Front-end testing method of distributed communication system
A distributed communication and testing method technology, applied in the field of front-end testing of distributed communication systems, can solve problems such as waste of test time, test errors, and test process errors, so as to improve efficiency and accuracy, avoid malicious tampering, and ensure safety sexual effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0085] The client responds to the test command and generates access request data;
[0086] The anomaly detection module intercepts the access request data and performs anomaly detection;
[0087] If the access request data is abnormal, the client responds to the test command again and regenerates the access request data.
Embodiment 2
[0089] The client responds to the test command and generates access request data;
[0090] The anomaly detection module intercepts the access request data and performs anomaly detection;
[0091] The access request data is detected to be normal, and the access request data is sent to the server;
[0092] The server selects a test case corresponding to the function to be tested;
[0093] The server obtains the data to be fed back according to the access request data;
[0094] The server generates response data according to the test case and the data to be fed back;
[0095] The server packs the response data, and at the same time, generates nine identical file packages;
[0096] Ten file packages make up the response data file package set P={P 1 ,P 2 ,P 3 ,P 4 ,P 5 ,P 6 ,P 7 ,P 8 ,P 9 ,P 10};
[0097] The tag address corresponding to each file packet in the response data file packet set P is:
[0098] P 1 =(1,5),P 2 =(2,8),P 3 =(3,12),P 4 =(4,20),P 5 =(5,29)...
Embodiment 3
[0116] The client responds to the test command and generates access request data;
[0117] The anomaly detection module intercepts the access request data and performs anomaly detection;
[0118] The access request data is detected to be normal, and the access request data is sent to the server;
[0119] The server selects a test case corresponding to the function to be tested;
[0120] The server obtains the data to be fed back according to the access request data;
[0121] The server generates response data according to the test case and the data to be fed back;
[0122] The server packs the response data, and at the same time, generates nine identical file packages;
[0123] Ten file packages make up the response data file package set P={P 1 ,P 2 ,P 3 ,P 4 ,P 5 ,P 6 ,P 7 ,P 8 ,P 9 ,P 10};
[0124] The tag address corresponding to each file packet in the response data file packet set P is:
[0125] P 1 =(1,5),P 2 =(2,8),P 3 =(3,13),P 4 =(4,20),P 5 =(5,29)...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com