory detection environment.
In one possible implementation manner, the method for acquiring the authorization and authentication information may be to invoke the camera module of the device to be detected to scan the detection authorization code, and acquire the authorization and authentication information carried by the detection authorization code.
Before the factory detection is carried out on the equipment to be detected which is not registered by the server of the internet of things, acquiring authorization and authentication information of the equipment to be detected, and checking whether the current factory detection environment meets the security requirement of the equipment to be detected for factory detection. The factory detection environment of the equipment to be detected can be guaranteed to be compliant and safe, the possibility that the equipment to be detected is interrupted maliciously or data are tampered in the factory detection process is reduced, and the safety of the equipment to be detected in factory detection is guaranteed.
Fig. 8 is a flowchart of factory detection of a device to be detected, provided in an embodiment of the present application, as shown in the drawing, including the following steps:
s11: and (5) starting.
On the production line, after equipment to be detected is assembled, factory detection staff needs to carry out factory detection on the equipment to be detected. First, it is necessary to perform power-up processing on the device to be detected and start the device. This step ensures that the basic functions of the device to be tested are normal, such as power on, display, etc.
S12: and initializing self-checking.
And initializing and automatically checking the equipment to be detected, and displaying an initialization page. The device to be detected automatically performs a series of initialization checks after being powered on to ensure that the hardware and software configuration is correct. In the process, the equipment to be detected displays an initialization page, and the state and progress of the equipment to be detected are displayed.
S13: inquiring whether the device is in a book.
The networking request internet of things server inquires whether the equipment to be detected is in a book. When the inquiry is carried out, the inquiry is retried for a preset number of times if the inquiry fails by default, and the network link overtime prompts an initialization failure. The device to be detected needs to be connected to the internet so as to communicate with the internet of things server. The device to be detected can send a request to the server of the internet of things to inquire whether the device to be detected is in a book. If the request fails, the device to be detected will retry by default a predetermined number of times, such as: 20 times. If the establishment of the data connection still fails, the device to be detected can give a prompt of 'failure of establishing the data connection'.
S14: and returning a result.
And the data connection is established successfully, and the server of the Internet of things returns a result of whether the equipment to be detected is in a book. When the equipment to be detected is successfully connected to the internet of things server and inquires that the equipment to be detected is in album information, the equipment to be detected can perform the next operation according to the returned result. If the device to be tested is already in the book, it is proved that the device to be tested has finished the factory test, and other operations can be performed.
S15: entering a factory detection flow, and prompting that the equipment is not finished leaving the factory.
If the query result shows that the equipment to be detected is not in the list, automatically entering a factory detection flow, and prompting that the equipment to be detected does not finish factory.
S16: and acquiring authorization authentication information.
And acquiring authorization authentication information of the equipment to be detected, and determining whether the factory detection environment meets the safety requirement or not based on the authorization authentication information.
Specifically, the authorization code can be scanned and detected by calling the camera module of the equipment to be detected, and authorization authentication information carried by the authorization code can be obtained.
Fig. 9 is a flowchart of prompting to scan and detect an authorization code and performing factory detection, where, as shown in the drawing, after a device to be detected with a screen display function enters a factory detection process, authorization authentication information needs to be acquired first, at this time, a prompt of "please scan and detect the authorization code" is displayed at a screen of the device to be detected, when the scanning of the authorization code is completed and the factory detection environment is determined to be safe, a typeface of "… in factory" is displayed on the screen, at this time, the factory detection of the device to be detected is performed, if the device to be detected passes the factory detection, a typeface of "factory success" is displayed, and if the device to be detected does not pass the factory detection, a typeface of "factory failure" is displayed on the screen. The prompt function can be realized through a voice broadcasting mode for the equipment to be detected without the screen display function.
S17: and reading the device parameters.
The internet of things server reads device parameters of the device to be detected, which may include, but are not limited to, the following device parameters:
cpu_id: CPU ID information for identifying the processor model and manufacturer of the device to be tested.
Eth_addr: the Ethernet MAC address is used for identifying network hardware of the device to be detected.
Wlan addr: and the wifi mac address is used for identifying wireless network hardware of the device to be detected.
-bt_addr: and the Bluetooth address is used for identifying Bluetooth hardware of the device to be detected.
Device_sn: and the device SN is used for uniquely identifying the device to be detected.
