Mobile internet App

Source: Internet
Author: User

Mobile internet App

2 app Test points

2.1 Safety Testing

2.1.1 Software permissions

1 risk of privacy breaches: including access to Mobile information, access to contact information, etc.

2 checking the input validity of the app, authentication, authorization, sensitive data storage, data encryption, etc.

3 restrictions/allow use of mobile phone function to pick up the internet

4 restrictions/allow the use of mobile phone to send reception information function

5 Limit/Allow application to register auto-start Application

6 restricting or using local connections

7 limit/allow use of mobile phone photo or recording

8 limit/allow use of mobile phone to read user data

9 Restrict/allow use of mobile phone to write user data

10 Detection of user authorization levels, data leaks, unauthorized access to the app

2.1.2 Installation and uninstallation security

1 The application should be installed correctly on the device driver

2 ability to locate the appropriate icon for the application on the installation device driver

3 whether to include digital signature information

4JAD files and all managed properties contained in the jar package and their values must be correct

The data content displayed by the 5JAD file should be consistent with the content displayed by the application

6 The installation path should be able to specify

7 Application cannot pre-set auto-start without user's permission

8 Uninstall is safe, its installed files are all uninstalled

9 uninstalling the files produced during user use is prompted

10 If the configuration information modified is restored

11 does uninstalling affect the functionality of other software

12 uninstallation should remove all files

2.1.3 Data Security

1 when a password or other sensitive data is lost to the application, it will not be stored in the device, and the password will not be decoded.

2 The password of the loser will not be displayed in clear text form.

3 passwords, credit card details, or other sensitive data will not be stored in their pre-lost

The location

4 The individual ID or password length of the different applications must be at least between 4--8 digit lengths

5 When an application processes credit card details, or other sensitive data, it is not in clear text

Write the data to a separate file or to a temporary file. To

6 prevents an application from terminating abnormally and without a temporary file on its side, the file may be attacked by a human attacker and then read the data.

7 when sensitive data is being lost to the application

It will not be stored in the device

8 backups should be encrypted

Recovery data should consider the exception of the recovery process?? data, such as interruption, should be verified before use

9 The application should consider the user-prompted information or security of the system or virtual machine

Sue

10 applications cannot ignore user prompts or security warnings generated by the system or virtual machine

It is also not possible to spoof a user with display misleading information before the security warning is displayed, and the application should not impersonate a security warning to mislead the user

11 Before data is deleted, the application should notify the user or the application to provide a "Cancel" command operation

12 "Cancel" command operation can be implemented according to the design requirements of its function

13 applications should be able to handle when applications are not allowed to connect to personal information management

Case

14 When you perform a read or write user information operation, the application will send an error message to the user

15 do not damage the side of any content in the personal information management application without the user's express permission

16 the application reads and writes the data correctly.

17 applications should have exception protection.

18 If important data in the database is being rewritten

Should inform the user promptly

19 can reasonably handle the errors that occur

20 The user should be prompted in unexpected situations

2.2

Install, uninstall test

Verify that the app is properly installed, run, uninstalled, and used for system resources before and after operation and operation

2.2.1

Installation

1 software on different operating systems

Palm

OS

Symbian

Linux

Android

Ios

Black Berryos 6.0

Windows Phone 7 is installed properly.

2 after the installation of the software will be able to run properly, after the installation of the folder and files are written

to the specified directory.

3 The combination of the various options for software installation conforms to the summary design instructions

4 The Software Installation Wizard

UI Test

5 The Software installation process can be canceled, click Cancel, the file is written as

To design instructions for processing

6 during the installation of the software, the unexpected processing is in accordance with the requirements (such as freezing, restarting,

Power

7 If the installation space is not sufficient when the appropriate prompt

8 No redundant directory structures and files are generated after installation

9 for installations that require network authentication, try it out in the case of a net break

10 also need to test the installation manual, according to the installation manual can be installed smoothly

2.2.2

Unloading

1 Delete the installation folder directly uninstall whether there is a prompt message.

2 Test the system directly uninstall the program if there is a prompt message.

3 After testing the uninstall file, delete all the installation folders.

4 test of unexpected conditions during uninstallation (e.g., crash, power outage, restart)

5 Uninstall supports cancel feature, click Cancel after software uninstall condition

Mobile internet App

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.