Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Security test method and system for mobile terminal applications

A security testing and application technology, applied in software testing/debugging, error detection/correction, instruments, etc., can solve the problem that manual testing is difficult to keep up with the speed of business development, so as to solve data source problems, improve efficiency, and satisfy The effect of security testing requirements

Pending Publication Date: 2021-09-07
SHANGHAI INST OF QUALITY INSPECTION & TECHN RES
View PDF3 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Manual testing will consume a lot of manpower and time, and the rapid development process will also make it difficult for manual testing to keep up with the speed of business development

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security test method and system for mobile terminal applications
  • Security test method and system for mobile terminal applications
  • Security test method and system for mobile terminal applications

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] see figure 1 , figure 1 A schematic diagram of the steps of a security testing method for a mobile application program provided by an embodiment of the present invention, as shown below:

[0035] Step S100, collecting the first message with the application program from the mobile terminal interface;

[0036] In some embodiments, the operating system of the mobile terminal may include operating systems of terminal devices such as an Android (Android) operating system and an Apple mobile phone (IOS) operating system. In order to shield differences between operating systems in one or more embodiments of this specification, corresponding data collection programs may be set in advance according to different types of operating systems.

[0037] By installing the data collection program in the mobile terminal, the first message related to the application program is collected from the interface of the operating system of the mobile terminal through the data collection program...

Embodiment 2

[0046] see figure 2 , figure 2 A schematic diagram of detailed steps of a security testing method for a mobile terminal application program provided by an embodiment of the present invention, as shown below:

[0047] Step S200, through the data collection program in the mobile terminal, collect message data related to the application program from the interface of the operating system of the mobile terminal.

[0048] Step S210, through the underlying interface of the application program, search for the function address of the target function implementing the reflection mechanism, obtain the function address of the target function, call the target function according to the function address, and encapsulate the target function to form an operating system interface.

[0049] Step S220, through the acquired message data in the application program, when the message data is a binary data stream, convert the binary data stream according to a preset data conversion method to obtain ...

Embodiment 3

[0055] see image 3 , image 3 A schematic diagram of a security testing system module of a mobile terminal application program provided by the embodiment of the present invention, which is as follows:

[0056] The collection module 10 is used to collect the first message with the application program from the mobile terminal interface;

[0057] A display module 20, configured to display and obtain a second message according to the first message, where the second message is adjusted message data based on the first message;

[0058] A test module 30, configured to obtain a target security test case corresponding to the type of the second message from a preset security test library;

[0059] The result module 40 is configured to perform data interaction with the target security test case based on the second message to obtain a security test result.

[0060] Such as Figure 4 As shown, the embodiment of the present application provides an electronic device, which includes a me...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a security test method and system for mobile terminal applications and relates to the field of computer software. The security test method for the mobile terminal applications comprises the following steps that: a first message of an application is collected from a mobile terminal interface; a second message is displayed and acquired according to the first message, wherein the second message is message data adjusted based on the first message; a target security test case corresponding to the type of the second message is obtained from a preset security test library; and data interaction is performed with the target security test case based on the second message to obtain a security test result. With the method adopted, the security test efficiency of the interaction process between a mobile terminal and a server in a service scene can be improved. In addition, the invention also provides a security test system for mobile terminal applications.

Description

technical field [0001] The invention relates to the field of computer software, in particular to a method and system for safety testing of mobile application programs. Background technique [0002] At present, after applications applied in domestic business scenarios are promoted to international business scenarios, the security team is usually unable to collect traffic data of international gateways for automated vulnerability testing due to compliance reasons such as the inability to export online data. [0003] In this case, it is necessary to manually conduct a security test on the interaction process between the mobile terminal and the server. Manual testing will consume a lot of manpower and time, and the rapid development process will also make it difficult for manual testing to keep up with the speed of business development. Therefore, how to provide a security testing method to test the interaction process between the client and the server in the international busi...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F11/36
CPCG06F11/3684G06F11/3688
Inventor 康剑萍
Owner SHANGHAI INST OF QUALITY INSPECTION & TECHN RES
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products