CN114143067B - Instruction processing method and system of dial testing system - Google Patents

Instruction processing method and system of dial testing system Download PDF

Info

Publication number
CN114143067B
CN114143067B CN202111425783.4A CN202111425783A CN114143067B CN 114143067 B CN114143067 B CN 114143067B CN 202111425783 A CN202111425783 A CN 202111425783A CN 114143067 B CN114143067 B CN 114143067B
Authority
CN
China
Prior art keywords
information
target
instruction
target terminal
authentication
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202111425783.4A
Other languages
Chinese (zh)
Other versions
CN114143067A (en
Inventor
陈志坚
梁鹰
郭宁
施唯佳
陈鑫
陈星�
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tianyi Shilian Technology Co ltd
Original Assignee
Tianyi Shilian Technology Co ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tianyi Shilian Technology Co ltd filed Critical Tianyi Shilian Technology Co ltd
Priority to CN202111425783.4A priority Critical patent/CN114143067B/en
Publication of CN114143067A publication Critical patent/CN114143067A/en
Application granted granted Critical
Publication of CN114143067B publication Critical patent/CN114143067B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/08Monitoring or testing based on specific metrics, e.g. QoS, energy consumption or environmental parameters
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L43/00Arrangements for monitoring or testing data switching networks
    • H04L43/50Testing arrangements
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/04Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
    • H04L63/0428Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
    • H04L63/0442Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload wherein the sending and receiving network entities apply asymmetric encryption, i.e. different keys for encryption and decryption
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/08Network architectures or network communication protocols for network security for authentication of entities
    • H04L63/083Network architectures or network communication protocols for network security for authentication of entities using passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Computing Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Environmental & Geological Engineering (AREA)
  • Telephonic Communication Services (AREA)

Abstract

The application discloses an instruction processing method and system of a dial testing system, wherein the method comprises the following steps: when the requirement of executing the task of the target terminal user exists, generating a task instruction, judging whether the task instruction is communicated with the target dial-up tester, if so, performing first authentication on the target dial-up tester, if the target dial-up tester passes the first authentication, encrypting the task instruction through a prestored first public key to obtain a first encryption instruction, and sending the first encryption instruction to the target dial-up tester to enable the target dial-up tester to decrypt the task instruction based on the prestored first private key to obtain the task instruction sent to the target terminal. Therefore, when the task instruction is issued to the target dial tester and the target terminal, the identity verification is required, the issued task instruction public key is encrypted, and the target dial tester and the target terminal can decrypt through the private key when receiving the encrypted instruction, so that the instruction processing safety of the dial testing system is greatly improved.

Description

Instruction processing method and system of dial testing system
Technical Field
The application relates to the technical field of data security, in particular to an instruction processing method and an instruction processing system of a dial testing system.
Background
Nowadays, with the increasing popularity of mobile internet and APP, the problems of network quality and performance can occur more or less, the normal experience of users is affected, the demand of automatic test service for the network quality and APP performance of the mobile internet is larger, the manual test efficiency is lower, the cost is higher, and the dial test system can automatically test the performance of the mobile network and the Internet of things and report network data automatically.
The traditional dial testing system adopts a mode of directly issuing dial testing task instructions, cannot determine the legality of the task instruction receiving equipment, and has lower safety.
Disclosure of Invention
In view of the above problems, the present application is provided to provide a method and a system for processing instructions of a dial testing system, so as to improve the security of the instruction transmission process.
In order to achieve the above object, the following specific solutions are proposed:
an instruction processing method of a dial testing system comprises the following steps:
when the requirement of executing a task by a target terminal user exists, generating a task instruction, wherein the task instruction comprises target dial indicator information to be sent and target terminal information;
Judging whether the target dial indicator corresponding to the target dial indicator information is communicated or not;
if yes, performing first identity verification on the target dial tester;
and if the target dial-up tester passes the first identity verification, encrypting the task instruction through a prestored first public key to obtain a first encryption instruction, and sending the first encryption instruction to the target dial-up tester so that the target dial-up tester can decrypt the task instruction based on the prestored first private key to obtain the task instruction sent to the target terminal corresponding to the target terminal information.
Optionally, the process of performing the first authentication on the target dial indicator includes:
transmitting first authentication information to the target dial tester, wherein the first authentication information comprises: information of whether background management service is deployed, information of whether equipment execution environment of a target terminal is deployed, and information of a source verification instruction;
receiving first authentication reply information replied by the target dial tester, wherein the first authentication reply information comprises: reply information of whether background management service is deployed, reply information of whether equipment execution environment of the target terminal is deployed, and source information of a reply check instruction;
If the first authentication reply message meets the following conditions simultaneously: and if the deployed background management service, the device execution environment of the deployed target terminal and the source of the reply verification instruction are correct, the target dial tester is indicated to pass the first identity verification.
Optionally, the instruction processing method further includes:
If the target dial indicator is not communicated with the target dial indicator corresponding to the target dial indicator information, judging whether the target dial indicator is communicated with the target terminal corresponding to the target terminal information;
if yes, performing second identity verification on the target terminal;
And if the target terminal passes the second identity verification, encrypting the task instruction through a pre-stored second public key to obtain a second encryption instruction, and sending the second encryption instruction to the target terminal so as to enable the target terminal to decrypt and obtain the task instruction.
Optionally, the process of performing the second authentication on the target terminal includes:
Transmitting second authentication information to the target terminal, the second authentication information including: information about whether the running state of the equipment is normal or not, and information about whether the equipment has permission authentication or not;
Receiving second authentication reply information replied by the target terminal, wherein the second authentication reply information comprises: reply information of whether the running state of the equipment is normal or not, and reply information of whether the equipment has permission authentication or not;
if the received second authentication reply message replied by the target terminal meets the following conditions at the same time: and if the running state of the equipment is normal and the equipment has permission authentication, the target terminal is indicated to pass the second identity authentication.
Optionally, the instruction processing method further includes:
and if the target terminal does not pass the second identity verification, sending prompt information that the verification does not pass to the target terminal.
An instruction processing method of a dial testing system comprises the following steps:
Receiving a first encryption instruction sent by the task scheduler, wherein the first encryption instruction is a result of the task scheduler after the task scheduler verifies the target dial indicator;
Decrypting the first encryption instruction through a pre-stored first private key to obtain the task instruction, wherein the task instruction comprises target terminal information;
Performing second identity verification on the target terminal corresponding to the target terminal information;
and if the target terminal passes the second identity verification, sending the task instruction to the target terminal.
Optionally, the process of performing the second authentication on the target terminal corresponding to the target terminal information includes:
sending second identity verification information to a target terminal corresponding to the target terminal information, wherein the second identity verification information comprises: information about whether the running state of the equipment is normal or not, and information about whether the equipment has permission authentication or not;
Receiving second authentication reply information replied by the target terminal, wherein the second authentication reply information comprises: reply information of whether the running state of the equipment is normal or not, and reply information of whether the equipment has permission authentication or not;
If the received second authentication reply message replied by the target terminal meets the following conditions: and if the running state of the equipment is normal and the equipment has permission authentication, the target terminal is indicated to pass the second identity authentication.
Optionally, before receiving the first encryption instruction sent by the task scheduler, the method further includes:
receiving first identity verification information sent by a task scheduler;
And sending first authentication reply information to the task scheduler based on the first authentication information.
Optionally, the instruction processing method further includes:
and if the target terminal does not pass the second identity verification, sending prompt information that the verification does not pass to the target terminal.
An instruction processing system of a dial testing system, comprising: task scheduler, target dial indicator and target terminal, wherein:
The task scheduler is configured to generate a task instruction when there is a requirement of a target terminal user for executing a task, where the task instruction includes target dial-up tester information to be sent to, and target terminal information, determine whether to communicate with a target dial-up tester corresponding to the target dial-up tester information, if so, perform first identity verification on the target dial-up tester, if the target dial-up tester passes the first identity verification, encrypt the task instruction by a prestored first public key to obtain a first encrypted instruction, and send the first encrypted instruction to the target dial-up tester;
The target dial testing device is used for receiving the first encryption instruction sent by the task dispatcher, decrypting the first encryption instruction through a prestored first private key to obtain the task instruction, performing second identity verification on a target terminal corresponding to the target terminal information, and sending the task instruction to the target terminal if the target terminal passes the second identity verification;
the target terminal is used for receiving the task instruction sent by the target dial testing device.
By means of the technical scheme, when the requirement of a target terminal user for executing a task exists, a task instruction is generated, the task instruction comprises target dialer information to be sent and target terminal information, whether the target dialer is communicated with a target dialer corresponding to the target dialer information is judged, if yes, first identity verification is conducted on the target dialer, if the target dialer passes the first identity verification, the task instruction is encrypted through a prestored first public key to obtain a first encrypted instruction, the first encrypted instruction is sent to the target dialer, and the target dialer decrypts the task instruction based on the prestored first private key to obtain the task instruction sent to a target terminal corresponding to the target terminal information. Therefore, when the task instruction is issued to the target dial tester and the target terminal, the identity verification is required, the issued task instruction public key is encrypted, and the target dial tester and the target terminal can decrypt through the private key when receiving the encrypted instruction, so that the instruction processing safety of the dial testing system is greatly improved.
Drawings
Various other advantages and benefits will become apparent to those of ordinary skill in the art upon reading the following detailed description of the preferred embodiments. The drawings are only for purposes of illustrating the preferred embodiments and are not to be construed as limiting the application. Also, like reference numerals are used to designate like parts throughout the figures. In the drawings:
FIG. 1 is a system architecture diagram for implementing instruction processing of a dial testing system according to an embodiment of the present application;
FIG. 2 is an alternative signaling flow of an instruction processing method for implementing a dial testing system according to an embodiment of the present application;
FIG. 3 is a schematic diagram of a device for implementing instruction processing of a dial testing system according to an embodiment of the present application;
Fig. 4 is a schematic diagram of another device for implementing instruction processing of a dial testing system according to an embodiment of the present application.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Fig. 1 is an alternative system architecture for implementing instruction processing of a dial testing system according to an embodiment of the present application, where, as shown in fig. 1, the system architecture may include: a task scheduler 10, a target dial 20 and a target terminal 30.
The task scheduler 10, the target dial indicator 20 and the target terminal 30 all support the function of sending and receiving information, and all have the function of displaying information, so that a user can watch the information and operate the information.
The specific operation process of the system can comprise the following steps:
The task scheduler 10 is configured to generate a task instruction when there is a requirement for a target terminal user to execute a task, where the task instruction includes target dial indicator information to be sent to, and target terminal information, determine whether to communicate with a target dial indicator 20 corresponding to the target dial indicator information, if so, perform first identity verification on the target dial indicator 20, and if the target dial indicator 20 passes the first identity verification, encrypt the task instruction by a pre-stored first public key to obtain a first encrypted instruction, and send the first encrypted instruction to the target dial indicator 20.
The target dial testing device 20 is configured to receive the first encryption instruction sent by the task scheduler 10, decrypt the first encryption instruction through a pre-stored first private key, obtain the task instruction, perform a second authentication on the target terminal 30 corresponding to the target terminal information, and send the task instruction to the target terminal 30 if the target terminal 30 passes the second authentication.
And the target terminal 30 is configured to receive a task instruction sent by the target dial testing device 20.
The task dispatcher 10 generates a task instruction, then judges whether the task instruction is communicated with the target dial-up tester 20 to which the task instruction is to be sent, after the communication is confirmed, performs first identity verification on the target dial-up tester 20, encrypts the task instruction through a prestored first public key after confirming that the target dial-up tester 20 passes the first identity verification, sends the encrypted first encryption instruction to the target dial-up tester 20, decrypts the first encryption instruction through the prestored first private key by the target dial-up tester 20 to obtain the task instruction, performs second identity verification on the target terminal 30, and sends the task instruction to the target terminal 30 after confirming that the target terminal 30 passes the second identity verification. Therefore, when the task instruction is issued to the target dial-up tester 20 and the target terminal 30, the identity verification is required, the issued task instruction public key is encrypted, and when the target dial-up tester 20 and the target terminal 30 receive the encrypted instruction, the encrypted instruction can be decrypted through the private key, so that the safety of instruction processing of the dial-up testing system is greatly improved.
Based on the system architecture shown in fig. 1, fig. 2 shows an optional signaling flow of an instruction processing method for implementing a dial testing system according to an embodiment of the present application, and referring to fig. 2, the flow may include:
In step S101, the task scheduler 10 generates a task instruction when there is a demand for the target end user to execute a task.
The task instruction may include target dial indicator information to be sent to, and target terminal information, that is, a transmission direction of the instruction may be determined to be transmitted to the target dial indicator 20 first and then to the target terminal 30.
Specifically, the task scheduler 10 may generate a task instruction in response to an administrator inputting the demand information of the target end user for executing the task. The task scheduler 10 may also generate task instructions based on the demands for the target end user to issue tasks periodically.
Step S102, it is determined whether the task scheduler 10 communicates with the target dial 20 corresponding to the target dial information.
Specifically, before the task scheduler 10 issues a task instruction to the target dialer 20, it is necessary to check whether the task scheduler 10 is in communication with the target dialer 20, and determine whether the task scheduler 10 and the target dialer 20 have a basis for successful communication.
Step S103, the task scheduler 10 performs a first authentication on the target dial indicator 20.
Before the task scheduler 10 issues a task instruction to the target dialer 20, identity verification needs to be performed on the target dialer 20 to ensure that a task instruction receiver is legal and safe, and avoid sending the task instruction to unsafe equipment.
Specifically, if the task scheduler 10 can successfully communicate with the target dial 20, the task scheduler 10 may perform a first authentication on the target dial 20.
In step S104, the task dispatcher 10 encrypts the task instruction by using the pre-stored first public key to obtain a first encrypted instruction.
The first public key may be generated when the task scheduler 10 and the target dialer 20 are first connected, and may be stored in the task scheduler 10, and may be directly invoked when encryption of data transmitted to the target dialer 20 is required.
Specifically, if the target dialer 20 passes the first identity verification, which indicates that the target dialer 20 is legal and safe, the task scheduler 10 may encrypt the task instruction by using the pre-stored first public key to obtain a first encrypted instruction.
Step S105, the task scheduler 10 transmits a first encryption instruction to the target dial 20.
Specifically, the encrypted first encryption instruction can avoid interception of task information in the leakage instruction in the transmission process.
In step S106, the target dial testing device 20 decrypts the first encrypted instruction by using the pre-stored first private key, and obtains the task instruction.
The first private key may be generated when the task scheduler 10 and the target dialer 20 are first connected, and stored in the target dialer 20, and may be directly invoked when encrypted data transmitted from the task scheduler 10 is to be received.
Specifically, after the target dialer 20 receives the first encryption instruction sent by the task scheduler 10, the target dialer 20 may decrypt the first encryption instruction through a first private key stored in advance to obtain the task instruction.
Step S107, the target dial testing device 20 performs a second authentication on the target terminal 30 corresponding to the target terminal information.
Wherein the second authentication is different from the target object of the first authentication, so the second authentication may take a different way or authenticate the content than the first authentication.
Before the target dial tester 20 issues the task instruction to the target terminal 30, the target terminal 30 needs to be subjected to identity verification to ensure that the task instruction receiver is legal and safe, and avoid sending the task instruction to unsafe equipment.
Step S108, the target dial 20 transmits a task instruction to the target terminal 30.
Specifically, if the target terminal 30 passes the second authentication, the target dial 20 may send a task instruction to the target terminal 30. The user of the target terminal 30 may perform a task based on the task instruction, the target terminal 30 may transmit task submission information after completion of the task to the target dialer 20, and the target dialer 20 may in turn transmit the task submission information to the task scheduler 10.
According to the instruction processing method of the dial testing system provided by the embodiment, the task dispatcher 10 encrypts and sends the task instruction to the target dial testing device 20 passing the first identity verification, and the target dial testing device 20 decrypts the encrypted instruction and then sends the task instruction obtained by decryption to the target terminal 30 passing the second identity verification. Therefore, each time of transmitting the instruction needs to carry out identity verification on the party receiving the instruction, and the safety of instruction processing of the dial testing system is improved.
In some embodiments of the present application, the process of performing the first authentication on the target dial indicator 20 by the task scheduler 10 in the step S103 is described, where the process may include:
s1, the task scheduler 10 sends first identity verification information to the target dialer 20.
Specifically, the first authentication information may include: information on whether a background management service has been deployed, information on whether a device execution environment of the target terminal 30 has been deployed, information on a source verification instruction.
The information about whether the background management service is deployed may indicate whether the target dial-up tester 20 is in a normal operation state. The information of whether the device execution environment of the target terminal 30 has been deployed may indicate whether the target dial 20 has a function of serving an application to the target terminal 30, including whether it is connected to the target terminal 30, whether it is possible to recognize the identity of the correct target terminal 30, whether an interface for transmitting and receiving information has been provided for the target terminal 30, and the like. The information of the source verification instruction may indicate whether the task scheduler 10 inquires of the target dial 20 information that can identify the source of the information.
S2, the task scheduler 10 receives the first authentication reply message replied by the target dialer 20.
Specifically, the target dial indicator 20 may reply to the first authentication information according to the current state, and send the first authentication reply information to the task scheduler 10.
After receiving the first authentication reply message returned by the target dialer 20, the task scheduler 10 determines whether the target dialer 20 can pass the first authentication in the following manner:
if the first authentication reply message meets the following conditions simultaneously: the deployed background management service, the device execution environment of the deployed target terminal 30, and the origin of the reply verification instruction are correct, which indicates that the target dialer 20 passes the first identity verification.
That is, the target dialer 20 is currently in a normal running state, has a function of serving an application to the target terminal 30, and can identify information of an information source, which indicates that the target dialer 20 can receive an instruction sent by the task scheduler 10 through the first authentication.
It will be appreciated that the dial testing system needs to secure the transmission of instructions, and if any of the above conditions is not met, it will indicate that the target dial tester 20 is not secure or legal and therefore cannot pass authentication. In this case, the task scheduler 10 may send a prompt message indicating that the verification is failed to the target dial-up tester 20, wherein the prompt message may specifically specify a condition of failure in the first identity verification information.
According to the instruction processing method of the dial testing system, the task scheduler 10 performs identity verification on the target dial testing device 20 to which the instruction is to be sent, so that safe equipment for receiving the instruction is ensured, and the safety of the instruction processing process of the dial testing system is improved.
In some embodiments of the present application, the process of performing the second authentication on the target terminal 30 corresponding to the target terminal information by the target dial indicator 20 in the step S107 is described, where the process may include:
S1, the target dial testing device 20 sends second identity verification information to the target terminal 30 corresponding to the target terminal information.
Specifically, the second authentication reply message may include: information on whether the running state of the equipment is normal or not, and information on whether the equipment has permission authentication or not.
The information indicating whether the device operating state is normal may indicate whether the target terminal 30 is in a normal operating state. The information on whether the device has the license authentication may indicate whether the device model of the target terminal 30 meets a preset prescribed model.
S2, the target dial testing device 20 receives second identity verification reply information replied by the target terminal 30.
Specifically, the target terminal 30 may reply to the second authentication information according to the current state, and send the second authentication reply information to the target dial-tester 20.
After receiving the second authentication reply message replied by the target terminal 30, the target dial-up tester 20 determines whether the target terminal 30 can pass the second authentication, in the following manner:
If the received second authentication reply message replied by the target terminal 30 meets the following conditions: and if the running state of the equipment is normal and the equipment has permission authentication, the target terminal 30 is indicated to pass the second identity verification.
That is, the target terminal 30 is currently in a normal running state, and the model of the device thereof meets the preset specified model, which indicates that the target terminal 30 can receive the instruction sent by the target dial-up tester 20 through the second authentication.
It will be appreciated that the dial testing system needs to ensure the security of the transmission of instructions, and if any of the above conditions is not met, it will indicate that the target terminal 30 is not secure or legal and therefore cannot pass authentication. In this case, the target dial 20 may send a prompt message to the target terminal 30 that the authentication is failed, wherein the prompt message may specifically specify a condition of failure in the second authentication information.
According to the instruction processing method of the dial testing system, the target dial tester 20 performs identity verification on the target terminal 30 to which the instruction is to be sent, so that safe equipment for receiving the instruction is ensured, and the safety of the instruction processing process of the dial testing system is improved.
In some embodiments of the present application, considering that in practice, the target dialer 20 may be distributed in multiple areas, the task scheduler 10 and the target dialer 20 may not be in the same communication network, and the two may not be able to communicate with each other, and in combination with the system architecture shown in fig. 1 and based on this, the embodiment of the present application provides another instruction processing method of the dialer system, where in the case that the result of determining whether the task scheduler 10 is in communication with the target dialer 20 corresponding to the target dialer information is no in the above step S102, the process of directly sending the task instruction to the target terminal 30 by the task scheduler 10 may be further added, and specifically the process may include:
S1, judging whether the task scheduler 10 is communicated with the target terminal 30.
Specifically, before the task scheduler 10 issues a task instruction to the target terminal 30, it is necessary to check whether the task scheduler 10 is in communication with the target terminal 30, and determine whether the task scheduler 10 and the target terminal 30 have a basis for successful communication.
S2, the task scheduler 10 performs second identity verification on the target terminal 30.
Before the task scheduler 10 issues a task instruction to the target terminal 30, identity verification needs to be performed on the target terminal 30 to ensure that a task instruction receiver is legal and safe, and avoid sending the task instruction to unsafe equipment.
Specifically, if the task scheduler 10 can successfully communicate with the target terminal 30, the task scheduler 10 may perform a first authentication on the target terminal 30.
In addition, if the task scheduler 10 cannot successfully communicate with the target terminal 30, the task scheduler 10 may display a prompt message that the task instruction cannot be transmitted to remind the administrator of the processing, and may suspend the event issuing the task instruction to wait for the administrator to process.
S3, the task dispatcher 10 encrypts the task instruction through a pre-stored second public key to obtain a second encrypted instruction, and sends the second encrypted instruction to the target terminal 30.
The second public key may be generated when the task scheduler 10 and the target terminal 30 are connected for the first time, and stored in the task scheduler 10, and may be directly invoked when encryption of data transmitted to the target terminal 30 is required.
Specifically, if the target terminal 30 passes the second authentication, which indicates that the target terminal 30 is legal and safe, the task scheduler 10 may encrypt the task instruction by using a second public key stored in advance to obtain a second encrypted instruction, and send the second encrypted instruction to the target terminal 30.
After the target terminal 30 receives the second encrypted instruction sent by the task scheduler 10, the target terminal 30 may decrypt the second encrypted instruction by using a second private key stored in advance to obtain a task instruction.
The second private key may be generated when the task scheduler 10 and the target terminal 30 are first connected, and stored in the target terminal 30, and may be directly invoked when encrypted data transmitted from the task scheduler 10 is to be received.
In the instruction processing method of the dial testing system provided in this embodiment, under the condition that the task scheduler 10 cannot communicate with the target dial tester 20, connection can be established with the target terminal 30, identity verification needs to be performed on the target terminal 30 in the instruction issuing process, and the instruction transmission process also needs to be transmitted through key encryption, so that the mechanism of issuing the instruction is increased, and meanwhile, the safety of instruction processing of the dial testing system is ensured.
In some embodiments of the present application, the above-mentioned process of performing the second authentication of the target terminal 30 by the task scheduler 10 is described, and the process may include:
s1, the task scheduler 10 sends second authentication information to the target terminal 30.
Specifically, the second authentication reply message may include: information on whether the running state of the equipment is normal or not, and information on whether the equipment has permission authentication or not.
The information indicating whether the device operating state is normal may indicate whether the target terminal 30 is in a normal operating state. The information on whether the device has the license authentication may indicate whether the device model of the target terminal 30 meets a preset prescribed model.
S2, the target dial testing device 20 receives second identity verification reply information replied by the target terminal 30.
Specifically, the target terminal 30 may reply to the second authentication information according to the current state and send the second authentication reply information to the task scheduler 10.
After receiving the second authentication reply message replied by the target terminal 30, the task scheduler 10 determines whether the target terminal 30 can pass the second authentication, in the following manner:
If the received second authentication reply message replied by the target terminal 30 meets the following conditions: and if the running state of the equipment is normal and the equipment has permission authentication, the target terminal 30 is indicated to pass the second identity verification.
That is, the target terminal 30 is currently in a normal running state, and the model of the device thereof meets the preset specified model, which indicates that the target terminal 30 can receive the instruction sent by the task scheduler 10 through the second authentication.
It will be appreciated that the dial testing system needs to ensure the security of the transmission of instructions, and if any of the above conditions is not met, it will indicate that the target terminal 30 is not secure or legal and therefore cannot pass authentication. In this case, the task scheduler 10 may transmit a prompt message indicating that the authentication is not passed to the target terminal 30, wherein the prompt message may specifically specify a condition of not passing in the second authentication information.
According to the instruction processing method of the dial testing system, the task scheduler 10 performs identity verification on the target terminal 30 to which the instruction is to be sent, so that safe equipment for receiving the instruction is ensured, and the safety of the instruction processing process of the dial testing system is improved.
The device for implementing the instruction processing of the dial testing system provided by the embodiment of the application is described below, and the device for implementing the instruction processing of the dial testing system described below and the method for implementing the instruction processing of the dial testing system described above can be referred to correspondingly.
Referring to fig. 3, fig. 3 is a schematic diagram of a device for implementing instruction processing of a dial testing system according to an embodiment of the present application.
As shown in fig. 3, the apparatus may include:
a task instruction generation unit 11 for generating a task instruction when there is a demand for the target end user to execute a task.
The task instruction comprises target dial indicator information to be sent to and target terminal information.
The target dial 20 is connected to the judging unit 12, for judging whether the target dial 20 corresponding to the target dial information is connected to the target dial.
The first authentication unit 13 is configured to perform a first authentication on the target dial 20 if communicating with the target dial 20.
The first encryption instruction sending unit 14 is configured to, if the target dialer 20 passes the first identity verification, encrypt the task instruction with a pre-stored first public key to obtain a first encryption instruction, and send the first encryption instruction to the target dialer 20, so that the target dialer 20 decrypts based on the pre-stored first private key to obtain the task instruction sent to the target terminal 30 corresponding to the target terminal information.
Referring to fig. 4, fig. 4 is a schematic diagram of another device for implementing instruction processing of a dial testing system according to an embodiment of the present application.
As shown in fig. 4, the apparatus may include:
A first encrypted instruction receiving unit 21, configured to receive a first encrypted instruction sent by the task scheduler 10.
The first encryption instruction is a result of encrypting the task instruction by the task scheduler 10 after the target dialer 20 is verified.
The first encrypted instruction decrypting unit 22 is configured to decrypt the first encrypted instruction by using a first private key stored in advance, and obtain the task instruction.
The task instruction comprises target terminal information.
And the second identity verification unit 23 is configured to perform second identity verification on the target terminal 30 corresponding to the target terminal information.
And a task instruction sending unit 24, configured to send the task instruction to the target terminal 30 if the target terminal 30 passes the second authentication.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In the present specification, each embodiment is described in a progressive manner, and each embodiment focuses on the difference from other embodiments, and may be combined according to needs, and the same similar parts may be referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.

Claims (8)

1. An instruction processing method of a dial testing system is characterized by being applied to a task scheduler and comprising the following steps:
when the requirement of executing a task by a target terminal user exists, generating a task instruction, wherein the task instruction comprises target dial indicator information to be sent and target terminal information;
Judging whether the target dial indicator corresponding to the target dial indicator information is communicated or not;
if yes, performing first identity verification on the target dial tester;
If the target dial-up tester passes the first identity verification, encrypting the task instruction through a prestored first public key to obtain a first encryption instruction, and sending the first encryption instruction to the target dial-up tester so that the target dial-up tester can decrypt the task instruction based on the prestored first private key to obtain the task instruction sent to the target terminal corresponding to the target terminal information;
A process for performing a first authentication of the target dial indicator, comprising:
Transmitting first authentication information to the target dial tester, wherein the first authentication information comprises: information of whether background management services are deployed, information of whether device execution environments of target terminals are deployed, and information of source verification instructions, wherein the information of whether the device execution environments of the target terminals are deployed comprises information of whether the device execution environments of the target terminals are communicated with the target terminals, information of whether identities of correct target terminals can be identified, and information of whether interfaces for sending and receiving information are provided for the target terminals;
receiving first authentication reply information replied by the target dial tester, wherein the first authentication reply information comprises: reply information of whether background management service is deployed, reply information of whether equipment execution environment of the target terminal is deployed, and source information of a reply check instruction;
If the first authentication reply message meets the following conditions simultaneously: and if the deployed background management service, the device execution environment of the deployed target terminal and the source of the reply verification instruction are correct, the target dial tester is indicated to pass the first identity verification.
2. The method as recited in claim 1, further comprising:
If the target dial indicator is not communicated with the target dial indicator corresponding to the target dial indicator information, judging whether the target dial indicator is communicated with the target terminal corresponding to the target terminal information;
if yes, performing second identity verification on the target terminal;
And if the target terminal passes the second identity verification, encrypting the task instruction through a pre-stored second public key to obtain a second encryption instruction, and sending the second encryption instruction to the target terminal so as to enable the target terminal to decrypt and obtain the task instruction.
3. The method according to claim 2, characterized in that the process of performing the second authentication of the target terminal comprises:
Transmitting second authentication information to the target terminal, the second authentication information including: information about whether the running state of the equipment is normal or not, and information about whether the equipment has permission authentication or not;
Receiving second authentication reply information replied by the target terminal, wherein the second authentication reply information comprises: reply information of whether the running state of the equipment is normal or not, and reply information of whether the equipment has permission authentication or not;
if the received second authentication reply message replied by the target terminal meets the following conditions at the same time: and if the running state of the equipment is normal and the equipment has permission authentication, the target terminal is indicated to pass the second identity authentication.
4. The method as recited in claim 2, further comprising:
and if the target terminal does not pass the second identity verification, sending prompt information that the verification does not pass to the target terminal.
5.A method of processing instructions for a dial testing system, the method being applied to a target dial testing device, the target dial testing device being in communication with a task scheduler, the method comprising:
Receiving a first encryption instruction sent by the task scheduler, wherein the first encryption instruction is a result of the task scheduler after the task scheduler verifies the target dial indicator;
Decrypting the first encryption instruction through a pre-stored first private key to obtain the task instruction, wherein the task instruction comprises target terminal information;
Performing second identity verification on the target terminal corresponding to the target terminal information;
If the target terminal passes the second identity verification, sending the task instruction to the target terminal;
before receiving the first encryption instruction sent by the task scheduler, the method further comprises:
Receiving first authentication information sent by a task scheduler, wherein the first authentication information comprises: information of whether background management services are deployed, information of whether device execution environments of target terminals are deployed, and information of source verification instructions, wherein the information of whether the device execution environments of the target terminals are deployed comprises information of whether the device execution environments of the target terminals are communicated with the target terminals, information of whether identities of correct target terminals can be identified, and information of whether interfaces for sending and receiving information are provided for the target terminals;
Transmitting first authentication reply information to the task scheduler based on the first authentication information, the first authentication reply information including: the method comprises the steps of reply information of whether background management service is deployed, reply information of whether device execution environment of a target terminal is deployed and source information of a reply check instruction.
6. The method according to claim 5, wherein the process of performing the second authentication on the target terminal corresponding to the target terminal information includes:
sending second identity verification information to a target terminal corresponding to the target terminal information, wherein the second identity verification information comprises: information about whether the running state of the equipment is normal or not, and information about whether the equipment has permission authentication or not;
Receiving second authentication reply information replied by the target terminal, wherein the second authentication reply information comprises: reply information of whether the running state of the equipment is normal or not, and reply information of whether the equipment has permission authentication or not;
If the received second authentication reply message replied by the target terminal meets the following conditions: and if the running state of the equipment is normal and the equipment has permission authentication, the target terminal is indicated to pass the second identity authentication.
7. The method as recited in claim 5, further comprising:
and if the target terminal does not pass the second identity verification, sending prompt information that the verification does not pass to the target terminal.
8. An instruction processing system of a dial testing system, comprising: task scheduler, target dial indicator and target terminal, wherein:
The task scheduler is configured to generate a task instruction when there is a requirement of a target terminal user for executing a task, where the task instruction includes target dial-up tester information to be sent to, and target terminal information, determine whether to communicate with a target dial-up tester corresponding to the target dial-up tester information, if so, perform first identity verification on the target dial-up tester, if the target dial-up tester passes the first identity verification, encrypt the task instruction by a prestored first public key to obtain a first encrypted instruction, and send the first encrypted instruction to the target dial-up tester;
The target dial testing device is used for receiving the first encryption instruction sent by the task dispatcher, decrypting the first encryption instruction through a prestored first private key to obtain the task instruction, performing second identity verification on a target terminal corresponding to the target terminal information, and sending the task instruction to the target terminal if the target terminal passes the second identity verification;
The target terminal is used for receiving a task instruction sent by the target dial tester;
the task scheduler performs a first authentication process on the target dial indicator, including:
The task scheduler sends first authentication information to the target dial-tester, the first authentication information including: information of whether background management services are deployed, information of whether device execution environments of target terminals are deployed, and information of source verification instructions, wherein the information of whether the device execution environments of the target terminals are deployed comprises information of whether the device execution environments of the target terminals are communicated with the target terminals, information of whether identities of correct target terminals can be identified, and information of whether interfaces for sending and receiving information are provided for the target terminals;
The task scheduler receives first authentication reply information replied by the target dial tester, wherein the first authentication reply information comprises: reply information of whether background management service is deployed, reply information of whether equipment execution environment of the target terminal is deployed, and source information of a reply check instruction;
The task scheduler simultaneously satisfies the following conditions if the first authentication reply message: and if the deployed background management service, the device execution environment of the deployed target terminal and the source of the reply verification instruction are correct, the target dial tester is indicated to pass the first identity verification.
CN202111425783.4A 2021-11-26 2021-11-26 Instruction processing method and system of dial testing system Active CN114143067B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111425783.4A CN114143067B (en) 2021-11-26 2021-11-26 Instruction processing method and system of dial testing system

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111425783.4A CN114143067B (en) 2021-11-26 2021-11-26 Instruction processing method and system of dial testing system

Publications (2)

Publication Number Publication Date
CN114143067A CN114143067A (en) 2022-03-04
CN114143067B true CN114143067B (en) 2024-04-19

Family

ID=80388944

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111425783.4A Active CN114143067B (en) 2021-11-26 2021-11-26 Instruction processing method and system of dial testing system

Country Status (1)

Country Link
CN (1) CN114143067B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115514663B (en) * 2022-09-23 2023-10-27 北京奇艺世纪科技有限公司 Dial testing method, system, device, electronic equipment and storage medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546269A (en) * 2010-12-07 2012-07-04 中国移动通信集团广东有限公司 Method and system capable of fast monitoring internet protocol (IP) network
WO2016110080A1 (en) * 2015-01-08 2016-07-14 中兴通讯股份有限公司 Fault location method and corresponding apparatus
WO2017131775A1 (en) * 2016-01-29 2017-08-03 Hewlett Packard Enterprise Development Lp Device attestation
CN107172056A (en) * 2017-05-31 2017-09-15 福建中金在线信息科技有限公司 A kind of channel safety determines method, device, system, client and server
CN109391618A (en) * 2018-10-18 2019-02-26 平安科技(深圳)有限公司 A kind of method for building up and system of communication link
CN110263585A (en) * 2019-06-26 2019-09-20 腾讯科技(深圳)有限公司 Test monitoring and managing method, device, equipment and storage medium

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN102546269A (en) * 2010-12-07 2012-07-04 中国移动通信集团广东有限公司 Method and system capable of fast monitoring internet protocol (IP) network
WO2016110080A1 (en) * 2015-01-08 2016-07-14 中兴通讯股份有限公司 Fault location method and corresponding apparatus
WO2017131775A1 (en) * 2016-01-29 2017-08-03 Hewlett Packard Enterprise Development Lp Device attestation
CN107172056A (en) * 2017-05-31 2017-09-15 福建中金在线信息科技有限公司 A kind of channel safety determines method, device, system, client and server
CN109391618A (en) * 2018-10-18 2019-02-26 平安科技(深圳)有限公司 A kind of method for building up and system of communication link
CN110263585A (en) * 2019-06-26 2019-09-20 腾讯科技(深圳)有限公司 Test monitoring and managing method, device, equipment and storage medium
CN110826111A (en) * 2019-06-26 2020-02-21 腾讯科技(深圳)有限公司 Test supervision method, device, equipment and storage medium

Also Published As

Publication number Publication date
CN114143067A (en) 2022-03-04

Similar Documents

Publication Publication Date Title
CN106603485B (en) Key agreement method and device
US9762590B2 (en) System and method for an integrity focused authentication service
EP3457344A1 (en) Payment authentication method, apparatus and system for onboard terminal
US20050188219A1 (en) Method and a system for communication between a terminal and at least one communication equipment
CN103078742B (en) Generation method and system of digital certificate
CN105207774A (en) Key negotiation method and device of verification information
CN110572418A (en) Vehicle identity authentication method and device, computer equipment and storage medium
CN103201996A (en) Method for providing wireless vehicle access
CN107483415B (en) Bidirectional authentication method for shared electricity utilization interactive system
WO2018113337A1 (en) Method and system for establishing secure communication environment for wearable device
CN112019566B (en) Data transmission method, server, client and computer storage medium
EP1530315A1 (en) System and method for authentication of applications in a non-trusted network environment
CN110446177B (en) Communication method, device and system of Internet of things meter
CN110324335A (en) A kind of automobile method for upgrading software and system based on electronics mobile certificate
CN101924635B (en) Method and device for user identity authentication
CN114143067B (en) Instruction processing method and system of dial testing system
CN105471920A (en) Identifying code processing method and device
EP1681648B1 (en) Communication device and digital signature generation method
KR100326361B1 (en) Method for transmitting security e-mail using cipher and certification on internet web
JP4409497B2 (en) How to send confidential information
CN109743283B (en) Information transmission method and equipment
CN110636503B (en) Data encryption method, device, equipment and computer readable storage medium
CN112118209A (en) Account number operation method and device of vehicle equipment
CN107241341B (en) Access control method and device
CN114258013B (en) Data encryption method, device and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
TA01 Transfer of patent application right
TA01 Transfer of patent application right

Effective date of registration: 20240321

Address after: Unit 1, Building 1, China Telecom Zhejiang Innovation Park, No. 8 Xiqin Street, Wuchang Street, Yuhang District, Hangzhou City, Zhejiang Province, 311100

Applicant after: Tianyi Shilian Technology Co.,Ltd.

Country or region after: China

Address before: Room 1423, No. 1256 and 1258, Wanrong Road, Jing'an District, Shanghai 200040

Applicant before: Tianyi Digital Life Technology Co.,Ltd.

Country or region before: China

GR01 Patent grant
GR01 Patent grant