Disclosure of Invention
In view of the above problems, the present application is provided to provide a method and a system for processing instructions of a dial testing system, so as to improve the security of the instruction transmission process.
In order to achieve the above object, the following specific solutions are proposed:
an instruction processing method of a dial testing system comprises the following steps:
when the requirement of executing a task by a target terminal user exists, generating a task instruction, wherein the task instruction comprises target dial indicator information to be sent and target terminal information;
Judging whether the target dial indicator corresponding to the target dial indicator information is communicated or not;
if yes, performing first identity verification on the target dial tester;
and if the target dial-up tester passes the first identity verification, encrypting the task instruction through a prestored first public key to obtain a first encryption instruction, and sending the first encryption instruction to the target dial-up tester so that the target dial-up tester can decrypt the task instruction based on the prestored first private key to obtain the task instruction sent to the target terminal corresponding to the target terminal information.
Optionally, the process of performing the first authentication on the target dial indicator includes:
transmitting first authentication information to the target dial tester, wherein the first authentication information comprises: information of whether background management service is deployed, information of whether equipment execution environment of a target terminal is deployed, and information of a source verification instruction;
receiving first authentication reply information replied by the target dial tester, wherein the first authentication reply information comprises: reply information of whether background management service is deployed, reply information of whether equipment execution environment of the target terminal is deployed, and source information of a reply check instruction;
If the first authentication reply message meets the following conditions simultaneously: and if the deployed background management service, the device execution environment of the deployed target terminal and the source of the reply verification instruction are correct, the target dial tester is indicated to pass the first identity verification.
Optionally, the instruction processing method further includes:
If the target dial indicator is not communicated with the target dial indicator corresponding to the target dial indicator information, judging whether the target dial indicator is communicated with the target terminal corresponding to the target terminal information;
if yes, performing second identity verification on the target terminal;
And if the target terminal passes the second identity verification, encrypting the task instruction through a pre-stored second public key to obtain a second encryption instruction, and sending the second encryption instruction to the target terminal so as to enable the target terminal to decrypt and obtain the task instruction.
Optionally, the process of performing the second authentication on the target terminal includes:
Transmitting second authentication information to the target terminal, the second authentication information including: information about whether the running state of the equipment is normal or not, and information about whether the equipment has permission authentication or not;
Receiving second authentication reply information replied by the target terminal, wherein the second authentication reply information comprises: reply information of whether the running state of the equipment is normal or not, and reply information of whether the equipment has permission authentication or not;
if the received second authentication reply message replied by the target terminal meets the following conditions at the same time: and if the running state of the equipment is normal and the equipment has permission authentication, the target terminal is indicated to pass the second identity authentication.
Optionally, the instruction processing method further includes:
and if the target terminal does not pass the second identity verification, sending prompt information that the verification does not pass to the target terminal.
An instruction processing method of a dial testing system comprises the following steps:
Receiving a first encryption instruction sent by the task scheduler, wherein the first encryption instruction is a result of the task scheduler after the task scheduler verifies the target dial indicator;
Decrypting the first encryption instruction through a pre-stored first private key to obtain the task instruction, wherein the task instruction comprises target terminal information;
Performing second identity verification on the target terminal corresponding to the target terminal information;
and if the target terminal passes the second identity verification, sending the task instruction to the target terminal.
Optionally, the process of performing the second authentication on the target terminal corresponding to the target terminal information includes:
sending second identity verification information to a target terminal corresponding to the target terminal information, wherein the second identity verification information comprises: information about whether the running state of the equipment is normal or not, and information about whether the equipment has permission authentication or not;
Receiving second authentication reply information replied by the target terminal, wherein the second authentication reply information comprises: reply information of whether the running state of the equipment is normal or not, and reply information of whether the equipment has permission authentication or not;
If the received second authentication reply message replied by the target terminal meets the following conditions: and if the running state of the equipment is normal and the equipment has permission authentication, the target terminal is indicated to pass the second identity authentication.
Optionally, before receiving the first encryption instruction sent by the task scheduler, the method further includes:
receiving first identity verification information sent by a task scheduler;
And sending first authentication reply information to the task scheduler based on the first authentication information.
Optionally, the instruction processing method further includes:
and if the target terminal does not pass the second identity verification, sending prompt information that the verification does not pass to the target terminal.
An instruction processing system of a dial testing system, comprising: task scheduler, target dial indicator and target terminal, wherein:
The task scheduler is configured to generate a task instruction when there is a requirement of a target terminal user for executing a task, where the task instruction includes target dial-up tester information to be sent to, and target terminal information, determine whether to communicate with a target dial-up tester corresponding to the target dial-up tester information, if so, perform first identity verification on the target dial-up tester, if the target dial-up tester passes the first identity verification, encrypt the task instruction by a prestored first public key to obtain a first encrypted instruction, and send the first encrypted instruction to the target dial-up tester;
The target dial testing device is used for receiving the first encryption instruction sent by the task dispatcher, decrypting the first encryption instruction through a prestored first private key to obtain the task instruction, performing second identity verification on a target terminal corresponding to the target terminal information, and sending the task instruction to the target terminal if the target terminal passes the second identity verification;
the target terminal is used for receiving the task instruction sent by the target dial testing device.
By means of the technical scheme, when the requirement of a target terminal user for executing a task exists, a task instruction is generated, the task instruction comprises target dialer information to be sent and target terminal information, whether the target dialer is communicated with a target dialer corresponding to the target dialer information is judged, if yes, first identity verification is conducted on the target dialer, if the target dialer passes the first identity verification, the task instruction is encrypted through a prestored first public key to obtain a first encrypted instruction, the first encrypted instruction is sent to the target dialer, and the target dialer decrypts the task instruction based on the prestored first private key to obtain the task instruction sent to a target terminal corresponding to the target terminal information. Therefore, when the task instruction is issued to the target dial tester and the target terminal, the identity verification is required, the issued task instruction public key is encrypted, and the target dial tester and the target terminal can decrypt through the private key when receiving the encrypted instruction, so that the instruction processing safety of the dial testing system is greatly improved.
Detailed Description
The following description of the embodiments of the present application will be made clearly and completely with reference to the accompanying drawings, in which it is apparent that the embodiments described are only some embodiments of the present application, but not all embodiments. All other embodiments, which can be made by those skilled in the art based on the embodiments of the application without making any inventive effort, are intended to be within the scope of the application.
Fig. 1 is an alternative system architecture for implementing instruction processing of a dial testing system according to an embodiment of the present application, where, as shown in fig. 1, the system architecture may include: a task scheduler 10, a target dial 20 and a target terminal 30.
The task scheduler 10, the target dial indicator 20 and the target terminal 30 all support the function of sending and receiving information, and all have the function of displaying information, so that a user can watch the information and operate the information.
The specific operation process of the system can comprise the following steps:
The task scheduler 10 is configured to generate a task instruction when there is a requirement for a target terminal user to execute a task, where the task instruction includes target dial indicator information to be sent to, and target terminal information, determine whether to communicate with a target dial indicator 20 corresponding to the target dial indicator information, if so, perform first identity verification on the target dial indicator 20, and if the target dial indicator 20 passes the first identity verification, encrypt the task instruction by a pre-stored first public key to obtain a first encrypted instruction, and send the first encrypted instruction to the target dial indicator 20.
The target dial testing device 20 is configured to receive the first encryption instruction sent by the task scheduler 10, decrypt the first encryption instruction through a pre-stored first private key, obtain the task instruction, perform a second authentication on the target terminal 30 corresponding to the target terminal information, and send the task instruction to the target terminal 30 if the target terminal 30 passes the second authentication.
And the target terminal 30 is configured to receive a task instruction sent by the target dial testing device 20.
The task dispatcher 10 generates a task instruction, then judges whether the task instruction is communicated with the target dial-up tester 20 to which the task instruction is to be sent, after the communication is confirmed, performs first identity verification on the target dial-up tester 20, encrypts the task instruction through a prestored first public key after confirming that the target dial-up tester 20 passes the first identity verification, sends the encrypted first encryption instruction to the target dial-up tester 20, decrypts the first encryption instruction through the prestored first private key by the target dial-up tester 20 to obtain the task instruction, performs second identity verification on the target terminal 30, and sends the task instruction to the target terminal 30 after confirming that the target terminal 30 passes the second identity verification. Therefore, when the task instruction is issued to the target dial-up tester 20 and the target terminal 30, the identity verification is required, the issued task instruction public key is encrypted, and when the target dial-up tester 20 and the target terminal 30 receive the encrypted instruction, the encrypted instruction can be decrypted through the private key, so that the safety of instruction processing of the dial-up testing system is greatly improved.
Based on the system architecture shown in fig. 1, fig. 2 shows an optional signaling flow of an instruction processing method for implementing a dial testing system according to an embodiment of the present application, and referring to fig. 2, the flow may include:
In step S101, the task scheduler 10 generates a task instruction when there is a demand for the target end user to execute a task.
The task instruction may include target dial indicator information to be sent to, and target terminal information, that is, a transmission direction of the instruction may be determined to be transmitted to the target dial indicator 20 first and then to the target terminal 30.
Specifically, the task scheduler 10 may generate a task instruction in response to an administrator inputting the demand information of the target end user for executing the task. The task scheduler 10 may also generate task instructions based on the demands for the target end user to issue tasks periodically.
Step S102, it is determined whether the task scheduler 10 communicates with the target dial 20 corresponding to the target dial information.
Specifically, before the task scheduler 10 issues a task instruction to the target dialer 20, it is necessary to check whether the task scheduler 10 is in communication with the target dialer 20, and determine whether the task scheduler 10 and the target dialer 20 have a basis for successful communication.
Step S103, the task scheduler 10 performs a first authentication on the target dial indicator 20.
Before the task scheduler 10 issues a task instruction to the target dialer 20, identity verification needs to be performed on the target dialer 20 to ensure that a task instruction receiver is legal and safe, and avoid sending the task instruction to unsafe equipment.
Specifically, if the task scheduler 10 can successfully communicate with the target dial 20, the task scheduler 10 may perform a first authentication on the target dial 20.
In step S104, the task dispatcher 10 encrypts the task instruction by using the pre-stored first public key to obtain a first encrypted instruction.
The first public key may be generated when the task scheduler 10 and the target dialer 20 are first connected, and may be stored in the task scheduler 10, and may be directly invoked when encryption of data transmitted to the target dialer 20 is required.
Specifically, if the target dialer 20 passes the first identity verification, which indicates that the target dialer 20 is legal and safe, the task scheduler 10 may encrypt the task instruction by using the pre-stored first public key to obtain a first encrypted instruction.
Step S105, the task scheduler 10 transmits a first encryption instruction to the target dial 20.
Specifically, the encrypted first encryption instruction can avoid interception of task information in the leakage instruction in the transmission process.
In step S106, the target dial testing device 20 decrypts the first encrypted instruction by using the pre-stored first private key, and obtains the task instruction.
The first private key may be generated when the task scheduler 10 and the target dialer 20 are first connected, and stored in the target dialer 20, and may be directly invoked when encrypted data transmitted from the task scheduler 10 is to be received.
Specifically, after the target dialer 20 receives the first encryption instruction sent by the task scheduler 10, the target dialer 20 may decrypt the first encryption instruction through a first private key stored in advance to obtain the task instruction.
Step S107, the target dial testing device 20 performs a second authentication on the target terminal 30 corresponding to the target terminal information.
Wherein the second authentication is different from the target object of the first authentication, so the second authentication may take a different way or authenticate the content than the first authentication.
Before the target dial tester 20 issues the task instruction to the target terminal 30, the target terminal 30 needs to be subjected to identity verification to ensure that the task instruction receiver is legal and safe, and avoid sending the task instruction to unsafe equipment.
Step S108, the target dial 20 transmits a task instruction to the target terminal 30.
Specifically, if the target terminal 30 passes the second authentication, the target dial 20 may send a task instruction to the target terminal 30. The user of the target terminal 30 may perform a task based on the task instruction, the target terminal 30 may transmit task submission information after completion of the task to the target dialer 20, and the target dialer 20 may in turn transmit the task submission information to the task scheduler 10.
According to the instruction processing method of the dial testing system provided by the embodiment, the task dispatcher 10 encrypts and sends the task instruction to the target dial testing device 20 passing the first identity verification, and the target dial testing device 20 decrypts the encrypted instruction and then sends the task instruction obtained by decryption to the target terminal 30 passing the second identity verification. Therefore, each time of transmitting the instruction needs to carry out identity verification on the party receiving the instruction, and the safety of instruction processing of the dial testing system is improved.
In some embodiments of the present application, the process of performing the first authentication on the target dial indicator 20 by the task scheduler 10 in the step S103 is described, where the process may include:
s1, the task scheduler 10 sends first identity verification information to the target dialer 20.
Specifically, the first authentication information may include: information on whether a background management service has been deployed, information on whether a device execution environment of the target terminal 30 has been deployed, information on a source verification instruction.
The information about whether the background management service is deployed may indicate whether the target dial-up tester 20 is in a normal operation state. The information of whether the device execution environment of the target terminal 30 has been deployed may indicate whether the target dial 20 has a function of serving an application to the target terminal 30, including whether it is connected to the target terminal 30, whether it is possible to recognize the identity of the correct target terminal 30, whether an interface for transmitting and receiving information has been provided for the target terminal 30, and the like. The information of the source verification instruction may indicate whether the task scheduler 10 inquires of the target dial 20 information that can identify the source of the information.
S2, the task scheduler 10 receives the first authentication reply message replied by the target dialer 20.
Specifically, the target dial indicator 20 may reply to the first authentication information according to the current state, and send the first authentication reply information to the task scheduler 10.
After receiving the first authentication reply message returned by the target dialer 20, the task scheduler 10 determines whether the target dialer 20 can pass the first authentication in the following manner:
if the first authentication reply message meets the following conditions simultaneously: the deployed background management service, the device execution environment of the deployed target terminal 30, and the origin of the reply verification instruction are correct, which indicates that the target dialer 20 passes the first identity verification.
That is, the target dialer 20 is currently in a normal running state, has a function of serving an application to the target terminal 30, and can identify information of an information source, which indicates that the target dialer 20 can receive an instruction sent by the task scheduler 10 through the first authentication.
It will be appreciated that the dial testing system needs to secure the transmission of instructions, and if any of the above conditions is not met, it will indicate that the target dial tester 20 is not secure or legal and therefore cannot pass authentication. In this case, the task scheduler 10 may send a prompt message indicating that the verification is failed to the target dial-up tester 20, wherein the prompt message may specifically specify a condition of failure in the first identity verification information.
According to the instruction processing method of the dial testing system, the task scheduler 10 performs identity verification on the target dial testing device 20 to which the instruction is to be sent, so that safe equipment for receiving the instruction is ensured, and the safety of the instruction processing process of the dial testing system is improved.
In some embodiments of the present application, the process of performing the second authentication on the target terminal 30 corresponding to the target terminal information by the target dial indicator 20 in the step S107 is described, where the process may include:
S1, the target dial testing device 20 sends second identity verification information to the target terminal 30 corresponding to the target terminal information.
Specifically, the second authentication reply message may include: information on whether the running state of the equipment is normal or not, and information on whether the equipment has permission authentication or not.
The information indicating whether the device operating state is normal may indicate whether the target terminal 30 is in a normal operating state. The information on whether the device has the license authentication may indicate whether the device model of the target terminal 30 meets a preset prescribed model.
S2, the target dial testing device 20 receives second identity verification reply information replied by the target terminal 30.
Specifically, the target terminal 30 may reply to the second authentication information according to the current state, and send the second authentication reply information to the target dial-tester 20.
After receiving the second authentication reply message replied by the target terminal 30, the target dial-up tester 20 determines whether the target terminal 30 can pass the second authentication, in the following manner:
If the received second authentication reply message replied by the target terminal 30 meets the following conditions: and if the running state of the equipment is normal and the equipment has permission authentication, the target terminal 30 is indicated to pass the second identity verification.
That is, the target terminal 30 is currently in a normal running state, and the model of the device thereof meets the preset specified model, which indicates that the target terminal 30 can receive the instruction sent by the target dial-up tester 20 through the second authentication.
It will be appreciated that the dial testing system needs to ensure the security of the transmission of instructions, and if any of the above conditions is not met, it will indicate that the target terminal 30 is not secure or legal and therefore cannot pass authentication. In this case, the target dial 20 may send a prompt message to the target terminal 30 that the authentication is failed, wherein the prompt message may specifically specify a condition of failure in the second authentication information.
According to the instruction processing method of the dial testing system, the target dial tester 20 performs identity verification on the target terminal 30 to which the instruction is to be sent, so that safe equipment for receiving the instruction is ensured, and the safety of the instruction processing process of the dial testing system is improved.
In some embodiments of the present application, considering that in practice, the target dialer 20 may be distributed in multiple areas, the task scheduler 10 and the target dialer 20 may not be in the same communication network, and the two may not be able to communicate with each other, and in combination with the system architecture shown in fig. 1 and based on this, the embodiment of the present application provides another instruction processing method of the dialer system, where in the case that the result of determining whether the task scheduler 10 is in communication with the target dialer 20 corresponding to the target dialer information is no in the above step S102, the process of directly sending the task instruction to the target terminal 30 by the task scheduler 10 may be further added, and specifically the process may include:
S1, judging whether the task scheduler 10 is communicated with the target terminal 30.
Specifically, before the task scheduler 10 issues a task instruction to the target terminal 30, it is necessary to check whether the task scheduler 10 is in communication with the target terminal 30, and determine whether the task scheduler 10 and the target terminal 30 have a basis for successful communication.
S2, the task scheduler 10 performs second identity verification on the target terminal 30.
Before the task scheduler 10 issues a task instruction to the target terminal 30, identity verification needs to be performed on the target terminal 30 to ensure that a task instruction receiver is legal and safe, and avoid sending the task instruction to unsafe equipment.
Specifically, if the task scheduler 10 can successfully communicate with the target terminal 30, the task scheduler 10 may perform a first authentication on the target terminal 30.
In addition, if the task scheduler 10 cannot successfully communicate with the target terminal 30, the task scheduler 10 may display a prompt message that the task instruction cannot be transmitted to remind the administrator of the processing, and may suspend the event issuing the task instruction to wait for the administrator to process.
S3, the task dispatcher 10 encrypts the task instruction through a pre-stored second public key to obtain a second encrypted instruction, and sends the second encrypted instruction to the target terminal 30.
The second public key may be generated when the task scheduler 10 and the target terminal 30 are connected for the first time, and stored in the task scheduler 10, and may be directly invoked when encryption of data transmitted to the target terminal 30 is required.
Specifically, if the target terminal 30 passes the second authentication, which indicates that the target terminal 30 is legal and safe, the task scheduler 10 may encrypt the task instruction by using a second public key stored in advance to obtain a second encrypted instruction, and send the second encrypted instruction to the target terminal 30.
After the target terminal 30 receives the second encrypted instruction sent by the task scheduler 10, the target terminal 30 may decrypt the second encrypted instruction by using a second private key stored in advance to obtain a task instruction.
The second private key may be generated when the task scheduler 10 and the target terminal 30 are first connected, and stored in the target terminal 30, and may be directly invoked when encrypted data transmitted from the task scheduler 10 is to be received.
In the instruction processing method of the dial testing system provided in this embodiment, under the condition that the task scheduler 10 cannot communicate with the target dial tester 20, connection can be established with the target terminal 30, identity verification needs to be performed on the target terminal 30 in the instruction issuing process, and the instruction transmission process also needs to be transmitted through key encryption, so that the mechanism of issuing the instruction is increased, and meanwhile, the safety of instruction processing of the dial testing system is ensured.
In some embodiments of the present application, the above-mentioned process of performing the second authentication of the target terminal 30 by the task scheduler 10 is described, and the process may include:
s1, the task scheduler 10 sends second authentication information to the target terminal 30.
Specifically, the second authentication reply message may include: information on whether the running state of the equipment is normal or not, and information on whether the equipment has permission authentication or not.
The information indicating whether the device operating state is normal may indicate whether the target terminal 30 is in a normal operating state. The information on whether the device has the license authentication may indicate whether the device model of the target terminal 30 meets a preset prescribed model.
S2, the target dial testing device 20 receives second identity verification reply information replied by the target terminal 30.
Specifically, the target terminal 30 may reply to the second authentication information according to the current state and send the second authentication reply information to the task scheduler 10.
After receiving the second authentication reply message replied by the target terminal 30, the task scheduler 10 determines whether the target terminal 30 can pass the second authentication, in the following manner:
If the received second authentication reply message replied by the target terminal 30 meets the following conditions: and if the running state of the equipment is normal and the equipment has permission authentication, the target terminal 30 is indicated to pass the second identity verification.
That is, the target terminal 30 is currently in a normal running state, and the model of the device thereof meets the preset specified model, which indicates that the target terminal 30 can receive the instruction sent by the task scheduler 10 through the second authentication.
It will be appreciated that the dial testing system needs to ensure the security of the transmission of instructions, and if any of the above conditions is not met, it will indicate that the target terminal 30 is not secure or legal and therefore cannot pass authentication. In this case, the task scheduler 10 may transmit a prompt message indicating that the authentication is not passed to the target terminal 30, wherein the prompt message may specifically specify a condition of not passing in the second authentication information.
According to the instruction processing method of the dial testing system, the task scheduler 10 performs identity verification on the target terminal 30 to which the instruction is to be sent, so that safe equipment for receiving the instruction is ensured, and the safety of the instruction processing process of the dial testing system is improved.
The device for implementing the instruction processing of the dial testing system provided by the embodiment of the application is described below, and the device for implementing the instruction processing of the dial testing system described below and the method for implementing the instruction processing of the dial testing system described above can be referred to correspondingly.
Referring to fig. 3, fig. 3 is a schematic diagram of a device for implementing instruction processing of a dial testing system according to an embodiment of the present application.
As shown in fig. 3, the apparatus may include:
a task instruction generation unit 11 for generating a task instruction when there is a demand for the target end user to execute a task.
The task instruction comprises target dial indicator information to be sent to and target terminal information.
The target dial 20 is connected to the judging unit 12, for judging whether the target dial 20 corresponding to the target dial information is connected to the target dial.
The first authentication unit 13 is configured to perform a first authentication on the target dial 20 if communicating with the target dial 20.
The first encryption instruction sending unit 14 is configured to, if the target dialer 20 passes the first identity verification, encrypt the task instruction with a pre-stored first public key to obtain a first encryption instruction, and send the first encryption instruction to the target dialer 20, so that the target dialer 20 decrypts based on the pre-stored first private key to obtain the task instruction sent to the target terminal 30 corresponding to the target terminal information.
Referring to fig. 4, fig. 4 is a schematic diagram of another device for implementing instruction processing of a dial testing system according to an embodiment of the present application.
As shown in fig. 4, the apparatus may include:
A first encrypted instruction receiving unit 21, configured to receive a first encrypted instruction sent by the task scheduler 10.
The first encryption instruction is a result of encrypting the task instruction by the task scheduler 10 after the target dialer 20 is verified.
The first encrypted instruction decrypting unit 22 is configured to decrypt the first encrypted instruction by using a first private key stored in advance, and obtain the task instruction.
The task instruction comprises target terminal information.
And the second identity verification unit 23 is configured to perform second identity verification on the target terminal 30 corresponding to the target terminal information.
And a task instruction sending unit 24, configured to send the task instruction to the target terminal 30 if the target terminal 30 passes the second authentication.
Finally, it is further noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one … …" does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises the element.
In the present specification, each embodiment is described in a progressive manner, and each embodiment focuses on the difference from other embodiments, and may be combined according to needs, and the same similar parts may be referred to each other.
The previous description of the disclosed embodiments is provided to enable any person skilled in the art to make or use the present application. Various modifications to these embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the application. Thus, the present application is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.