CN110263585A - Test monitoring and managing method, device, equipment and storage medium - Google Patents

Test monitoring and managing method, device, equipment and storage medium Download PDF

Info

Publication number
CN110263585A
CN110263585A CN201910561207.9A CN201910561207A CN110263585A CN 110263585 A CN110263585 A CN 110263585A CN 201910561207 A CN201910561207 A CN 201910561207A CN 110263585 A CN110263585 A CN 110263585A
Authority
CN
China
Prior art keywords
test
information
instruction
block chain
binding
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201910561207.9A
Other languages
Chinese (zh)
Other versions
CN110263585B (en
Inventor
陈金龙
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tencent Technology Shenzhen Co Ltd
Original Assignee
Tencent Technology Shenzhen Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tencent Technology Shenzhen Co Ltd filed Critical Tencent Technology Shenzhen Co Ltd
Priority to CN201911269625.7A priority Critical patent/CN110826111B/en
Priority to CN201910561207.9A priority patent/CN110263585B/en
Publication of CN110263585A publication Critical patent/CN110263585A/en
Application granted granted Critical
Publication of CN110263585B publication Critical patent/CN110263585B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/36Preventing errors by testing or debugging software
    • G06F11/3668Software testing
    • G06F11/3672Test management
    • G06F11/3688Test management for test execution, e.g. scheduling of test suites
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Computer Security & Cryptography (AREA)
  • General Physics & Mathematics (AREA)
  • Computer Hardware Design (AREA)
  • General Engineering & Computer Science (AREA)
  • Bioethics (AREA)
  • Software Systems (AREA)
  • General Health & Medical Sciences (AREA)
  • Health & Medical Sciences (AREA)
  • Quality & Reliability (AREA)
  • Databases & Information Systems (AREA)
  • Storage Device Security (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

This application discloses a kind of test monitoring and managing method, device, equipment and storage medium, in this method, server obtains and executes test instruction;Binding test instruction and identification information;Hash operation is carried out to binding information, and Hash operation result is digitally signed;Digital signature result and binding information are uploaded to the block chain node in block chain network, carry out sign test so as to block chain link point and save binding information after sign test passes through.The application is saved by block chain network the identification information of test instruction and corresponding test side is bound after obtained information.After completing cochain, test instruction, identification information and the binding relationship between them in above-mentioned binding information just can not be tampered, later period monitoring party is when carrying out the Liability Retroact of test accident, test instruction relevant with test accident can be utilized accurately to find corresponding identification information from block chain network, to accurately trace back to practical person liable.