-screen information: and the pixel and the width and height information are used for describing the display performance of the equipment to be detected.
Rom_version: and the ROM version number is used for identifying the firmware version of the device to be detected.
Build_model: and a build mode for describing the hardware and software configuration of the device to be detected.
Build_mangafacter: the manufacturer is used for identifying the manufacturer of the equipment to be detected.
In the process of reading the device parameters, detection configuration can be requested, and se authentication information can be configured: the device to be detected needs to request detection configuration information from the internet server for subsequent detection and authentication. Such configuration information may include hardware and software specifications of the device to be detected, allowed sensor data ranges, etc.
S18: and transmitting the device parameters.
And the equipment to be detected sends the collected equipment parameters to the server of the Internet of things.
S19: and carrying out factory detection.
And the internet of things server performs factory detection on the equipment to be detected based on the equipment parameters carried by the factory detection request according to the acquired factory detection request of the equipment to be detected.
The equipment to be detected sends the collected equipment parameters to an Internet of things server, and the Internet of things server is requested to detect according to a preset detection rule. These rules may include whether the hardware configuration meets specifications, whether the software version is correct, whether the sensor data is within normal range, etc. The internet of things server will detect the device to be detected according to these rules.
S20: and finishing equipment authentication.
And finishing equipment authentication according to the equipment parameters of the equipment to be detected. In the detection process, the internet of things server authenticates the equipment to be detected according to the information of the equipment parameters provided by the equipment to be detected. The authentication process may include checking the unique identification of the device, an authorization code, etc. to ensure that the device to be detected is legitimate.
S21: and returning a detection result.
Analyzing json data to obtain a detection result of the equipment to be detected, if result represents SUCCESS, the equipment is successful in delivery, otherwise, the equipment fails.
After the detection of the equipment to be detected is completed, the internet of things server generates json data containing the detection result and sends the json data back to the equipment to be detected. The device to be detected needs to analyze the json data to obtain a factory inspection result. If the result shows SUCCESS, the equipment to be detected is successfully detected by leaving the factory; otherwise, the equipment to be detected fails to be delivered and detected.
S22: and (5) storing the detection result.
And the equipment to be detected stores the detection result to a delivery detection path, uses UMS mode to mount the path into a U disk, and finishes automatic detection of the equipment.
The device to be detected stores the detection result into a designated factory detection path, and the path is mounted into a U disk by using a USB Mass Storage (UMS) mode. In this way, the detection result of the device to be detected can be directly accessed by a factory detection tool (PC-side detection tool).
S23: and reading the detection result.
And reading the detection result stored in the equipment to be detected by using a factory detection tool. Before the factory testing tool reads the testing result, a data connection with the equipment to be tested needs to be established, and the data connection can be established in a wired mode or a wireless mode. For example, the wired manner may include that the device to be detected establishes a data connection with the factory measurement tool through the usb interface. In popular terms, a connection relationship between the device to be detected and the factory testing tool can be established by using a USB line. The factory testing tool is connected with the equipment to be tested by using a USB wire. The factory testing tool can automatically identify the equipment to be tested and read the test result file on the equipment to be tested.
S24: and displaying the detection result.
And displaying the detection result of the equipment to be detected in the factory detection tool, and judging whether the equipment to be detected is qualified or not according to the result. If the equipment to be detected is qualified, the next step of packaging and delivery can be carried out; if the equipment to be detected is not qualified, maintenance or adjustment is needed. So far, the whole factory detection flow of the equipment to be detected is finished.
In the above embodiment, the complete process of factory detection of the device to be detected is specifically described, and it can be seen that three devices are required to be completed in cooperation in the factory detection process, and the three devices are respectively: the device to be detected, the Internet of things server and the factory testing tool. The method mainly comprises the steps of establishing data connection through equipment to be detected and an internet of things server, realizing automatic delivery detection of the equipment to be detected, displaying a detection result of the equipment to be detected through a delivery detection tool after the delivery detection is finished, enabling a user to know delivery detection conditions of the equipment to be detected in time, and carrying out corresponding treatment on the equipment to be detected according to the detection result. Through automatic delivery detection mode, can avoid artificial participation, practice thrift the human cost, can get rid of artificial influence simultaneously in the testing process, improve the efficiency and the precision of waiting to detect equipment delivery detection.
