Mobile internet App
2 app Test points
2.1 Safety Testing
2.1.1 Software permissions
1 risk of privacy breaches: including access to Mobile information, access to contact information, etc.
2 checking the input validity of the app, authentication, authorization, sensitive data storage, data encryption, etc.
3 restrictions/allow use of mobile phone function to pick up the internet
4 restrictions/allow the use of mobile phone to send reception information function
5 Limit/Allow application to register auto-start Application
6 restricting or using local connections
7 limit/allow use of mobile phone photo or recording
8 limit/allow use of mobile phone to read user data
9 Restrict/allow use of mobile phone to write user data
10 Detection of user authorization levels, data leaks, unauthorized access to the app
2.1.2 Installation and uninstallation security
1 The application should be installed correctly on the device driver
2 ability to locate the appropriate icon for the application on the installation device driver
3 whether to include digital signature information
4JAD files and all managed properties contained in the jar package and their values must be correct
The data content displayed by the 5JAD file should be consistent with the content displayed by the application
6 The installation path should be able to specify
7 Application cannot pre-set auto-start without user's permission
8 Uninstall is safe, its installed files are all uninstalled
9 uninstalling the files produced during user use is prompted
10 If the configuration information modified is restored
11 does uninstalling affect the functionality of other software
12 uninstallation should remove all files
2.1.3 Data Security
1 when a password or other sensitive data is lost to the application, it will not be stored in the device, and the password will not be decoded.
2 The password of the loser will not be displayed in clear text form.
3 passwords, credit card details, or other sensitive data will not be stored in their pre-lost
The location
4 The individual ID or password length of the different applications must be at least between 4--8 digit lengths
5 When an application processes credit card details, or other sensitive data, it is not in clear text
Write the data to a separate file or to a temporary file. To
6 prevents an application from terminating abnormally and without a temporary file on its side, the file may be attacked by a human attacker and then read the data.
7 when sensitive data is being lost to the application
It will not be stored in the device
8 backups should be encrypted
Recovery data should consider the exception of the recovery process?? data, such as interruption, should be verified before use
9 The application should consider the user-prompted information or security of the system or virtual machine
Sue
10 applications cannot ignore user prompts or security warnings generated by the system or virtual machine
It is also not possible to spoof a user with display misleading information before the security warning is displayed, and the application should not impersonate a security warning to mislead the user
11 Before data is deleted, the application should notify the user or the application to provide a "Cancel" command operation
12 "Cancel" command operation can be implemented according to the design requirements of its function
13 applications should be able to handle when applications are not allowed to connect to personal information management
Case
14 When you perform a read or write user information operation, the application will send an error message to the user
15 do not damage the side of any content in the personal information management application without the user's express permission
16 the application reads and writes the data correctly.
17 applications should have exception protection.
18 If important data in the database is being rewritten
Should inform the user promptly
19 can reasonably handle the errors that occur
20 The user should be prompted in unexpected situations
2.2
Install, uninstall test
Verify that the app is properly installed, run, uninstalled, and used for system resources before and after operation and operation
2.2.1
Installation
1 software on different operating systems
Palm
OS
Symbian
Linux
Android
Ios
Black Berryos 6.0
Windows Phone 7 is installed properly.
2 after the installation of the software will be able to run properly, after the installation of the folder and files are written
to the specified directory.
3 The combination of the various options for software installation conforms to the summary design instructions
4 The Software Installation Wizard
UI Test
5 The Software installation process can be canceled, click Cancel, the file is written as
To design instructions for processing
6 during the installation of the software, the unexpected processing is in accordance with the requirements (such as freezing, restarting,
Power
7 If the installation space is not sufficient when the appropriate prompt
8 No redundant directory structures and files are generated after installation
9 for installations that require network authentication, try it out in the case of a net break
10 also need to test the installation manual, according to the installation manual can be installed smoothly
2.2.2
Unloading
1 Delete the installation folder directly uninstall whether there is a prompt message.
2 Test the system directly uninstall the program if there is a prompt message.
3 After testing the uninstall file, delete all the installation folders.
4 test of unexpected conditions during uninstallation (e.g., crash, power outage, restart)
5 Uninstall supports cancel feature, click Cancel after software uninstall condition
Mobile internet App