Description

Test monitoring and managing method, device, equipment and storage medium
Technical field
This application involves field of computer technology, in particular to a kind of test monitoring and managing method, device, equipment and storage are situated between Matter.
Background technique
Currently, with the development of enterprise's routine work, the server capability of enterprise needs to carry out continuous update iteration.? During this, need tester that corresponding test is unfolded to server.
Existing server measuring technology is normally based on the realization of multi-task and multi-user platform, so that multidigit is surveyed Examination personnel can share a server.Tester when testing server, sometimes can either intentionally or unintentionally to Server has submitted the test instruction or illegal test instruction of mistake, so as to cause the misoperation of server.At this point, enterprise can The Liability Retroact to above-mentioned test accident is realized with the historical operation record by trace test personnel.However, the prior art In may there is a situation where that traced back to person liable and practical person liable are inconsistent, so as to cause Liability Retroact failure.
Summary of the invention
In view of this, the application's is designed to provide a kind of test monitoring and managing method, device, equipment and storage medium, with So that can guarantee consistent between traced person liable and practical person liable when carrying out the Liability Retroact of test accident Property, avoid the occurrence of the case where Liability Retroact fails.Its concrete scheme is as follows:
To achieve the above object, on the one hand, this application provides a kind of test monitoring and managing methods, comprising:
It obtains and executes test instruction;The test instruction is for testing the server;
The test instruction and identification information are bound, binding information is obtained;The identification information is for characterizing Submit the identity of the test side of the test instruction;
Hash operation is carried out to the binding information, and Hash operation result is digitally signed;
Digital signature result and the binding information are uploaded to the block chain node in block chain network, with toilet Block chain node is stated to carry out sign test to the digital signature result and save the binding information after sign test passes through.
Another aspect, present invention also provides a kind of test maintenance devices, comprising:
Instruction acquisition module, for obtaining test instruction;The test instruction is for testing the server;
Instruction execution module, for executing the test instruction;
Information binding module obtains binding information for binding the test instruction and identification information;The identity Identification information is used to characterize the identity for submitting the test side of the test instruction;
Hash operation module, for carrying out Hash operation to the binding information;
Digital Signature module, for being digitally signed to Hash operation result;
Information cochain module, for being uploaded to digital signature result and the binding information in block chain network Block chain node, so that the block chain node carries out sign test to the digital signature result and saves institute after sign test passes through State binding information.
Another aspect, present invention also provides a kind of electronic equipment, the electronic equipment includes processor and memory;Its In, the memory is for storing computer program, before the computer program is loaded by the processor and executed to realize State test monitoring and managing method.
It is executable to be stored with computer present invention also provides a kind of storage medium for another aspect in the storage medium Instruction, when the computer executable instructions are loaded and executed by processor, realizes aforementioned test monitoring and managing method.
The application is after obtaining and having executed test instruction, by the identification information of test instruction and corresponding test side It is bound, after successively carrying out Hash operation and digital signature to binding information, by digital signature result and binding information It is uploaded to the block chain node being located in block chain network, so that the block chain node tests the digital signature result Sign and save after sign test passes through the binding information.It can be seen that the application be saved by block chain network it is above-mentioned Binding information, also, above-mentioned binding information is after binding to the identification information of test instruction and corresponding test side It obtains, means after carrying out cochain to above-mentioned binding information in this way, test instruction, identity in above-mentioned binding information Information and the binding relationship between them, just can not be tampered, later period monitoring party when carrying out the Liability Retroact of test accident, Test instruction relevant to test accident can be utilized accurately to find from block chain network to tie up with above-mentioned test instruction Fixed identification information to accurately trace back to practical person liable, namely ensure that traced person liable and practical duty Consistency between leting people avoids the occurrence of Liability Retroact fails.
Detailed description of the invention
In order to illustrate the technical solutions in the embodiments of the present application or in the prior art more clearly, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this The embodiment of application for those of ordinary skill in the art without creative efforts, can also basis The attached drawing of offer obtains other attached drawings.
Fig. 1 is a kind of test supervisory systems structure composed schematic diagram provided by the present application;
Fig. 2 is a kind of test supervisory systems structure composed schematic diagram provided by the present application;
Fig. 3 is that the block chain overview based on third party tube platform checks schematic diagram;
Fig. 4 is the block chain browsing data schematic diagram based on third party tube platform;
Fig. 5 is the block chain data query schematic diagram based on third party tube platform;
Fig. 6 is the Transaction Details information schematic diagram based on third party tube platform;
Fig. 7 is the history test operation carrying recorded decoding schematic diagram based on third party tube platform;
Fig. 8 is a kind of test monitoring and managing method flow chart provided by the present application;
Fig. 9 is a kind of test monitoring and managing method flow chart provided by the present application;
Figure 10 is a kind of test monitoring and managing method flow chart provided by the present application;
Figure 11 is a kind of test monitoring and managing method flow chart provided by the present application;
Figure 12 is a kind of block chain information querying flow figure for testing monitoring and managing method provided by the present application;
Figure 13 is a kind of integral multi-layered configuration diagram of system provided by the present application;
Figure 14 is the application schematic diagram that test supervision is realized in a kind of application scenarios provided by the present application;
Figure 15 is a kind of test maintenance device structural schematic diagram provided by the present application;
Figure 16 is a kind of test maintenance device structural schematic diagram provided by the present application;
Figure 17 is a kind of server architecture figure provided by the present application;
Figure 18 is a kind of terminal structure figure provided by the present application.
Specific embodiment
It is currently based on the server measuring technology of multi-task and multi-user platform realization, allows multidigit tester to same Server expansion test.During being unfolded to test to server, it can locally save relevant test data or will survey Examination data are sent to centralized management server and are saved.When server refers to due to executing error checking instruction or illegal test When enabling and misoperation occur, supervisor can be inquired by local number or send inquiry request to centralized server Mode instructs corresponding test side to trace back to corresponding test, thus the accident of progress fix duty.But above-mentioned test data is to save On centralized management server in the local database or remotely, there are quilts for the data saved by above two mode The risk distorted or destroyed.
It is instructed for example, the error checking instruction in the test data preserved is changed to proper testing by interpolater, Perhaps the test side A corresponding with illegal test instruction is revised as the side of test B by interpolater or interpolater will be with test accident Relevant test data is directly deleted, or directly carries out physical destroying to local tested server or centralized management server Deng.It is understood that above-mentioned interpolater both may be the illegal invasion person of database, reached by various illegal invasion means To the purpose of altered data, it is also possible to nominally the legal access user of database.Once local data base or centralization It is subsequent when calling to account to test accident after data in management server are tampered, it will be unable to navigate to accurate duty It lets people, so as to cause Liability Retroact failure, or even Liability Retroact dispute can be caused.
In view of the above problem existing at present, present applicant proposes the servers based on block chain to test regulation technique side Case can be guaranteed the consistency between traced person liable and practical person liable, be avoided responsibility and chased after by the technical solution Trace back failure the occurrence of.
In order to make it easy to understand, the system architecture being applicable in below the technical solution of the application is introduced.Referring to Fig. 1 and Fig. 2, which respectively show a kind of two different structure composeds of test supervisory systems of the application.
As shown in Figure 1, a kind of structure composed of the test supervisory systems of the application may include the side's of test terminal 11, service Device 12, block chain network 13, third party tube platform 14 and inquiry terminal 15.
Wherein, test side's terminal 11 can be test on user interface by itself preassembled client Side provides information input interface and information sends trigger unit.Wherein, test side's terminal 11 is obtained by information input interface and is surveyed The test instruction that examination side inputs.After information, which sends trigger unit, to be triggered by the external world, it is logical that test side's terminal 11 can use first Network is interrogated, the information got by information input interface is sent to server 12.It is understood that the survey in the application Examination side's terminal 11 includes but is not limited to the smart phone for being mounted with above-mentioned client, tablet computer, wearable device and desk-top meter Calculation machine etc..
In the application, server 12 can specifically refer to for realizing the private server of single business, different services Device 12 is respectively used to realize different business.Server 12 is established communication by the first communication network and test side's terminal 11 and is connected It connects.After server 12 gets the test instruction of the transmission of test side's terminal 11, test instruction can be executed to complete to survey accordingly Trial business.In the application, the inside of server 12 is integrated with instruction monitoring program in advance, for execute behavior that test instructs into Row monitoring is performed once monitoring certain test instruction, then can instruct and be collected to the test, it is subsequent can will be current Real-time collecting or the test instruction collected in history and the identification information of test side are bound, then to binding information into Row Hash operation and Hash operation result is digitally signed, then by the second communication network by digital signature result and Binding information is sent to block chain network 13, uplink operation process is unfolded.It is understood that the server in the present embodiment 12 include but is not limited to Cloud Server, physical server and virtual server etc..
It is understood that block chain network 13 includes multiple block chain nodes 130.When the test number that server 12 is submitted After the success cochain on either block chain node 130, above-mentioned test data will be quickly transferred to it within grade period second He saves block chain node 130, and each block chain node 130 maintains full dose director data by cooperative cooperating.This Shen Please in, in the either block of block chain network 13 in addition to can recorde it is block-identified symbol, test operation record, binary tree root breathe out Except transaction cryptographic Hash uncommon and corresponding with test data, with can also further recording block chain mark and block chain account The information such as location.
Wherein, the block-identified symbol carries out what Hash processing obtained later to the block head of a upper block either referring to Identifier may also mean that the block height of current block;Test operation record may include test data and corresponding Timestamp etc., wherein test data includes at least the identification information of test instruction and test side by binding;Described two Fork tree specifically can be Merkle tree;The block chain identifies the mark for characterizing current block chain, can be adapted for existing The needs of a variety of different blocks chains apply the scene across chain technology;The block chain account address is test side's registration block chain account The address information obtained behind family, registration process can specifically include: after getting the Account Registration information of test side, for test side Private key is created an account, and generates account public key corresponding with account private key using elliptic curve, is then dissipated using unidirectional Column algorithm carries out operation to account public key, to obtain block chain account address.
For the external world, above-mentioned block chain account address is a kind of irregular character string of milli, is avoided due to block The reason of chain account address itself and cause privacy of user leakage event generation.It is understood that above-mentioned Account Registration letter Cease the true surname of the user name, test side that can specifically include but be not limited to the IP address of server, Linux and distribute for test side Name, the type of service of server and affiliated group information etc..As shown in Table 1, the application is providing block chain account to the external world It, can also be into addition to above-mentioned account public key Facc_pub_key and block chain account address Facc_addr can be provided when information One step, which is provided, identifies Fchain_ with the corresponding User ID Fuser_id of the block chain account, account validity period, corresponding block chain Id, block version number Fversion, ca authentication type Fissue, Digital Signature Algorithm type Fsign_type, e-payment are flat The trade company Fmch_id and account details information Fother_info of platform.Wherein, account validity period passes through the validity period in table one Initial time Ffrom and cut-off time validity period Fto is determined.Wherein, above-mentioned account details information Fother_info tool Body may include server ip address, Linux is user name, the industry of the Real Name of test side, server that test side distributes Service type and affiliated group information etc..In addition, it is necessary to, it is noted that in the application a bit test side user can bind it is multiple Block chain account, a block chain account are then pertaining only to a bit test side user.
Table one
The application can also outwardly provide survey in addition to can outwardly provide the block chain account information of test side user Examination side's user information.As shown in Table 2, test side's user information can specifically include corresponding User ID Fuser_id, Yong Huqian Packet address Fuser_addr, client public key Fuser_pub_key, corresponding block chain identify Fchain_id, block version number Fversion, ca authentication type Fissue, Digital Signature Algorithm type Fsign_type, test side Real Name Ffull_ Name, email address Femail, telephone number Ftel, the trade company Fmch_id of user information validity period and electronic payment platform Deng.
Table two
It is understood that the node device type of the block chain node 130 in the application is including but not limited to various types of Server, personal computer, handheld terminal of type etc..
In the application, third party tube platform 14 is that one kind can collect block chain data, provide block chain browsing data Query function provides the platform that private key generates service, account executive for user.The application user passes through third party tube platform 14 The profile information of block chain can be viewed, it is specific as shown in Figure 3.In Fig. 3, the specific block chain name of the profile information of block chain Title, block chain ID, block chain functional circuit information and block chain key index etc..In addition, as shown in Table 3, third party's management Platform 14 can periodically or non-periodically collect the record of the history test operation in block chain network 13 Fdata, transaction cryptographic Hash Fhash, block height Fheight, block cryptographic Hash (being not shown in table three), exchange hour Fblock_time, block chain account Facc and block chain mark Fchain_id etc..Further, after third party tube platform 14 is collected into above-mentioned block chain data, The block chain data of the block chain data of the above-mentioned all types being collected into or some types can be shown in inquiry terminal 15 Human-computer interaction interface on, for user browsing, referring specifically to Fig. 4.Shown block chain data include transaction Hash in Fig. 4 Value, block height, block cryptographic Hash, exchange hour etc..Further, as shown in Table 3, the survey recorded in block chain network 13 Examination operation note Fdata can specifically include server ip address, timestamp, user name, affiliated group information and test instruction etc..
Table three
In addition, third party tube platform 14 can use that third communication network obtains that inquiry terminal 15 initiates for history The inquiry request for testing instruction, then inquires the information being collected into from block chain network 13 accordingly, to obtain and The history test instructs the identification information of corresponding test side.Specifically, inquiry terminal 15 passes through search shown in Fig. 4 Frame obtains block height, the transaction search keys such as cryptographic Hash or block cryptographic Hash of user's input, then manages to third party Platform 14 sends the inquiry request comprising above-mentioned search key.After third party tube platform 14 gets inquiry request, from receipts Block chain data corresponding with above-mentioned inquiry request are found out in the information collected, and are back to the terminal interface of inquiry terminal 15 On, it is specific as shown in Figure 5.In the application, above-mentioned inquiry mode can specifically support fuzzy query.In addition, working as shown in Fig. 5 After " checking " is clicked by user, the display interface of Transaction Details can be opened in inquiry terminal 15, it is specific as shown in Figure 6. In Fig. 6, Transaction Details can specifically include transaction cryptographic Hash, affiliated block, block size, exchange hour, trading volume and friendship Easy data etc..
It should be pointed out that the history test operation record that third party tube platform 14 is collected into from block chain network 13 Usually by the information of coding, obtained after e.g. being encoded by Base58 coding techniques.For this purpose, referring to Fig. 7 institute Show, third party tube platform 14 is got after the history test operation record that block chain network 13 issues, it is also necessary to carry out phase The decoding process answered, the identity mark of test instruction and corresponding test side to obtain corresponding timestamp, in binding state Know information.
In the application, if the above-mentioned identity identification information for being in binding state with test instruction is obtained after encryption , in order to obtain its corresponding cleartext information, it is also necessary to operation, ability further be decrypted using corresponding decruption key It is enough finally to know identification information corresponding with history test instruction, so that corresponding Liability Retroact is unfolded.It can manage Solution, inquiry terminal 15 can be the terminal that monitoring party is held, be also possible to the terminal that ordinary user holds.Wherein, it supervises The square behavioral test for test side carries out the manager of confirmation of responsibility, and inquiry terminal 15 includes but is not limited to smart phone, puts down Plate computer, wearable device and desktop computer etc..
As shown in Fig. 2, another structure composed of the test supervisory systems of the application may include server 21, test side Terminal 22, block chain network 23, third party tube platform 24 and inquiry terminal 25.This structure composed and former structure composed Between difference be mainly reflected in the information exchange mechanism between server 21, test side's terminal 22 and block chain network 23 not Together.
In Fig. 2, test side's terminal 22 sends test instruction to server 21.After server 21 has executed test instruction, to Test side's terminal 22 sends corresponding feedback information, to prompt the test instruction accordingly of test side's terminal 22 to be finished.When Test side's terminal 22 monitors server 21 and has returned to feedback information, then acquires relevant test data, and pass through the 5th communication Network sends above-mentioned test data to block chain network 23, to be saved by block chain network 23 to above-mentioned test data.
It should be noted that above-mentioned first communication network, the second communication network, the third communication network, the 4th of the application Communication network and the 5th communication network can according in actual application Network status and application demand determine, both can be with It is wireless communication networks, such as mobile communication network or WIFI network, is also possible to wire communication network;Either wide area Net can also use local area network when situation allows.
