Sensitive data protection during user interface automation testing systems and methods
First Claim
1. A system comprising:
- a non-transitory memory storing user account information, wherein the user account information comprises encrypted user information; and
one or more hardware processors in communication with the non-transitory memory and configured to;
receive a data file including a first encrypted data key, wherein the first encrypted data key is logged in the data file, and wherein the data file is a test data file for a website user interface automation test;
determine a first cipher text corresponding to the first encrypted data key using a conversion kit, wherein the conversion kit includes a cipher mapping file and an encryption algorithm; and
decrypt the first cipher text using the encryption algorithm to obtain a first data.
2 Assignments
0 Petitions
Accused Products
Abstract
There is provided systems and method for sensitive data protection during user interface automation testing. A user may transmit sensitive data to the test website framework, where the sensitive data is encrypted as a data key. The encrypted data key is set by an administrator of the test website and given to the user. The user may enter the key, where the test website framework application utilizes a conversion kit to decrypt the encrypted data key for use in the website user interface automation test. However, the encrypted data key is pulled into a version control system and/or viewed in test results so that the sensitive data remains hidden from view. In various embodiments, the encrypted data key may be entered into a web element, such as a password field, where the password field displays only the encrypted data key during test results.
-
Citations
18 Claims
-
1. A system comprising:
-
a non-transitory memory storing user account information, wherein the user account information comprises encrypted user information; and one or more hardware processors in communication with the non-transitory memory and configured to; receive a data file including a first encrypted data key, wherein the first encrypted data key is logged in the data file, and wherein the data file is a test data file for a website user interface automation test; determine a first cipher text corresponding to the first encrypted data key using a conversion kit, wherein the conversion kit includes a cipher mapping file and an encryption algorithm; and decrypt the first cipher text using the encryption algorithm to obtain a first data. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8)
-
-
9. A method comprising:
-
receiving a data file including a first encrypted data key, wherein the first encrypted data key is logged in the data file, and wherein the data file is a test data file for a website user interface automation test; determining a first cipher text corresponding to the first encrypted data key using a conversion kit, wherein the conversion kit includes a cipher mapping file and an encryption algorithm; and decrypting, using one or more hardware processors of a website server, the first cipher text using the encryption algorithm to obtain a first data. - View Dependent Claims (10, 11, 12, 13, 14, 15, 16)
-
-
17. A non-transitory computer readable medium comprising a plurality of machine-readable instructions which when executed by one or more processors of a server are adapted to cause the server to perform a method comprising:
-
receiving a data file including a first encrypted data key, wherein the first encrypted data key is logged in the data file, and wherein the data file is a test data file for a website user interface automation test; determining a first cipher text corresponding to the first encrypted data key using a conversion kit, wherein the conversion kit includes a cipher mapping file and an encryption algorithm; and decrypting the first cipher text using the encryption algorithm to obtain a first data. - View Dependent Claims (18)
-
Specification