Point burying testing method, device and system

A test method and test-end technology, applied in the computer field, can solve the problems of wasting time comparison, reducing system bandwidth, database resource utilization, etc., and achieve the effect of saving packet capture operations and shortening comparison time

Inactive Publication Date: 2018-07-24
UXIN SHUXIANG BEIJING INFORMATION TECH CO LTD
View PDF5 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The entire test process needs to compare the data captured by charles with the pre-stored requirement documents one by one, which wastes a lot of time in the test process, resulting in a long-term waiting state for the buried point detection system, which reduces the system bandwidth. , database and other resource utilization

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Point burying testing method, device and system
  • Point burying testing method, device and system
  • Point burying testing method, device and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0073] The first aspect of the embodiment of the present application shows a buried point test system, please refer to Picture 1-1 , and 1-2, the system includes:

[0074] Application platform server 31, a data storage server 32 connected to the application platform server 31, the data storage server 32 is set inside the platform server 31 or independently, and the application platform server 31 communicates with the terminal through the Internet 33 phase connection;

[0075] The terminal 33 is configured to send the exposed buried point data to the application platform server;

[0076] The terminal 33 shown in the embodiment of the present application is the most peripheral device in the computer network, and is mainly used for inputting user information and outputting processing results. The mobile terminals shown in the prior art, such as mobile phones and PADs, are all within the scope of protection of the embodiments of the present application.

[0077] The applicatio...

Embodiment 2

[0088] In the buried point testing method shown in the prior art, after the test manually triggers the buried point, the data captured by charles is compared with the pre-stored requirement document. The entire test process needs to compare the data captured by charles with the pre-stored requirement documents one by one, which wastes a lot of time in the test process, resulting in a long-term waiting state for the buried point detection system, which reduces the system bandwidth. , database and other resource utilization.

[0089] In order to solve the above problems, the second aspect of the embodiment of the present application shows a buried point test method, please refer to figure 2 , the method includes:

[0090] S101 triggers the function module after the embedded point of the test terminal, inserts the embedded point file into the corresponding function module of the test end according to the requirement document of the data embedded point, and generates the function...

Embodiment 3

[0099] In order to further shorten the testing time, the embodiment of this application shows a method for comparing buried point files. For details, please refer to image 3 , Embodiment 3 has similar steps to Embodiment 2, and the only difference is that step S102 in the technical solution shown in Embodiment 2 includes:

[0100] S10211 Run the functional module after the point-buying of the testing terminal to generate a point-burying file of the testing side, run the functional module after the point-burying of the testing terminal, and generate the point-buying file of the testing side;

[0101] S10212 Compare the buried point file of the testing end with the buried point file of the testing end, and determine the accuracy of the buried point file of the testing end according to the comparison result.

[0102] In the method shown in the embodiment of the present application, the embedded point file of the testing terminal is generated by running the functional module of t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The embodiment of the invention provides a point burying testing method, device and system. The method comprises the steps that when a client side extracts and measures a point burying file, a test engineer executes a corresponding function module to generate a corresponding point burying data file by running an automated testing script, a corresponding data point burying file can be generated inan app, the two point burying files are compared, if the two point burying files are consistent, point burying testing succeeds, and if the two point burying files are not consistent, problems are found for correction. According to the method, the function module after point burying of an extraction and measurement terminal and the function module after point burying of a testing terminal run separately through the extraction and measurement terminal in the whole extraction and measurement process, the accuracy of the point burying file of the extraction and measurement terminal is determinedaccording to a running result, a package capture tool does not need to be used for intercepting a data package transmitted by the internet, frequent package capture operations are omitted, the comparison time is shortened, the situation is avoided that a detection system bearing buried points is in a waiting state for a long time, and the utilization rate of resources such as system bandwidth anddatabases is increased.

Description

technical field [0001] The invention relates to the field of computer technology, in particular to a buried point testing method, device and system. Background technique [0002] With the rapid development of software technology, various software that can realize functions such as text editing, image processing, chatting, and playing audio and video emerge in an endless stream. Many buried points. When the user is using the software, if the user triggers a function module with preset buried points, the software will send the corresponding buried point data to the server. By analyzing the buried point data, you can know whether the software function is good or not, and then adjust or Improve software functionality. [0003] In order to ensure that the set buried points can be used normally, usually software testers need to test the buried points after setting the buried points. The relevant buried point test method is as follows: After setting the buried point, the softwar...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36
CPCG06F11/3636G06F11/3644
Inventor 夏能支申刘禹
Owner UXIN SHUXIANG BEIJING INFORMATION TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products