Next, taking the device to be detected as 02 devices, the internet of things server as IoT background service, and the factory testing tool as factory line detection PC as an example, performing an explanation of the detection method provided in the present application, fig. 10 is a schematic diagram of the detection method in an application scenario provided in the embodiment of the present application, and as shown in the drawing, the method specifically includes:
after the O2 equipment is assembled on the production line, the equipment parameters of the O2 equipment can be automatically acquired through factory detection software. These device parameters may include hardware configuration, software version, sensor data, etc. The O2 device packages the device parameters into one data packet and sends it to the IoT background service over the network. Before sending, a data connection between the O2 device and the IoT background service needs to be established, and when the data connection is established successfully, data transmission of the device to be detected can be performed.
After the IoT background service receives the device parameters sent by the O2 device, the O2 device is subjected to factory detection according to a preset rule. These rules may include whether the hardware configuration meets specifications, whether the software version is correct, whether the sensor data is within normal range, etc. After the detection is completed, the IoT background service may generate detection results, including whether the detection passed (success or failure) and the specific cause of the failure, if any.
The IoT background service then sends the detection result to the O2 device. After the O2 device receives the detection result, the detection result is stored in a file of a designated path, and the file format is JSON. The purpose of doing so is to facilitate the subsequent quick look-up and analysis of the detection result by using the factory line detection PC as a detection tool.
And finally, opening a file with a detection result stored on the O2 device by using the factory line detection PC and checking the detection result. The plant line inspection PC parses the JSON file and presents the inspection results in a visual manner, including inspecting whether it passed or not and the specific failure cause (if any). Based on this information, it may be determined whether the O2 device is acceptable and whether further maintenance or adjustment is required. After the delivery detection flow is finished, qualified O2 equipment can enter the next packaging and delivery link.
In one possible implementation manner, the protocol of the detection result protocol file of the device to be detected from the factory may be:
{
"result":"SUCCESS",
"errors":[
"application version too low",
"product model is empty"
],
"warnings":[
"device model needs to be over checked as soon as possible"
],
"return_msg":”,
"device_sn":"",
"inspect_time":1692243709
}
Wherein,
result: the background rule check result returns SUCCESS to 'SUCCESS', and FAILs to return 'FAIL'
error: enumerating all inspection rule error entries
warnings: prompt message
return_msg: background return information
device_sn: device SN
On the basis of the foregoing embodiments corresponding to fig. 1 to 10, fig. 11 is a schematic device diagram of a detection device provided in this embodiment of the present application, where the detection device 1100 includes an obtaining module 1101, a storage module 1102, a connection establishing module 1103, and a permission cancelling module 1104;
the acquisition module is used for acquiring a detection result of the equipment to be detected by running factory detection software, the factory detection software is configured in the equipment to be detected, and the detection result is used for identifying whether the equipment to be detected meets the qualified factory standard;
the storage module is used for storing the detection result in a designated storage space of the equipment to be detected;
the connection establishment module is used for establishing appointed connection between the result inquiry equipment and the equipment to be detected in response to the determination result, and setting the access authority of the result inquiry equipment to the equipment to be detected as permission to access the appointed storage space;
and the permission cancellation module is used for canceling the access permission of the result query equipment to the equipment to be detected in response to the detection result being successfully read from the appointed storage space by the result query equipment.
In one possible implementation manner, the connection establishment module is specifically configured to:
the appointed storage space is a virtual mounted disk drive generated based on the storage space of the equipment to be detected; when the result inquiry equipment and the equipment to be detected are connected in a specified mode, the equipment to be detected is identified as a mountable universal serial bus disk, and the storage space of the universal serial bus disk is the specified storage space.
In one possible implementation, the apparatus is specifically configured to:
and responding to the detection result being successfully read from the appointed storage space by the result inquiry equipment, and canceling the virtual of the virtual mounted disk drive.
In one possible implementation, the apparatus is specifically configured to:
when the equipment to be detected establishes data connection with the result inquiry equipment through a universal serial bus interface, determining that the result inquiry equipment establishes specified connection with the equipment to be detected.
In one possible implementation manner, the device to be detected is an internet of things device, and the obtaining module is specifically configured to:
requesting to establish data connection to the Internet of things server by running factory detection software;
In response to the successful establishment of the data connection, acquiring equipment parameters of the equipment to be detected by the factory detection software, wherein the equipment parameters are at least one of software parameters or hardware parameters for factory detection;
a factory detection request is sent to the internet of things server through the data connection, and the factory detection request is used for indicating the internet of things server to carry out factory detection on the equipment to be detected based on the equipment parameters carried by the factory detection request;
and acquiring the detection result returned by the Internet of things server through the data connection.
In one possible implementation manner, the acquiring module is specifically configured to:
responding to the successful establishment of the data connection, and inquiring factory registration information of the equipment to be detected from the Internet of things server;
responding to the factory registration information to indicate that the equipment to be detected has completed registration in the internet of things server through factory detection, and determining that the equipment to be detected has passed factory detection;
and responding to the factory registration information to indicate that the equipment to be detected is not registered in the Internet of things server, and executing the operation of collecting the equipment parameters of the equipment to be detected through the factory detection software.
In one possible implementation manner, the acquiring module is specifically configured to:
responding to the factory registration information to indicate that the equipment to be detected is not registered in the Internet of things server, and acquiring authorization information, wherein the authorization information is used for identifying a factory detection environment;
and responding to the fact that the factory detection environment meets the safety requirement based on the authorization authentication information, and executing the operation of collecting the equipment parameters of the equipment to be detected through the factory detection software.
In one possible implementation manner, the acquiring module is specifically configured to:
and calling the camera module of the equipment to be detected to scan the detection authorization code, and acquiring authorization authentication information carried by the detection authorization code.
In one possible implementation manner, the acquiring module is specifically configured to:
in response to failing to establish the data connection after attempting the connection a predetermined number of times, performing connection establishment failure prompts by factory detection software, wherein the connection establishment failure prompts comprise image prompts or voice prompts.
In one possible implementation, the apparatus is specifically configured to:
and the detection result is used for displaying the result when being read, and the displayed result comprises whether the equipment to be detected reaches the qualified factory standard or not and the equipment problem that the qualified factory standard is not reached when the equipment to be detected does not reach the qualified factory standard.
In one possible implementation, the apparatus is specifically configured to:
and the management authority of the equipment to be detected is kept closed in the process of factory detection, and the management authority is used for modifying equipment parameters of the equipment to be detected.
According to the detection device, the automatic delivery detection of the equipment to be detected can be realized by utilizing the delivery detection software through the acquisition module, the delivery detection is performed at the cloud end through the equipment to be detected and the Internet of things server, manual intervention is not needed, the influence of human factors on the detection result is avoided, and the accuracy of the detection result of the delivery detection can be ensured to a certain extent. The detection result of the equipment to be detected can be stored in the appointed storage space of the equipment to be detected through the storage module, and the additional high-authority acquisition during the detection result query of the result query equipment can be avoided through the storage mode of the detection result, so that the safety of the equipment to be detected can be ensured, and the malicious tampering of the equipment data can not occur due to the grant authority. And then, after the result inquiry equipment and the equipment to be detected establish appointed connection through the connection establishment module, the equipment to be detected performs access authorization of an appointed storage space for the result inquiry equipment. During the duration of the designated connection, the result querying device can only access the designated memory space and cannot access other spatial data. Therefore, when the result inquiry equipment finishes reading the detection result and the appointed connection with the equipment to be detected is not released, the safety of the equipment to be detected can be ensured. And after the detection result is read, the permission cancellation module is utilized to cancel the access permission of the result inquiry equipment to the equipment to be detected, so that the security risk brought to the equipment to be detected by the result inquiry equipment for carrying out additional invalid access can be avoided.
The embodiment of the application also provides a computer device, which is the computer device described above, and may include a terminal device or a server, where the foregoing detecting device may be configured in the computer device. The computer device is described below with reference to the accompanying drawings.
If the computer device is a terminal device, please refer to fig. 12, an embodiment of the present application provides a terminal device, taking the terminal device as a mobile phone as an example:
fig. 12 is a block diagram showing a part of the structure of a mobile phone related to a terminal device provided in an embodiment of the present application. Referring to fig. 12, the mobile phone includes: radio Frequency (RF) circuitry 1410, memory 1420, input unit 1430, display unit 1440, sensor 1450, audio circuitry 1460, wireless fidelity (WiFi) module 1470, processor 1480, and power supply 1490. Those skilled in the art will appreciate that the handset configuration shown in fig. 12 is not limiting of the handset and may include more or fewer components than shown, or may combine certain components, or a different arrangement of components.
