Automated mobile application verification
First Claim
Patent Images
1. A method, comprising:
- installing, by at least one computing device, an application in a testing computing device;
initiating, by the at least one computing device, execution of the application in the testing computing device;
generating, by the at least one computing device, a user input profile for the application by performing a static analysis on the application;
generating, by the at least one computing device, simulated user input for the application based at least in part on the user input profile generated by performing the static analysis on the application;
providing, by the at least one computing device, the simulated user input to the application executed in the testing computing device; and
verifying, by the at least one computing device, whether the application meets at least one performance criterion in the testing computing device, wherein the at least one performance criterion comprises at least one of;
a stability criterion based at least in part on whether the application becomes unresponsive or a security criterion based at least in part on whether the application accesses a protected resource.
1 Assignment
0 Petitions
Accused Products
Abstract
Disclosed are various embodiments for automatically testing and verifying applications. A user input profile is generated for an application by performing a static analysis on the application. Simulated user input for the application is generated based at least in part on the user input profile. Execution of the application is initiated in a computing device. The simulated user input is provided to the application executed in the computing device. It is verified whether the application meets performance criteria in the computing device.
-
Citations
20 Claims
-
1. A method, comprising:
-
installing, by at least one computing device, an application in a testing computing device; initiating, by the at least one computing device, execution of the application in the testing computing device; generating, by the at least one computing device, a user input profile for the application by performing a static analysis on the application; generating, by the at least one computing device, simulated user input for the application based at least in part on the user input profile generated by performing the static analysis on the application; providing, by the at least one computing device, the simulated user input to the application executed in the testing computing device; and verifying, by the at least one computing device, whether the application meets at least one performance criterion in the testing computing device, wherein the at least one performance criterion comprises at least one of;
a stability criterion based at least in part on whether the application becomes unresponsive or a security criterion based at least in part on whether the application accesses a protected resource. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10)
-
-
11. A non-transitory computer-readable medium embodying a program executable in at least one computing device, wherein when executed the program causes the at least one computing device to at least:
-
generate a user input profile for a mobile application by performing a static analysis on the mobile application; generate simulated user input for the mobile application based at least in part on the user input profile generated by performing the static analysis on the mobile application; initiate execution of the mobile application in a mobile computing device; provide the simulated user input to the mobile application executed in the mobile computing device; and add the mobile application to an application marketplace based at least in part on whether the mobile application meets at least one performance criterion in the mobile computing device, wherein the at least one performance criterion comprises at least one of;
a stability criterion based at least in part on whether the mobile application becomes unresponsive or a security criterion based at least in part on whether the mobile application accesses a protected resource. - View Dependent Claims (12, 13)
-
-
14. A system, comprising:
-
at least one computing device having a hardware processor; and at least one service executable in the at least one computing device, wherein when executed the at least one service causes the at least one computing device to at least; initiate an instance of a mobile application in a mobile computing device; generate a user input profile for the mobile application by performing a static analysis on the mobile application; generate simulated user input based at least in part on the user input profile generated by performing the static analysis on the mobile application; provide the simulated user input to the instance of the mobile application; and evaluate at least one performance criterion for the instance of the mobile application in response to the simulated user input, wherein the at least one performance criterion comprises at least one of;
a stability criterion based at least in part on whether the mobile application becomes unresponsive or a security criterion based at least in part on whether the mobile application accesses a protected resource. - View Dependent Claims (15, 16, 17, 18, 19, 20)
-
Specification