Fig. 8 is a kind of flow chart for testing monitoring and managing method provided by the embodiments of the present application.It is shown in Figure 8, test prison Pipe method may comprise steps of:
S101, the creation test instruction of test side's terminal, the test instruction are used for testing service device.
In the embodiment of the present application, test side's terminal can provide one or more information input interfaces for test side, pass through Said one or multiple information input interfaces, the command information that available test side inputs, the instruction inputted according to test side Test of the information creating for testing service device instructs.
In one implementation, test side's terminal can be only that test side provides an information input interface.It is all with The relevant various types of command informations of server test pass through the information input interface and pass to test side's terminal, wherein Different types of command information is used to generate the test instruction for the different function of server.This information input mode, energy Enough so that different types of command information is mutually nested, to form more complicated instruction code, to be conducive to complete to clothes The more complicated test operation of business device, thus improves the accuracy and reliability of the test result of server.
In another implementation, test side's terminal can provide multiple information input interfaces for test side, by not Same information input interface obtains the command information that the test for creating for server different function instructs.For example, being directed to The data of server, which delete function, file arrangements function and data look-up functions, test side's terminal, can accordingly provide three not Same information input interface.This information input mode, test side can be made by different information input interface editor and Management is directed to the command information of server different function, reduces the confusion of command information editing process, helps to reduce and survey Try the error rate of instruction.
Server is made in order to allow test side to find test instruction of problems in time and reduce illegal test instruction At damage, test side's terminal can be every to have created a test instruction in one dangerous command feature database of local maintenance, just utilizes Local dangerous command feature database go to examine test instruction whether be mistake test instruction or illegal test instruction, if Be that test side's terminal then issues corresponding alarm prompt or amending advice to test side or monitoring party, and can also forbid by Test instruction is sent to server.It is understood that dangerous command feature database refers to the mistake arrived in advance to dynamic collection Test instruction and/or illegal test instruction carry out the database obtained after feature extraction and record.
In view of in some cases, test side's terminal is in order to smoothly complete test assignment, and it is necessary to send out to server really The test for sending some instruction features to be consistent with local dangerous command feature database instructs.At this point, just in order to not influence test assignment It often carries out, test side can request to pass through the interim electricity for the temporary electronic license of above-mentioned special test instruction to monitoring party Son license can make features described above test instruction skip the interception of the dangerous command feature database.It should be pointed out that above-mentioned Temporary electronic license is specifically to be issued by monitoring party, and its validity is sent to server in above-mentioned special test instruction Just automatic later to disappear.
In order to reduce the risk that the dangerous command feature database is distorted by the external world, test side's terminal can refer in the danger In the case where enabling feature database not called or updating, asymmetric encryption is carried out to the dangerous command feature database using public key, When needing to call or update the dangerous command feature database, the dangerous command feature database of private key pair encryption is recycled to carry out Decryption.
S102, test side's terminal to server send the test instruction.
In the present embodiment, if test side's terminal is to send test instruction to server for the first time, the side's of test terminal is also needed The identification information of test side is sent to server.After server gets identification information, save it in Server local.Later if necessary to the identification information using test side, can directly be transferred from server local Corresponding identification information out.
S103, server obtain and execute the test instruction.
In the present embodiment, server can also pass through dangerous command spy in one dangerous command feature database of local maintenance Library is levied, is intercepted again to test instruction progress second is got, the test that instruction features are located at the dangerous command feature database is referred to Order intercepts, remaining can be executed by server.The application is intercepted again by first in test side's terminal and server On second intercept again, can be effectively reduced the risk of the final performed test instruction of server.
In addition, can be according to preset period of time, periodically to the dangerous command feature in test side's terminal in the present embodiment Dangerous command feature database on library and server synchronizes updating maintenance operation.
It is understood that for the dangerous command feature database in server, since a server is usually to be used for At a kind of private server of specific transactions, so the danger in the present embodiment, in the dangerous command feature database of every server Instruction features may each be the dangerous command feature that the type of service based on the server carries out custom-made.Similarly, test side Dangerous command feature in the dangerous command feature database of terminal is also possible to carry out custom-made based on server service type Dangerous command feature.
S104, server bind the test instruction and identification information, obtain binding information, the identity letter Breath submits the identity of the test side of the test instruction for characterizing.
In the present embodiment, server passes through binding test instruction and the identification information of corresponding test side, Ke Yi A kind of binding relationship is constructed between test instruction and identification information, to obtain the binding information.That is, the binding Test instruction, identification information and the binding relationship between them are specifically included in information, it can be with by above-mentioned binding relationship Determine identification information corresponding with test instruction.
It is understood that the identification information in the present embodiment can specifically include but be not limited to the user of test side Name, Real Name, telephone number etc..
In order to reduce the data volume of subsequent cochain, server can before binding test instruction and identification information, First test is instructed and carries out de-redundancy processing.Specifically, server can use the redundant instruction code library constructed in advance, from survey The redundant instruction code being consistent with the redundant instruction code library is determined in examination instruction, then by redundant instruction code from described It is rejected in test instruction, the test instruction after being simplified.It should be noted that the redundant instruction code can specifically refer to survey Complementary effect is functioned only as rather than the instruction code segment of key effect to test process in examination instruction.
For example, being instructed for this following test: [root@Gin scripts] #find-name " locatetest ", benefit After carrying out de-redundancy processing with redundant instruction code library, it is obtained simplify after test instruction be specifically as follows: find- name。
Further, in the present embodiment, server binds the process of the test instruction and identification information, specifically may be used To include: the instruction features of the identification test instruction, instruct generation corresponding to meet the test of preset instructions feature Then instruction description information binds the test instruction, the identification information and described instruction description information.
In a specific embodiment, server can identify this according to the practical implementing result of certain test instruction The instruction execution efficiency of instruction is tested, and judges whether the instruction execution efficiency is greater than preset instructions execution efficiency threshold value, if It is then to be generated accordingly for characterizing its instruction efficiency description information with higher execution efficiency, then for test instruction Bind the identification information and the instruction efficiency description information of test instruction, test side.Later period carries out the binding information After uplink operation, above-mentioned test instruction, identification information and instruct efficiency description information content and they between Binding relationship will be unable to be distorted by the external world, in this way, the test instruction that dependence test side is submitted has this of higher execution efficiency Dawn known to the public is played the role of commendation by part thing to a certain extent, to be conducive to be promoted the work of test side Enthusiasm.
In another embodiment specific implementation mode, if server is before executing certain test instruction, test side's terminal kimonos Business device does not utilize local dangerous command feature database to test test instruction, then server can use this at this time The dangerous command feature database on ground identifies the instruction features of test instruction, if the instruction features for recognizing test instruction are located at this In the dangerous command feature database on ground, then corresponding instruction warning information can be generated for test instruction, then binds the test Instruction, the identification information of test side and the instruction warning information.After later period carries out uplink operation to the binding information, on State test instruction, identification information and instruct warning information content and the binding relationship between them will be unable to it is extraneous Distort, in this way, dependence test side submitted test instruction tool it is dangerous this by dawn known to the public, certain Play the role of warning in degree.
In another specific embodiment, if server is before executing certain test instruction, test instruction is logical The inspection of the dangerous command feature database in test side's terminal and server is crossed, but server is actually executing test instruction When, the operation exception of server is but caused, then the practical implementing result that server can be instructed according to the test at this time, knows Not Chu test instruction instruction severity, and judge whether the instruction severity is greater than preset instructions severity threshold Value, if it is, generate for test instruction accordingly for characterizing the instruction type description information that it is novel dangerous command, Then the identification information and the instruction type description information of test instruction, test side are bound.Further, in discovery After stating the operation exception that test instruction causes server, the feature that can also instruct the test is added to local danger and refers to It enables in feature database.
It is understood that the binding information in the present embodiment in addition to comprising test instruction, identification information and Instruction description information further includes timestamp, server ip address etc..
S105, server carry out Hash operation to the binding information.
S106, server are digitally signed Hash operation result.
It is understood that needing first to carry out Hash operation and number to data before carrying out uplink operation to data Signature processing.In the present embodiment, server carries out Hash operation to bound test instruction and identification information, then sharp Hash operation result is digitally signed with private key.
In a specific embodiment, a binding information of the every generation of server, just at once to the binding information Hash operation is carried out, after obtaining the Hash operation result, and number is carried out to this Hash operation result using private key at once Signature.It can be with that is, in the present embodiment, between these three steps of generation, Hash operation and the digital signature of the binding information Closely linked, intermediate time interval is very short, in this way can be after obtaining binding information, can be with faster speed Digital signature result is obtained, can substantially shorten the time window of extraneous altered data in this way, increase the difficulty of data tampering And cost.
In another embodiment specific implementation mode, server is after continuously generating the more parts of binding informations, just to above-mentioned More parts of binding informations carry out Hash operation, are digitally signed followed by private key to the Hash operation result.Pass through this side Case can effectively reduce the number of Hash operation and digital signature.For example, it is assumed that server continuously generates following 3 parts of bindings letter Breath:
Binding information A:{ " linux_ip ": " 127.0.0.1 ", " timestamp ": " 2018-10-28 16:25:17 ", " linux_user":"tt_tom","linux_group":"tt","operator_cmd":"whereis mysql"};
Binding information B:{ " linux_ip ": " 127.0.0.1 ", " timestamp ": " 2018-10-28 16:25:17 ", " linux_user":"tt_tom","linux_group":"tt","operator_cmd":"rm-rf*"};
Binding information C:{ " linux_ip ": " 127.0.0.1 ", " timestamp ": " 2018-10-28 16:25:17 ", " linux_user":"tt_tom","linux_group":"tt","operator_cmd":"find-name"};
Then, server carries out Hash to the above-mentioned binding information A sequentially linked up, binding information B and binding information C Then operation is again digitally signed the Hash operation solution result.
In another specific embodiment, after server often continuously generates binding information described in several pieces, just to above-mentioned Several pieces binding information carries out Hash operation, after generating more parts of Hash operation results in the same manner, recycles private key to sequentially The more parts of Hash operation results linked up are digitally signed.For example, server often continuously generate 3 parts of binding informations it Afterwards, Hash operation just is carried out to every 3 parts continuous binding informations, in this way, after server continuously generates 9 parts of binding informations, 3 parts of Hash operations will be obtained as a result, can recycle private key to the above-mentioned 3 parts of Hash operation results sequentially linked up at this time It is digitally signed.Compared to former scheme, current this scheme can further reduce the number of digital signature.
It is understood that several pieces binding information corresponding to each digital signature is to return in the embodiment of the present application Belong to the binding information of same block chain account.
In addition, it is necessary to which explanation, server used private key when carrying out above-mentioned digital signature, specifically can be the Tripartite manages the private key for the block chain account creation that platform is test side, and can save in the server, works as server in this way When needing using private key, directly transferred from local.
In order to improve the safety of private key in server, server is in addition to needing to avoid that any protection processing will not be carried out Private key is stored directly in local, it is also necessary to avoid to be stored in by conventionally known coding or the processed private key of encryption technology It is local.In the embodiment of the present application, a set of customized private key protection mechanism can be created on server local, wherein this is made by oneself Adopted private key protection mechanism includes but is not limited to customized private key encoding mechanism or customized private key encryption mechanism.Server is to private Before key is saved, first with above-mentioned customized private key protection mechanism, respective handling is carried out to private key, then by treated As a result it is stored in local.When subsequent server needs to call private key, can based on above-mentioned customized private key protection mechanism come Restore private key.It is a kind of unknown private key protection machine for the external world since above-mentioned private key protection mechanism is customized System, and for the external world, server use which kind of protection mechanism on earth carry out private key protection be also it is unknown, lead in this way Above-mentioned private key protection scheme is crossed, the probability that private key is intercepted and captured by the external world can be effectively reduced, greatly improve local private key Safety.
It is understood that in actual application, related technical personnel customized according to actual needs can meet The private key protection mechanism of actual operation requirements.According to customized private key protection mechanism, server can be before saving private key Corresponding protection processing first is carried out to private key.For example, in a specific embodiment, if private key can be divided by server Dry is assigned with the segment of serial number, then modifies according to private key segment of the different segment alteration rulers to different serial numbers, And the private key segment after all modifications is saved respectively to multiple and different storage locations of local periodically dynamic change.Example Such as, private key is divided into 3 segments, wherein the corresponding segment alteration ruler of the 1st segment is by n-th of word of the 1st segment Symbol and n-th of character reciprocal exchange, and the corresponding segment alteration ruler of the 2nd segment is to add one to the tail portion of the 2nd segment Preset characters, the corresponding segment alteration ruler of the 3rd segment are that the specific character in the 3rd segment is all changed to another kind Preset characters, after obtaining 3 modified private key segments according to above-mentioned segment alteration ruler, just they are saved respectively to The corresponding 3 different storage locations of current storage location change cycle.It is understood that the later period when restoring private key, needs The characteristics of first periodically being changed according to segment storage location, determine the storage location of different private key segments, then according to not With segment serial number, corresponding different fragments alteration ruler restores the script information of different fragments, then carries out piece based on numeric order Section splicing, can restore private key.
Digital signature result and the binding information are uploaded to the block chain in block chain network by S107, server Node.
Workload in order to reduce certain block chain link points in block chain network is excessive or is chronically at idle state Situation, in the application, digital signature result and the binding information are uploaded to the block in block chain network by server The process of chain node may include: information on load and location information of the server according to current each block chain node, to the area Block chain link point in block chain network is screened, and destination node is obtained, then by the digital signature result and the binding Information is uploaded to the destination node.That is, the server in the present embodiment can voluntarily select block chain node as directly The node of uplink data is obtained, also, server can work as according to the information on load of block chain node and location information to screen Preceding suitable block chain node, server can select that current loads are smaller and geographical location is moderate in this way Block chain node is as the node for directly receiving uplink data.
In order to accelerate the chain speed on the whole of the data in server, in the present embodiment, server by digital signature result and The binding information is uploaded to the block chain node in block chain network, can specifically include: multiple numbers are signed Name result and the corresponding binding information are uploaded to the different block chain nodes in block chain network respectively.It needs to refer to Out, the corresponding all binding informations of the same digital signature result belong to the same block chain account, and different numbers Binding information corresponding to word signature result then can both belong to the same block chain account, can also belong to different areas Block chain account.For same server, above-mentioned different block chain account typically refers to the block chain of different test sides Account.
Block chain node in S108, block chain network carries out sign test to the digital signature result, and passes through in sign test After save the binding information.
In the present embodiment, the arbitrary node in block chain network gets the digital signature result and binding of server transmission After information, sign test first can be carried out to the digital signature result, after sign test passes through, just generate and saved on this node The block of binding information is stated, other nodes into block chain network are then broadcasted, other nodes are received and verified, verifying Above-mentioned block can be appended on block chain after.Block chain generated through the above way can help to supervise The historical test data of Servers-all on side's retrospect block chain.
