CN113362173B - Anti-duplicate mechanism verification method, verification system, electronic device and storage medium - Google Patents
Anti-duplicate mechanism verification method, verification system, electronic device and storage medium Download PDFInfo
- Publication number
- CN113362173B CN113362173B CN202110621633.4A CN202110621633A CN113362173B CN 113362173 B CN113362173 B CN 113362173B CN 202110621633 A CN202110621633 A CN 202110621633A CN 113362173 B CN113362173 B CN 113362173B
- Authority
- CN
- China
- Prior art keywords
- information
- assertion
- verification
- button element
- button
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 238000012795 verification Methods 0.000 title claims abstract description 130
- 238000000034 method Methods 0.000 title claims abstract description 80
- 230000007246 mechanism Effects 0.000 title claims abstract description 57
- 230000004044 response Effects 0.000 claims abstract description 76
- 238000004088 simulation Methods 0.000 claims abstract description 43
- 238000004590 computer program Methods 0.000 claims abstract description 25
- 230000015654 memory Effects 0.000 claims description 11
- 230000001172 regenerating effect Effects 0.000 claims description 4
- 238000010276 construction Methods 0.000 claims description 3
- 230000009194 climbing Effects 0.000 claims 2
- 238000012360 testing method Methods 0.000 description 20
- 238000010586 diagram Methods 0.000 description 10
- 238000004891 communication Methods 0.000 description 8
- 230000006870 function Effects 0.000 description 8
- 238000012545 processing Methods 0.000 description 6
- 238000010200 validation analysis Methods 0.000 description 6
- 230000002265 prevention Effects 0.000 description 5
- 230000009193 crawling Effects 0.000 description 4
- 238000001514 detection method Methods 0.000 description 4
- 230000008569 process Effects 0.000 description 4
- 230000003287 optical effect Effects 0.000 description 3
- 108010001267 Protein Subunits Proteins 0.000 description 2
- 238000007405 data analysis Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000009472 formulation Methods 0.000 description 2
- 238000007689 inspection Methods 0.000 description 2
- 239000000203 mixture Substances 0.000 description 2
- 238000012986 modification Methods 0.000 description 2
- 230000004048 modification Effects 0.000 description 2
- 238000012216 screening Methods 0.000 description 2
- 239000000758 substrate Substances 0.000 description 2
- BUGBHKTXTAQXES-UHFFFAOYSA-N Selenium Chemical compound [Se] BUGBHKTXTAQXES-UHFFFAOYSA-N 0.000 description 1
- 230000005540 biological transmission Effects 0.000 description 1
- 235000014510 cooky Nutrition 0.000 description 1
- 230000000694 effects Effects 0.000 description 1
- 230000006872 improvement Effects 0.000 description 1
- 239000004973 liquid crystal related substance Substances 0.000 description 1
- 238000004806 packaging method and process Methods 0.000 description 1
- 229910052711 selenium Inorganic materials 0.000 description 1
- 239000011669 selenium Substances 0.000 description 1
- 239000004065 semiconductor Substances 0.000 description 1
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q40/00—Finance; Insurance; Tax strategies; Processing of corporate or income taxes
- G06Q40/04—Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/08—Network architectures or network communication protocols for network security for authentication of entities
Landscapes
- Engineering & Computer Science (AREA)
- Business, Economics & Management (AREA)
- Finance (AREA)
- Accounting & Taxation (AREA)
- Development Economics (AREA)
- Economics (AREA)
- Signal Processing (AREA)
- General Engineering & Computer Science (AREA)
- Computing Systems (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computer Networks & Wireless Communication (AREA)
- Marketing (AREA)
- Strategic Management (AREA)
- Technology Law (AREA)
- Physics & Mathematics (AREA)
- General Business, Economics & Management (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Debugging And Monitoring (AREA)
Abstract
The disclosure provides an anti-weight mechanism verification method, which can be used in the financial field. The method comprises the steps of constructing a request message sequence table according to button elements in a target webpage and request messages associated with the button elements; generating first assertion information and second assertion information associated with the button element according to the request message sequence table; generating simulation request information according to the attribute information of the button element and the request message; executing clicking operation aiming at the button element, and acquiring first response information corresponding to the simulation request information; executing clicking operation aiming at the button element again under the condition that the first response information is successfully matched with the first assertion information, and acquiring second response information corresponding to the simulation request information; and generating a server anti-replay check result according to the second response information and the second assertion information. The present disclosure also provides an anti-replay mechanism verification system, an electronic device, a storage medium, and a computer program product.
Description
Technical Field
The present disclosure relates to the field of finance and computer technology, and more particularly, to an anti-replay mechanism verification method, a verification system, an electronic device, a storage medium, and a computer program product.
Background
According to the application safety specifications of institutions such as banks, a double proof check guarantee mechanism of a client and a server is required aiming at a submitting type button. In particular to transaction submission of accounting class, which prevents business risks caused by repeated clicking of submission operation by clients or business personnel.
In the process of implementing the disclosed concept, the inventor finds that at least the following problems exist in the related art: at present, the operation mechanism of the method through manual verification is single, the repeated workload of testers is large, the verification and inspection time is long, and the test efficiency is low.
Disclosure of Invention
In view of this, the present disclosure provides an anti-replay mechanism verification method and verification system.
One aspect of the present disclosure provides a weight-resistant mechanism verification method, comprising:
constructing a request message sequence table according to button elements in a target webpage and request messages associated with the button elements;
Generating first assertion information and second assertion information associated with the button element according to the request message sequence table, wherein the first assertion information is different from the second assertion information;
Under the condition that the client page proof verification is successful, generating simulation request information according to the attribute information of the button element and the request message;
executing clicking operation aiming at the button element, and acquiring first response information corresponding to the simulation request information;
executing clicking operation for the button element again under the condition that the first response information is successfully matched with the first assertion information, and acquiring second response information corresponding to the simulation request information;
And generating a server anti-replay verification result according to the second response information and the second assertion information.
According to an embodiment of the present disclosure, the weight-prevention mechanism verification method further includes:
Acquiring a button element and the attribute information in the target webpage;
And executing clicking operation aiming at each button element in turn, and acquiring the request message associated with the button element.
According to an embodiment of the present disclosure, the acquiring the button element and the attribute information in the target web page includes:
acquiring page data of the target page;
And determining button elements and the attribute information in the target webpage according to the page data.
According to an embodiment of the present disclosure, the method for client page anti-re-verification includes:
executing clicking operation aiming at the button element, and detecting state information of the button element;
Executing clicking operation for the button element again under the condition that the state information characterizes the button element to be effective, and detecting whether to pop up prompt information;
and under the condition that the prompt message is popped up, generating a verification result which indicates that the client anti-replay verification is successful.
According to an embodiment of the present disclosure, the weight-prevention mechanism verification method further includes:
and under the condition that the state information indicates that the button element is invalid, generating a verification result which indicates that the client anti-replay verification is successful.
According to an embodiment of the present disclosure, the weight-prevention mechanism verification method further includes:
And generating a verification result indicating that the client anti-replay verification fails under the condition that the prompt message is not detected to pop up.
According to an embodiment of the present disclosure, the attribute information includes at least one of: uniform resource locator text information and user local terminal data.
According to an embodiment of the present disclosure, the weight-prevention mechanism verification method further includes:
And under the condition that the first response information is not matched with the first assertion information, regenerating the simulation request information until the first response information corresponding to the simulation request information is successfully matched with the first assertion information.
According to an embodiment of the disclosure, generating a server anti-replay check result according to the second response information and the second assertion information includes:
generating a verification result indicating that the server-side anti-replay verification is successful under the condition that the second response information is successfully matched with the second assertion information; or alternatively
And under the condition that the second response information and the second assertion information fail to be matched, generating a verification result which indicates that the server-side anti-replay verification is successful.
Another aspect of the present disclosure provides an anti-weight mechanism verification system, comprising:
The construction module is used for constructing a request message sequence table according to button elements in the target webpage and request messages associated with the button elements;
the first generation module is used for generating first assertion information and second assertion information associated with the button element according to the request message sequence table, wherein the first assertion information is different from the second assertion information;
The second generation module is used for generating simulation request information according to the attribute information of the button element and the request message under the condition that the client page proof verification is successful;
The first acquisition module is used for executing clicking operation aiming at the button element and acquiring first response information corresponding to the simulation request information;
The second obtaining module is used for obtaining second response information corresponding to the simulation request information by executing clicking operation for the button element again under the condition that the first response information is successfully matched with the first assertion information;
and the third generation module is used for generating a server anti-replay check result according to the second response information and the second assertion information.
Another aspect of the present disclosure provides an electronic device, comprising: one or more processors; and a memory for storing one or more instructions that, when executed by the one or more processors, cause the one or more processors to implement the method as described above.
Another aspect of the present disclosure provides a computer-readable storage medium storing computer-executable instructions that, when executed, are configured to implement a method as described above.
Another aspect of the present disclosure provides a computer program product comprising computer executable instructions which, when executed, are for implementing a method as described above.
According to the embodiment of the disclosure, first assertion information and second assertion information are generated according to a message sequence table constructed by a button element and a request message associated with the button element, simulation request information is generated under the condition that the client page proof verification is successful, and a verification result is generated by comparing first response information and second response information corresponding to the simulation request information with the first assertion information and the second assertion information. The test result is obtained by comparing the response information with the assertion information, so that the test cost can be effectively reduced, the test efficiency can be improved, meanwhile, the verification of the button in the aspect of weight prevention can be ensured to be comprehensive in coverage, the omission risk is reduced, and support is provided for product quality guarantee.
Drawings
The above and other objects, features and advantages of the present disclosure will become more apparent from the following description of embodiments thereof with reference to the accompanying drawings in which:
Fig. 1 schematically illustrates an exemplary system architecture to which an anti-replay mechanism validation method may be applied according to an embodiment of the present disclosure.
Fig. 2 schematically illustrates a flow chart of an anti-replay mechanism validation method according to an embodiment of the present disclosure.
Fig. 3 schematically illustrates a button element acquisition method according to an embodiment of the present disclosure.
Fig. 4 schematically illustrates a client page anti-replay method according to an embodiment of the present disclosure.
Fig. 5 schematically illustrates a schematic diagram of an anti-weight mechanism verification method according to another embodiment of the present disclosure.
Fig. 6 schematically illustrates a block diagram of an anti-replay mechanism validation system according to an embodiment of the present disclosure.
Fig. 7 schematically illustrates a block diagram of a computer system suitable for implementing the above-described methods, according to an embodiment of the present disclosure.
Detailed Description
Hereinafter, embodiments of the present disclosure will be described with reference to the accompanying drawings. It should be understood that the description is only exemplary and is not intended to limit the scope of the present disclosure. In the following detailed description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the embodiments of the present disclosure. It may be evident, however, that one or more embodiments may be practiced without these specific details. In addition, in the following description, descriptions of well-known structures and techniques are omitted so as not to unnecessarily obscure the concepts of the present disclosure.
The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. The terms "comprises," "comprising," and/or the like, as used herein, specify the presence of stated features, steps, operations, and/or components, but do not preclude the presence or addition of one or more other features, steps, operations, or components.
All terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in the art unless otherwise defined. It should be noted that the terms used herein should be construed to have meanings consistent with the context of the present specification and should not be construed in an idealized or overly formal manner.
Where a convention analogous to "at least one of A, B and C, etc." is used, in general such a convention should be interpreted in accordance with the meaning of one of skill in the art having generally understood the convention (e.g., "a system having at least one of A, B and C" would include, but not be limited to, systems having a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.). Where a formulation similar to at least one of "A, B or C, etc." is used, in general such a formulation should be interpreted in accordance with the ordinary understanding of one skilled in the art (e.g. "a system with at least one of A, B or C" would include but not be limited to systems with a alone, B alone, C alone, a and B together, a and C together, B and C together, and/or A, B, C together, etc.).
According to the application safety specifications of institutions such as banks, a double proof check guarantee mechanism of a client and a server is required aiming at a submitting type button. In particular to transaction submission of accounting class, which prevents business risks caused by repeated clicking of submission operation by clients or business personnel.
At present, the button duplicate prevention method at the client is mainly realized by putting ash on a button, popping up a prompt box and the like. And the button weight prevention at the server performs unique constraint and verification on fields such as application form numbers, serial numbers and the like. Most verification modes for button anti-duplication at present are a button anti-duplication mechanism for logging in a client page by a tester, selecting a request button to be verified on the page, submitting request data by continuously clicking the button manually, checking a return result, and observing whether page control or page prompt verification realizes the client and server. However, when the application involves more submitting or approving related functions, the number of buttons is more, or special treatment is performed on the buttons in the technical improvement project, the manual verification workload is very large, the test verification points are easy to miss, and the risk is high.
At present, part of scanning tools support crawling all requests of pages, record all request messages and corresponding messages, find the corresponding request for playback through the corresponding request path and method name, and then compare and check corresponding results by testers to judge whether to realize anti-duplication and have large manual verification workload.
In the process of implementing the disclosed concept, the inventor finds that at least the following problems exist in the related art: at present, the operation mechanism of the method through manual verification is single, the repeated workload of testers is large, the verification and inspection time is long, and the test efficiency is low. Meanwhile, if transaction replay is intercepted by a tool, screening of test button objects is required to be carried out in a request of page crawling, screening difficulty is high when the number of page buttons or the number of requests is high, omission is easy, meanwhile, the request time of repeated transaction sending is required to be controlled manually, and testing accuracy is difficult to ensure.
Embodiments of the present disclosure provide an anti-replay mechanism verification method, verification system, electronic device, storage medium, and computer program product. The weight-proof mechanism verification method comprises the following steps: constructing a request message sequence table according to button elements in the target webpage and request messages associated with the button elements; generating first assertion information and second assertion information associated with the button element according to the request message sequence table, wherein the first assertion information is different from the second assertion information; under the condition that the client page proof verification is successful, generating simulation request information according to attribute information of the button element and the request message; executing clicking operation aiming at the button element, and acquiring first response information corresponding to the simulation request information; executing clicking operation aiming at the button element again under the condition that the first response information is successfully matched with the first assertion information, and acquiring second response information corresponding to the simulation request information; and generating a server anti-replay check result according to the second response information and the second assertion information.
It should be noted that, the method and system for verifying anti-replay mechanism of the present disclosure may be used in the financial field and the computer technical field, and may also be used in any field other than the financial field and the computer technical field, and the application field of the method and system for verifying anti-replay mechanism of the present disclosure is not limited.
Fig. 1 schematically illustrates an exemplary system architecture 100 in which an anti-replay mechanism validation method may be applied in accordance with an embodiment of the present disclosure. It should be noted that fig. 1 is only an example of a system architecture to which embodiments of the present disclosure may be applied to assist those skilled in the art in understanding the technical content of the present disclosure, but does not mean that embodiments of the present disclosure may not be used in other devices, systems, environments, or scenarios.
As shown in fig. 1, a system architecture 100 according to this embodiment may include terminal devices 101, 102, 103, a network 104, and a server 105. The network 104 is used as a medium to provide communication links between the terminal devices 101, 102, 103 and the server 105. The network 104 may include various connection types, such as wired and/or wireless communication links, and the like.
The user may interact with the server 105 via the network 104 using the terminal devices 101, 102, 103 to receive or send messages or the like. Various communication client applications may be installed on the terminal devices 101, 102, 103, such as shopping class applications, web browser applications, search class applications, instant messaging tools, mailbox clients and/or social platform software, to name a few.
The terminal devices 101, 102, 103 may be a variety of electronic devices having a display screen and supporting web browsing, including but not limited to smartphones, tablets, laptop and desktop computers, and the like.
The server 105 may be a server providing various services, such as a background management server (by way of example only) providing support for websites browsed by users using the terminal devices 101, 102, 103. The background management server may analyze and process the received data such as the user request, and feed back the processing result (e.g., the web page, information, or data obtained or generated according to the user request) to the terminal device.
It should be noted that the anti-replay mechanism verification method provided in the embodiments of the present disclosure may be generally performed by the server 105. Accordingly, the weight-resistant mechanism verification system provided by embodiments of the present disclosure may be generally disposed in the server 105. The anti-replay mechanism verification method provided by the embodiments of the present disclosure may also be performed by a server or a server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Accordingly, the anti-replay mechanism verification system provided by the embodiments of the present disclosure may also be provided in a server or server cluster that is different from the server 105 and is capable of communicating with the terminal devices 101, 102, 103 and/or the server 105. Or the anti-replay mechanism verification method provided by the embodiment of the present disclosure may be performed by the terminal device 101, 102, or 103, or may be performed by another terminal device different from the terminal device 101, 102, or 103. Accordingly, the anti-weight mechanism verification system provided by the embodiments of the present disclosure may also be provided in the terminal device 101, 102, or 103, or in other terminal devices different from the terminal device 101, 102, or 103.
For example, the anti-replay mechanism to be verified may be originally installed in any one of the terminal devices 101, 102, or 103 (for example, but not limited to, the terminal device 101). Then, the terminal device 101 may locally perform the anti-replay mechanism authentication method provided by the embodiments of the present disclosure. The terminal device 101 may be connected to other terminal devices, servers, or server clusters, and the anti-replay mechanism verification method provided by the embodiments of the present disclosure may be performed by the other terminal devices, servers, or server clusters connected to the terminal device 101. Or the anti-replay mechanism to be verified can be installed in a server or a server cluster, and the server or the server cluster provided with the anti-replay mechanism to be verified locally executes the anti-replay mechanism verification method provided by the embodiment of the disclosure.
It should be understood that the number of terminal devices, networks and servers in fig. 1 is merely illustrative. There may be any number of terminal devices, networks, and servers, as desired for implementation.
Fig. 2 schematically illustrates a flow chart of an anti-replay mechanism validation method according to an embodiment of the present disclosure.
As shown in fig. 2, the method includes operations S201 to S206.
In operation S201, a request message sequence table is constructed according to button elements in the target web page and request messages associated with the button elements.
According to embodiments of the present disclosure, the target web page may refer to, for example, a web page that needs to be displayed on a carrier. The type of the target interface may include a PC (personal computer) side web page, a counter side web page, or a mobile side web page. The carrier may comprise an electronic device, which may comprise a terminal device, which may comprise a smart phone, a tablet computer, a portable computer, a desktop computer or the like.
According to an embodiment of the present disclosure, the target web page may include at least one button element, name all the button elements, and display the button elements and the request message associated therewith in a list form.
In operation S202, first assertion information and second assertion information associated with the button element are generated according to the request message sequence table, wherein the first assertion information is different from the second assertion information.
According to an embodiment of the present disclosure, the first assertion information may include, for example, a first assertion condition, and the second assertion information may include, for example, a second assertion condition. The first assertion condition may be used, for example, to determine whether the request sent by pressing the button matches successfully. The second assertion condition may be used, for example, to determine whether the duplicate transmission of the request was prevented from being repeated.
According to an embodiment of the present disclosure, a button element in a request message sequence table is selected to present a request message associated with the button element. And generating a first assertion condition and a second assertion condition according to the request message. Further, the method for displaying the request message may be displayed in a text form of a Json (JavaScript Object Notation, json object numbered musical notation) message, for example. The first assertion condition and the second assertion condition can be generated automatically by a system, or can be manually input by a tester.
According to the embodiment of the disclosure, before the first assertion condition and the second assertion condition are generated, for example, the request message may be adaptively modified according to specific implementation needs, and then the first assertion condition and the second assertion condition are generated according to the modified request message.
In operation S203, in case that the client page proof check is successful, simulation request information is generated according to the attribute information of the button element and the request message.
According to an embodiment of the present disclosure, the attribute information may include, for example, URL (uniform resource locator) text information, cookies (data stored on the user's local terminal), and the like. The request message may include, for example, request data, a request header, and the like.
In operation S204, a click operation with respect to the button element is performed, and first response information corresponding to the simulation request information is acquired.
According to embodiments of the present disclosure, clicking on a button element, for example, may send the simulation request information through a Requests library, obtain first response information, match a first assertion condition, and verify whether the simulation request information was sent successfully and return an expected result.
In operation S205, in the case where the first response information is successfully matched with the first assertion information, the click operation with respect to the button element is performed again, and the second response information corresponding to the simulation request information is acquired.
In operation S206, a server anti-replay verification result is generated according to the second response information and the second assertion information.
According to the embodiment of the disclosure, first assertion information and second assertion information are generated according to a message sequence table constructed by a button element and a request message associated with the button element, simulation request information is generated under the condition that the client page proof verification is successful, and a verification result is generated by comparing first response information and second response information corresponding to the simulation request information with the first assertion information and the second assertion information. The test result is obtained by comparing the response information with the assertion information, so that the test cost can be effectively reduced, the test efficiency can be improved, meanwhile, the verification of the button in the aspect of weight prevention can be ensured to be comprehensive in coverage, the omission risk is reduced, and support is provided for product quality guarantee.
According to an embodiment of the present disclosure, the weight-prevention mechanism verification method further includes:
acquiring button elements and attribute information in a target webpage; and executing clicking operation aiming at each button element in turn, and acquiring a request message associated with the button element.
According to an embodiment of the present disclosure, the acquisition method of the button element can be determined by, for example, selenium (automated test tool) locating elements with "button" in all tags in the target web page. Each time a button element is found, attribute information corresponding to the button element is recorded.
According to an embodiment of the present disclosure, after determining a button element, it may be named, for example, and the naming format may include, for example: button + determine sequence (e.g. button 1).
According to the embodiment of the disclosure, after all button elements are recorded, the recorded attribute information is matched through a find_element. Click method, automatic clicking operation of each button is implemented, a request message is recorded immediately after clicking and is associated with a button name, and all recorded buttons and corresponding request messages are traversed circularly.
According to the embodiment of the present disclosure, if any button element is not crawled in the target web page during the processing, the "page has no button that can be verified" is prompted to end.
According to an embodiment of the present disclosure, acquiring button elements and attribute information in a target web page includes:
Acquiring page data of a target page; and determining button elements and attribute information in the target webpage according to the page data.
According to the embodiment of the disclosure, firstly, data analysis is performed on a target page, after url of the target page is input, a corresponding webpage is opened, and front-end page data is output. Data analysis is performed on the page data.
Fig. 3 schematically illustrates a button element acquisition method according to an embodiment of the present disclosure.
As shown in fig. 3, the method includes operations S310 to S370.
First, operation S310 is performed, where the page elements are crawled after the data processing is performed on the target page. In operation S320, it is detected whether a button element exists in the target page.
In the case where the button element does not exist, operation S370 is performed, prompting that the target page does not have the button element.
In case that the button element exists, operation S330 is performed, and each time one button element is crawled, it is named according to a preset naming rule. In operation S340, the button is automatically clicked, the attribute name of the button and the request message are recorded, and the recorded information is matched with the name of the button. In operation S350, it is detected whether there are button elements in the target page downward. In the case where the button element still exists, operation S330 is performed. In the case where there is no button element, operation S360 is performed, and the crawling result is displayed.
According to an embodiment of the present disclosure, a method for client page anti-replay includes:
Executing clicking operation aiming at the button element, and detecting state information of the button element; executing clicking operation for the button element again under the condition that the state information characterizes the button element to be effective, and detecting whether to pop up prompt information; and under the condition that the popup prompt information is detected, generating a verification result which indicates that the client anti-replay verification is successful.
According to embodiments of the present disclosure, the execution method of the click operation may include, for example, a find_element. The state information of the button element may include, for example, a valid state and an invalid state. The active state may include, for example, an available state. The invalid state may include, for example, a disabled state. The prompt information may include, for example, a prompt box, a prompt tone, and the like.
According to an embodiment of the present disclosure, the method for proof verification of a client page further includes:
and generating a verification result indicating that the client anti-replay verification is successful under the condition that the state information indicates that the button element is invalid.
According to an embodiment of the present disclosure, the method for proof verification of a client page further includes:
And generating a verification result indicating that the client-side anti-replay verification fails under the condition that the popup prompt information is not detected.
Fig. 4 schematically illustrates a client page anti-replay method according to an embodiment of the present disclosure.
As shown in fig. 4, the method includes operations S410 to S460.
First, operation S410 is performed to locate a button in a target page and automatically click. In operation S420, a state of the button element is detected.
And in the state that the button element is in the disabled state, the client-side page proof verification is successfully verified, operation S450 is executed, and a verification result is output.
In a state where the state of the button element is available, operation S430 is performed to locate the button again and click. In operation S440, it is detected whether the hint information is popped up in the target page.
If the presence of the prompt message is detected, indicating that the client page proof verification is successful, executing operation S450, and outputting a verification result.
If no prompt message is detected, indicating that the client page proof verification fails, executing operation S460, and outputting a verification result.
And repeatedly executing the steps until all button elements in the target page are verified.
According to an embodiment of the present disclosure, the attribute information includes at least one of: uniform resource locator text information and user local terminal data.
According to an embodiment of the present disclosure, the weight-prevention mechanism verification method further includes:
and under the condition that the matching of the first response information and the first assertion information fails, regenerating the simulation request information until the matching of the first response information corresponding to the simulation request information and the first assertion information is successful.
According to an embodiment of the present disclosure, if the first response information fails to match the first assertion information, it is indicated that the simulation request is not expected to correspond. The verification may be ended when the first response information fails to match with the first assertion information.
According to an embodiment of the present disclosure, generating a server anti-replay check result according to the second response information and the second assertion information includes:
Under the condition that the second response information is successfully matched with the second assertion information, generating a verification result which indicates that the server-side anti-replay verification is successful; or under the condition that the second response information and the second assertion information fail to be matched, generating a verification result which indicates that the server-side anti-replay verification is successful.
Fig. 5 schematically illustrates a schematic diagram of an anti-weight mechanism verification method according to another embodiment of the present disclosure.
As shown in fig. 5, the method includes operations S510 to S580.
First, operation S510 is performed to send a virtual request through the Requests library. Operation S520 is performed to record first response information for the virtual request. In operation S530, it is determined whether the first response information matches the first assertion condition.
In case the first response information does not match the first assertion condition, for example, operation S510 may be re-performed. Further, before re-executing operation S510, for example, the virtual request may be re-generated, and operation S510 may be executed using the re-generated virtual request. Or ending the verification operation in the case that the first response information does not match the first assertion condition.
In case that the first response information matches the first assertion condition, operation S540 is performed, where the virtual request is sent again through the Requests library, further, for example, an interval time may be preset, so that a time for sending the virtual request for the second time and a time for sending the virtual request for the first time have a certain time interval. Operation S550 is performed to record second response information for the virtual request. In operation S560, it is determined whether the second response information matches the second assertion condition.
And if the second response information does not match the second assertion condition, indicating that the server-side proof verification fails, executing operation S580, and outputting a verification result. And under the condition that the second response information is matched with the second assertion condition, the server side proof verification is successfully verified, operation S560 is executed, and a verification result is output.
It should be noted that, unless there is an execution sequence between different operations or an execution sequence between different operations in technical implementation, the execution sequence between multiple operations may be different, and multiple operations may also be executed simultaneously in the embodiment of the disclosure.
According to the embodiment of the disclosure, the anti-replay mechanism verification method can display the anti-replay mechanism display result after repeated clicking on the client target page, and simultaneously automatically execute request replay and result assertion comparison according to the selection of testers, so that the testers only need to pay attention to whether the returned result of the tool is anti-replay or not, and do not need to perform request replay and corresponding result comparison by themselves, thereby reducing the test threshold, improving the test efficiency and effectively reducing the test workload of the current anti-replay technology.
Furthermore, according to the embodiment of the disclosure, the front end and the rear end verification effect is effectively ensured, the controllability of the test is increased, the button request requiring repeated clicking verification is selected by the tester by crawling the page content to match the listed button elements, and the tester can perform more targeted test.
Fig. 6 schematically illustrates a block diagram of an anti-replay mechanism validation system according to an embodiment of the present disclosure.
As shown in fig. 6, the weight-prevention mechanism verification system 600 includes a build module 601, a first generation module 602, a second generation module 603, a first acquisition module 604, a second acquisition module 605, and a third generation module 606.
The construction module 601 is configured to construct a request message sequence table according to a button element in the target webpage and a request message associated with the button element;
A first generating module 602, configured to generate, according to the request message sequence table, first assertion information and second assertion information associated with the button element, where the first assertion information is different from the second assertion information;
the second generating module 603 is configured to generate simulation request information according to attribute information of the button element and the request message when the client page proof check is successful;
a first obtaining module 604, configured to perform a clicking operation for the button element, and obtain first response information corresponding to the simulation request information;
a second obtaining module 605, configured to, if the first response information matches the first assertion information successfully, perform a clicking operation for the button element again, and obtain second response information corresponding to the simulation request information;
the third generating module 606 is configured to generate a server anti-duplicate verification result according to the second response information and the second assertion information.
According to the embodiment of the disclosure, first assertion information and second assertion information are generated according to a message sequence table constructed by a button element and a request message associated with the button element, simulation request information is generated under the condition that the client page proof verification is successful, and a verification result is generated by comparing first response information and second response information corresponding to the simulation request information with the first assertion information and the second assertion information. The test result is obtained by comparing the response information with the assertion information, so that the test cost can be effectively reduced, the test efficiency can be improved, meanwhile, the verification of the button in the aspect of weight prevention can be ensured to be comprehensive in coverage, the omission risk is reduced, and support is provided for product quality guarantee.
According to an embodiment of the present disclosure, the weight-prevention mechanism verification system 600 further includes a third acquisition module and a fourth acquisition module.
And the third acquisition module is used for acquiring the button elements and the attribute information in the target webpage.
And the fourth acquisition module is used for sequentially executing clicking operation aiming at each button element and acquiring the request message associated with the button element.
According to an embodiment of the present disclosure, the third acquisition module includes a first acquisition unit and a determination unit.
And the first acquisition unit is used for acquiring the page data of the target page.
And the determining unit is used for determining the button elements and the attribute information in the target webpage according to the page data.
According to an embodiment of the present disclosure, the second generating module 603 includes: the device comprises a first detection unit, a second detection unit and a first generation unit.
And a first detection unit for performing a click operation with respect to the button element, and detecting state information of the button element.
And the second detection unit is used for executing clicking operation aiming at the button element again under the condition that the state information characterizes the button element to be effective, and detecting whether the prompt information is popped up.
The first generation unit is used for generating a verification result indicating that the client anti-replay verification is successful under the condition that the pop-up prompt message is detected.
According to an embodiment of the present disclosure, the anti-weight mechanism verification system 600 further includes a fourth generation module.
And the fourth generation module is used for generating a verification result indicating that the client anti-replay verification is successful under the condition that the state information representation button element is invalid.
According to an embodiment of the present disclosure, the weight-prevention mechanism verification system 600 further includes a fifth generation module.
And the fifth generation module is used for generating a verification result indicating that the client-side anti-replay verification fails under the condition that the popup prompt information is not detected.
According to an embodiment of the present disclosure, the attribute information includes at least one of: uniform resource locator text information and user local terminal data.
According to an embodiment of the present disclosure, the anti-weight mechanism verification system 600 further includes a sixth generation module.
And the sixth generation module is used for regenerating the simulation request information under the condition that the first response information is failed to be matched with the first assertion information until the first response information corresponding to the simulation request information is successfully matched with the first assertion information.
According to an embodiment of the present disclosure, the third generation module 606 includes a second generation unit and a third generation unit.
And the second generating unit is used for generating a verification result indicating that the server-side anti-replay verification is successful under the condition that the second response information is successfully matched with the second assertion information.
And the third generating unit is used for generating a verification result indicating that the server-side anti-replay verification is successful under the condition that the second response information and the second assertion information are failed to be matched.
Any number of modules, sub-modules, units, sub-units, or at least some of the functionality of any number of the sub-units according to embodiments of the present disclosure may be implemented in one module. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented as split into multiple modules. Any one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system-on-chip, a system-on-substrate, a system-on-package, an Application Specific Integrated Circuit (ASIC), or in any other reasonable manner of hardware or firmware that integrates or encapsulates the circuit, or in any one of or a suitable combination of three of software, hardware, and firmware. Or one or more of the modules, sub-modules, units, sub-units according to embodiments of the present disclosure may be at least partially implemented as computer program modules, which, when executed, may perform the corresponding functions.
For example, any of the building module 601, the first generating module 602, the second generating module 603, the first acquiring module 604, the second acquiring module 605, and the third generating module 606 may be combined in one module/unit/sub-unit, or any of the modules/units/sub-units may be split into a plurality of modules/units/sub-units. Or at least some of the functionality of one or more of these modules/units/sub-units may be combined with at least some of the functionality of other modules/units/sub-units and implemented in one module/unit/sub-unit. According to embodiments of the present disclosure, at least one of the building module 601, the first generating module 602, the second generating module 603, the first obtaining module 604, the second obtaining module 605, and the third generating module 606 may be implemented at least in part as a hardware circuit, such as a Field Programmable Gate Array (FPGA), a Programmable Logic Array (PLA), a system-on-chip, a system-on-substrate, a system-on-package, an Application Specific Integrated Circuit (ASIC), or in hardware or firmware in any other reasonable manner of integrating or packaging the circuits, or in any one of or a suitable combination of three of software, hardware, and firmware. Or at least one of the building block 601, the first generating block 602, the second generating block 603, the first obtaining block 604, the second obtaining block 605 and the third generating block 606 may be at least partly implemented as a computer program module which, when executed, may perform the respective functions.
It should be noted that, in the embodiment of the present disclosure, the anti-duplication mechanism verification system portion corresponds to the anti-duplication mechanism verification method portion in the embodiment of the present disclosure, and the description of the anti-duplication mechanism verification system portion specifically refers to the anti-duplication mechanism verification method portion and is not described herein again.
Fig. 7 schematically illustrates a block diagram of a computer system suitable for implementing the above-described methods, according to an embodiment of the present disclosure. The computer system illustrated in fig. 7 is merely an example, and should not be construed as limiting the functionality and scope of use of the embodiments of the present disclosure.
As shown in fig. 7, a computer system 700 according to an embodiment of the present disclosure includes a processor 701 that can perform various appropriate actions and processes according to a program stored in a Read Only Memory (ROM) 702 or a program loaded from a storage section 708 into a Random Access Memory (RAM) 703. The processor 701 may include, for example, a general purpose microprocessor (e.g., a CPU), an instruction set processor and/or an associated chipset and/or a special purpose microprocessor (e.g., an Application Specific Integrated Circuit (ASIC)), or the like. The processor 701 may also include on-board memory for caching purposes. The processor 701 may comprise a single processing unit or a plurality of processing units for performing different actions of the method flows according to embodiments of the disclosure.
In the RAM 703, various programs and data required for the operation of the system 700 are stored. The processor 701, the ROM 702, and the RAM 703 are connected to each other through a bus 704. The processor 701 performs various operations of the method flow according to the embodiments of the present disclosure by executing programs in the ROM 702 and/or the RAM 703. Note that the program may be stored in one or more memories other than the ROM 702 and the RAM 703. The processor 701 may also perform various operations of the method flow according to embodiments of the present disclosure by executing programs stored in the one or more memories.
According to an embodiment of the present disclosure, the system 700 may further include an input/output (I/O) interface 705, the input/output (I/O) interface 705 also being connected to the bus 704. The system 700 may also include one or more of the following components connected to the I/O interface 705: an input section 706 including a keyboard, a mouse, and the like; an output portion 707 including a Cathode Ray Tube (CRT), a Liquid Crystal Display (LCD), and the like, a speaker, and the like; a storage section 708 including a hard disk or the like; and a communication section 709 including a network interface card such as a LAN card, a modem, or the like. The communication section 709 performs communication processing via a network such as the internet. The drive 710 is also connected to the I/O interface 705 as needed. A removable medium 711 such as a magnetic disk, an optical disk, a magneto-optical disk, a semiconductor memory, or the like is mounted on the drive 710 as necessary, so that a computer program read therefrom is mounted into the storage section 708 as necessary.
According to embodiments of the present disclosure, the method flow according to embodiments of the present disclosure may be implemented as a computer software program. For example, embodiments of the present disclosure include a computer program product comprising a computer program embodied on a computer readable storage medium, the computer program comprising program code for performing the method shown in the flowcharts. In such an embodiment, the computer program may be downloaded and installed from a network via the communication portion 709, and/or installed from the removable medium 711. The above-described functions defined in the system of the embodiments of the present disclosure are performed when the computer program is executed by the processor 701. The systems, devices, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
The present disclosure also provides a computer-readable storage medium that may be embodied in the apparatus/device/system described in the above embodiments; or may exist alone without being assembled into the apparatus/device/system. The computer-readable storage medium carries one or more programs which, when executed, implement methods in accordance with embodiments of the present disclosure.
According to embodiments of the present disclosure, the computer-readable storage medium may be a non-volatile computer-readable storage medium. Examples may include, but are not limited to: a portable computer diskette, a hard disk, a Random Access Memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or flash memory), a portable compact disc read-only memory (CD-ROM), an optical storage device, a magnetic storage device, or any suitable combination of the foregoing. In the context of this disclosure, a computer-readable storage medium may be any tangible medium that can contain, or store a program for use by or in connection with an instruction execution system, apparatus, or device.
For example, according to embodiments of the present disclosure, the computer-readable storage medium may include ROM 702 and/or RAM 703 and/or one or more memories other than ROM 702 and RAM 703 described above.
Embodiments of the present disclosure also include a computer program product comprising a computer program comprising program code for performing the methods provided by the embodiments of the present disclosure, the program code for causing an electronic device to implement the anti-replay mechanism verification methods provided by the embodiments of the present disclosure when the computer program product is run on the electronic device.
The above-described functions defined in the system/apparatus of the embodiments of the present disclosure are performed when the computer program is executed by the processor 701. The systems, apparatus, modules, units, etc. described above may be implemented by computer program modules according to embodiments of the disclosure.
In one embodiment, the computer program may be based on a tangible storage medium such as an optical storage device, a magnetic storage device, or the like. In another embodiment, the computer program may also be transmitted, distributed over a network medium in the form of signals, downloaded and installed via the communication section 709, and/or installed from the removable medium 711. The computer program may include program code that may be transmitted using any appropriate network medium, including but not limited to: wireless, wired, etc., or any suitable combination of the foregoing.
According to embodiments of the present disclosure, program code for performing computer programs provided by embodiments of the present disclosure may be written in any combination of one or more programming languages, and in particular, such computer programs may be implemented in high-level procedural and/or object-oriented programming languages, and/or assembly/machine languages. Programming languages include, but are not limited to, such as Java, c++, python, "C" or similar programming languages. The program code may execute entirely on the user's computing device, partly on the user's device, partly on a remote computing device, or entirely on the remote computing device or server. In the case of remote computing devices, the remote computing device may be connected to the user computing device through any kind of network, including a Local Area Network (LAN) or a Wide Area Network (WAN), or may be connected to an external computing device (e.g., connected via the Internet using an Internet service provider).
The flowcharts and block diagrams in the figures illustrate the architecture, functionality, and operation of possible implementations of systems, methods and computer program products according to various embodiments of the present disclosure. In this regard, each block in the flowchart or block diagrams may represent a module, segment, or portion of code, which comprises one or more executable instructions for implementing the specified logical function(s). It should also be noted that, in some alternative implementations, the functions noted in the block may occur out of the order noted in the figures. For example, two blocks shown in succession may, in fact, be executed substantially concurrently, or the blocks may sometimes be executed in the reverse order, depending upon the functionality involved. It will also be noted that each block of the block diagrams or flowchart illustration, and combinations of blocks in the block diagrams or flowchart illustration, can be implemented by special purpose hardware-based systems which perform the specified functions or acts, or combinations of special purpose hardware and computer instructions. Those skilled in the art will appreciate that the features recited in the various embodiments of the disclosure and/or in the claims may be combined in various combinations and/or combinations, even if such combinations or combinations are not explicitly recited in the disclosure. In particular, the features recited in the various embodiments of the present disclosure and/or the claims may be variously combined and/or combined without departing from the spirit and teachings of the present disclosure. All such combinations and/or combinations fall within the scope of the present disclosure.
The embodiments of the present disclosure are described above. These examples are for illustrative purposes only and are not intended to limit the scope of the present disclosure. Although the embodiments are described above separately, this does not mean that the measures in the embodiments cannot be used advantageously in combination. The scope of the disclosure is defined by the appended claims and equivalents thereof. Various alternatives and modifications can be made by those skilled in the art without departing from the scope of the disclosure, and such alternatives and modifications are intended to fall within the scope of the disclosure.
Claims (13)
1. A weight-resistant mechanism verification method, comprising:
constructing a request message sequence table according to button elements in a target webpage and request messages associated with the button elements;
Generating first assertion information and second assertion information associated with the button element according to the request message sequence table, wherein the first assertion information is different from the second assertion information;
under the condition that the client page proof verification is successful, generating simulation request information according to the attribute information of the button element and the request message, wherein the attribute information and the request message are obtained by climbing the client page;
executing clicking operation aiming at the button element, and acquiring first response information corresponding to the simulation request information;
Executing clicking operation for the button element again under the condition that the first response information is successfully matched with the first assertion information, and acquiring second response information corresponding to the simulation request information, wherein the successful matching of the first response information and the first assertion information is used for representing that the simulation request information is successfully transmitted and meets a preset condition;
and generating a server anti-replay verification result according to the second response information and the second assertion information, wherein the successful matching of the second response information and the second assertion information is used for representing the successful anti-replay verification of the server.
2. The method of claim 1, further comprising:
Acquiring a button element and the attribute information in the target webpage;
And executing clicking operation aiming at each button element in turn, and acquiring the request message associated with the button element.
3. The method of claim 2, wherein the obtaining the button element and the attribute information in the target web page comprises:
acquiring page data of the target webpage;
And determining button elements and the attribute information in the target webpage according to the page data.
4. The method of claim 1, wherein the client page anti-replay method comprises:
executing clicking operation aiming at the button element, and detecting state information of the button element;
Executing clicking operation for the button element again under the condition that the state information characterizes the button element to be effective, and detecting whether to pop up prompt information;
and under the condition that the prompt message is popped up, generating a verification result which indicates that the client anti-replay verification is successful.
5. The method of claim 4, further comprising:
and under the condition that the state information indicates that the button element is invalid, generating a verification result which indicates that the client anti-replay verification is successful.
6. The method of claim 4, further comprising:
And generating a verification result indicating that the client anti-replay verification fails under the condition that the prompt message is not detected to pop up.
7. The method of claim 1, wherein the attribute information includes at least one of: uniform resource locator text information and user local terminal data.
8. The method of claim 1, further comprising:
And under the condition that the first response information is not matched with the first assertion information, regenerating the simulation request information until the first response information corresponding to the simulation request information is successfully matched with the first assertion information.
9. The method of claim 1, wherein the generating a server-side anti-replay check result according to the second response information and the second assertion information comprises:
generating a verification result indicating that the server-side anti-replay verification is successful under the condition that the second response information is successfully matched with the second assertion information; or alternatively
And under the condition that the second response information and the second assertion information fail to be matched, generating a verification result indicating that the server-side anti-replay verification fails.
10. An anti-weight mechanism verification system, comprising:
The construction module is used for constructing a request message sequence table according to button elements in the target webpage and request messages associated with the button elements;
the first generation module is used for generating first assertion information and second assertion information associated with the button element according to the request message sequence table, wherein the first assertion information is different from the second assertion information;
The second generation module is used for generating simulation request information according to the attribute information of the button element and the request message under the condition that the client page proof verification is successful, wherein the attribute information and the request message are obtained by climbing the client page;
The first acquisition module is used for executing clicking operation aiming at the button element and acquiring first response information corresponding to the simulation request information;
the second obtaining module is used for performing clicking operation on the button element again under the condition that the first response information is successfully matched with the first assertion information, and obtaining second response information corresponding to the simulation request information, wherein the first response information is successfully matched with the first assertion information and is used for representing that the simulation request information is successfully transmitted and meets a preset condition;
And the third generation module is used for generating a server anti-replay check result according to the second response information and the second assertion information, wherein the successful matching of the second response information and the second assertion information is used for representing the successful anti-replay check of the server.
11. An electronic device, comprising:
One or more processors;
A memory for storing one or more instructions,
Wherein the one or more instructions, when executed by the one or more processors, cause the one or more processors to implement the method of any of claims 1 to 9.
12. A computer readable storage medium having stored thereon executable instructions which, when executed by a processor, cause the processor to implement the method of any of claims 1 to 9.
13. A computer program product comprising computer executable instructions for implementing the method of any one of claims 1 to 9 when executed.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110621633.4A CN113362173B (en) | 2021-06-03 | 2021-06-03 | Anti-duplicate mechanism verification method, verification system, electronic device and storage medium |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110621633.4A CN113362173B (en) | 2021-06-03 | 2021-06-03 | Anti-duplicate mechanism verification method, verification system, electronic device and storage medium |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113362173A CN113362173A (en) | 2021-09-07 |
CN113362173B true CN113362173B (en) | 2024-11-26 |
Family
ID=77532090
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110621633.4A Active CN113362173B (en) | 2021-06-03 | 2021-06-03 | Anti-duplicate mechanism verification method, verification system, electronic device and storage medium |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113362173B (en) |
Families Citing this family (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN113094047B (en) * | 2021-04-01 | 2022-09-06 | 山石网科通信技术股份有限公司 | Method and device for processing webpage buttons, storage medium and processor |
CN114528286A (en) * | 2022-02-21 | 2022-05-24 | 中国工商银行股份有限公司 | Method and device for preventing repeated sending of message, electronic equipment and storage medium |
CN116909260B (en) * | 2023-09-12 | 2023-12-01 | 常州星宇车灯股份有限公司 | Intelligent driving domain controller test verification method for simulating HIL (high-performance liquid chromatography) rack |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111026645A (en) * | 2019-11-20 | 2020-04-17 | 航天信息股份有限公司 | User interface automatic testing method and device, storage medium and electronic equipment |
Family Cites Families (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103236959A (en) * | 2013-05-09 | 2013-08-07 | 中国银行股份有限公司 | Test system and test method for testing business processing module |
CN103530777B (en) * | 2013-10-10 | 2017-04-12 | 顾翠标 | Interactive electronic certificate verifying system and method based on mobile terminal |
JP6621776B2 (en) * | 2017-03-22 | 2019-12-18 | 株式会社東芝 | Verification system, verification method, and program |
CN108924159B (en) * | 2018-07-31 | 2020-10-09 | 杭州迪普科技股份有限公司 | Verification method and device of message feature recognition library |
CN110298662B (en) * | 2019-07-04 | 2022-03-22 | 中国工商银行股份有限公司 | Automatic detection method and device for transaction repeated submission |
CN111143192A (en) * | 2019-11-28 | 2020-05-12 | 叮当快药科技集团有限公司 | Interface automation test method and device and related product |
CN112671605B (en) * | 2020-12-16 | 2023-07-11 | 建信金融科技有限责任公司 | Test method and device and electronic equipment |
-
2021
- 2021-06-03 CN CN202110621633.4A patent/CN113362173B/en active Active
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN111026645A (en) * | 2019-11-20 | 2020-04-17 | 航天信息股份有限公司 | User interface automatic testing method and device, storage medium and electronic equipment |
Also Published As
Publication number | Publication date |
---|---|
CN113362173A (en) | 2021-09-07 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN110378749B (en) | Client similarity assessment method, device, terminal equipment and storage medium | |
CN113362173B (en) | Anti-duplicate mechanism verification method, verification system, electronic device and storage medium | |
US8813039B2 (en) | Method and system for software defect reporting | |
US20180131779A1 (en) | Recording And Triggering Web And Native Mobile Application Events With Mapped Data Fields | |
CN114358147B (en) | Training method, recognition method, device and equipment for abnormal account recognition model | |
US9934310B2 (en) | Determining repeat website users via browser uniqueness tracking | |
US8621613B1 (en) | Detecting malware in content items | |
US10374934B2 (en) | Method and program product for a private performance network with geographical load simulation | |
CN112965916B (en) | Page testing method, page testing device, electronic equipment and readable storage medium | |
CN113535577B (en) | Application testing method and device based on knowledge graph, electronic equipment and medium | |
EP3506592A1 (en) | Method and system for detecting fradulent user-content provider pairs | |
US9348977B1 (en) | Detecting malware in content items | |
CN114301713A (en) | Risk access detection model training method, risk access detection method and risk access detection device | |
CN112306826A (en) | Method and apparatus for processing information for terminal | |
CN113535568B (en) | Verification method, device, equipment and medium for application deployment version | |
CN115827122A (en) | Operation guiding method and device, electronic equipment and storage medium | |
CN115293273A (en) | User portrait generation method, user portrait model training method and device | |
CN114281704A (en) | A website testing method, device, electronic device and medium | |
US10325027B2 (en) | Changing a language for a user session replay | |
US10158659B1 (en) | Phony profiles detector | |
CN114117449B (en) | Testing method, device, electronic device and medium based on hidden parameter mining | |
CN113360417B (en) | Test method, session modifier, electronic device and medium | |
CN119168516A (en) | Logistics information processing method, device, equipment, medium and program product | |
CN119336627A (en) | Method, device, equipment, storage medium and program product for matching mobile terminal page with transaction code | |
CN116467209A (en) | Performance test method, device, equipment and storage medium |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |