WO2021003975A1 - 网关接口测试方法、终端设备、存储介质及装置 - Google Patents

网关接口测试方法、终端设备、存储介质及装置 Download PDF

Info

Publication number
WO2021003975A1
WO2021003975A1 PCT/CN2019/122328 CN2019122328W WO2021003975A1 WO 2021003975 A1 WO2021003975 A1 WO 2021003975A1 CN 2019122328 W CN2019122328 W CN 2019122328W WO 2021003975 A1 WO2021003975 A1 WO 2021003975A1
Authority
WO
WIPO (PCT)
Prior art keywords
interface
gateway
mapping relationship
target
channel
Prior art date
Application number
PCT/CN2019/122328
Other languages
English (en)
French (fr)
Inventor
于善友
Original Assignee
深圳壹账通智能科技有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 深圳壹账通智能科技有限公司 filed Critical 深圳壹账通智能科技有限公司
Publication of WO2021003975A1 publication Critical patent/WO2021003975A1/zh

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L12/00Data switching networks
    • H04L12/66Arrangements for connecting between networks having differing types of switching systems, e.g. gateways
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0803Configuration setting
    • H04L41/0823Configuration setting characterised by the purposes of a change of settings, e.g. optimising configuration for enhancing reliability
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L41/00Arrangements for maintenance, administration or management of data switching networks, e.g. of packet switching networks
    • H04L41/08Configuration management of networks or network elements
    • H04L41/0876Aspects of the degree of configuration automation
    • H04L41/0886Fully automatic configuration
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • H04L43/0805Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability
    • H04L43/0817Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters by checking availability by checking functioning
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/14Arrangements for monitoring or testing data switching networks using software, i.e. software packages
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/12Applying verification of the received information
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/20Network architectures or network communication protocols for network security for managing network security; network security policies in general
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials

Definitions

  • This application relates to the field of security protection, in particular to gateway interface testing methods, terminal equipment, storage media and devices.
  • the main purpose of this application is to provide a gateway interface test method, terminal equipment, storage medium, and device, which aims to solve the technical problems of high cost of gateway test development and low test efficiency.
  • the gateway interface testing method includes the following steps:
  • a preset network mapping table is generated according to the tree structure diagram, the first mapping relationship reflects the mapping relationship between each gateway and several channels, the second mapping relationship reflects the mapping relationship between each channel and several applications, and the third The mapping relationship reflects the mapping relationship between each application and several interfaces to be called;
  • the authentication data and the interface to be called are obtained from the gateway interface test request;
  • the preset network mapping table reflects the correspondence between each gateway and each interface to be called;
  • the present invention also provides a terminal device.
  • the terminal device includes a memory, a processor, and computer-readable instructions stored in the memory and running on the processor.
  • the readable instructions are configured to implement the steps of the gateway interface testing method as described above.
  • the present invention also provides a storage medium storing computer-readable instructions, and when the computer-readable instructions are executed by a processor, the gateway interface test method as described above is implemented. step.
  • the present invention also provides a gateway interface testing device, which includes:
  • the request response module is used to obtain the authentication data and the interface to be called from the gateway interface test request when the gateway interface test request is received;
  • the transmission module is configured to find the target gateway corresponding to the interface to be called in the preset network mapping table, and transmit the authentication data to the target gateway, so that the target gateway can verify the authentication data , And feedback the verification result, the preset network mapping table reflects the corresponding relationship between each gateway and each interface to be called;
  • the test module is configured to test the interface to be called when the verification result fed back by the target gateway is a pass;
  • the transmission module is further configured to obtain a first mapping relationship, a second mapping relationship, and a third mapping relationship according to a preset encryption and signing strategy; for the first mapping relationship, the second mapping relationship, and the The third mapping relationship is integrated to obtain the encrypted and signed data; the tree structure diagram of each gateway, each channel, each application, and each interface to be called is constructed according to the encrypted and signed data; the preset is generated according to the tree structure diagram
  • the first mapping relationship reflects the mapping relationship between each gateway and several channels
  • the second mapping relationship reflects the mapping relationship between each channel and several applications
  • the third mapping relationship reflects each application and several interfaces to be called The mapping relationship.
  • FIG. 1 is a schematic diagram of a terminal device structure of a hardware operating environment involved in a solution of an embodiment of the present application
  • FIG. 3 is a schematic flowchart of a second embodiment of a gateway interface testing method according to this application.
  • FIG. 4 is a schematic flowchart of a third embodiment of a gateway interface testing method according to this application.
  • Fig. 5 is a structural block diagram of the first embodiment of the gateway interface testing device of this application.
  • FIG. 1 is a schematic diagram of the terminal device structure of the hardware operating environment involved in the solution of the embodiment of the application.
  • the terminal device may include a processor 1001, such as a CPU, a communication bus 1002, a user interface 1003, a network interface 1004, and a memory 1005.
  • the communication bus 1002 is used to implement connection and communication between these components.
  • the user interface 1003 may include a display screen (Display), and the optional user interface 1003 may also include a standard wired interface and a wireless interface.
  • the wired interface of the user interface 1003 may be a USB interface in this application.
  • the network interface 1004 may optionally include a standard wired interface and a wireless interface (such as a WI-FI interface).
  • the memory 1005 can be a high-speed RAM memory or a stable memory (non-volatile memory), such as disk storage.
  • the memory 1005 may also be a storage device independent of the foregoing processor 1001.
  • FIG. 1 does not constitute a limitation on the terminal device, and may include more or less components than shown in the figure, or a combination of certain components, or different component arrangements.
  • the storage medium of the present application may be a non-volatile computer-readable storage medium.
  • the memory 1005 may include an operating system, a network communication module, a user interface module, and a gateway interface test computer Readable instructions.
  • the network interface 1004 is mainly used to connect to a back-end server for data communication with the back-end server; the user interface 1003 is mainly used to connect peripherals; the terminal device calls the memory 1005 through the processor 1001
  • the gateway interface test computer readable instructions stored in the computer and execute the gateway interface test method provided in the embodiments of the present application.
  • FIG. 2 is a schematic flowchart of a first embodiment of a gateway interface testing method according to the present application.
  • the gateway interface testing method includes the following steps:
  • Step S10 When the gateway interface test request is received, the authentication data and the interface to be called are obtained from the gateway interface test request.
  • the gateway interface test request is a test request generated by users or other terminal users by touching, clicking on the operation interface or inputting relevant information by pressing keys.
  • the gateway interface test request will include the interface to be called and the security
  • the authentication data for authentication the authentication data includes the corresponding channel, application identifier and application terminal public key; the corresponding authentication data and the interface to be called can be obtained through the gateway interface test request, and the authentication data is used to connect the gateway interface
  • the interface to be called is an interface that needs to be tested.
  • the gateway interface testing method further includes the following steps:
  • Step S010 Obtain a first mapping relationship, a second mapping relationship, and a third mapping relationship according to a preset encryption and signing strategy, and integrate the first mapping relationship, the second mapping relationship, and the third mapping relationship.
  • a preset network mapping table is generated according to the integrated first mapping relationship, second mapping relationship, and third mapping relationship.
  • the first mapping relationship reflects the mapping relationship between each gateway and several channels
  • the second mapping relationship reflects each channel.
  • the mapping relationship with several applications, and the third mapping relationship reflects the mapping relationship between each application and several interfaces to be called.
  • the encryption and endorsement strategy is a strategy pre-set on multiple gateways to perform encryption and endorsement processing for each gateway, each channel, each application, and each interface to be called.
  • the encryption and endorsement process needs to be complicated. In actual operation, the encryption and signature code logic will be hidden. Testers only need to pay attention to the corresponding test request information, and then the terminal device will automatically perform encryption and signature processing according to the test request information, and then call the corresponding background To call the interface for testing.
  • mapping relationship can be generated according to the integrated first, second, and third mapping relationships, that is, according to the integrated first, second, and second mapping relationships.
  • the mapping relationship and the third mapping relationship can determine the mutual correspondence between each gateway and its corresponding channels, applications, and interfaces, and then generate a preset network mapping table based on the correspondence, and the preset network mapping table reflects each gateway The mapping relationship table of the corresponding relationship with each interface to be called.
  • Step S20 Find the target gateway corresponding to the interface to be invoked in the preset network mapping table, and transmit the authentication data to the target gateway, so that the target gateway verifies the authentication data, and The verification result is fed back, and the preset network mapping table reflects the corresponding relationship between each gateway and each interface to be called.
  • the preset network mapping table stores the mapping relationship between each gateway and each interface, and the target gateway corresponding to the interface to be called can be found through the preset network mapping table, and the authentication When the data is transmitted to the target gateway, the target gateway can verify the authentication data and feed back the verification result.
  • the preset network mapping table reflects the corresponding relationship between each gateway and each interface to be called. Obtain the corresponding verification result.
  • Step S30 When the verification result fed back by the target gateway is a pass, test the interface to be called.
  • the verification result reflects whether the gateway interface test request is legal and whether the authentication data is successfully verified.
  • the verification result indicates that the gateway interface test request is legitimate.
  • the test of the interface to be called can be started at this time.
  • step S30 specifically includes the following steps:
  • the current operating environment is configured according to the configuration parameters, the request information corresponding to the test request is entered in the current operating environment after the configuration is completed, and the interface to be called is tested according to the request information.
  • the configuration parameters corresponding to the channel to be invoked and the application identifier to be invoked are obtained, and the configuration parameters can be further configured, and then entered in the current operating environment after the configuration is completed.
  • the interface to be called is tested according to the request information.
  • the verification result fed back by the target gateway is that the verification of the public key and the private key is successful, and the interface to be called If the calling path is correct, it indicates that the verification result is passed, and the interface to be called can be tested.
  • the method of testing is to select the corresponding channel and application identifier according to the test request, and automatically obtain the corresponding encrypted and signed data, public
  • the key and private key are configured with parameters, the request information is filled in after the configuration is completed, and the interface to be called is tested according to the request information.
  • the authentication data and the interface to be invoked are obtained from the gateway interface test request; the target gateway corresponding to the interface to be invoked is searched in the preset network mapping table, and all The authentication data is transmitted to the target gateway, so that the target gateway verifies the authentication data and feeds back the verification result, and the preset network mapping table reflects the corresponding relationship between each gateway and each interface to be called;
  • the interface to be called is tested, which can automatically configure the test environment, avoid repeated setting of different security policies, save research and development time, and improve the performance of the gateway interface. Test speed and efficiency reduce the workload of test development, optimize the test process, and reduce the cost of test development.
  • FIG. 3 is a schematic flowchart of the second embodiment of the gateway interface testing method of this application. Based on the first embodiment shown in Fig. 2 above, a second embodiment of the gateway interface testing method of this application is proposed.
  • step S010 includes the following steps:
  • Step S011 Obtain the first mapping relationship, the second mapping relationship, and the third mapping relationship according to the preset encryption and signing strategy.
  • the preset encryption and signing strategy includes multiple mapping relationships, that is, a preset first mapping relationship, a second mapping relationship, and a third mapping relationship.
  • the first mapping relationship reflects each gateway and several The mapping relationship of channels
  • the second mapping relationship reflects the mapping relationship between each channel and a number of applications
  • the third mapping relationship reflects the mapping relationship between each application and a number of interfaces to be invoked; that is, different gateways correspond to a number of different channels.
  • the channel corresponds to a number of different applications, that is, the application of computer-readable instructions, and different applications correspond to a number of different interfaces to be called.
  • the mapping relationship can be one-to-one or one-to-many, which is determined according to the actual situation. This is not restricted.
  • Step S012 Integrate the first mapping relationship, the second mapping relationship, and the third mapping relationship to obtain encrypted signature data.
  • the integration of the first mapping relationship, the second mapping relationship, and the third mapping relationship is to determine the number of channels allocated by each gateway according to the first mapping relationship, that is, to determine each gateway
  • a number of different applications that have been allocated to each channel can be determined according to the second mapping relationship, that is, different docking parties correspond to a number of different application computer-readable instructions that have been allocated, according to the third
  • the mapping relationship determines a number of different interfaces to be called that have been allocated to each application, that is, different application computer-readable instructions correspond to different interfaces to be called that have been allocated for data transmission
  • the first mapping relationship and the second mapping relationship Integrating with the third mapping relationship obtains encrypted and signed data, which can realize automatic data configuration.
  • step S012 includes the following steps:
  • each gateway corresponds to different channels and has corresponding channel docking data, and the channel docking data is integrated to obtain a channel data set; each channel corresponds to different applications, that is, the application of computer-readable instructions , Different applications have different application identities. By integrating the application identities of each application, an application identity set can be obtained. Different applications correspond to different interfaces to be called, that is, different application computer-readable instructions correspond to different interfaces to be called ,
  • the preset calling authority is the authority of the interface to be called that each application can call in advance, and the interface to be called that each application can call can be determined according to the preset calling authority.
  • An interface set is obtained, and encrypted and signed data is generated according to the application identification set and the interface set, that is, encrypted and signed data can be generated by encrypting and signing the data in the application identification set and the interface set.
  • Step S013 Construct a tree structure diagram of each gateway, each channel, each application, and each interface to be called according to the encrypted and signed data.
  • each gateway, each channel, each application, and each interface to be called can be configured through the encrypted and signed data, and then it is possible to determine which channels each gateway corresponds to, and which channels correspond to each channel.
  • Application computer-readable instructions that is, each application, which interfaces to be called corresponding to each application, and the tree structure diagram reflects the mapping relationship between each gateway, each channel, each application, and each interface to be called.
  • Step S014 Generate a preset network mapping table according to the tree structure diagram.
  • each gateway, each channel, each application, and each interface to be called can be configured, and then a tree structure diagram can be generated, and each tree structure diagram can be obtained according to the tree structure diagram.
  • the mapping relationship between gateways, channels, applications, and interfaces to be called is then generated to generate a preset network mapping table.
  • the preset network mapping table is a mapping relationship table reflecting the correspondence between each gateway and each interface to be called. It may also be a mapping relationship table reflecting the correspondence between each gateway and its corresponding channels, applications, and interfaces to be invoked, which is not limited in this embodiment.
  • a first preset number of channels are allocated to the target gateway according to the encryption and endorsement strategy, a target channel is selected from each channel, and the target channel is allocated a second
  • select a target application from each application and assign a third preset number of calling interfaces to the target application
  • generate a preset network mapping table based on the tree structure diagram, which can be mapped through the preset network The table quickly finds the target gateway corresponding to the calling interface, which saves data processing time and improves the test speed and efficiency of the gateway interface.
  • FIG. 4 is a schematic flowchart of a third embodiment of a gateway interface testing method of this application. Based on the second embodiment shown in FIG. 3, a fourth embodiment of the gateway interface testing method of this application is proposed.
  • step S20 includes the following steps:
  • Step S21 Search for the target gateway corresponding to the interface to be called in the preset network mapping table, and transmit the authentication data to the target gateway; so that the target gateway determines the corresponding target channel according to the authentication data , Determine whether the preset encrypted and signed data corresponding to the target channel matches the encrypted and signed data in the authentication data, and feed back the verification result.
  • the preset network mapping table reflects the relationship between each gateway and each interface to be called Correspondence.
  • the target gateway may determine the corresponding target channel according to the authentication data, and the target channel corresponds to pre-allocated encrypted signature data, That is, the preset encrypted and signed data is verified by verifying the preset encrypted and signed data and the encrypted and signed data in the authentication data to see whether the two match, and then the verification result can be generated.
  • the preset encrypted and signed data is a preset public key and a preset private key loaded through a target calling interface and a target application identifier
  • the target calling interface is an interface to be called determined through the target channel
  • the target application identifier is an application identifier determined through the target channel.
  • the target gateway corresponding to the interface to be called can be searched in the preset network mapping table, and the authentication data can be transmitted to the target gateway; so that the target gateway can be based on the authentication data Determine the corresponding target channel, obtain the corresponding target application identification and target calling interface according to the target channel; determine the preset public key and preset private key to be loaded according to the target application identification, and load according to the target calling interface
  • the preset public key and the preset private key determine whether the preset public key matches the public key in the authentication data, and judge whether the preset private key matches the private key in the authentication data, It is determined whether the target calling interface matches the interface to be called, and the verification result is fed back, and the preset network mapping table reflects the corresponding relationship between each gateway and each interface to be called.
  • the target gateway verifies the public key and private key in the authentication data.
  • the corresponding application identifier can be obtained according to the target channel And target calling interface; determine the target public key and target private key to be loaded according to the application identifier, determine whether the target public key matches the public key in the authentication data, and determine whether the target private key matches the Whether the private key in the authentication data matches, it is determined whether the target calling interface matches the to-be called interface, and the verification result is generated.
  • the target gateway determines the corresponding target channel according to the authentication data, and before determining whether the preset encrypted signature data corresponding to the target channel matches the encrypted signature data in the authentication data, it also needs to Configure the target gateway according to the preset configuration parameters, then load the preset public key and the preset private key to the target application computer-readable instructions under the target channel corresponding to the target gateway, and set the parameter pair according to the preset encryption and signature
  • the target channel performs corresponding encryption and endorsement settings.
  • the target gateway corresponding to the interface to be invoked is searched in the preset network mapping table, and the authentication data is transmitted to the target gateway; so that the target gateway determines the corresponding target according to the authentication data Channel, determine whether the preset encrypted signature data corresponding to the target channel matches the encrypted signature data in the authentication data, and feed back the verification result.
  • the preset network mapping table reflects each gateway and each interface to be called The corresponding relationship can quickly verify the authenticity and security of the gateway interface test request, ensure accurate data control, and make the interface test safer and faster.
  • an embodiment of the present application also proposes a storage medium.
  • the storage medium of the present application may be a non-volatile computer-readable storage medium.
  • the storage medium stores a gateway interface test computer-readable instruction, and the gateway interface
  • the test computer readable instructions are executed by the processor to implement the steps of the gateway interface test method as described above.
  • an embodiment of the present application also proposes a gateway interface testing device, and the gateway interface testing device includes:
  • the request response module 10 is configured to obtain authentication data and the interface to be invoked from the gateway interface test request when the gateway interface test request is received.
  • the gateway interface test request is a test request generated by users or other terminal users by touching, clicking on the operation interface or inputting relevant information by pressing keys.
  • the gateway interface test request will include the interface to be called and the security
  • the authentication data for authentication the authentication data includes the corresponding channel, application identifier and application terminal public key; the corresponding authentication data and the interface to be called can be obtained through the gateway interface test request, and the authentication data is used to connect the gateway interface
  • the interface to be called is an interface that needs to be tested.
  • the transmission module 20 is configured to search for the target gateway corresponding to the interface to be called in the preset network mapping table, and transmit the authentication data to the target gateway, so that the target gateway can collate the authentication data And feed back the verification result.
  • the preset network mapping table reflects the correspondence between each gateway and each interface to be called.
  • the preset network mapping table stores the mapping relationship between each gateway and each interface, and the target gateway corresponding to the interface to be called can be found through the preset network mapping table, and the authentication When the data is transmitted to the target gateway, the target gateway can verify the authentication data and feed back the verification result.
  • the preset network mapping table reflects the corresponding relationship between each gateway and each interface to be called. Obtain the corresponding verification result.
  • the transmission module 20 is further configured to obtain a first mapping relationship, a second mapping relationship, and a third mapping relationship according to a preset encryption and signing strategy; to compare the first mapping relationship, the second mapping relationship, and the The third mapping relationship is integrated to obtain encrypted and signed data; a tree structure diagram of each gateway, each channel, each application, and each interface to be called is constructed according to the encrypted and signed data; generated according to the tree structure diagram
  • a network mapping table is preset, the first mapping relationship reflects the mapping relationship between each gateway and several channels, the second mapping relationship reflects the mapping relationship between each channel and several applications, and the third mapping relationship reflects each application and several The mapping relationship of the calling interface.
  • the transmission module 20 is further configured to obtain channel docking data corresponding to each gateway according to the first mapping relationship, integrate the channel docking data to obtain a channel data set; obtain the corresponding channel data according to the second mapping relationship
  • the application identification of each application is integrated to obtain an application identification set; according to the third mapping relationship and the preset calling authority, the interface to be called corresponding to each application is obtained, and the interfaces to be called are integrated to obtain the interface set ; Generate encrypted signature data according to the channel data set, the application identification set and the interface set.
  • the transmission module 20 is further configured to search for a target gateway corresponding to the interface to be invoked in a preset network mapping table, and transmit the authentication data to the target gateway; so that the target gateway is based on the authentication
  • the data determines the corresponding target channel, determines whether the preset encrypted signature data corresponding to the target channel matches the encrypted signature data in the authentication data, and feeds back the verification result.
  • the test module 30 is configured to test the interface to be called when the verification result fed back by the target gateway is a pass.
  • the verification result reflects whether the gateway interface test request is legal and whether the authentication data is successfully verified.
  • the verification result indicates that the gateway interface test request is legitimate.
  • the test of the interface to be called can be started at this time.
  • the test module 30 is further configured to receive the verification result fed back by the target gateway, and when the verification result is a pass, select the corresponding channel to be invoked and the identification of the application to be invoked according to the test request; The configuration parameters corresponding to the channel to be invoked and the identification of the application to be invoked; configure the current operating environment according to the configuration parameters, and enter the request information corresponding to the test request in the current operating environment after the configuration is completed, according to The request information tests the interface to be called.
  • a preset network mapping table is generated according to the integrated encryption and signing strategies; when a gateway interface test request is received, authentication data and authentication data are obtained from the gateway interface test request. Interface to be invoked; search for a target gateway corresponding to the interface to be invoked in a preset network mapping table, and transmit the authentication data to the target gateway, so that the target gateway can verify the authentication data, And feedback the verification result, the preset network mapping table reflects the corresponding relationship between each gateway and each interface to be called; when the verification result fed back by the target gateway is that the verification passed, the interface to be called is tested, It can automatically configure the test environment, avoid repeated setting of different security policies, save R&D time, improve the test speed and efficiency of the gateway interface, reduce the test and development workload, optimize the test process, and reduce the cost of test development.
  • the method of the embodiment can be realized by means of software plus the necessary general hardware platform, of course, it can also be realized by Over hardware, but in many cases the former is a better implementation.
  • the technical solution of this application essentially or the part that contributes to the existing technology can be embodied in the form of a software product.
  • the computer software product is stored in a storage medium (such as ROM/RAM, magnetic disk, optical disk), and includes several instructions to enable a terminal device (which can be a mobile phone, computer, server, air conditioner, or network device) Etc.) execute the method described in each embodiment of the present application.

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Automation & Control Theory (AREA)
  • Environmental & Geological Engineering (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本申请涉及安全防护领域,公开了一种网关接口测试方法、终端设备、存储介质及装置;本申请通过在接收到网关接口测试请求时,从所述网关接口测试请求中获取认证数据和待调用接口;在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关,以使所述目标网关对所述认证数据进行校验,并反馈校验结果,所述预设网络映射表反映各网关与各待调用接口的对应关系;在所述目标网关反馈的校验结果为校验通过时,对所述待调用接口进行测试,能够自动配置测试环境,避免了重复设置不同的安全策略,节省了研发时间,提高了网关接口的测试速度和效率,减少了测试开发工作量,优化了测试流程,降低了测试开发成本。

Description

网关接口测试方法、终端设备、存储介质及装置
本申请要求于2019年7月11日提交中国专利局、申请号为201910626959.9、发明名称为“网关接口测试方法、终端设备、存储介质及装置”的中国专利申请的优先权,其全部内容通过引用结合在申请中。
技术领域
本申请涉及安全防护领域,尤其涉及网关接口测试方法、终端设备、存储介质及装置。
背景技术
对于现有的网关测试方式,开发人员一般是基于Postman(一款调试超文本传输协议(HyperText Transfer Protocol,HTTP)接口的工具)等测试工具对后台接口进行测试;一般的网关接口为了安全考虑,都需要进行加密加签处理,通过不同的解密方式才能访问网关接口,即不同的网关有着不同的安全策略,开发者需要根据不同的安全策略定制对应的开发测试工具,进而进行网关测试,但是这种方式存在开发成本较大,网关测试效率较低的缺陷。
上述内容仅用于辅助理解本申请的技术方案,并不代表承认上述内容是现有技术。
发明内容
本申请的主要目的在于提供网关接口测试方法、终端设备、存储介质及装置,旨在解决网关测试开发成本大,且测试效率低的技术问题。
为实现上述目的,本申请提供一种网关接口测试方法,所述网关接口测试方法包括以下步骤:
根据预设加密加签策略获取第一映射关系、第二映射关系及第三映射关系;
对所述第一映射关系、所述第二映射关系及所述第三映射关系进行集成,获得加密加签数据;
根据所述加密加签数据构建各网关、各渠道、各应用及各待调用接口的树状结构图;
根据所述树状结构图生成预设网络映射表,所述第一映射关系反映各网关与若干渠道的映射关系,所述第二映射关系反映各渠道与若干应用的映射关系,所述第三映射关系反映各应用与若干待调用接口的映射关系;
在接收到网关接口测试请求时,从所述网关接口测试请求中获取认证数据和待调用接口;
在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关,以使所述目标网关对所述认证数据进行校验,并反馈校验结果,所述预设网络映射表反映各网关与各待调用接口的对应关系;
在所述目标网关反馈的校验结果为校验通过时,对所述待调用接口进行测试。
此外,为实现上述目的,本发明还提出一种终端设备,所述终端设备包括存储器、处理器及存储在所述存储器上并可在所述处理器上运行的计算机可读指令,所述计算机可读指令配置为实现如上文所述的网关接口测试方法的步骤。
此外,为实现上述目的,本发明还提出一种存储介质,所述存储介质上存储有计算机可读指令,所述计算机可读指令被处理器执行时实现如上文所述的网关接口测试方法的步骤。
此外,为实现上述目的,本发明还提出一种网关接口测试装置,所述网关接口测试装置包括:
请求响应模块,用于在接收到网关接口测试请求时,从所述网关接口测试请求中获取认证数据和待调用接口;
传输模块,用于在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关,以使所述目标网关对所述认证数据进行校验,并反馈校验结果,所述预设网络映射表反映各网关与各待调用接口的对应关系;
测试模块,用于在所述目标网关反馈的校验结果为校验通过时,对所述待调用接口进行测试;
其中,所述传输模块,还用于根据预设加密加签策略获取第一映射关系、第二映射关系及第三映射关系;对所述第一映射关系、所述第二映射关系及所述第三映射关系进行集成,获得加密加签数据;根据所述加密加签数据构建各网关、各渠道、各应用及各待调用接口的树状结构图;根据所述树状结构图生成预设网络映射表,所述第一映射关系反映各网关与若干渠道的映射关系,所述第二映射关系反映各渠道与若干应用的映射关系,所述第三映射关系反映各应用与若干待调用接口的映射关系。
本申请的一个或多个实施例的细节在下面的附图和描述中提出,本申请的其他特征和优点将从说明书、附图以及权利要求书变得明显。
附图说明
图1是本申请实施例方案涉及的硬件运行环境的终端设备结构示意图;
图2为本申请网关接口测试方法第一实施例的流程示意图;
图3为本申请网关接口测试方法第二实施例的流程示意图;
图4为本申请网关接口测试方法第三实施例的流程示意图;
图5为本申请网关接口测试装置第一实施例的结构框图。
本申请目的的实现、功能特点及优点将结合实施例,参照附图做进一步说明。
具体实施方式
应当理解,此处所描述的具体实施例仅仅用以解释本申请,并不用于限定本申请。
参照图1,图1为本申请实施例方案涉及的硬件运行环境的终端设备结构示意图。
如图1所示,该终端设备可以包括:处理器1001,例如CPU,通信总线1002、用户接口1003,网络接口1004,存储器1005。其中,通信总线1002用于实现这些组件之间的连接通信。用户接口1003可以包括显示屏(Display),可选用户接口1003还可以包括标准的有线接口、无线接口,对于用户接口1003的有线接口在本申请中可为USB接口。网络接口1004可选的可以包括标准的有线接口、无线接口(如WI-FI接口)。存储器1005可以是高速RAM存储器,也可以是稳定的存储器(non-volatile memory),例如磁盘存储器。存储器1005可选的还可以是独立于前述处理器1001的存储装置。
本领域技术人员可以理解,图1中示出的结构并不构成对终端设备的限定,可以包括比图示更多或更少的部件,或者组合某些部件,或者不同的部件布置。
如图1所示,本申请的存储介质可以为非易失性计算机可读存储介质,作为一种计算机存储介质的存储器1005中可以包括操作系统、网络通信模块、用户接口模块以及网关接口测试计算机可读指令。
在图1所示的终端设备中,网络接口1004主要用于连接后台服务器,与所述后台服务器进行数据通信;用户接口1003主要用于连接外设;所述终端设备通过处理器1001调用存储器1005中存储的网关接口测试计算机可读指令,并执行本申请实施例提供的网关接口测试方法。
基于上述硬件结构,提出本申请网关接口测试方法的实施例。
参照图2,图2为本申请网关接口测试方法第一实施例的流程示意图。
在第一实施例中,所述网关接口测试方法包括以下步骤:
步骤S10、在接收到网关接口测试请求时,从所述网关接口测试请求中获取认证数据和待调用接口。
需要说明的是,所述网关接口测试请求为用户或其他终端使用者通过触摸、点击操作界面或按键输入相关信息生成的测试请求,所述网关接口测试请求中会包含需要调用的接口和进行安全认证的认证数据,所述认证数据包括对应的渠道、应用标识和应用终端公钥;通过所述网关接口测试请求可以获得对应的认证数据和待调用接口,所述认证数据为用于对网关接口进行认证的数据,所述待调用接口为需要进行测试的接口。
进一步地,所述步骤S10之前,所述网关接口测试方法还包括以下步骤:
步骤S010、根据预设加密加签策略获取第一映射关系、第二映射关系及第三映射关系,对所述第一映射关系、所述第二映射关系及所述第三映射关系进行集成,根据集成后的第一映射关系、第二映射关系及第三映射关系生成预设网络映射表,所述第一映射关系反映各网关与若干渠道的映射关系,所述第二映射关系反映各渠道与若干应用的映射关系,所述第三映射关系反映各应用与若干待调用接口的映射关系。
需要说明的是,所述加密加签策略为预先设置在多个网关的用于对各网关、各渠道、各应用及各待调用接口进行加密加签处理的策略,加密加签的过程需要复杂的代码逻辑实现,在实际操作中,加密加签代码逻辑会被隐藏,测试人员只需要关注相应的测试请求信息,进而终端设备会自动根据测试请求信息进行加密加签处理后,调用后台对应的待调用接口进行测试。
应当理解的是,不同的加密加签策略对应不同待调用接口的加密加签方式,对所述第一映射关系、所述第二映射关系及所述第三映射关系进行集成,即对各加密加签策略对应的加密加签数据进行集成,根据集成后的第一映射关系、第二映射关系及第三映射关系可以生成预设网络映射表,即根据集成后的第一映射关系、第二映射关系及第三映射关系可以确定各网关及其对应的渠道、应用及接口之间的相互的对应关系,进而根据对应关系生成预设网络映射表,所述预设网络映射表为反映各网关与各待调用接口的对应关系的映射关系表。
步骤S20、在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关,以使所述目标网关对所述认证数据进行校验,并反馈校验结果,所述预设网络映射表反映各网关与各待调用接口的对应关系。
应当理解的是,所述预设网络映射表中存储着各网关与各接口的映射关系,通过所述预设网络映射表可以查找到与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关,可以使所述目标网关对所述认证数据进行校验,并反馈校验结果,所述预设网络映射表反映各网关与各待调用接口的对应关系,进而可以获得对应的校验结果。
步骤S30、在所述目标网关反馈的校验结果为校验通过时,对所述待调用接口进行测试。
可以理解的是,所述校验结果反映所述网关接口测试请求是否合法且所述认证数据是否校验成功在所述校验结果为校验通过时,即表明所述网关接口测试请求为合法安全的请求信息,此时可以开启对所述待调用接口的测试。
进一步的,所述步骤S30具体包括以下步骤:
接收所述目标网关反馈的校验结果,在所述校验结果为校验通过时,根据所述测试请求选择对应的待调用渠道和待调用应用标识;
获取所述待调用渠道和所述待调用应用标识对应的配置参数;
根据所述配置参数对当前运行环境进行配置,并在配置完成后的当前运行环境中录入所述测试请求对应的请求信息,根据所述请求信息对所述待调用接口进行测试。
应当理解的是,在校验通过时,获取所述待调用渠道和所述待调用应用标识对应的配置参数,能够更加所述配置参数进行配置,进而在配置完成后的当前运行环境中录入所述测试请求对应的请求信息,根据所述请求信息对所述待调用接口进行测试,在具体实现中,所述目标网关反馈的校验结果为公钥和私钥校验成功,且待调用接口的调用路径正确,则表明校验结果通过,则可以对所述待调用接口进行测试,测试的方式是根据所述测试请求选择对应的渠道和应用标识,自动获取对应的加密加签数据、公钥和私钥进行参数配置,配置完成后填写请求信息,根据所述请求信息对所述待调用接口进行测试。
本实施例通过在接收到网关接口测试请求时,从所述网关接口测试请求中获取认证数据和待调用接口;在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关,以使所述目标网关对所述认证数据进行校验,并反馈校验结果,所述预设网络映射表反映各网关与各待调用接口的对应关系;在所述目标网关反馈的校验结果为校验通过时,对所述待调用接口进行测试,能够自动配置测试环境,避免了重复设置不同的安全策略,节省了研发时间,提高了网关接口的测试速度和效率,减少了测试开发工作量,优化了测试流程,降低了测试开发成本。
进一步地,参照图3,图3为本申请网关接口测试方法第二实施例的流程示意图,基于上述图2所示的第一实施例,提出本申请网关接口测试方法的第二实施例。
第三实施例中,所述步骤S010包括以下步骤:
步骤S011、根据预设加密加签策略获取第一映射关系、第二映射关系及第三映射关系。
需要说明的是,所述预设加密加签策略中包含多个映射关系,即预先设置的第一映射关系、第二映射关系及第三映射关系,所述第一映射关系反映各网关与若干渠道的映射关系,所述第二映射关系反映各渠道与若干应用的映射关系,所述第三映射关系反映各应用与若干待调用接口的映射关系;即不同的网关对应若干不同的渠道,不同的渠道对应若干不同的应用,即应用计算机可读指令,不同的应用对应若干不同的待调用接口,映射关系可以是一对一,也可以是一对多,根据实际情况确定,本实施例对此不加以限制。
步骤S012、对所述第一映射关系、所述第二映射关系及所述第三映射关系进行集成,获得加密加签数据。
可以理解的是,对所述第一映射关系、所述第二映射关系及所述第三映射关系进行集成,即根据所述第一映射关系确定各网关已经分配的若干渠道,即确定各网关对应的若干不同的对接方,根据所述第二映射关系可以确定各渠道已经分配的若干不同的应用,即不同的对接方对应已经分配的若干不同的应用计算机可读指令,根据所述第三映射关系确定各应用已经分配的若干不同的待调用接口,即不同的应用计算机可读指令对应已经分配不同的待调用接口进行数据传输,通过对所述第一映射关系、所述第二映射关系及所述第三映射关系进行集成获得了加密加签数据,能够实现数据自动配置。
进一步地,所述步骤S012包括以下步骤:
根据所述第一映射关系获取各网关对应的渠道对接数据,对所述渠道对接数据进行集成,获得渠道数据集;
根据所述第二映射关系获取各渠道对应的应用标识,对各应用的应用标识进行集成,获得应用标识集;
根据所述第三映射关系和预设调用权限获得各应用对应的待调用接口,对各待调用接口进行集成,获得接口集;
根据所述渠道数据集、所述应用标识集和所述接口集生成加密加签数据。
需要说明的是,各网关下对应有不同的渠道,具有对应的渠道对接数据,对所述渠道对接数据进行集成,获得渠道数据集;各渠道下对应有不同的应用,即应用计算机可读指令,不同的应用具有不同的应用标识,通过对各应用的应用标识进行集成,可以获得应用标识集,不同的应用对应不同的待调用接口,即不同的应用计算机可读指令对应不同的待调用接口,所述预设调用权限为预先设置的各应用能够调用的待调用接口的权限,根据所述预设调用权限可以确定各应用能够调用的待调用接口,通过对各待调用接口进行集成,能够获得接口集,根据所述应用标识集和所述接口集生成加密加签数据,即通过对所述应用标识集和所述接口集中的数据进行加密加签可以生成加密加签数据。
步骤S013、根据所述加密加签数据构建各网关、各渠道、各应用及各待调用接口的树状结构图。
需要说明的是,通过所述加密加签数据可以配置各网关、各渠道、各应用及各待调用接口的网络环境,进而可以确定各网关对应有哪几个渠道,各渠道对应有哪几个应用计算机可读指令,即各应用,各应用对应有哪几个待调用接口,所述树状结构图反映各网关、各渠道、各应用及各待调用接口之间的映射关系。
步骤S014、根据所述树状结构图生成预设网络映射表。
应当理解的是,根据所述加密加签数据可以对各网关、各渠道、各应用及各待调用接口的网络环境进行配置,进而生成树状结构图,进而根据所述树状结构图获得各网关、各渠道、各应用及各待调用接口之间的映射关系,进而生成预设网络映射表,所述预设网络映射表为反映各网关与各待调用接口的对应关系的映射关系表,也可以是反映各网关及其对应的渠道、应用及待调用接口的之间的对应关系的映射关系表,本实施例对此不加以限制。
本实施例通过获取多个网关的加密加签策略,根据所述加密加签策略为目标网关分配第一预设数量的渠道,从各渠道中选取目标渠道,并为所述目标渠道分配第二预设数量的应用,从各应用中选取目标应用,并为所述目标应用分配第三预设数量的调用接口;对各网关、各渠道、各应用及各待调用接口进行集成,获得加密加签数据;根据所述加密加签数据构建各网关、各渠道、各应用及各待调用接口的树状结构图;根据所述树状结构图生成预设网络映射表,能够通过预设网络映射表快速查找到带调用接口对应的目标网关,节省了数据处理的时间,提高了网关接口的测试速度和效率。
参照图4,图4为本申请网关接口测试方法第三实施例的流程示意图,基于上述图3所示的第二实施例,提出本申请网关接口测试方法的第四实施例。
第四实施例中,所述步骤S20包括以下步骤:
步骤S21、在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关;以使所述目标网关根据所述认证数据确定对应的目标渠道,确定所述目标渠道对应的预设加密加签数据与所述认证数据中的加密加签数据是否匹配,并反馈校验结果,所述预设网络映射表反映各网关与各待调用接口的对应关系。
需要说明的是,在所述认证数据传输至所述目标网关后,所述目标网关可以根据所述认证数据确定对应的目标渠道,所述目标渠道对应有预先分配好的加密加签数据, 即预设加密加签数据,通过将所述预设加密加签数据和所述认证数据中的加密加签数据进行校验,看两者是否匹配,进而可以生成校验结果。
相应地,所述预设加密加签数据为通过目标调用接口和目标应用标识加载的预设公钥和预设私钥,所述目标调用接口为通过所述目标渠道确定的待调用接口,所述目标应用标识为通过所述目标渠道确定的应用标识。
可以理解的是,可以通过所述预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关;以使所述目标网关根据所述认证数据确定对应的目标渠道,根据所述目标渠道获得对应的目标应用标识及目标调用接口;根据所述目标应用标识确定需要进行加载的预设公钥和预设私钥,根据所述目标调用接口加载所述预设公钥和预设私钥,判断所述预设公钥与所述认证数据中的公钥是否匹配,判断所述预设私钥与所述认证数据中的私钥是否匹配,判断所述目标调用接口与所述待调用接口是否匹配,并反馈校验结果,所述预设网络映射表反映各网关与各待调用接口的对应关系。
应当理解的是,所述目标网关在接收到认证数据后,所述目标网关将所述认证数据中的公钥和私钥进行校验,具体的,可以根据所述目标渠道获得对应的应用标识及目标调用接口;根据所述应用标识确定需要进行加载的目标公钥和目标私钥,判断所述目标公钥与所述认证数据中的公钥是否匹配,判断所述目标私钥与所述认证数据中的私钥是否匹配,判断所述目标调用接口与所述待调用接口是否匹配,从而生成校验结果。
在具体实现中,所述目标网关根据所述认证数据确定对应的目标渠道,确定所述目标渠道对应的预设加密加签数据与所述认证数据中的加密加签数据是否匹配之前,还需要根据预设配置参数对目标网关进行配置,进而将预设公钥和预设私钥加载至所述目标网关对应的目标渠道下的目标应用计算机可读指令,根据预设加密加签设置参数对所述目标渠道进行相应的加密加签设置。
本实施例中在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关;以使所述目标网关根据所述认证数据确定对应的目标渠道,确定所述目标渠道对应的预设加密加签数据与所述认证数据中的加密加签数据是否匹配,并反馈校验结果,所述预设网络映射表反映各网关与各待调用接口的对应关系,能够快速验证所述网关接口测试请求的真实性和安全性,保证了准确的数据控制,使接口测试更加安全快捷。
此外,本申请实施例还提出一种存储介质,,本申请的存储介质可以为非易失性计算机可读存储介质,所述存储介质上存储有网关接口测试计算机可读指令,所述网关接口测试计算机可读指令被处理器执行时实现如上文所述的网关接口测试方法的步骤。
此外,参照图5,本申请实施例还提出一种网关接口测试装置,所述网关接口测试装置包括:
请求响应模块10,用于在接收到网关接口测试请求时,从所述网关接口测试请求中获取认证数据和待调用接口。
需要说明的是,所述网关接口测试请求为用户或其他终端使用者通过触摸、点击操作界面或按键输入相关信息生成的测试请求,所述网关接口测试请求中会包含需要调用的接口和进行安全认证的认证数据,所述认证数据包括对应的渠道、应用标识和应用终端公钥;通过所述网关接口测试请求可以获得对应的认证数据和待调用接口,所述认证数据为用于对网关接口进行认证的数据,所述待调用接口为需要进行测试的接口。
传输模块20,用于在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关,以使所述目标网关对所述认证数据进行校验,并反馈校验结果,所述预设网络映射表反映各网关与各待调用接口的对应关系。
应当理解的是,所述预设网络映射表中存储着各网关与各接口的映射关系,通过所述预设网络映射表可以查找到与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关,可以使所述目标网关对所述认证数据进行校验,并反馈校验结果,所述预设网络映射表反映各网关与各待调用接口的对应关系,进而可以获得对应的校验结果。
相应地,所述传输模块20,还用于根据预设加密加签策略获取第一映射关系、第二映射关系及第三映射关系;对所述第一映射关系、所述第二映射关系及所述第三映射关系进行集成,获得加密加签数据;根据所述加密加签数据构建各网关、各渠道、各应用及各待调用接口的树状结构图;根据所述树状结构图生成预设网络映射表,所述第一映射关系反映各网关与若干渠道的映射关系,所述第二映射关系反映各渠道与若干应用的映射关系,所述第三映射关系反映各应用与若干待调用接口的映射关系。
所述传输模块20,还用于根据所述第一映射关系获取各网关对应的渠道对接数据,对所述渠道对接数据进行集成,获得渠道数据集;根据所述第二映射关系获取各渠道对应的应用标识,对各应用的应用标识进行集成,获得应用标识集;根据所述第三映射关系和预设调用权限获得各应用对应的待调用接口,对各待调用接口进行集成,获得接口集;根据所述渠道数据集、所述应用标识集和所述接口集生成加密加签数据。
所述传输模块20,还用于在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关;以使所述目标网关根据所述认证数据确定对应的目标渠道,确定所述目标渠道对应的预设加密加签数据与所述认证数据中的加密加签数据是否匹配,并反馈校验结果。
测试模块30,用于在所述目标网关反馈的校验结果为校验通过时,对所述待调用接口进行测试。
可以理解的是,所述校验结果反映所述网关接口测试请求是否合法且所述认证数据是否校验成功在所述校验结果为校验通过时,即表明所述网关接口测试请求为合法安全的请求信息,此时可以开启对所述待调用接口的测试。
所述测试模块30,还用于接收所述目标网关反馈的校验结果,在所述校验结果为校验通过时,根据所述测试请求选择对应的待调用渠道和待调用应用标识;获取所述待调用渠道和所述待调用应用标识对应的配置参数;根据所述配置参数对当前运行环境进行配置,并在配置完成后的当前运行环境中录入所述测试请求对应的请求信息,根据所述请求信息对所述待调用接口进行测试。
本实施例通过获取多个网关的加密加签策略,根据集成后的加密加签策略生成预设网络映射表;在接收到网关接口测试请求时,从所述网关接口测试请求中获取认证数据和待调用接口;在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关,以使所述目标网关对所述认证数据进行校验,并反馈校验结果,所述预设网络映射表反映各网关与各待调用接口的对应关系;在所述目标网关反馈的校验结果为校验通过时,对所述待调用接口进行测试,能够自动配置测试环境,避免了重复设置不同的安全策略,节省了研发时间,提高了网关接口的测试速度和效率,减少了测试开发工作量,优化了测试流程,降低了测试开发成本。
本申请所述网关接口测试装置的其他实施例或具体实现方式可参照上述各方法实施例,此处不再赘述。
需要说明的是,在本文中,术语“包括”、“包含”或者其任何其他变体意在涵盖非排他性的包含,从而使得包括一系列要素的过程、方法、物品或者系统不仅包括那些要素,而且还包括没有明确列出的其他要素,或者是还包括为这种过程、方法、物品或者系统所固有的要素。在没有更多限制的情况下,由语句“包括一个……”限定的要素,并不排除在包括该要素的过程、方法、物品或者系统中还存在另外的相同要素。
通过以上的实施方式的描述,本领域的技术人员可以清楚地了解到上述 实施例方法可借助软件加必需的通用硬件平台的方式来实现,当然也可以通 过硬件,但很多情况下前者是更佳的实施方式。基于这样的理解,本申请的技术方案本质上或者说对现有技术做出贡献的部分可以以软件产品的形式体 现出来,该计算机软件产品存储在一个存储介质(如ROM/RAM、磁碟、光盘)中,包括若干指令用以使得一台终端设备(可以是手机,计算机,服务器,空调器,或者网络设备等)执行本申请各个实施例所述的方法。
以上仅为本申请的优选实施例,并非因此限制本申请的专利范围,凡是利用本申请说明书及附图内容所作的等效结构或等效流程变换,或直接或间接运用在其他相关的技术领域,均同理包括在本申请的专利保护范围内。

Claims (20)

  1. 一种网关接口测试方法,其特征在于,所述网关接口测试方法包括以下步骤:
    根据预设加密加签策略获取第一映射关系、第二映射关系及第三映射关系;
    对所述第一映射关系、所述第二映射关系及所述第三映射关系进行集成,获得加密加签数据;
    根据所述加密加签数据构建各网关、各渠道、各应用及各待调用接口的树状结构图;
    根据所述树状结构图生成预设网络映射表,所述第一映射关系反映各网关与若干渠道的映射关系,所述第二映射关系反映各渠道与若干应用的映射关系,所述第三映射关系反映各应用与若干待调用接口的映射关系;
    在接收到网关接口测试请求时,从所述网关接口测试请求中获取认证数据和待调用接口;
    在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关,以使所述目标网关对所述认证数据进行校验,并反馈校验结果,所述预设网络映射表反映各网关与各待调用接口的对应关系;
    在所述目标网关反馈的校验结果为校验通过时,对所述待调用接口进行测试。
  2. 如权利要求1所述的网关接口测试方法,其特征在于,所述对所述第一映射关系、所述第二映射关系及所述第三映射关系进行集成,获得加密加签数据,包括:
    根据所述第一映射关系获取各网关对应的渠道对接数据,对所述渠道对接数据进行集成,获得渠道数据集;
    根据所述第二映射关系获取各渠道对应的应用标识,对各应用的应用标识进行集成,获得应用标识集;
    根据所述第三映射关系和预设调用权限获得各应用对应的待调用接口,对各待调用接口进行集成,获得接口集;
    根据所述渠道数据集、所述应用标识集和所述接口集生成加密加签数据。
  3. 如权利要求1所述的网关接口测试方法,其特征在于,所述在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关,以使所述目标网关对所述认证数据进行校验,并反馈校验结果,包括:
    在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关;以使所述目标网关根据所述认证数据确定对应的目标渠道,确定所述目标渠道对应的预设加密加签数据与所述认证数据中的加密加签数据是否匹配,并反馈校验结果。
  4. 如权利要求3所述的网关接口测试方法,其特征在于,所述预设加密加签数据为通过目标调用接口和目标应用标识加载的预设公钥和预设私钥,所述目标调用接口为通过所述目标渠道确定的待调用接口,所述目标应用标识为通过所述目标渠道确定的应用标识。
  5. 如权利要求1所述的网关接口测试方法,其特征在于,所述在所述目标网关反馈的校验结果为校验通过时,对所述待调用接口进行测试,包括:
    接收所述目标网关反馈的校验结果,在所述校验结果为校验通过时,根据所述测试请求选择对应的待调用渠道和待调用应用标识;
    获取所述待调用渠道和所述待调用应用标识对应的配置参数;
    根据所述配置参数对当前运行环境进行配置,并在配置完成后的当前运行环境中录入所述测试请求对应的请求信息,根据所述请求信息对所述待调用接口进行测试。
  6. 一种终端设备,其特征在于,所述终端设备包括:存储器、处理器及存储在所述存储器上并可在所述处理器上运行网关接口测试计算机可读指令,所述网关接口测试计算机可读指令被所述处理器执行时实现如下的步骤:
    根据预设加密加签策略获取第一映射关系、第二映射关系及第三映射关系;
    对所述第一映射关系、所述第二映射关系及所述第三映射关系进行集成,获得加密加签数据;
    根据所述加密加签数据构建各网关、各渠道、各应用及各待调用接口的树状结构图;
    根据所述树状结构图生成预设网络映射表,所述第一映射关系反映各网关与若干渠道的映射关系,所述第二映射关系反映各渠道与若干应用的映射关系,所述第三映射关系反映各应用与若干待调用接口的映射关系;
    在接收到网关接口测试请求时,从所述网关接口测试请求中获取认证数据和待调用接口;
    在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关,以使所述目标网关对所述认证数据进行校验,并反馈校验结果,所述预设网络映射表反映各网关与各待调用接口的对应关系;
    在所述目标网关反馈的校验结果为校验通过时,对所述待调用接口进行测试。
  7. 如权利要求6所述的终端设备,其特征在于,所述对所述第一映射关系、所述第二映射关系及所述第三映射关系进行集成,获得加密加签数据的步骤包括:
    根据所述第一映射关系获取各网关对应的渠道对接数据,对所述渠道对接数据进行集成,获得渠道数据集;
    根据所述第二映射关系获取各渠道对应的应用标识,对各应用的应用标识进行集成,获得应用标识集;
    根据所述第三映射关系和预设调用权限获得各应用对应的待调用接口,对各待调用接口进行集成,获得接口集;
    根据所述渠道数据集、所述应用标识集和所述接口集生成加密加签数据。
  8. 如权利要求6所述的终端设备,其特征在于,所述在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关,以使所述目标网关对所述认证数据进行校验,并反馈校验结果的步骤包括:
    在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关;以使所述目标网关根据所述认证数据确定对应的目标渠道,确定所述目标渠道对应的预设加密加签数据与所述认证数据中的加密加签数据是否匹配,并反馈校验结果。
  9. 如权利要求8所述的终端设备,其特征在于,所述预设加密加签数据为通过目标调用接口和目标应用标识加载的预设公钥和预设私钥,所述目标调用接口为通过所述目标渠道确定的待调用接口,所述目标应用标识为通过所述目标渠道确定的应用标识。
  10. 如权利要求6所述的终端设备,其特征在于,所述在所述目标网关反馈的校验结果为校验通过时,对所述待调用接口进行测试的步骤包括:
    接收所述目标网关反馈的校验结果,在所述校验结果为校验通过时,根据所述测试请求选择对应的待调用渠道和待调用应用标识;
    获取所述待调用渠道和所述待调用应用标识对应的配置参数;
    根据所述配置参数对当前运行环境进行配置,并在配置完成后的当前运行环境中录入所述测试请求对应的请求信息,根据所述请求信息对所述待调用接口进行测试。
  11. 一种存储介质,其特征在于,所述存储介质上存储有网关接口测试计算机可读指令,所述网关接口测试计算机可读指令被处理器执行时实现如下的步骤:
    根据预设加密加签策略获取第一映射关系、第二映射关系及第三映射关系;
    对所述第一映射关系、所述第二映射关系及所述第三映射关系进行集成,获得加密加签数据;
    根据所述加密加签数据构建各网关、各渠道、各应用及各待调用接口的树状结构图;
    根据所述树状结构图生成预设网络映射表,所述第一映射关系反映各网关与若干渠道的映射关系,所述第二映射关系反映各渠道与若干应用的映射关系,所述第三映射关系反映各应用与若干待调用接口的映射关系;
    在接收到网关接口测试请求时,从所述网关接口测试请求中获取认证数据和待调用接口;
    在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关,以使所述目标网关对所述认证数据进行校验,并反馈校验结果,所述预设网络映射表反映各网关与各待调用接口的对应关系;
    在所述目标网关反馈的校验结果为校验通过时,对所述待调用接口进行测试。
  12. 如权利要求11所述的存储介质,其特征在于,所述对所述第一映射关系、所述第二映射关系及所述第三映射关系进行集成,获得加密加签数据的步骤包括:
    根据所述第一映射关系获取各网关对应的渠道对接数据,对所述渠道对接数据进行集成,获得渠道数据集;
    根据所述第二映射关系获取各渠道对应的应用标识,对各应用的应用标识进行集成,获得应用标识集;
    根据所述第三映射关系和预设调用权限获得各应用对应的待调用接口,对各待调用接口进行集成,获得接口集;
    根据所述渠道数据集、所述应用标识集和所述接口集生成加密加签数据。
  13. 如权利要求11所述的存储介质,其特征在于,所述在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关,以使所述目标网关对所述认证数据进行校验,并反馈校验结果的步骤包括:
    在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关;以使所述目标网关根据所述认证数据确定对应的目标渠道,确定所述目标渠道对应的预设加密加签数据与所述认证数据中的加密加签数据是否匹配,并反馈校验结果。
  14. 如权利要求13所述的存储介质,其特征在于,所述预设加密加签数据为通过目标调用接口和目标应用标识加载的预设公钥和预设私钥,所述目标调用接口为通过所述目标渠道确定的待调用接口,所述目标应用标识为通过所述目标渠道确定的应用标识。
  15. 如权利要求11所述的存储介质,其特征在于,所述在所述目标网关反馈的校验结果为校验通过时,对所述待调用接口进行测试的步骤包括:
    接收所述目标网关反馈的校验结果,在所述校验结果为校验通过时,根据所述测试请求选择对应的待调用渠道和待调用应用标识;
    获取所述待调用渠道和所述待调用应用标识对应的配置参数;
    根据所述配置参数对当前运行环境进行配置,并在配置完成后的当前运行环境中录入所述测试请求对应的请求信息,根据所述请求信息对所述待调用接口进行测试。
  16. 一种网关接口测试装置,其特征在于,所述网关接口测试装置包括:
    请求响应模块,用于在接收到网关接口测试请求时,从所述网关接口测试请求中获取认证数据和待调用接口;
    传输模块,用于在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关,以使所述目标网关对所述认证数据进行校验,并反馈校验结果,所述预设网络映射表反映各网关与各待调用接口的对应关系;
    测试模块,用于在所述目标网关反馈的校验结果为校验通过时,对所述待调用接口进行测试;
    其中,所述传输模块,还用于根据预设加密加签策略获取第一映射关系、第二映射关系及第三映射关系;对所述第一映射关系、所述第二映射关系及所述第三映射关系进行集成,获得加密加签数据;根据所述加密加签数据构建各网关、各渠道、各应用及各待调用接口的树状结构图;根据所述树状结构图生成预设网络映射表,所述第一映射关系反映各网关与若干渠道的映射关系,所述第二映射关系反映各渠道与若干应用的映射关系,所述第三映射关系反映各应用与若干待调用接口的映射关系。
  17. 如权利要求16所述的网关接口测试装置,其特征在于,所述传输模块,还用于根据所述第一映射关系获取各网关对应的渠道对接数据,对所述渠道对接数据进行集成,获得渠道数据集;根据所述第二映射关系获取各渠道对应的应用标识,对各应用的应用标识进行集成,获得应用标识集;根据所述第三映射关系和预设调用权限获得各应用对应的待调用接口,对各待调用接口进行集成,获得接口集;根据所述渠道数据集、所述应用标识集和所述接口集生成加密加签数据。
  18. 如权利要求16所述的网关接口测试装置,其特征在于,所述传输模块,还用于在预设网络映射表中查找与所述待调用接口对应的目标网关,将所述认证数据传输至所述目标网关;以使所述目标网关根据所述认证数据确定对应的目标渠道,确定所述目标渠道对应的预设加密加签数据与所述认证数据中的加密加签数据是否匹配,并反馈校验结果。
  19. 如权利要求18所述的网关接口测试装置,其特征在于,所述预设加密加签数据为通过目标调用接口和目标应用标识加载的预设公钥和预设私钥,所述目标调用接口为通过所述目标渠道确定的待调用接口,所述目标应用标识为通过所述目标渠道确定的应用标识。
  20. 如权利要求16所述的网关接口测试装置,其特征在于,所述测试模块,还用于接收所述目标网关反馈的校验结果,在所述校验结果为校验通过时,根据所述测试请求选择对应的待调用渠道和待调用应用标识;获取所述待调用渠道和所述待调用应用标识对应的配置参数;根据所述配置参数对当前运行环境进行配置,并在配置完成后的当前运行环境中录入所述测试请求对应的请求信息,根据所述请求信息对所述待调用接口进行测试。
PCT/CN2019/122328 2019-07-11 2019-12-02 网关接口测试方法、终端设备、存储介质及装置 WO2021003975A1 (zh)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201910626959.9A CN110519115B (zh) 2019-07-11 2019-07-11 网关接口测试方法、终端设备、存储介质及装置
CN201910626959.9 2019-07-11

Publications (1)

Publication Number Publication Date
WO2021003975A1 true WO2021003975A1 (zh) 2021-01-14

Family

ID=68622455

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/CN2019/122328 WO2021003975A1 (zh) 2019-07-11 2019-12-02 网关接口测试方法、终端设备、存储介质及装置

Country Status (2)

Country Link
CN (1) CN110519115B (zh)
WO (1) WO2021003975A1 (zh)

Cited By (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112527688A (zh) * 2021-01-18 2021-03-19 杭银消费金融股份有限公司 页面元素的测试用例处理方法及系统
CN113132158A (zh) * 2021-04-07 2021-07-16 珠海格力电器股份有限公司 点表配置方法、装置、控制器和存储介质
CN113438083A (zh) * 2021-06-22 2021-09-24 中国工商银行股份有限公司 基于接口自动化测试的加验签方法及装置
CN113766323A (zh) * 2021-09-28 2021-12-07 深圳小湃科技有限公司 机顶盒网络检测方法、装置、设备及存储介质
CN114650222A (zh) * 2022-03-14 2022-06-21 北京百度网讯科技有限公司 参数配置方法、装置、电子设备和存储介质
CN114826623A (zh) * 2022-06-28 2022-07-29 云账户技术(天津)有限公司 一种mock测试报文的处理方法及装置
CN114915549A (zh) * 2022-05-11 2022-08-16 深圳创维-Rgb电子有限公司 指令查询方法、装置、设备及存储介质
CN115052041A (zh) * 2022-06-16 2022-09-13 平安银行股份有限公司 渠道标识分配方法、装置、设备和存储介质
CN115150293A (zh) * 2021-03-31 2022-10-04 京东科技控股股份有限公司 一种接口数据的监控方法及装置
CN115333987A (zh) * 2022-08-11 2022-11-11 北京广利核系统工程有限公司 一种接口测试系统和方法

Families Citing this family (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110519115B (zh) * 2019-07-11 2022-05-17 深圳壹账通智能科技有限公司 网关接口测试方法、终端设备、存储介质及装置
CN114143251B (zh) * 2021-12-08 2023-10-13 北京天融信网络安全技术有限公司 智能选路方法、装置、电子设备及计算机可读存储介质
CN114465892A (zh) * 2022-03-16 2022-05-10 北京字节跳动网络技术有限公司 接口维护方法、装置、电子设备及存储介质
CN114696894B (zh) * 2022-05-31 2022-11-08 深圳市华迅光通信有限公司 无源光网络设备的测试方法、装置及可读存储介质
CN117421253B (zh) * 2023-12-19 2024-04-02 深圳市智慧城市科技发展集团有限公司 接口安全测试方法、装置、设备及存储介质

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102567198A (zh) * 2010-12-30 2012-07-11 中国移动通信集团公司 对应用程序在物理系统环境中进行测试的系统及其方法
CN103023708A (zh) * 2011-09-20 2013-04-03 腾讯科技(深圳)有限公司 通信协议接口的测试方法及系统
WO2016120194A1 (fr) * 2015-01-27 2016-08-04 Sagemcom Broadband Sas Procédé de test d'un dispositif de radiocommunication à tester d'une passerelle d'un parc de passerelles
CN108718261A (zh) * 2018-06-08 2018-10-30 北京飞音时代技术有限公司 网关自动化测试方法及系统
CN109361562A (zh) * 2018-10-31 2019-02-19 广东电网有限责任公司信息中心 一种基于关联网络设备接入的自动化测试方法
CN110519115A (zh) * 2019-07-11 2019-11-29 深圳壹账通智能科技有限公司 网关接口测试方法、终端设备、存储介质及装置

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2014093620A2 (en) * 2012-12-12 2014-06-19 Turning Technologies, Llc Dynamic data interoperability gateway
CN104254073B (zh) * 2014-09-03 2018-02-06 深信服网络科技(深圳)有限公司 对接入终端进行认证的方法及装置
CN109560986A (zh) * 2018-11-23 2019-04-02 赛尔通信服务技术股份有限公司 物联网网关设备的测试方法、装置和测试系统

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102567198A (zh) * 2010-12-30 2012-07-11 中国移动通信集团公司 对应用程序在物理系统环境中进行测试的系统及其方法
CN103023708A (zh) * 2011-09-20 2013-04-03 腾讯科技(深圳)有限公司 通信协议接口的测试方法及系统
WO2016120194A1 (fr) * 2015-01-27 2016-08-04 Sagemcom Broadband Sas Procédé de test d'un dispositif de radiocommunication à tester d'une passerelle d'un parc de passerelles
CN108718261A (zh) * 2018-06-08 2018-10-30 北京飞音时代技术有限公司 网关自动化测试方法及系统
CN109361562A (zh) * 2018-10-31 2019-02-19 广东电网有限责任公司信息中心 一种基于关联网络设备接入的自动化测试方法
CN110519115A (zh) * 2019-07-11 2019-11-29 深圳壹账通智能科技有限公司 网关接口测试方法、终端设备、存储介质及装置

Cited By (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112527688B (zh) * 2021-01-18 2021-12-17 杭银消费金融股份有限公司 页面元素的测试用例处理方法及系统
CN112527688A (zh) * 2021-01-18 2021-03-19 杭银消费金融股份有限公司 页面元素的测试用例处理方法及系统
CN115150293A (zh) * 2021-03-31 2022-10-04 京东科技控股股份有限公司 一种接口数据的监控方法及装置
CN113132158A (zh) * 2021-04-07 2021-07-16 珠海格力电器股份有限公司 点表配置方法、装置、控制器和存储介质
CN113132158B (zh) * 2021-04-07 2022-05-31 珠海格力电器股份有限公司 点表配置方法、装置、控制器和存储介质
CN113438083A (zh) * 2021-06-22 2021-09-24 中国工商银行股份有限公司 基于接口自动化测试的加验签方法及装置
CN113438083B (zh) * 2021-06-22 2023-04-07 中国工商银行股份有限公司 基于接口自动化测试的加验签方法及装置
CN113766323A (zh) * 2021-09-28 2021-12-07 深圳小湃科技有限公司 机顶盒网络检测方法、装置、设备及存储介质
CN113766323B (zh) * 2021-09-28 2023-11-07 深圳小湃科技有限公司 机顶盒网络检测方法、装置、设备及存储介质
CN114650222A (zh) * 2022-03-14 2022-06-21 北京百度网讯科技有限公司 参数配置方法、装置、电子设备和存储介质
CN114650222B (zh) * 2022-03-14 2024-03-01 北京百度网讯科技有限公司 参数配置方法、装置、电子设备和存储介质
CN114915549A (zh) * 2022-05-11 2022-08-16 深圳创维-Rgb电子有限公司 指令查询方法、装置、设备及存储介质
CN114915549B (zh) * 2022-05-11 2024-03-22 深圳创维-Rgb电子有限公司 指令查询方法、装置、设备及存储介质
CN115052041A (zh) * 2022-06-16 2022-09-13 平安银行股份有限公司 渠道标识分配方法、装置、设备和存储介质
CN115052041B (zh) * 2022-06-16 2024-03-19 平安银行股份有限公司 渠道标识分配方法、装置、设备和存储介质
CN114826623B (zh) * 2022-06-28 2022-09-20 云账户技术(天津)有限公司 一种mock测试报文的处理方法及装置
CN114826623A (zh) * 2022-06-28 2022-07-29 云账户技术(天津)有限公司 一种mock测试报文的处理方法及装置
CN115333987A (zh) * 2022-08-11 2022-11-11 北京广利核系统工程有限公司 一种接口测试系统和方法
CN115333987B (zh) * 2022-08-11 2023-12-29 北京广利核系统工程有限公司 一种接口测试系统和方法

Also Published As

Publication number Publication date
CN110519115A (zh) 2019-11-29
CN110519115B (zh) 2022-05-17

Similar Documents

Publication Publication Date Title
WO2021003975A1 (zh) 网关接口测试方法、终端设备、存储介质及装置
WO2020155360A1 (zh) 家电设备的配网方法、家电设备、移动终端及存储介质
WO2020029585A1 (zh) 基于迁移学习的神经网络联邦建模方法、设备及存储介质
WO2021002692A1 (en) Method for providing virtual asset service based on decentralized identifier and virtual asset service providing server using them
WO2021092973A1 (zh) 敏感信息处理方法、设备及可读存储介质
US8238555B2 (en) Management server, communication apparatus and program implementing key allocation system for encrypted communication
WO2019035700A1 (en) METHOD AND APPARATUS FOR BOARDING IN AN IOT NETWORK
WO2017111383A1 (ko) 생체 정보 기반 인증 장치, 이와 연동하는 제어 서버, 그리고 이들의 생체 정보 기반 로그인 방법
WO2020224246A1 (zh) 基于区块链的数据管理方法、装置、设备和存储介质
WO2016169410A1 (zh) 登录方法、服务器和登录系统
WO2020147383A1 (zh) 基于区块链系统的流程审批方法、装置、系统及非易失性存储介质
WO2019132272A1 (ko) 블록체인 기반의 서비스로서의 아이디
WO2020220413A1 (zh) 个人信息的零知识证明方法、系统及存储介质
WO2012099330A2 (ko) Cpns 환경에서 사용자 인증을 위한 인증키 발급 시스템 및 방법
WO2021006616A1 (en) Method for providing relational decentralized identifier service and blockchain node using the same
WO2014185594A1 (ko) Vdi 환경에서의 싱글 사인온 시스템 및 방법
WO2014058130A1 (ko) 네트워크 드라이브 접근 제어 방법 및 네트워크 드라이브 시스템
WO2020253120A1 (zh) 网页注册方法、系统、设备和计算机存储介质
WO2021072881A1 (zh) 基于对象存储的请求处理方法、装置、设备及存储介质
WO2017054444A1 (zh) 一种登录系统的方法、服务器、系统及网络附属存储设备
WO2020233073A1 (zh) 区块链环境检测方法、设备、装置及存储介质
WO2021145555A1 (ko) 블록 체인을 기반으로 한 다중 노드 인증 방법 및 이를 위한 장치
WO2020062661A1 (zh) 合同数据一致性的核实方法、装置、设备及存储介质
WO2020042464A1 (zh) 数据交互方法、装置、设备及可读存储介质
WO2018000674A1 (zh) 网络连接方法、网络连接装置和终端

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19937077

Country of ref document: EP

Kind code of ref document: A1

32PN Ep: public notification in the ep bulletin as address of the adressee cannot be established

Free format text: NOTING OF LOSS OF RIGHTS PURSUANT TO RULE 112(1) EPC (EPO FORM 1205A DATED 17/05/2022)

122 Ep: pct application non-entry in european phase

Ref document number: 19937077

Country of ref document: EP

Kind code of ref document: A1