The embodiment of the present application is after obtaining and having executed test instruction, by the identity mark of test instruction and corresponding test side Know information to be bound, after successively carrying out Hash operation and digital signature to binding information, by digital signature result and tie up The block chain node that information is uploaded in block chain network is determined, so that the block chain node is to the digital signature result It carries out sign test and saves the binding information after sign test passes through.It can be seen that the embodiment of the present application is by block link network Network saves above-mentioned binding information, also, above-mentioned binding information believed the identity of test instruction and corresponding test side What breath obtained after being bound, mean after carrying out cochain to above-mentioned binding information in this way, the test in above-mentioned binding information Instruction, identification information and the binding relationship between them, just can not be tampered, later period monitoring party is carrying out test accident Liability Retroact when, can utilize relevant to test accident test instruction accurately found from block chain network with it is upper The identification information for stating test instruction binding, to accurately trace back to practical person liable, namely ensure that traced duty The consistency let people between practical person liable avoids the occurrence of Liability Retroact fails.
Fig. 9 is a kind of flow chart for testing monitoring and managing method provided by the embodiments of the present application.It is shown in Figure 9, test prison Pipe method may comprise steps of:
Whether S201, server detection test side there is instruction to submit permission.
In a kind of possible embodiment, server can detecte whether current test side has and the server The corresponding block chain account of business, then determines the test according to the above-mentioned block chain account testing result of the test side Whether side there is instruction to submit permission.That is, if server detects that presently described test side has had and the server The corresponding block chain account of business, then can be determined that the test side have to the server submit test instruction power Limit.It is understood that if detecting presently described test side block chain corresponding with the business of the server not yet Account, then server can send corresponding block chain Account Registration prompt information to test side's terminal, with prompt test side into The corresponding block chain Account Registration process of row.
In alternatively possible embodiment, what the available third party tube platform of server was sent is currently held in Historical test data in block chain network, then according to the historical test data saved in current block chain network to determine State whether test side there is instruction to submit permission.Specifically, server can be according to the history saved in current block chain network Test data counts the dangerous command quantity of the test side in history and/or the menace level of dangerous command, then basis Statistical result determines whether to also continue maintaining the instruction of the test side to submit permission.Server can be in above-mentioned statistics As a result in the case where meeting certain condition, permission is submitted in the instruction for permanently or temporarily cancelling the test side.
If S202, server detect that there is instruction to submit permission for test side, corresponding finger is issued to test side's terminal It enables and submits authority credentials.
In the present embodiment, the permission for testing instruction is submitted when server detects that test side has, then is the generation of test side Authority credentials is submitted in corresponding instruction, and instruction submission authority credentials is then sent to test side's terminal.It should be pointed out that In the present embodiment, server can submit the instruction of Embedded test side in authority credentials to submit the effective of permission in above-metioned instruction Phase.
S203, the creation test instruction of test side's terminal, the test instruction are used for testing service device.
S204, test side's terminal submit authority credentials to submit the test instruction to server according to instruction.
In the present embodiment, described instruction can be submitted permission when submitting test instruction to server by test side's terminal Voucher is transferred to local instruction and submits process, submits process to submit authority credentials come really by described instruction by local instruction The legitimacy and validity of permission are submitted in the instruction of test side before settled.Submit process that current test has been determined in local instruction It is that then can permit to server in legal and effective situation and submit the test instruction that permission is submitted in the instruction of side.Into One step, in order to avoid illegal terminal submits authority credentials to test instruction to submit to server using the instruction stolen, this In embodiment, it is non-right that the public key that server can use test side submits authority credentials to carry out the instruction recorded with plaintext version Claim encryption, so that obtaining encrypted instruction submits authority credentials, authority credentials hair then is submitted into above-mentioned encrypted instruction It send to test side's terminal.Test side's terminal submits authority credentials to solve above-mentioned encrypted instruction using the private key of itself Close, reduction obtains submitting authority credentials with the instruction that plaintext version records, so that power is submitted in the instruction obtained according to above-mentioned reduction It limits voucher and submits test instruction to server.
S205, server obtain and execute the test instruction.
S206, server encrypt identification information, obtain the first encryption information, and the identification information is used The identity of the test side of the test instruction is submitted in characterization.
S207, server bind the test instruction and first encryption information, obtain binding information.
In the present embodiment, server can first believe identity before binding test instruction and identification information Breath is encrypted.In actual information binding procedure, service implement body can be to test instruction and encrypted identity Information is bound.It handles in this way, the subsequent test data saved in block chain network can be made to inquire When, if inquiry's decruption key not corresponding with the ciphering process of above-mentioned identification information, for this kind of inquiry For person, they will be unable to know the corresponding test side's identity information of the test instruction in these test datas, thus one Determine the privacy that user is protected in degree.
In one possible implementation, the process that server encrypts the identification information, specifically may be used To include: to carry out asymmetric encryption to the identification information using the public key of monitoring party.This also means that, block link network The identification information corresponding with test instruction saved in network is obtained after carrying out asymmetric encryption using the public key of monitoring party The first encryption information.Correspondingly, to restore identification information, being needed in order to which above-mentioned first encryption information is decrypted It is just able to achieve by the private key of monitoring party.Since the private key of monitoring party is saved by monitoring party, other staff can not be got, So that with the corresponding identification information of test instruction be for monitoring party it is disclosed, for other kinds of personnel It says, is secrecy.It can be seen that designing through the above scheme, on the one hand neither influences monitoring party and refer to dangerous test is had submitted On the other hand the Liability Retroact of the test side of order is largely effectively guaranteed the privacy of identities of test side.
In alternatively possible implementation, the process that server encrypts the identification information, specifically It may include: that symmetric cryptography is carried out to the identification information using the private key of monitoring party.This also means that, block link network The identification information corresponding with test instruction saved in network is obtained after carrying out symmetric cryptography using the private key of monitoring party First encryption information.Correspondingly, to restore identification information, needing to borrow in order to which above-mentioned first encryption information is decrypted The private key of monitoring party is helped just to be able to achieve.It designs through the above scheme, equally can also reach following effect: is corresponding with test instruction Identification information be for monitoring party it is disclosed, for other kinds of personnel then be secrecy.
S208, server carry out Hash operation to the binding information.
S209, server are digitally signed Hash operation result.
Whether S210, server detection currently meet default upper chain condition.
If S211, server, which detect, currently meets the default upper chain condition, by the digital signature result and institute State the block chain node that binding information is uploaded in block chain network.
That is, server is first sentenced before carrying out cochain to digital signature result and the binding information in the present embodiment It is disconnected currently whether to meet default upper chain condition, uplink operation is just triggered if met.Specifically, block chain network or third party tube Platform can be according to the equipment of itself load of block chain node each in current block chain network and the communication of whole network Load, and target is minimised as with the workload of whole network, when being that each server is planned as a whole to distribute corresponding legal cochain It carves.Any server needs first to detect current time and legal cochain moment for obtaining in advance before carrying out cochain to data It is whether consistent, if unanimously, allowing to carry out uplink operation to the digital signature result and the binding information, if different It causes, then forbids carrying out uplink operation to the digital signature result and the binding information.
Block chain node in S212, block chain network carries out sign test to the digital signature result, and passes through in sign test After save the binding information.
Figure 10 is a kind of flow chart for testing monitoring and managing method provided by the embodiments of the present application.It is shown in Figure 10, the test Monitoring and managing method may comprise steps of:
S301, the creation test instruction of test side's terminal, the test instruction are used for testing service device.
S302, test side's terminal to server send the test instruction.
S303, server obtain and execute the test instruction.
S304, server collect the test instruction.
S305, server bind the test instruction and identity of collection in the case where meeting default binding trigger condition Identification information, obtains binding information, and the identification information is used to characterize the identity for submitting the test side of the test instruction.
In the present embodiment, server can be played multiple test instruction acquisitions corresponding with same identification information Come, after meeting preset binding trigger condition, just to the above-mentioned multiple test instructions being collected into and the identity mark Know information binding to get up, be bound in this way with the corresponding identification information relative to test instruction described in each The case where, the number of binding can be greatly decreased and reduce the information content size of whole binding data.
In the present embodiment, server needs to monitor currently whether meet preset tie up during collecting test instruction Determine trigger condition, only after monitoring currently to meet preset binding trigger condition, just allows to carry out bindings.
Wherein, above-mentioned preset binding trigger condition can specifically include: being collected into same identification information pair The quantity for the test instruction answered reaches present count magnitude, or the test instruction corresponding with same identification information being collected into Overall amount of data size reaches the collection of preset data amount size or epicycle test instruction corresponding with same identification information Duration reaches preset duration etc..It should be pointed out that in the embodiment of the present application, it is final for same a binding information It is to be added to the same block.In view of the amount of capacity of each block is limited, so above-mentioned present count magnitude, The specific value of preset data amount size and preset duration is not limited, but will be by the pact of block amount of capacity Beam.For this purpose, the present embodiment can specifically determine above-mentioned present count magnitude, preset data amount size according to the amount of capacity of block Or preset duration.
S306, server are based on default protection mechanism, carry out anti-tampering protection to the binding information, and monitoring to need When triggering Hash operation, restored to by the information of the anti-tampering protection, to obtain the binding information.
In a specific embodiment, the default protection mechanism can be the information based on coding techniques building and prevent usurping Change protection mechanism.Specifically, server, which can use custom coding rule, carries out coded treatment to the binding information, obtain Encoded information is decoded the encoded information using customized decoding rule when monitoring to need to trigger Hash operation Processing obtains the binding information with reduction, and the customized decoding rule is solution corresponding with the custom coding rule Code rule.In the present embodiment, above-mentioned custom coding rule and customized decoding rule specifically can be and carried out certainly by monitoring party The coding rule and decoding rule of definition.Since above-mentioned encoding and decoding rule is that monitoring party is customized, the external world is come Say it is a set of unknown encoding and decoding rule, in addition, above-mentioned encoded information is generated based on which kind of coding rule on earth, for It is also unknown for the external world, it is possible thereby to substantially increase the extraneous difficulty for attempting to restore the binding information by decoding Degree.If the external world attempts directly to distort the information content of above-mentioned encoded information itself, that will will lead to subsequent solve Obtained decoded information becomes a kind of messy code information that semanteme is obstructed after code processing.Server passes through natural language processing technique In semantics recognition technology, once monitor that above-mentioned decoded information is semantic obstructed information, can be directly to monitoring party end End issues relevant warning message.It is understood that the warning message can specifically include but be not limited to server ip address, The information etc. of the test side's terminal communicated in current time segment information and current slot with server.
In another embodiment specific implementation mode, the default protection mechanism can be based on asymmetric encryption techniques building Information anti-tampering protection mechanism.Specifically, the public key that server can use the server is non-to binding information progress Symmetric cryptography obtains the second encryption information, when monitoring to need to trigger Hash operation, using the private key of the server to institute It states the second encryption information to be decrypted, the binding information is obtained with reduction.In the present embodiment, the private key of server itself be by Come what is taken care of, the external world can not be got server.When the public key of server by utilizing itself carries out asymmetric encryption to binding information After obtaining the second encryption information, above-mentioned second encryption information can not be decrypted in the external world, so that outer bound pair be prevented to bind Information is distorted.In the present embodiment, server can use the public key and private key that local key generation procedure generates itself.And And in order to further increase the effect of anti-tampering protection, server can be updated periodically according to the preset key updating period The public key and private key of itself.
S307, server carry out Hash operation to the binding information.
S308, server are digitally signed Hash operation result.
Digital signature result and the binding information are uploaded to the block chain in block chain network by S309, server Node.
Block chain node in S310, block chain network carries out sign test to the digital signature result, and passes through in sign test After save the binding information.
It is understood that aforementioned all optional technical solutions, can form the application using any combination can Embodiment is selected, this is no longer going to repeat them.
According to foregoing teachings it is found that uplink operation above-mentioned is completed by server.In fact, the application is in addition to can To complete uplink operation by server, uplink operation can also be completed by test side's terminal.For details, reference can be made to Figure 11, figures 11 be a kind of flow chart for testing monitoring and managing method provided by the embodiments of the present application, which may include following step It is rapid:
S401, the creation test instruction of test side's terminal, the test instruction are used for testing service device.
S402, test side's terminal to server send the test instruction.
S403, server obtain and test the test instruction.
The prompt information that S404, server are completed to test side's terminal feedback command.
After S405, test side's terminal get feedback information, the test instruction and identification information are bound, is tied up Determine information, the identification information is used to characterize the identity of the test side;The feedback information is server execution The prompt information fed back after the complete test instruction.
S406, test side's terminal carry out Hash operation to the binding information, and carry out digital label to Hash operation result Name.
Digital signature result and the binding information are uploaded to the area in block chain network by S407, test side's terminal Block chain node.
Block chain node in S408, block chain network carries out sign test to the digital signature result, and passes through in sign test After save the binding information.
That is, the operation for information binding, Hash operation, digital signature and the information cochain originally completed by server, All turn to be completed by test side's terminal in the present embodiment, and the side's of test terminal is to have executed test instruction simultaneously in server After getting the prompt information that the instruction testing of server feedback finishes, above- mentioned information binding, Hash operation, number is just unfolded The operation such as signature and information cochain.In addition, the information binding executed by test side's terminal in the present embodiment, Hash operation, number Between the relevant operation executed by server in the operations and previous embodiment such as word signature and information cochain, in addition to executing subject Difference except, remaining technical detail is substantially similar, thus in relation in the present embodiment information binding, Hash operation, The technical detail description of the operations such as digital signature and information cochain can refer to the corresponding contents of previous embodiment, no longer open up herein It opens and repeats.
After completing information uplink operation by server or test side's terminal, inquiry terminal can be unfolded on corresponding Chain information inquiry operation.Referring specifically to Figure 12, Figure 12 is the block in a kind of test monitoring and managing method provided by the embodiments of the present application The flow chart of chain information query process, the block chain information query process may comprise steps of:
S501, inquiry terminal generate the inquiry request for target detection instruction.
It, can be to inquiry eventually when finding that target detection instruction once caused the misoperation of server in the present embodiment End inputs the target detection instruction, then inquires terminal generation for the inquiry request of target detection instruction.
S502, inquiry terminal send the inquiry request to third party tube platform.
S503, third party tube platform obtain history test operation record from block chain network.
In the present embodiment, in order to accelerate data query speed and increase the type of search key, third party tube is patted Platform can obtain all history test operation records from block chain network in advance, wherein specific in history test operation record It may include the information such as server ip address, timestamp, user name and test instruction, and to the history test operation got Encryption data present in record carries out corresponding decryption oprerations, such as to adding in history test operation record by asymmetric Close user name is decrypted.It is understood that third party tube platform obtains the history test operation in block chain network While record, corresponding transaction cryptographic Hash, block height, exchange hour, block chain account address and really can also be obtained Fixed corresponding block cryptographic Hash etc..
It is understood that third party tube platform utilizes the above-mentioned data information collected from block chain network, both may be used It, can also be to for user name, block chain account address, transaction Hash to be responded to the inquiry request for test instruction Value, block height, exchange hour, server ip address or block cryptographic Hash inquiry request responded.Wherein, above-mentioned each Inquiry mode can support fuzzy query.In addition, third party tube platform can also obtain appointing in current block chain network The block chain mark of block chain a kind of and total number of deals of this block chain, number of deals today, in nearest preset time period Number of deals, block total height, current membership's number, present node number, with pen/second is single at the block counts in nearest preset time period The indexs such as the concurrent peak value of history of position.For example, the available block chain mark for being referred to as test chain of third party tube platform, Total number of deals, number of deals today, the number of deals in nearest preset time period, the block counts in nearest preset time period, block are total Highly, the indexs such as current membership's number, present node number, the concurrent peak value of the history as unit of pen/second, so that monitoring party can The various indication informations of the test chain in current block chain network are learned by third party tube platform.On it is understood that Test chain is stated to specifically refer in block chain network dedicated for the block chain of log history test operation record.
S504, third party tube platform utilize the history test operation got from block chain network to record to inquiry eventually End returns to data information corresponding with the inquiry request.
S505, inquiry terminal receive the data information, to determine that the target detection instructs according to the data information Corresponding person liable.
Below by a specific application scenarios example description, it is being based on come the test data to game server The cochain and query process that TrustSQL is built in block chain network are illustrated.Wherein, TrustSQL is a kind of block Chain bottom frame can be compatible with Mysql and JsonRPC, and support a variety of common recognition algorithms.TrustSQL specifically uses Byzantium to hold Wrong common recognition mechanism allows Partial Block chain node delay machine, advantageously reduces node cost of access and improves network reliability. The Digital Signature Algorithm of TrustSQL is elliptic curve digital signature algorithm, and private key can be generated by user oneself, so that is used Binding relationship between family test operation and user can not be tampered.
Referring specifically to shown in Figure 13 and Figure 14, Figure 13 is the multi-layer framework schematic diagram of system entirety, and Figure 14 is concrete application The cochain of test data and inquiry application schematic diagram in scene.
In Figure 13, Linux Shell client is operated in test side's terminal, and test side's terminal passes through Linux Shell Client creation test instruction, and it is sent to game server, to test game server.For monitoring and collecting trip The Agent program of the test instruction being performed on play server can be deployed on Agent layer;For carrying out information cochain Api interface, the api interface for carrying out uplink communications inquiry and the service for managing block chain account also can be disposed On Agent layer;It is accused with instruction rights management service, instruction cochain service, instructions query service, Instruction Statistics service, instruction Police uniform business or other assisted class service relevant processing logic and can be deployed on Logic layer;It is relevant to block chain network Bottom knows together module, back end and service database can be positioned at DB layers.In Figure 13, as third party tube platform BaaS platform (BaaS, i.e. Blockchain as a Service, block chain service), can provide block chain letter for user Cease query service and Instruction Statistics service.Further, BaaS platform can also provide monitoring nodes service, node purchase clothes The service such as business, chain creation service.It is understood that if not carrying out looking into for block chain information by third party tube platform It askes, the present embodiment can also be after a management dedicated for carrying out the inquiry of block chain information be developed in this ground of game server Platform, but such development cost is comparatively relatively high.
In Figure 14, test side's terminal gets the test instruction that test side inputs, wherein containing rm-rf instruction, then To the above-mentioned test instruction of game server.After game server has executed above-mentioned test instruction, above-mentioned test can be referred to It enables and carries out de-redundancy processing, obtain rm-rf instruction, then bind above-mentioned rm-rf instruction and comprising test side user name " tt_ The identification information of tom ", and Hash operation is carried out to binding information and number is carried out to Hash operation result using private key Signature, is then sent to any block based on the TrustSQL block chain network built for digital signature result and binding information Chain node.After the block chain node gets above-mentioned digital signature result and binding information, first with corresponding with above-mentioned private key Public key carries out sign test to digital signature result, if sign test passes through, subsequent can generate on the block chain node includes upper The block of binding information is stated, and the block is broadcasted into other block chain nodes into block chain network, to other block chain links After point is verified, above-mentioned block can be appended on block chain.If subsequent monitoring party terminal is needed to BaaS platform The inquiry request for rm-rf instruction is had sent, then BaaS platform can use going through of getting from block chain network in advance History test operation record, inquires the identification information comprising user entitled " tt_tom " corresponding with rm-rf instruction, then The above-mentioned information inquired is back to monitoring party terminal, thus supervisor can know that rm-rf instruction is by " tt_ Tom " submits to game server, so as to realize accurate Liability Retroact.
Figure 15 is a kind of test maintenance device provided by the embodiments of the present application, comprising:
Instruction acquisition module 31, for obtaining test instruction;The test instruction is used for testing service device;
Instruction execution module 32, for executing the test instruction;
Information binding module 33 obtains binding information for binding the test instruction and identification information;The body Part identification information is used to characterize the identity for submitting the test side of the test instruction;
Hash operation module 34, for carrying out Hash operation to the binding information;
Digital Signature module 35, for being digitally signed to Hash operation result;
Information cochain module 36, for being uploaded to digital signature result and the binding information in block chain network Block chain node, so that the block chain node carries out sign test to the digital signature result and saves after sign test passes through The binding information.
In a kind of possible implementation, the information binding module 33 be can specifically include:
Identification information encryption unit obtains the first encryption information for encrypting to the identification information;
First information binding unit, for binding the test instruction and first encryption information.
In a kind of possible implementation, the identification information encryption unit is specifically used for: utilizing the public key pair of monitoring party The identification information carries out asymmetric encryption, and the monitoring party is to carry out confirmation of responsibility to the behavioral test of the test side Manager.
In a kind of possible implementation, the information binding module 33 be can specifically include:
Instruction features recognition unit, the instruction features that the test instructs for identification;
Instruction description unit generates corresponding instruction description letter for the test instruction to meet preset instructions feature Breath;
Second information binding unit, for binding the test instruction, the identification information and described instruction description Information.
In a kind of possible implementation, the information binding module 33 be can specifically include:
Instruction acquisition unit, for collecting the test instruction;
Third instructs binding unit, for bound after meeting default binding trigger condition collection test instruction and Identification information.
In a kind of possible implementation, the test maintenance device can also include:
First protective module is used for before the Hash operation module 34 carries out Hash operation to the binding information, Coded treatment is carried out to the binding information using custom coding rule, obtains encoded information;It is breathed out when monitoring that needs trigger When uncommon operation, processing is decoded to the encoded information using customized decoding rule, the binding information is obtained with reduction, The customized decoding rule is decoding rule corresponding with the custom coding rule.
In a kind of possible implementation, the test maintenance device can also include:
Second protective module is used for before the Hash operation module 34 carries out Hash operation to the binding information, Asymmetric encryption is carried out to the binding information using the public key of the server, obtains the second encryption information;When monitor need When triggering Hash operation, second encryption information is decrypted using the private key of the server, institute is obtained with reduction State binding information.
In a kind of possible implementation, the test maintenance device can also include:
Permission determining module is used for before instruction acquisition module 31 obtains test instruction, according to the area of the test side The historical test data saved in block chain account testing result or block chain network, determines whether the test side there is instruction to mention Hand power over limit;
Voucher issues module, for when the permission determining module determine the test side have instruction submit permission after, The terminal held to the test side issues corresponding instruction and submits authority credentials, the terminal foundation held so as to the test side Described instruction submits authority credentials to submit the test instruction to the server, and described instruction submits authority credentials to utilize institute The public key for stating test side carries out the voucher obtained after asymmetric encryption.
In a kind of possible implementation, the information cochain module 36 be can specifically include:
Whether moment detection unit, the legal cochain moment for detecting current time with obtaining in advance are consistent;
Chain element in information is used under current time and the legal cochain moment unanimous circumstances, by the number Signature result and the binding information are uploaded to the block chain node in block chain network.
In a kind of possible implementation, the information cochain module 36 be can specifically include:
Node screening unit, for the information on load and location information according to current each block chain node, to the block Block chain link point in chain network is screened, and destination node is obtained;
Information uploading unit, for the digital signature result and the binding information to be uploaded to the destination node.
In a kind of possible implementation, the information cochain module 36 specifically can be used for: multiple numbers are signed Name result and the corresponding binding information are uploaded to the different block chain nodes in block chain network respectively.
Device provided by the embodiments of the present application surveys test instruction with corresponding after obtaining and having executed test instruction The identification information of examination side is bound, will be digital after successively carrying out Hash operation and digital signature to binding information Signature result and binding information are uploaded to the block chain node in block chain network, so that the block chain node is to the number Signature result carries out sign test and saves the binding information after sign test passes through.It can be seen that the embodiment of the present application is to pass through Block chain network saves above-mentioned binding information, also, above-mentioned binding information is the body to test instruction and corresponding test side What part identification information obtained after being bound, mean after carrying out cochain to above-mentioned binding information in this way, above-mentioned binding information In test instruction, identification information and the binding relationship between them, just can not be tampered, later period monitoring party is carrying out When the Liability Retroact of test accident, test instruction relevant to test accident can be utilized accurately to look into from block chain network The identification information with above-mentioned test instruction binding is found, to accurately trace back to practical person liable, namely ensure that institute Consistency between the person liable of retrospect and practical person liable avoids the occurrence of Liability Retroact fails.
Figure 16 is a kind of test maintenance device provided by the embodiments of the present application, the terminal held applied to test side, comprising:
Creation module 41 is instructed, for creating test instruction;The test instruction is used for testing service device;
Instruction sending module 42, for sending the test instruction to the server;
Information binding module 43 is bound the test instruction and identification information, is obtained after getting feedback information To binding information;The identification information is used to characterize the identity of the test side;The feedback information is the server The prompt information fed back after the test instruction is executed;
Hash operation module 44, for carrying out Hash operation to the binding information;
Digital Signature module 45, for being digitally signed to Hash operation result;
Information cochain module 46, for being uploaded to digital signature result and the binding information in block chain network Block chain node, so that the block chain node carries out sign test to the digital signature result and saves after sign test passes through The binding information.
That is, the operation for information binding, Hash operation, digital signature and the information cochain originally completed by server, All turn to be completed by test side's terminal in the present embodiment, and the side's of test terminal is to have executed test instruction simultaneously in server After getting the prompt information that the instruction testing of server feedback finishes, above- mentioned information binding, Hash operation, number is just unfolded The operation such as signature and information cochain.In addition, the information binding executed by test side's terminal in the present embodiment, Hash operation, number Between the relevant operation executed by server in the operations and previous embodiment such as word signature and information cochain, in addition to executing subject Difference except, remaining technical detail is substantially similar, so the corresponding function module is completed in related the present embodiment The technical detail description of the operations such as information binding, Hash operation, digital signature and information cochain can be with reference to previous embodiment Corresponding contents, it is not reinflated herein to repeat.
Further, the embodiment of the present application also provides a kind of electronic equipment.Wherein, above-mentioned electronic equipment is either such as Server 50 shown in Figure 17 are also possible to terminal 60 as shown in figure 18.Figure 17 and Figure 18 is according to an exemplary implementation The electronic devices structure figure exemplified, the content in figure are not construed as any restrictions to the use scope of the application.
Figure 17 is a kind of structural schematic diagram of server provided by the embodiments of the present application.The server 50, specifically can wrap Include: at least one processor 51, at least one processor 52, power supply 53, communication interface 54, input/output interface 55 and communication are total Line 56.Wherein, for storing computer program, the computer program is loaded and is held by the processor 51 memory 52 Row, to realize the correlation step tested in monitoring and managing method executed disclosed in aforementioned any embodiment by server.
In the present embodiment, power supply 53 is used to provide operating voltage for each hardware device on server 50;Communication interface 54 It can be the data transmission channel between the creation of server 50 and external device, the communication protocol followed is can be suitable for The random communication protocol of technical scheme does not limit it specifically herein;Input/output interface 55, it is outer for obtaining Boundary's input data or outwardly output data, specific interface type can be chosen according to concrete application, herein Without specifically limiting.
In addition, the carrier that memory 52 is stored as resource, can be read-only memory, random access memory, disk or CD etc., the resource stored thereon include operating system 521, computer program 522 and data 523 etc., and storage mode can be with Be it is of short duration storage or permanently store.
Wherein, operating system 521 is used to manage and each hardware device and computer program in control server 50 522, to realize operation and processing of the processor 51 to mass data 523 in memory 52, can be Windows Server, Netware, Unix, Linux etc..Computer program 522 in addition to include can be used in completing disclosed in aforementioned any embodiment by Except the computer program for the test monitoring and managing method that server executes, can further include can be used in completing other it is specific The computer program of work.Data 523 in addition to may include server be collected into test instruction and test side identification It can also include the business datums such as game data, electric business transaction data outside the data such as information.
Figure 18 is a kind of structural schematic diagram of terminal provided by the embodiments of the present application, which can specifically include but not It is limited to smart phone, tablet computer, laptop or desktop computer etc..
In general, the terminal 60 in the present embodiment includes: processor 61 and memory 62.
Wherein, processor 61 may include one or more processing cores, such as 4 core processors, 8 core processors Deng.Processor 61 can use DSP (Digital Signal Processing, Digital Signal Processing), FPGA (Field- Programmable Gate Array, field programmable gate array), PLA (Programmable Logic Array, may be programmed Logic array) at least one of example, in hardware realize.Processor 61 also may include primary processor and coprocessor, main place Reason device is the processor for being handled data in the awake state, also referred to as CPU (Central Processing Unit, central processing unit);Coprocessor is the low power processor for being handled data in the standby state.? In some embodiments, processor 61 can be integrated with GPU (Graphics Processing Unit, image processor), GPU For being responsible for the rendering and drafting of content to be shown needed for display screen.In some embodiments, processor 61 can also include AI (Artificial Intelligence, artificial intelligence) processor, the AI processor is for handling the calculating in relation to machine learning Operation.
Memory 62 may include one or more computer readable storage mediums, which can be with It is non-transient.Memory 62 may also include high-speed random access memory and nonvolatile memory, such as one or more A disk storage equipment, flash memory device.In the present embodiment, memory 62 is at least used to store following computer program 621, Wherein, after which is loaded and executed by processor 61, it is disclosed by terminal to can be realized aforementioned any embodiment The correlation step in test monitoring and managing method that side executes.In addition, the resource that memory 62 is stored can also include operating system 622 and data 623 etc., storage mode can be of short duration storage or permanently store.Wherein, operating system 622 may include Windows, Unix, Linux etc..Data 623 can include but is not limited to test director data, user ID data etc..
In some embodiments, terminal 60, which may also include, has display screen 63, input/output interface 64, communication interface 65, passes Sensor 66, power supply 67 and communication bus 68.
It will be understood by those skilled in the art that the restriction of the not structure paired terminal 60 of structure shown in Figure 18, can wrap It includes than illustrating more or fewer components.
Further, the embodiment of the present application also discloses a kind of storage medium, is stored with computer in the storage medium Executable instruction when the computer executable instructions are loaded and executed by processor, is realized disclosed in aforementioned any embodiment The test monitoring and managing method step executed by server, or realize that the disclosed test executed by terminal side of aforementioned any embodiment is supervised Pipe method and step.
It should be pointed out that above are only the preferred embodiment of the application, it is all in the application not to limit the application Spirit and principle within, any modification, equivalent replacement, improvement and so on, should be included in the application protection scope it It is interior.
Each embodiment in this specification is described in a progressive manner, the highlights of each of the examples are with it is other The difference of embodiment, same or similar part may refer to each other between each embodiment.For being filled disclosed in embodiment For setting, since it is corresponded to the methods disclosed in the examples, so being described relatively simple, related place is referring to method part Explanation.
Detailed Jie has been carried out to a kind of test monitoring and managing method, device, equipment and storage medium provided herein above It continues, specific examples are used herein to illustrate the principle and implementation manner of the present application, and the explanation of above embodiments is only It is to be used to help understand the method for this application and its core ideas;At the same time, for those skilled in the art, according to this Shen Thought please, there will be changes in the specific implementation manner and application range, in conclusion the content of the present specification should not manage Solution is the limitation to the application.

Claims (14)

1. a kind of test monitoring and managing method characterized by comprising
It obtains and executes test instruction;The test instruction is for testing the server;
The test instruction and identification information are bound, binding information is obtained;The identification information is submitted for characterizing The identity of the test side of the test instruction;
Hash operation is carried out to the binding information, and Hash operation result is digitally signed;
Digital signature result and the binding information are uploaded to the block chain node in block chain network, so as to the area Block chain node carries out sign test to the digital signature result and saves the binding information after sign test passes through.
2. test monitoring and managing method according to claim 1, which is characterized in that the binding test instruction and identity mark Know information, comprising:
The identification information is encrypted, the first encryption information is obtained;
Bind the test instruction and first encryption information.
3. test monitoring and managing method according to claim 2, which is characterized in that described to add to the identification information It is close, comprising:
Asymmetric encryption is carried out to the identification information using the public key of monitoring party, the monitoring party is to the test side Behavioral test carry out confirmation of responsibility manager.
4. test monitoring and managing method according to claim 1, which is characterized in that the binding test instruction and identity mark Know information, comprising:
Identify the instruction features of the test instruction;
Corresponding instruction description information is generated to meet the test instruction of preset instructions feature;
Bind the test instruction, the identification information and described instruction description information.
5. test monitoring and managing method according to claim 1, which is characterized in that the binding test instruction and identity mark Know information, comprising:
Collect the test instruction;
Meet the test instruction and identification information that collection is bound after presetting binding trigger condition.
6. test monitoring and managing method according to claim 5, which is characterized in that described to carry out Hash fortune to the binding information Before calculation, further includes:
Coded treatment is carried out to the binding information using custom coding rule, obtains encoded information;
When monitoring to need to trigger Hash operation, processing is decoded to the encoded information using customized decoding rule, The binding information is obtained with reduction, the customized decoding rule is advised for decoding corresponding with the custom coding rule Then.
7. test monitoring and managing method according to claim 5, which is characterized in that described to carry out Hash fortune to the binding information Before calculation, further includes:
Asymmetric encryption is carried out to the binding information using the public key of the server, obtains the second encryption information;
When monitoring to need to trigger Hash operation, second encryption information is solved using the private key of the server It is close, the binding information is obtained with reduction.
8. test monitoring and managing method according to claim 1, which is characterized in that the acquisition simultaneously executes before testing instruction, Further include:
According to the historical test data saved in the block chain account testing result or block chain network of the test side, institute is determined State whether test side there is instruction to submit permission;
If it is determined that there is instruction to submit permission for the test side, then corresponding instruction is issued to the terminal that the test side holds and mentioned Authority credentials is handed over, so that the terminal that the test side holds submits authority credentials to submit institute to the server according to described instruction State test instruction, described instruction submit authority credentials be using the test side public key progress asymmetric encryption after obtain with Card.
9. test monitoring and managing method according to any one of claims 1 to 8, which is characterized in that described by digital signature result The block chain node in block chain network is uploaded to the binding information, comprising:
Whether detection current time and the legal cochain moment obtained in advance are consistent;
If current time is consistent with the legal cochain moment, the digital signature result and the binding information are uploaded to Block chain node in block chain network.
10. test monitoring and managing method according to any one of claims 1 to 8, which is characterized in that described by digital signature result The block chain node in block chain network is uploaded to the binding information, comprising:
According to the information on load and location information of current each block chain node, the block chain link in the block chain network is clicked through Row screening, obtains destination node;
The digital signature result and the binding information are uploaded to the destination node.
11. test monitoring and managing method according to any one of claims 1 to 8, which is characterized in that described by digital signature result The block chain node in block chain network is uploaded to the binding information, comprising:
Multiple digital signature results and the corresponding binding information are uploaded in block chain network not respectively Same block chain node.
12. a kind of test maintenance device characterized by comprising
Instruction acquisition module, for obtaining test instruction;The test instruction is for testing the server;
Instruction execution module, for executing the test instruction;
Information binding module obtains binding information for binding the test instruction and identification information;The identity Information is used to characterize the identity for submitting the test side of the test instruction;
Hash operation module, for carrying out Hash operation to the binding information;
Digital Signature module, for being digitally signed to Hash operation result;
Information cochain module, for digital signature result and the binding information to be uploaded to the block in block chain network Chain node is tied up so as to the block chain node to digital signature result progress sign test and after sign test passes through described in preservation Determine information.
13. a kind of electronic equipment, which is characterized in that the electronic equipment includes processor and memory;Wherein, the memory For storing computer program, the computer program is loaded by the processor and is executed to realize such as claim 1 to 11 Described in any item test monitoring and managing methods.
14. a kind of storage medium, which is characterized in that be stored with computer executable instructions, the calculating in the storage medium When machine executable instruction is loaded and executed by processor, test monitoring and managing method as described in any one of claim 1 to 11 is realized.
CN201910561207.9A 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium Active CN110263585B (en)

Priority Applications (2)

Application Number Priority Date Filing Date Title
CN201911269625.7A CN110826111B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium
CN201910561207.9A CN110263585B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910561207.9A CN110263585B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium

Related Child Applications (1)

Application Number Title Priority Date Filing Date
CN201911269625.7A Division CN110826111B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium

Publications (2)

Publication Number Publication Date
CN110263585A true CN110263585A (en) 2019-09-20
CN110263585B CN110263585B (en) 2024-04-26

Family

ID=67921785

Family Applications (2)

Application Number Title Priority Date Filing Date
CN201911269625.7A Active CN110826111B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium
CN201910561207.9A Active CN110263585B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium

Family Applications Before (1)

Application Number Title Priority Date Filing Date
CN201911269625.7A Active CN110826111B (en) 2019-06-26 2019-06-26 Test supervision method, device, equipment and storage medium

Country Status (1)

Country Link
CN (2) CN110826111B (en)

Cited By (17)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110572480A (en) * 2019-10-14 2019-12-13 腾讯科技(深圳)有限公司 method, device and equipment for realizing calibration of test equipment
CN110941533A (en) * 2019-11-20 2020-03-31 腾讯科技(深圳)有限公司 Monitoring method, monitoring device and computer readable storage medium
CN111079136A (en) * 2019-11-07 2020-04-28 北京科技大学 Fog computing intrusion detection feature sharing system based on block chain technology
CN111291339A (en) * 2020-02-19 2020-06-16 上海方付通商务服务有限公司 Processing method, device and equipment of block chain data and storage medium
CN111324517A (en) * 2020-01-20 2020-06-23 阿尔法云计算(深圳)有限公司 Application service supervision method, supervision server and storage medium
CN111563365A (en) * 2020-03-31 2020-08-21 岭东核电有限公司 Test standard work order modification information processing method and device and computer equipment
CN111679648A (en) * 2020-05-22 2020-09-18 浙江浙能技术研究院有限公司 Multivariate closed-loop control loop performance evaluation method based on Gaussian process regression
CN111786791A (en) * 2020-06-16 2020-10-16 湖南天河国云科技有限公司 Industrial Internet data acquisition method based on block chain and gateway
CN111866088A (en) * 2020-06-29 2020-10-30 深圳壹账通智能科技有限公司 Block chain-based test method and device, computer equipment and storage medium
CN111953940A (en) * 2020-08-06 2020-11-17 中标慧安信息技术股份有限公司 Uploading processing method and system for monitoring video
CN111988149A (en) * 2020-08-31 2020-11-24 中国信息通信研究院 Data sharing method, device and system in industrial internet
CN112015460A (en) * 2020-09-09 2020-12-01 南京工程学院 Code tracing method and system based on block chain technology
CN112925846A (en) * 2021-01-18 2021-06-08 迅鳐成都科技有限公司 Historical operation tracing method and system based on block chain and identity authentication
CN113221159A (en) * 2021-04-19 2021-08-06 湖北邮电规划设计有限公司 Epidemic situation reporting system based on block chain
CN114143067A (en) * 2021-11-26 2022-03-04 天翼数字生活科技有限公司 Instruction processing method and system of dial testing system
CN115150360A (en) * 2022-06-28 2022-10-04 北京送好运信息技术有限公司 E-mail address and block chain address binding method based on block chain technology
CN115277686A (en) * 2021-04-30 2022-11-01 ***通信集团辽宁有限公司 Data transmission method, device and equipment and computer storage medium

Families Citing this family (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112910724B (en) * 2020-06-24 2022-08-09 支付宝(杭州)信息技术有限公司 Pressure testing method, device and system for block chain network
CN111783122B (en) * 2020-07-03 2022-07-15 常熟中信金桥科技服务有限公司 Research and development trial-production information management method and system
CN112163171B (en) * 2020-09-21 2022-03-18 中国电子科技网络信息安全有限公司 Data chaining method based on terminal signature
CN112269838B (en) * 2020-11-18 2023-07-25 网易(杭州)网络有限公司 Blockchain-based supervision method and device, electronic equipment and storage medium
CN112711631B (en) * 2020-11-27 2022-07-08 国网山东省电力公司营销服务中心(计量中心) Digital twin information synchronization method, system, readable storage medium and device
CN112333206B (en) * 2020-12-24 2021-03-30 长沙树根互联技术有限公司 Safety test method and device and electronic equipment
CN115114603B (en) * 2021-03-17 2024-06-11 ***通信集团福建有限公司 Base station equipment data management method and device and electronic equipment
CN113672994B (en) * 2021-09-03 2023-12-01 中国联合网络通信集团有限公司 Cooking equipment data management method, device and system based on blockchain
CN115277179A (en) * 2022-07-26 2022-11-01 湖南三湘银行股份有限公司 Open platform comprehensive safety protection method based on multi-step protection
CN116684207B (en) * 2023-08-03 2023-10-20 杭州字节方舟科技有限公司 Method, device, equipment and medium for processing monitoring data based on blockchain

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106933709A (en) * 2015-12-31 2017-07-07 北京金山云网络技术有限公司 A kind of method of testing and device
WO2018050081A1 (en) * 2016-09-13 2018-03-22 ***通信有限公司研究院 Device identity authentication method and apparatus, electric device, and storage medium
CN108200208A (en) * 2018-02-11 2018-06-22 广西师范学院 Logistics block chain common recognition algorithm based on cloud computing
CN108833514A (en) * 2018-06-01 2018-11-16 众安信息技术服务有限公司 Audit log processing method, device and Log Audit System based on block chain
CN109447648A (en) * 2018-12-07 2019-03-08 深圳市智税链科技有限公司 The method of recorded data zone block, accounting nodes and medium in block chain network

Family Cites Families (10)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9122789B1 (en) * 2008-11-24 2015-09-01 Jpmorgan Chase Bank, N.A. System and method for testing applications with a load tester and testing translator
US20150187223A1 (en) * 2013-12-30 2015-07-02 Pearson Education, Inc. Deidentified access of instructional content
CN106469113B (en) * 2015-08-18 2023-08-08 腾讯科技(深圳)有限公司 Application program testing method and system
CN108874596B (en) * 2017-05-08 2022-11-08 龙芯中科(山西)技术有限公司 Server stability testing method and server
CN108076063A (en) * 2017-12-25 2018-05-25 天津理工大学 Network O&M auditing method, server terminal and client based on block chain
CN108694500B (en) * 2018-04-26 2021-04-13 布比(北京)网络技术有限公司 Block chain-based digital asset circulation method and system
CN109194708B (en) * 2018-07-24 2021-07-13 哈尔滨工程大学 Distributed storage system based on block chain technology and identity authentication method thereof
CN109800248A (en) * 2018-12-17 2019-05-24 上海点融信息科技有限责任公司 Digital content for block chain network is traced to the source and recording method, storage medium, calculating equipment
CN109741063A (en) * 2019-01-10 2019-05-10 众安信息技术服务有限公司 Digital signature method and device based on block chain
CN109828958A (en) * 2019-01-31 2019-05-31 北京瑞卓喜投科技发展有限公司 Event recording method and record system based on block chain

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106933709A (en) * 2015-12-31 2017-07-07 北京金山云网络技术有限公司 A kind of method of testing and device
WO2018050081A1 (en) * 2016-09-13 2018-03-22 ***通信有限公司研究院 Device identity authentication method and apparatus, electric device, and storage medium
CN108200208A (en) * 2018-02-11 2018-06-22 广西师范学院 Logistics block chain common recognition algorithm based on cloud computing
CN108833514A (en) * 2018-06-01 2018-11-16 众安信息技术服务有限公司 Audit log processing method, device and Log Audit System based on block chain
CN109447648A (en) * 2018-12-07 2019-03-08 深圳市智税链科技有限公司 The method of recorded data zone block, accounting nodes and medium in block chain network

Cited By (28)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110572480A (en) * 2019-10-14 2019-12-13 腾讯科技(深圳)有限公司 method, device and equipment for realizing calibration of test equipment
CN111079136B (en) * 2019-11-07 2022-02-11 北京科技大学 Fog computing intrusion detection feature sharing system based on block chain technology
CN111079136A (en) * 2019-11-07 2020-04-28 北京科技大学 Fog computing intrusion detection feature sharing system based on block chain technology
CN110941533A (en) * 2019-11-20 2020-03-31 腾讯科技(深圳)有限公司 Monitoring method, monitoring device and computer readable storage medium
CN111324517A (en) * 2020-01-20 2020-06-23 阿尔法云计算(深圳)有限公司 Application service supervision method, supervision server and storage medium
CN111324517B (en) * 2020-01-20 2023-08-18 阿尔法云计算(深圳)有限公司 Application service supervision method, supervision server and storage medium
CN111291339A (en) * 2020-02-19 2020-06-16 上海方付通商务服务有限公司 Processing method, device and equipment of block chain data and storage medium
CN111291339B (en) * 2020-02-19 2024-02-06 上海方付通商务服务有限公司 Method, device, equipment and storage medium for processing blockchain data
CN111563365A (en) * 2020-03-31 2020-08-21 岭东核电有限公司 Test standard work order modification information processing method and device and computer equipment
CN111563365B (en) * 2020-03-31 2023-09-19 岭东核电有限公司 Method and device for processing modification information of test standard worksheet and computer equipment
CN111679648A (en) * 2020-05-22 2020-09-18 浙江浙能技术研究院有限公司 Multivariate closed-loop control loop performance evaluation method based on Gaussian process regression
CN111786791A (en) * 2020-06-16 2020-10-16 湖南天河国云科技有限公司 Industrial Internet data acquisition method based on block chain and gateway
CN111866088A (en) * 2020-06-29 2020-10-30 深圳壹账通智能科技有限公司 Block chain-based test method and device, computer equipment and storage medium
CN111866088B (en) * 2020-06-29 2022-08-26 深圳壹账通智能科技有限公司 Block chain based test method and device, computer equipment and storage medium
CN111953940B (en) * 2020-08-06 2021-07-27 中标慧安信息技术股份有限公司 Uploading processing method and system for monitoring video
CN111953940A (en) * 2020-08-06 2020-11-17 中标慧安信息技术股份有限公司 Uploading processing method and system for monitoring video
CN111988149B (en) * 2020-08-31 2022-09-23 中国信息通信研究院 Data sharing method, device and system in industrial internet
CN111988149A (en) * 2020-08-31 2020-11-24 中国信息通信研究院 Data sharing method, device and system in industrial internet
CN112015460A (en) * 2020-09-09 2020-12-01 南京工程学院 Code tracing method and system based on block chain technology
CN112015460B (en) * 2020-09-09 2023-11-03 南京工程学院 Code responsibility-following method and system based on block chain technology
CN112925846A (en) * 2021-01-18 2021-06-08 迅鳐成都科技有限公司 Historical operation tracing method and system based on block chain and identity authentication
CN113221159A (en) * 2021-04-19 2021-08-06 湖北邮电规划设计有限公司 Epidemic situation reporting system based on block chain
CN115277686B (en) * 2021-04-30 2024-04-19 ***通信集团辽宁有限公司 Data transmission method, device, equipment and computer storage medium
CN115277686A (en) * 2021-04-30 2022-11-01 ***通信集团辽宁有限公司 Data transmission method, device and equipment and computer storage medium
CN114143067A (en) * 2021-11-26 2022-03-04 天翼数字生活科技有限公司 Instruction processing method and system of dial testing system
CN114143067B (en) * 2021-11-26 2024-04-19 天翼视联科技有限公司 Instruction processing method and system of dial testing system
CN115150360B (en) * 2022-06-28 2023-12-19 北京送好运信息技术有限公司 Mailbox address and blockchain address binding method based on blockchain technology
CN115150360A (en) * 2022-06-28 2022-10-04 北京送好运信息技术有限公司 E-mail address and block chain address binding method based on block chain technology

Also Published As

Publication number Publication date
CN110826111B (en) 2021-08-13
CN110826111A (en) 2020-02-21
CN110263585B (en) 2024-04-26

Similar Documents

Publication Publication Date Title
CN110263585A (en) Test monitoring and managing method, device, equipment and storage medium
CN110032545A (en) File memory method, system and electronic equipment based on block chain
CN103023657B (en) Security verification system based on distributed network transaction
CN109995523B (en) Activation code management method and device and activation code generation method and device
US10812486B2 (en) Utilizing smart data tags to track and control secure enterprise data
CN113495920A (en) Content auditing system, method and device based on block chain and storage medium
CN110866265A (en) Data storage method, device and storage medium based on block chain
CN109951490A (en) Webpage integrity assurance, system and electronic equipment based on block chain
CN111488372A (en) Data processing method, device and storage medium
CN110932859A (en) User information processing method, device and equipment and readable storage medium
CN110866261A (en) Data processing method and device based on block chain and storage medium
CN107040520A (en) A kind of cloud computing data-sharing systems and method
CN111339141A (en) Data transmission method, block link node equipment and medium
CN111680282B (en) Node management method, device, equipment and medium based on block chain network
JP2022006164A (en) Method, device, electronic device, computer-readable storage media and computer program for processing user request
CN115296794A (en) Key management method and device based on block chain
CN111582876A (en) Operation authentication method, device, storage medium and electronic device
CN111274597A (en) Data processing method and equipment
CN107370605A (en) One kind is based on SHA256 challenge response certification bluetooth lock management methods
CN112883425A (en) Data processing method based on block chain and block chain link point
CN110232570B (en) Information supervision method and device
CN115567218A (en) Data processing method and device of security certificate based on block chain and server
CN115118434A (en) Key management method and device based on block chain
CN114418769A (en) Block chain transaction charging method and device and readable storage medium
CN113327169A (en) Claims settlement method and device based on block chain and electronic equipment

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
REG Reference to a national code

Ref country code: HK

Ref legal event code: DE

Ref document number: 40008584

Country of ref document: HK

SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant