Debugging management platform and operating method for the same

ABSTRACT

A debugging management platform and an operating method for the same are provided. In the operating method, the debugging management platform operates a debugging agent service for establishing a debugging channel between a software development platform and a test platform. When receiving debugging packets are issued by the software development platform or the test platform, the debugging agent service analyzes the debugging packets and checks if the debugging packets meet an information security standard. The debugging packets are forwarded to the test platform or the software development platform if the debugging packets meet the information security standard. If the debugging packets do not meet the information security standard, the debugging packets are not forwarded, so as to ensure information security of the debugging packets that are forwarded between different environments.

CROSS-REFERENCE TO RELATED PATENT APPLICATION

This application claims the benefit of priority to Taiwan PatentApplication No. 110129010, filed on Aug. 6, 2021. The entire content ofthe above identified application is incorporated herein by reference.

Some references, which may include patents, patent applications andvarious publications, may be cited and discussed in the description ofthis disclosure. The citation and/or discussion of such references isprovided merely to clarify the description of the present disclosure andis not an admission that any such reference is “prior art” to thedisclosure described herein. All references cited and discussed in thisspecification are incorporated herein by reference in their entiretiesand to the same extent as if each reference was individuallyincorporated by reference.

FIELD OF THE DISCLOSURE

The present disclosure relates to a security measure for softwaredebugging, and more particularly to a debugging management platform andan operating method for the same, so as to securely transfer debuggingdata between a software development platform and a test platform.

BACKGROUND OF THE DISCLOSURE

A conventional software development platform allows users to log on anddevelop software thereon, and to conduct remote debugging from acomputer. This has become one solution for software developers toremotely develop and debug various types of software.

FIG. 1 is a schematic diagram depicting a conventional softwaredevelopment and testing platform. A software development platform 10provides a user with a service of developing software remotely. Thesoftware development platform 10 allows the user to write source codes101 and produce an execution file 103 by a compiling process. A debugger105 is used to debug the source codes 101. After a debugging process iscompleted, the execution file 103 can be uploaded to a test platform 12for testing the software. If any problem is found or re-compilation isrequired, the user needs to update the source codes 101, re-compile,debug and produce a new execution file 103.

In an example shown in FIG. 1 , the software development platform 10 is,for example, a workstation or a server, and the test platform 12 can bean electronic device (such as a mobile device, a personal computer or aspecific device) that is used to execute the execution file 103. Whilesoftware development is in operation, a debugging channel is establishedby a communication port (e.g., TCP and USB), and a debugging protocol isprovided by the test platform 12. The debugging protocol can be a remoteserial protocol, such as GNU debugger (GDB). After the debugging channelis established, the debugger 105 of the software development platform 10loads the execution file 103 produced by the software developmentplatform 10 to the test platform 12 via the debugging channel Thedebugger 105 also checks the source codes 101 and the execution file 103in the software development platform 10, and tests the source codes 101in the test platform 12 via the debugging channel In the debuggingprocess, the debugger 105 sets break points in the source codes 101,executes program codes in a single-stepping mode, and displaysinformation of a buffer and a memory of the test platform 12.

During development of software, in addition to basic debuggingfunctions, a debugging tool also supports various powerful functions, soas to assist a developer to test and debug source codes moreefficiently. However, the debugging tool generally lacks informationsecurity measures for a development environment. Therefore, sensitiveand confidential data (e.g., copyrighted source codes and keys) in thedevelopment environment may be transferred to an unauthorized device dueto a debugging requirement.

For example, an Android debug bridge (ADB) of an Android (R) developmentenvironment provides functions of data transferring and remote login, sothat the user is allowed to transmit developed data to an Android-baseddevice via a USB or TCP. Further, a debugger in compliance with a GDBremote serial protocol allows the user to write data into a memory of adevice through a write memory command Accordingly, the conventionaltechnology allows the user to write the sensitive and confidential datainto the memory of the device, and also to retrieve the sensitive andconfidential data from the memory of the device by a specificapplication in the device. Therefore, since the above-mentioneddevelopment environment may be under threat of insufficient informationsecurity, management of the debugging channel used for softwaredebugging is one of the issues that need to be addressed.

SUMMARY OF THE DISCLOSURE

In response to the above-referenced technical inadequacies, i.e., adebugging channel for information security purposes being notestablished between a software development end and a test end of aconventional software development system, the present disclosureprovides a debugging management platform and an operating method for thesame. The debugging management platform is an independent platform or asoftware-implemented approach that is used to provide a security measureadapted to a debugging process. In one aspect of the present disclosure,the debugging management platform is connected with a softwaredevelopment platform and a test platform. The debugging managementplatform operates a debugging agent service by steps as follows.

The debugging agent service is operated to receive debugging packetsgenerated on the software development platform and forward the debuggingpackets to a destination, i.e., the test platform. Alternatively, thedebugging packets are issued from the test platform and forwarded toanother destination, i.e., the software development platform. Thedebugging agent service analyzes the debugging packets and checks if thedebugging packets meet an information security standard. An examinationresult is accordingly generated. The information security standard isused to check if the debugging packets are sniffed and if data carriedby the debugging packets includes sensitive and confidential data.

Next, according to the examination result, the debugging agent servicedetermines whether or not the debugging packets are forwarded to thetest platform or the software development platform. Specifically, if theexamination result indicates that the debugging packets meet theinformation security standard, the debugging packets can be forwarded tothe test platform or the software development platform. However, if theexamination result indicates that the debugging packets do not meet theinformation security standard, the debugging packets are not forwarded,and a record is created.

Further, the debugging agent service can enable a packet encryptionfunction for encrypting the debugging packets and transferring thedebugging packets to the test platform or the software developmentplatform.

Still further, the debugging management platform provides a permissionmanagement service to authenticate a user logging on the debuggingmanagement platform, so as to confirm use permission of the user. Thedebugging management platform also provides an event viewing service,which allows the user to view software development content recorded inthe debugging management platform according to the use permission of theuser.

These and other aspects of the present disclosure will become apparentfrom the following description of the embodiment taken in conjunctionwith the following drawings and their captions, although variations andmodifications therein may be affected without departing from the spiritand scope of the novel concepts of the disclosure.

BRIEF DESCRIPTION OF THE DRAWINGS

The described embodiments may be better understood by reference to thefollowing description and the accompanying drawings, in which:

FIG. 1 is a schematic diagram depicting a conventional framework of asoftware development platform and a test platform;

FIG. 2 is a schematic diagram depicting a system framework of adebugging management platform according to one embodiment of the presentdisclosure;

FIG. 3 is a flowchart illustrating a process of logging on the debuggingmanagement platform according to one embodiment of the presentdisclosure;

FIG. 4 is a flowchart illustrating a process of establishing a debuggingchannel through the debugging management platform according to oneembodiment of the present disclosure; and

FIG. 5 is a flowchart describing a debugging agent service operated inthe debugging management platform according to one embodiment of thepresent disclosure.

DETAILED DESCRIPTION OF THE EXEMPLARY EMBODIMENTS

The present disclosure is more particularly described in the followingexamples that are intended as illustrative only since numerousmodifications and variations therein will be apparent to those skilledin the art. Like numbers in the drawings indicate like componentsthroughout the views. As used in the description herein and throughoutthe claims that follow, unless the context clearly dictates otherwise,the meaning of “a”, “an”, and “the” includes plural reference, and themeaning of “in” includes “in” and “on”. Titles or subtitles can be usedherein for the convenience of a reader, which shall have no influence onthe scope of the present disclosure.

The terms used herein generally have their ordinary meanings in the art.In the case of conflict, the present document, including any definitionsgiven herein, will prevail. The same thing can be expressed in more thanone way. Alternative language and synonyms can be used for any term(s)discussed herein, and no special significance is to be placed uponwhether a term is elaborated or discussed herein. A recital of one ormore synonyms does not exclude the use of other synonyms. The use ofexamples anywhere in this specification including examples of any termsis illustrative only, and in no way limits the scope and meaning of thepresent disclosure or of any exemplified term. Likewise, the presentdisclosure is not limited to various embodiments given herein. Numberingterms such as “first”, “second” or “third” can be used to describevarious components, signals or the like, which are for distinguishingone component/signal from another one only, and are not intended to, norshould be construed to impose any substantive limitations on thecomponents, signals or the like.

The present disclosure provides a debugging management platform and anoperating method for the same. One of the objectives of the debuggingmanagement platform is to ensure information security in a process ofsoftware development and debugging. In particular, one debuggingmanagement platform that can securely transfer debugging messagesbetween a software development platform and a test platform is provided.The debugging management platform is an independent platform or asoftware-implemented approach that provides a security measure in theprocess of debugging. In one aspect of the present disclosure, thedebugging management platform establishes a debugging channel thatallows a software developer to upload or download debugging packets. Thedebugging management platform can automatically take over to confirm ifthe debugging packets meet an information security standard.

Reference is made to FIG. 2 , which is a schematic diagram depicting asystem framework of the debugging management platform according to oneembodiment of the present disclosure.

A software development platform 200 can be an independent workstation ora server. Various software tools that users can use to develop softwareare provided in the software development platform 200. For example, thesoftware tools allow the users to edit source codes 202 and to producean execution file 203 by compiling the source codes 202. A debugger 201is provided to debug both the source codes 202 and the execution file203, and also to debug the messages transferred to the test platform210.

In particular, a debugging management platform 220 is provided betweenthe software development platform 200 and the test platform 210. Thedebugging management platform 220 can be an external server or asoftware sequence operated in a server. Major functions of the debuggingmanagement platform 220 include managing use permission of a debuggingagent service 230, providing records, and checking access records andinformation security events. The debugging management platform 220 isable to analyze and filter data to be transferred in the debuggingprocess instantly, and then filter out high-risk data for reducing therisk of leaking sensitive and confidential data via the debuggingchannel Furthermore, the debugging management platform 220 can alsoprovide a real-time analysis result when analyzing packets recorded bythe debugging agent service 230, and sniff the debugging packets for afollow-up information security event analysis and tracking. Thedebugging agent service 230 can activate an encryption function forensuring security and accuracy.

The debugging management platform 220 provides a permission managementservice 221, an event viewing service 222 and a debugging agentconnection management service 223 by means of software. The permissionmanagement service 221 is used to manage identification of the users wholog on the debugging management platform 22 and their use permissions,so that an administrator of the debugging management platform 220 canmanage the use permission of the debugging agent service 230. Forexample, through the debugging management platform 220, theadministrator can manage user accounts, a network address and machineidentification data of the software development platform 200, setting ofthe debugger 201, and setting of a network address, a communicationport, a machine identification data and an expiration time limit of thetest platform 210 (which is an environment to be tested).

The event viewing service 222 is provided for the administrator to viewthe various messages transferred between the software developmentplatform 200 and the test platform 210. The messages can be use recordsof the users, transfer records of the debugging packets and records ofinformation security events. Further, the event viewing service 222allows the software developer to view his own development contentaccording to his use permission. The debugging agent connectionmanagement service 223 is provided for the administrator and the usersto set up the debugging agent service 230 specific to the software to bedeveloped. For example, the debugging agent service 230 can be initiatedor terminated according to the use permission of the user.

Specifically, the system-end software development platform 200 and theuser (or developer)-end test platform 210 are two environments withdifferent security trust levels. The debugging management platform 220provides the debugging agent service, so as to establish a securetransmission channel that implements a mechanism to separate the twoenvironments involving different information security concerns. Aconventional connection that allows the test platform 210 to directlyaccess the software development platform 200 is replaced by the securetransmission channel Further, the debugging management platform 220 canbe used to monitor the messages to be transferred during debugging ofthe software via the secure transmission channel.

The debugging agent service 230 can be a daemon program operating in abackground of a server, a computer host or the above-mentionedplatforms. When the debugging agent service 230 operates, the daemonprogram runs as a background process in the debugging managementplatform 220, and the debugging agent service 230 assists the softwaredeveloper to establish a debugging channel between the softwaredevelopment platform 200 and the test platform 210 for connecting theenvironments with different security and trust levels, so as to monitorand transfer the debugging packets between the software developmentplatform 200 and the test platform 210.

Based on its software-implemented functions, the debugging agent service230 can be separated into a data analyzing module 231, an eventrecording module 232 and a packet encryption module 233. The dataanalyzing module 231 is used to analyze the debugging packets issued bythe software development platform 200 or the test platform 210 in realtime. An information security standard built in the data analyzingmodule 231 is used to filter out the sensitive and confidential datacarried in the debugging packets. The event recording module 232 is usedto record the access records of the debugging agent service 230, sniffthe debugging packets, and record events formed by the data analyzingmodule 231, so that the administrator can view the events via thedebugging management platform 220. The packet encryption module 233 canbe activated according to the needs of the administrator and the users.Through cooperation with the environment corresponding to the debuggeror the test platform 210, the packet encryption module 233 can encryptthe debugging packets to be transferred to the test platform 210 via thedebugging channel, thereby enhancing security and accuracy for thedebugging process.

In one embodiment of the present disclosure, the administrator of thedebugging management platform 220 can be an administrator forinformation security management, or a unit supervisor of an enterpriseor an organization. The debugging management platform 220 allows theadministrator to conduct information security management for thesoftware development platform 200. The users can be the softwaredevelopers or software debugging personnel. The users can developsoftware on the software development platform 200 that is under control,and can also debug the software on the test platform 210 that is notunder information security control. The software development platform200 can be a software development environment that implementsinformation security control management, such as a workstationcontrolled by a computer room that is under information securitycontrol. The software development platform 200 only allows the user tolog in through a terminal device or remote access software. The softwaredevelopment platform 200 can also be a user-end device under informationsecurity control, and no user is allowed to directly link to anenvironment under test via the communication port for debuggingpurposes. The software development platform 200 includes softwaredevelopment tools required by the users. The software development toolsare, for example, a library, an editor, a compiler and the debugger 201for the source codes 202. While compiling the execution file 203, theexecution file 203 can be loaded to the test platform 210 for testingand debugging via the debugging management platform 220.

The test platform 210 is designated as an environment for executing andtesting the execution file 203. The test platform 210 can be an embeddeddevelopment board, a field programmable gate array (FPGA) circuit, acomputer device, or a proprietary computer-based demo board. The testplatform 210 provides the communication port required for remotedebugging, so as to establish the debugging channel Since the testplatform 210 is an environment with limited resources, the softwaredevelopment platform 200 cannot allow the administrator to implementstrict information security control management. In addition, the testplatform 210 and the software development platform 200 are twoenvironments with different security levels and trust degrees.Therefore, the information security approach provided in the softwaredevelopment platform 200 can be used to ensure the information securityof the debugging packets and the various messages transferred betweenthe test platform 210 and the software development platform 200.

It should be noted that the environments (such as the softwaredevelopment platform 200 and the test platform 210) are provided forillustrative purposes only, and are not to be construed as limiting thescope of the present disclosure. The debugging management platform 220and the operating method can be adapted to more complicatedcircumstances. For example the debugging agent service 230 running inthe debugging management platform 220 can support multiple developmentenvironments (such as the software development platform 200) andmultiple test environments (such as the test platform 210) at the sametime. Furthermore, multiple proprietary debugging agent services 230 canbe used to support an environment with a single software developmentenvironment and a single test environment.

FIG. 3 shows a flowchart describing a process of logging on thedebugging management platform according to one embodiment of the presentdisclosure.

The above-mentioned debugging management platform interconnects thesoftware development platform and the test platform. A number ofplatforms to be connected by the debugging management platform dependson a processing capacity of the debugging management platform. Thedebugging management platform operates a debugging agent service thatallows the administrator or the common user (such as a softwaredeveloper) to log on the debugging management platform remotely (stepS301). An identity authentication mechanism adopted by the debuggingmanagement platform can be, but not limited to, an Open ID, alight-weighted directory access protocol (LDAP), and an active directory(AD). The sequences operated in the debugging management platformincludes: a permission management service, an event viewing service, anda debugging agent connection management service. After identifyauthentication is completed, the debugging management platform checkspermission of the administrator or the common user (step S303). Thedebugging management platform enables the administrator to view eventsrecorded in a storage device or a database (step S305), or enables thecommon user to view the development contents recorded by the debuggingmanagement platform (step S307).

FIG. 4 is a flowchart describing a process of establishing a debuggingchannel by the debugging management platform according to one embodimentof the present disclosure. The process also describes an operationprocess for initiating the debugging agent service in the debuggingmanagement platform.

In the beginning, the administrator or the common user logs on thedebugging management platform (step S401). The user requests forinitiation of the debugging agent service (step S403). The permissionmanagement service running in the platform determines if the usercomplies with an initiating permission (step S405). If the service canbe initiated according to the user's permission, the debugging agentservice is initiated (step S409). Conversely, if the initiatingpermission is not met, the debugging agent service will not be initiated(step S407).

After the debugging agent service is initiated, the debugging agentconnection management service (referring to the debugging agentconnection management service 223 in FIG. 2 ) is enabled to connect thesoftware development platform and the test platform with the debuggingagent service (step S411), and then determines if the user complies withthe permission to connect with the debugging agent service (step S413).The permission can be authenticated according to an identity of the userand other identifiable information (such as a network address of theuser-end device, a machine identification data, a communication port anda debugging protocol that can be preset for identification). If the userfails to comply with the permission requirement, the user is prohibitedfrom establishing the debugging channel via the debugging agent service(step S415). In the meantime, the event viewing service of the debuggingmanagement platform records this event. If the user complies with thepermission to connect with the debugging agent service, the debuggingagent service is enabled to interconnect with the software developmentplatform and the test platform, so as to establish the debugging channelbetween the debugging agent service and the test platform and betweenthe software development platform and the debugging agent service (stepS417). The communication port required by the debugging channel is alsoactivated, by which the debugging management platform is able totransfer and monitor the debugging packets. The debugging managementplatform records the related events.

Reference is made to FIG. 5 , which is a flowchart describing anoperation of the debugging agent service after establishing thedebugging channel according to one embodiment of the present disclosure.

The debugging agent service starts to receive the debugging packets fromthe software development platform or the test platform via the debuggingchannel (step S501). The software-based debugging agent service relieson the format (e.g., the above-mentioned GDB) of the debugging packetsto analyze (via the data analyzing module) and check the debuggingpackets (step S503).

In the meantime, the debugging agent service checks if the debuggingpackets meet an information security standard regulated by theadministrator. Specifically, the debugging agent service can sniff thedata carried by the debugging packets, check the data transmitted by thedebugging packets, and/or check if any sensitive and confidential datais included in a write-memory debugging command, so as to determine ifthe debugging packets meet the information security standard (stepS505).

After that, an examination result is generated. The debugging agentservice determines whether or not to transfer the debugging packets tothe test platform or to the software development platform according tothe examination result. If the debugging packets do not meet theinformation security standard, the debugging packets will not betransferred, and the related events will be recorded by the eventrecording module (step S507). The sequence is terminated and awaits thenext debugging packets. Conversely, if the debugging packets aredetermined to meet the information security standard, the debuggingagent service then checks if an encryption scheme is enabled in thedebugging packets (step S509), and also checks encryption algorithms andinformation security approaches supported by the platforms.

In step S509, if it is determined that no encryption scheme is enabledin the debugging packets, encryption/decryption may not be processed.The debugging agent service then transfers the debugging packets to thetest platform or the software development platform (step S513). If thedebugging packets are issued by the software development platform, thedebugging agent service transfers the debugging packets to the testplatform when the debugging packets meet the information securitystandard. If the debugging packets are issued by the test platform, thedebugging agent service transfers the debugging packets to the softwaredevelopment platform when the debugging packets meet the informationsecurity standard. If the encryption scheme is enabled in the debuggingpackets, the debugging agent service encrypts the debugging packets withthe encryption algorithm and an encryption key via the packet encryptionmodule. For example, an asymmetric encryption (such as RSA) or atransport security layer (TSL) protocol is used to establish anencryption channel (step S511), and the encrypted debugging packets aretransferred to the test platform or the software development platform(step S513). The debugging agent service awaits the next packets.

In summation, according to the above embodiments of the debuggingmanagement platform and the operating method, the information securitymechanism for a debugging process is provided via a debugging channelestablished between the software development platform and the testplatform by the debugging management platform. The debugging managementplatform is able to prevent the sensitive and confidential data producedby the software development environments from being leaked to anexternal environment. Particularly, a debugging agent service initiatedin the debugging management platform is to establish an indirectdebugging channel between the software development platform and the testplatform, so as to achieve the following features: implementingcentralized management of software debugging requirements via thedebugging management platform; assisting in bridging of differentdebugging channels for platforms with different levels of security andtrust degrees; managing use permissions such as user accounts,development environments, test environments and expiration time limitsto access the debugging agent service of the debugging managementplatform; analyzing the debugging packets and examining informationsecurity of the debugging packets in real time; preventing the sensitiveand confidential data from being leaked via the debugging channel;recording access records and events of the debugging channel, andsniffing the debugging packets via the debugging management platform fora follow-up information security event analysis and tracking; and usingan encryption protocol to ensure security and accuracy of the datatransferred via the debugging channel.

The foregoing description of the exemplary embodiments of the disclosurehas been presented only for the purposes of illustration and descriptionand is not intended to be exhaustive or to limit the disclosure to theprecise forms disclosed. Many modifications and variations are possiblein light of the above teaching.

The embodiments were chosen and described in order to explain theprinciples of the disclosure and their practical application so as toenable others skilled in the art to utilize the disclosure and variousembodiments and with various modifications as are suited to theparticular use contemplated. Alternative embodiments will becomeapparent to those skilled in the art to which the present disclosurepertains without departing from its spirit and scope.

What is claimed is:
 1. A debugging management platform connected with asoftware development platform and a test platform, wherein the debuggingmanagement platform operates a debugging agent service by steps of:receiving debugging packets issued by the software development platformor the test platform; analyzing the debugging packets, checking if thedebugging packets meet an information security standard, and generatingan examination result; and determining whether or not to transfer thedebugging packets to the test platform or the software developmentplatform according to the examination result.
 2. The debuggingmanagement platform according to claim 1, wherein the debugging agentservice is a daemon program operated in the debugging managementplatform and used for establishing a debugging channel between thesoftware development platform and the test platform, so as to ensureinformation security of the debugging packets to be transferred.
 3. Thedebugging management platform according to claim 1, wherein thedebugging management platform is a server or a software processoperating in the server, and is used to manage use permission of thedebugging agent service, provide records, and check access records andinformation security events.
 4. The debugging management platformaccording to claim 1, wherein, if the examination result indicates thatthe debugging packets meet the information security standard, thedebugging packets are transferred to the test platform or the softwaredevelopment platform; wherein, if the examination result indicates thatthe debugging packets do not meet the information security standard, thedebugging packets are not transferred, and a record is created.
 5. Thedebugging management platform according to claim 4, wherein, if thedebugging packets are issued from the software development platform, thedebugging packets are transferred to the test platform when thedebugging packets are determined to meet the information securitystandard; wherein, if the debugging packets are issued from the testplatform, the debugging packets are transferred to the softwaredevelopment platform when the debugging packets are determined to meetthe information security standard.
 6. The debugging management platformaccording to claim 1, wherein the step of checking if the debuggingpackets meet the information security standard includes sniffing thedebugging packets and checking if the debugging packets includesensitive and confidential data.
 7. The debugging management platformaccording to claim 1, wherein the debugging agent service enables apacket encryption function for encrypting the debugging packets andtransferring the debugging packets to the test platform or the softwaredevelopment platform.
 8. The debugging management platform according toclaim 1, wherein the test platform connected with the debuggingmanagement platform is an embedded development board, a fieldprogrammable gate array circuit or a computer device that is used toexecute and test an execution file developed through the softwaredevelopment platform.
 9. The debugging management platform according toclaim 8, wherein the debugging agent service is a daemon programoperated in the debugging management platform and used for establishinga debugging channel between the software development platform and thetest platform, so as to ensure information security of the debuggingpackets to be transferred.
 10. The debugging management platformaccording to claim 8, wherein the debugging management platform is aserver or a software process operating in the server, and is used tomanage use permission of the debugging agent service, provide records,and check access records and information security events.
 11. Thedebugging management platform according to claim 10, wherein thedebugging management platform is used to analyze and filter data to betransferred in a debugging process and filter high-risk data, to providea real-time analysis result when analyzing packets recorded by thedebugging agent service, and to sniff the debugging packets forinformation security event analysis and tracking.
 12. The debuggingmanagement platform according to claim 10, wherein a permissionmanagement service is provided for authenticating a user logging on thedebugging management platform, so as to confirm use permission of theuser.
 13. The debugging management platform according to claim 10,wherein an event viewing service is provided for a user to view softwaredevelopment content recorded in the debugging management platformaccording to use permission of the user.
 14. An operating method for adebugging management platform, comprising: operating a debugging agentservice for establishing a debugging channel between a softwaredevelopment platform and a test platform; receiving debugging packetsissued by the software development platform or the test platform;analyzing the debugging packets, checking if the debugging packets meetan information security standard, and generating an examination result;and determining whether or not to transfer the debugging packets to thetest platform or the software development platform according to theexamination result.
 15. The operating method according to claim 14,wherein the debugging agent service is a daemon program operated in thedebugging management platform, so as to ensure information security ofthe debugging packets to be transferred.
 16. The operating methodaccording to claim 14, wherein, if the examination result indicates thatthe debugging packets meet the information security standard, thedebugging packets are transferred to the test platform or the softwaredevelopment platform; wherein, if the examination result indicates thatthe debugging packets do not meet the information security standard, thedebugging packets are not transferred, and a record is created.
 17. Theoperating method according to claim 14, wherein the step of checking ifthe debugging packets meet the information security standard includessniffing the debugging packets and checking if the debugging packetsinclude sensitive and confidential data.
 18. The operating methodaccording to claim 14, wherein the debugging agent service enables apacket encryption function for encrypting the debugging packets andtransferring the debugging packets to the test platform or the softwaredevelopment platform.
 19. The operating method according to claim 14,wherein the test platform connected with the debugging managementplatform is an embedded development board, a field programmable gatearray circuit or a computer device that is used to execute and test anexecution file developed through the software development platform. 20.The operating method according to claim 19, wherein the debugging agentservice is a daemon program operated in the debugging managementplatform, so as to ensure information security of the debugging packetsto be transferred.