The following describes the components of the mobile phone in detail with reference to fig. 12:
The RF circuit 1410 may be used for receiving and transmitting signals during a message or a call, and particularly, after receiving downlink information of a base station, the downlink information is processed by the processor 1480; in addition, the data of the design uplink is sent to the base station.
The memory 1420 may be used to store software programs and modules, and the processor 1480 performs various functional applications and data processing of the cellular phone by executing the software programs and modules stored in the memory 1420. The memory 1420 may mainly include a storage program area that may store an operating system, application programs required for at least one function (such as a sound playing function, an image playing function, etc.), and a storage data area; the storage data area may store data (such as audio data, phonebook, etc.) created according to the use of the handset, etc. In addition, memory 1420 may include high-speed random access memory, and may also include non-volatile memory, such as at least one magnetic disk storage device, flash memory device, or other volatile solid-state storage device.
The input unit 1430 may be used to receive input numeric or character information and generate key signal inputs related to user settings and function control of the handset. In particular, the input unit 1430 may include a touch panel 1431 and other input devices 1432.
The display unit 1440 may be used to display information input by a user or information provided to the user and various menus of the mobile phone. The display unit 1440 may include a display panel 1441.
The handset can also include at least one sensor 1450, such as a light sensor, motion sensor, and other sensors.
Audio circuitry 1460, speaker 1461, microphone 1462 may provide an audio interface between the user and the handset.
WiFi belongs to a short-distance wireless transmission technology, and a mobile phone can help a user to send and receive emails, browse webpages, access streaming media and the like through a WiFi module 1470, so that wireless broadband Internet access is provided for the user.
The processor 1480 is a control center of the handset, connects various parts of the entire handset using various interfaces and lines, performs various functions of the handset and processes data by running or executing software programs and/or modules stored in the memory 1420, and invoking data stored in the memory 1420.
The handset also includes a power supply 1490 (e.g., a battery) that provides power to the various components.
In this embodiment, the processor 1480 included in the terminal apparatus also has the following functions:
obtaining a detection result of equipment to be detected by running factory detection software, wherein the factory detection software is configured in the equipment to be detected, and the detection result is used for identifying whether the equipment to be detected meets the qualified factory standard;
Storing the detection result in a designated storage space of the equipment to be detected;
in response to determining that the result query device establishes a designated connection with the device to be detected, setting the access authority of the result query device to the device to be detected to allow access to the designated storage space;
and responding to the detection result which is successfully read by the result inquiry equipment from the appointed storage space, and canceling the access right of the result inquiry equipment to the equipment to be detected. If the computer device is a server, as shown in fig. 13, fig. 13 is a block diagram of a server 1500 provided in the embodiment of the present application, where the server 1500 may have a relatively large difference due to different configurations or performances, and may include one or more central processing units (Central Processing Units, abbreviated as CPU) 1522 (e.g., one or more processors) and a memory 1532, one or more storage media 1530 (e.g., one or more mass storage devices) storing application programs 1542 or data 1544. Wherein the memory 1532 and the storage medium 1530 may be transitory or persistent storage. The program stored on the storage medium 1530 may include one or more modules (not shown), each of which may include a series of instruction operations on the server. Still further, the central processor 1522 may be configured to communicate with a storage medium 1530 and execute a series of instruction operations on the storage medium 1530 on the server 1500.
The Server 1500 may also include one or more power supplies 1526, one or more wired or wireless network interfaces 1550, one or more input/output interfaces 1558, and/or one or more operating systems 1541, such as Windows Server TM ,Mac OS X TM ,Unix TM ,Linux TM ,FreeBSD TM Etc.
The steps performed by the server in the above embodiments may be based on the server structure shown in fig. 13.
In addition, the embodiment of the application also provides a storage medium for storing a computer program for executing the method provided by the embodiment.
The present application also provides a computer program product comprising a computer program which, when run on a computer device, causes the computer device to perform the method provided by the above embodiments.
Those of ordinary skill in the art will appreciate that: all or part of the steps for implementing the above method embodiments may be implemented by hardware related to program instructions, where the above program may be stored in a computer readable storage medium, and when the program is executed, the program performs steps including the above method embodiments; and the aforementioned storage medium may be at least one of the following media: read-only Memory (ROM), RAM, magnetic disk or optical disk, and the like, on which a computer program can be stored.
It should be noted that, in the present specification, each embodiment is described in a progressive manner, and identical and similar parts of each embodiment are all referred to each other, and each embodiment is mainly described in a different point from other embodiments. In particular, for the apparatus and system embodiments, since they are substantially similar to the method embodiments, the description is relatively simple, with reference to the description of the method embodiments in part. The apparatus and system embodiments described above are merely illustrative, in which elements illustrated as separate elements may or may not be physically separate, and elements shown as elements may or may not be physical elements, may be located in one place, or may be distributed over a plurality of network elements. Some or all of the modules may be selected according to actual needs to achieve the purpose of the solution of this embodiment. Those of ordinary skill in the art will understand and implement the present invention without undue burden.
The foregoing is merely one specific embodiment of the present application, but the protection scope of the present application is not limited thereto, and any changes or substitutions that can be easily conceived by those skilled in the art within the technical scope of the present application should be covered in the protection scope of the present application. Further combinations of the implementations provided in the above aspects may be made to provide further implementations. Therefore, the protection scope of the present application shall be subject to the protection scope of the claims.

Claims (15)

1. A method of detection, the method comprising:
obtaining a detection result of equipment to be detected by running factory detection software, wherein the factory detection software is configured in the equipment to be detected, and the detection result is used for identifying whether the equipment to be detected meets the qualified factory standard;
storing the detection result in a designated storage space of the equipment to be detected;
in response to determining that the result query device establishes a designated connection with the device to be detected, setting the access authority of the result query device to the device to be detected to allow access to the designated storage space;
and responding to the detection result which is successfully read by the result inquiry equipment from the appointed storage space, and canceling the access right of the result inquiry equipment to the equipment to be detected.
2. The method of claim 1, wherein the designated storage space is a virtual mounted disk drive generated based on the device to be detected's own storage space; when the result inquiry equipment and the equipment to be detected are connected in a specified mode, the equipment to be detected is identified as a mountable universal serial bus disk, and the storage space of the universal serial bus disk is the specified storage space.
3. The method according to claim 2, wherein the method further comprises:
and responding to the detection result being successfully read from the appointed storage space by the result inquiry equipment, and canceling the virtual of the virtual mounted disk drive.
4. The method according to claim 1, wherein the method further comprises:
when the equipment to be detected establishes data connection with the result inquiry equipment through a universal serial bus interface, determining that the result inquiry equipment establishes specified connection with the equipment to be detected.
5. The method according to any one of claims 1-4, wherein the device to be detected is an internet of things device, and the obtaining the detection result of the device to be detected by running factory detection software includes:
requesting to establish data connection to the Internet of things server by running factory detection software;
in response to the successful establishment of the data connection, acquiring equipment parameters of the equipment to be detected by the factory detection software, wherein the equipment parameters are at least one of software parameters or hardware parameters for factory detection;
a factory detection request is sent to the internet of things server through the data connection, and the factory detection request is used for indicating the internet of things server to carry out factory detection on the equipment to be detected based on the equipment parameters carried by the factory detection request;
And acquiring the detection result returned by the Internet of things server through the data connection.
6. The method of claim 5, wherein the method further comprises:
responding to the successful establishment of the data connection, and inquiring factory registration information of the equipment to be detected from the Internet of things server;
responding to the factory registration information to indicate that the equipment to be detected has completed registration in the internet of things server through factory detection, and determining that the equipment to be detected has passed factory detection;
and responding to the factory registration information to indicate that the equipment to be detected is not registered in the Internet of things server, and executing the operation of collecting the equipment parameters of the equipment to be detected through the factory detection software.
7. The method of claim 6, wherein the method further comprises:
responding to the factory registration information to indicate that the equipment to be detected is not registered in the Internet of things server, and acquiring authorization information, wherein the authorization information is used for identifying a factory detection environment;
and responding to the fact that the factory detection environment meets the safety requirement based on the authorization authentication information, and executing the operation of collecting the equipment parameters of the equipment to be detected through the factory detection software.
8. The method of claim 7, wherein the obtaining authorization authentication information comprises:
and calling the camera module of the equipment to be detected to scan the detection authorization code, and acquiring authorization authentication information carried by the detection authorization code.
9. The method of claim 5, wherein the method further comprises:
in response to failing to establish the data connection after attempting the connection a predetermined number of times, performing connection establishment failure prompts by factory detection software, wherein the connection establishment failure prompts comprise image prompts or voice prompts.
10. The method according to claim 1, wherein the detection result is used for displaying the result when being read, the displayed result including whether the device to be detected meets the acceptable factory standard, and when the device to be detected does not meet the acceptable factory standard, causing a device problem that the device to be detected does not meet the acceptable factory standard.
11. The method of claim 1, wherein the management rights of the device to be tested remain closed during the factory testing process, the management rights being used to modify device parameters of the device to be tested.
12. A detection device, the device comprising: the device comprises an acquisition module, a storage module, a connection establishment module and a permission cancellation module;
The acquisition module is used for acquiring a detection result of the equipment to be detected by running factory detection software, the factory detection software is configured in the equipment to be detected, and the detection result is used for identifying whether the equipment to be detected meets the qualified factory standard;
the storage module is used for storing the detection result in a designated storage space of the equipment to be detected;
the connection establishment module is used for establishing appointed connection between the result inquiry equipment and the equipment to be detected in response to the determination result, and setting the access authority of the result inquiry equipment to the equipment to be detected as permission to access the appointed storage space;
and the permission cancellation module is used for canceling the access permission of the result query equipment to the equipment to be detected in response to the detection result being successfully read from the appointed storage space by the result query equipment.
13. A computer device, the computer device comprising a processor and a memory:
the memory is used for storing a computer program and transmitting the computer program to the processor;
the processor is configured to perform the method of any of claims 1-11 according to the computer program.
14. A computer readable storage medium for storing a computer program which, when executed by a computer device, implements the method of any one of claims 1-11.
15. A computer program product comprising a computer program which, when run on a computer device, causes the computer device to perform the method of any of claims 1-11.
CN202311432784.0A 2023-10-30 2023-10-30 Detection method and related device Pending CN117453131A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202311432784.0A CN117453131A (en) 2023-10-30 2023-10-30 Detection method and related device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202311432784.0A CN117453131A (en) 2023-10-30 2023-10-30 Detection method and related device

Publications (1)

Publication Number Publication Date
CN117453131A true CN117453131A (en) 2024-01-26

Family

ID=89588753

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202311432784.0A Pending CN117453131A (en) 2023-10-30 2023-10-30 Detection method and related device

Country Status (1)

Country Link
CN (1) CN117453131A (en)

Similar Documents

Publication Publication Date Title
US20230021634A1 (en) OTA System Software Upgrade Control Method and Terminal Device
US20190268155A1 (en) Method for Ensuring Terminal Security and Device
CN110869907B (en) Method and terminal for browsing application page
US10091657B2 (en) Method for determining validity of base station and electronic device supporting the same
WO2016101729A1 (en) Wireless network access method, device and system
TWI617166B (en) Hardware resource access systems and techniques
WO2017020654A1 (en) Wireless network access method and device
CN113468515B (en) User identity verification method, device, electronic equipment and storage medium
CN109683997B (en) Method for accessing application program interface through sandbox, sandbox and sandbox equipment
CN111880508A (en) Automatic calibration and test method and device for T-box parameters
KR20190069574A (en) Wireless network type detection method and apparatus, and electronic device
US20220086252A1 (en) Methods to enable automated m2m/iot product management services
KR20190061060A (en) Profile-based content and services
KR102310027B1 (en) Determination method and corresponding terminal, computer program product and storage medium
CN109818972B (en) Information security management method and device for industrial control system and electronic equipment
CN108183978B (en) Communication equipment IP address configuration method and communication equipment
EP3926992B1 (en) Electronic device, and authentication method in electronic device
CN117453131A (en) Detection method and related device
EP4310407A1 (en) Control right switching method and apparatus for virtual remote control, device, and storage medium
CN115412920A (en) Internet of things equipment binding system, method and device and electronic equipment
KR20140121571A (en) System for intergrated authentication, method and apparatus for intergraged authentication thereof
CN111107089B (en) Method and device for protecting data transmission safety of Android system
CN109714371B (en) Industrial control network safety detection system
CN109933990B (en) Multi-mode matching-based security vulnerability discovery method and device and electronic equipment
KR20180046756A (en) System of testing iot sensor for power facility management

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination