CN104883679B - The method of testing of voice call encryption and device - Google Patents

The method of testing of voice call encryption and device Download PDF

Info

Publication number
CN104883679B
CN104883679B CN201510165865.8A CN201510165865A CN104883679B CN 104883679 B CN104883679 B CN 104883679B CN 201510165865 A CN201510165865 A CN 201510165865A CN 104883679 B CN104883679 B CN 104883679B
Authority
CN
China
Prior art keywords
data
voice call
encryption
terminal
voice
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201510165865.8A
Other languages
Chinese (zh)
Other versions
CN104883679A (en
Inventor
冯斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nubia Technology Co Ltd
Original Assignee
Nubia Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nubia Technology Co Ltd filed Critical Nubia Technology Co Ltd
Priority to CN201510165865.8A priority Critical patent/CN104883679B/en
Publication of CN104883679A publication Critical patent/CN104883679A/en
Application granted granted Critical
Publication of CN104883679B publication Critical patent/CN104883679B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements

Abstract

The invention discloses a kind of method of testing of voice call encryption, comprise: the voice call packet obtaining terminal, and from described voice call packet, extract the front voice call data of encryption as voice call data after the first data and encryption as the second data; Described first data are encrypted and obtain the 3rd data; When described second data and described 3rd Data Matching, judge described voice call data encryption success.The present invention also discloses a kind of testing apparatus of voice call encryption.Whether the present invention extends the test specification of voice call encryption, and accurately test out voice call and encrypt.

Description

The method of testing of voice call encryption and device
Technical field
The present invention relates to technical field of measurement and test, particularly relate to method of testing and the device of voice call encryption.
Background technology
Along with popularizing of intelligent terminal, increasing user uses intelligent terminal to complete voice call, and along with user is to the attention of call safety, increasing user proposes demand (such as to call voice encryption, government organs, high-tech enterprise etc.), increasing intelligent terminal manufacturer also starts to add this partial function in the intelligent terminal produced at it.
But, part manufacturer is only had to add speech scrambling phonetic function in terminal at present, and the encryption implementation method adopted due to each manufacturer, method of testing result in the uneven of end product quality from the different of index, whether the voice call carried out encrypts to cause terminal use in use cannot accurately judge, namely, whether the encryption test mode of existing terminal speech call cannot carry out the test of voice call encryption to the end product of each manufacturers produce, and accurately cannot test out voice call and encrypt.
Summary of the invention
Main purpose of the present invention is the method for testing and the device that propose a kind of voice call encryption, the encryption test mode being intended to solve the call of existing terminal speech cannot carry out the test of voice call encryption to the end product of each manufacturers produce, and accurately cannot test out the problem whether voice call encrypt.
For achieving the above object, the method for testing of a kind of voice call encryption provided by the invention, comprising:
Obtain the voice call packet of terminal, and from described voice call packet, extract the front voice call data of encryption as voice call data after the first data and encryption as the second data;
Described first data are encrypted and obtain the 3rd data;
When described second data and described 3rd Data Matching, judge described voice call data encryption success.
Preferably, the voice call packet of described acquisition terminal, and extract encryption from described voice call packet before, voice call data comprise as the step of voice call data after the first data and encryption as enciphered data:
The packet of terminal air interface transmission is captured by instrument;
According to the flag bit arranged, from captured packet, extract the voice call data before encryption as voice call data after the first data and encryption as the second data.
Preferably, described described first data are encrypted to the step obtaining the 3rd data before, also comprise:
When obtaining the failure of voice call packet, send to auxiliary survey terminal and preset speech data as the first data, and the speech data sent after extracting described auxiliary survey terminal encryption is as the second data.
Preferably, describedly the step obtaining the 3rd data be encrypted to described first data comprise:
Determine the cryptographic algorithm of obtained voice call data;
According to determined algorithm described first data are encrypted and obtain the 3rd data.
Preferably, described described first data are encrypted to the step obtaining the 3rd data after, also comprise:
When described second data are not mated with described 3rd data, judge described voice call data encryption failure.
Preferably, described described first data are encrypted to the step obtaining the 3rd data after, also comprise:
When described second data are not mated with described 3rd data, determine the mode of operation that terminal is current;
After described mode of operation is not for default mode of operation, continue terminal call operation.
In addition, for achieving the above object, the present invention also proposes a kind of testing apparatus of voice call encryption, comprising:
Acquisition module, for obtaining the voice call data of terminal, and encrypts front voice call data as voice call data after the first data and encryption as the second data from described voice call extracting data;
Encrypting module, obtains the 3rd data for being encrypted described first data;
Test module, for when the difference of described second data and described 3rd data is less than preset difference value threshold value, judges described voice call data encryption success.
Preferably, described acquisition module, also for being captured the packet of terminal air interface transmission by instrument; Also for according to the flag bit arranged, from captured packet, extract the voice call data before encryption as voice call data after the first data and encryption as the second data.
Preferably, the testing apparatus of described voice encryption communicating data also comprises:
Sending module, for when obtaining the failure of voice call packet, sending to auxiliary survey terminal and presetting speech data as the first data;
Described acquisition module, also for the speech data that sends after extracting described auxiliary survey terminal encryption as the second data.
Preferably, described encrypting module comprises:
Determining unit, for determining the cryptographic algorithm of obtained voice call data;
Ciphering unit, obtains the 3rd data for being encrypted described first data according to determined algorithm.
Preferably, the testing apparatus of described voice encryption communicating data also comprises call module,
Described determining unit, also for when described second data are not mated with described 3rd data, determines the mode of operation that terminal is current;
Described call module, for after described mode of operation is not for default mode of operation, has continued terminal call operation.
Preferably, described test module, also for when described second data are not mated with described 3rd data, judges described voice call data encryption failure.
Data encryption before encryption by capturing the voice call data after the voice call data before voice call data encryption and encryption, and is become the voice call comparing after the encryption of theoretical enciphered data and crawl by the present invention, if coupling, then judges that encryption is correct.Extend the test specification of voice call encryption, and accurately test out voice call and whether encrypt.
Accompanying drawing explanation
Fig. 1 is the hardware configuration signal of the mobile terminal realizing each embodiment of the present invention;
Fig. 2 is the wireless communication system schematic diagram of mobile terminal as shown in Figure 1;
Fig. 3 is the schematic flow sheet of the first embodiment of the method for testing of voice call encryption of the present invention;
Fig. 4 is the schematic flow sheet that the present invention obtains voice call data one embodiment;
Fig. 5 is the present invention is encrypted the embodiment obtaining the 3rd data schematic flow sheet to described first data;
Fig. 6 is the schematic flow sheet of test process one embodiment of voice call encryption of the present invention;
The schematic flow sheet of the second embodiment of the method for testing of Fig. 7 voice call encryption of the present invention;
Fig. 8 is the high-level schematic functional block diagram of the first embodiment of the testing apparatus of voice call encryption of the present invention;
Fig. 9 is the refinement high-level schematic functional block diagram of encrypting module one embodiment in Fig. 8;
Figure 10 is the high-level schematic functional block diagram of the second embodiment of the testing apparatus of voice call encryption of the present invention.
The realization of the object of the invention, functional characteristics and advantage will in conjunction with the embodiments, are described further with reference to accompanying drawing.
Embodiment
Should be appreciated that specific embodiment described herein only in order to explain the present invention, be not intended to limit the present invention.
The mobile terminal realizing each embodiment of the present invention is described referring now to accompanying drawing.In follow-up description, use the suffix of such as " module ", " parts " or " unit " for representing element only in order to be conducive to explanation of the present invention, itself is specific meaning not.Therefore, " module " and " parts " can mixedly use.
Mobile terminal can be implemented in a variety of manners.Such as, the terminal described in the present invention can comprise the such as mobile terminal of mobile phone, smart phone, notebook computer, digit broadcasting receiver, PDA (personal digital assistant), PAD (panel computer), PMP (portable media player), guider etc. and the fixed terminal of such as digital TV, desktop computer etc.Below, suppose that terminal is mobile terminal.But it will be appreciated by those skilled in the art that except the element except being used in particular for mobile object, structure according to the embodiment of the present invention also can be applied to the terminal of fixed type.
Fig. 1 is the hardware configuration signal of the mobile terminal realizing each embodiment of the present invention.
Mobile terminal 100 can comprise wireless communication unit 110, A/V (audio/video) input unit 120, user input unit 130, sensing cell 140, output unit 150, memory 160, interface unit 170, controller 180 and power subsystem 190 etc.Fig. 1 shows the mobile terminal with various assembly, it should be understood that, does not require to implement all assemblies illustrated.Can alternatively implement more or less assembly.Will be discussed in more detail below the element of mobile terminal.
Wireless communication unit 110 generally includes one or more assembly, and it allows the radio communication between mobile terminal 100 and wireless communication system or network.Such as, wireless communication unit can comprise at least one in broadcast reception module 111, mobile communication module 112, wireless Internet module 113, short range communication module 114 and positional information module 115.
Broadcast reception module 111 via broadcast channel from external broadcasting management server receiving broadcast signal and/or broadcast related information.Broadcast channel can comprise satellite channel and/or terrestrial channel.Broadcast management server can be generate and send the server of broadcast singal and/or broadcast related information or the broadcast singal generated before receiving and/or broadcast related information and send it to the server of terminal.Broadcast singal can comprise TV broadcast singal, radio signals, data broadcasting signal etc.And broadcast singal may further include the broadcast singal combined with TV or radio signals.Broadcast related information also can provide via mobile communications network, and in this case, broadcast related information can be received by mobile communication module 112.Broadcast singal can exist in a variety of manners, such as, it can exist with the form of the electronic service guidebooks (ESG) of the electronic program guides of DMB (DMB) (EPG), digital video broadcast-handheld (DVB-H) etc.Broadcast reception module 111 can by using the broadcast of various types of broadcast system Received signal strength.Especially, broadcast reception module 111 can by using such as multimedia broadcasting-ground (DMB-T), DMB-satellite (DMB-S), digital video broadcasting-hand-held (DVB-H), forward link media (MediaFLO ) the digit broadcasting system receiving digital broadcast of Radio Data System, received terrestrial digital broadcasting integrated service (ISDB-T) etc.Broadcast reception module 111 can be constructed to be applicable to providing the various broadcast system of broadcast singal and above-mentioned digit broadcasting system.The broadcast singal received via broadcast reception module 111 and/or broadcast related information can be stored in memory 160 (or storage medium of other type).
Radio signal is sent at least one in base station (such as, access point, Node B etc.), exterior terminal and server and/or receives radio signals from it by mobile communication module 112.Various types of data that such radio signal can comprise voice call signal, video calling signal or send according to text and/or Multimedia Message and/or receive.
Wireless Internet module 113 supports the Wi-Fi (Wireless Internet Access) of mobile terminal.This module can be inner or be externally couple to terminal.Wi-Fi (Wireless Internet Access) technology involved by this module can comprise WLAN (WLAN) (Wi-Fi), Wibro (WiMAX), Wimax (worldwide interoperability for microwave access), HSDPA (high-speed downlink packet access) etc.
Short range communication module 114 is the modules for supporting junction service.Some examples of short-range communication technology comprise bluetooth TM, radio-frequency (RF) identification (RFID), Infrared Data Association (IrDA), ultra broadband (UWB), purple honeybee TM etc.
Positional information module 115 is the modules of positional information for checking or obtain mobile terminal.The typical case of positional information module is GPS (global positioning system).According to current technology, GPS module 115 calculates from the range information of three or more satellite and correct time information and for the Information application triangulation calculated, thus calculates three-dimensional current location information according to longitude, latitude and pin-point accuracy.Current, the method for calculating location and temporal information uses three satellites and by the error of the position that uses an other satellite correction calculation to go out and temporal information.In addition, GPS module 115 can carry out computational speed information by Continuous plus current location information in real time.
A/V input unit 120 is for audio reception or vision signal.A/V input unit 120 can comprise camera 121 and microphone 1220, and the view data of camera 121 to the static images obtained by image capture apparatus in Video Capture pattern or image capture mode or video processes.Picture frame after process may be displayed on display unit 151.Picture frame after camera 121 processes can be stored in memory 160 (or other storage medium) or via wireless communication unit 110 and send, and can provide two or more cameras 1210 according to the structure of mobile terminal.Such acoustic processing can via microphones sound (voice data) in telephone calling model, logging mode, speech recognition mode etc. operational mode, and can be voice data by microphone 122.Audio frequency (voice) data after process can be converted to the formatted output that can be sent to mobile communication base station via mobile communication module 112 when telephone calling model.Microphone 122 can be implemented various types of noise and eliminate (or suppress) algorithm and receiving and sending to eliminate (or suppression) noise or interference that produce in the process of audio signal.
User input unit 130 can generate key input data to control the various operations of mobile terminal according to the order of user's input.User input unit 130 allows user to input various types of information, and keyboard, the young sheet of pot, touch pad (such as, detecting the touch-sensitive assembly of the change of the resistance, pressure, electric capacity etc. that cause owing to being touched), roller, rocking bar etc. can be comprised.Especially, when touch pad is superimposed upon on display unit 151 as a layer, touch-screen can be formed.
Sensing cell 140 detects the current state of mobile terminal 100, (such as, mobile terminal 100 open or close state), the position of mobile terminal 100, user for mobile terminal 100 contact (namely, touch input) presence or absence, the orientation of mobile terminal 100, the acceleration or deceleration of mobile terminal 100 move and direction etc., and generate order or the signal of the operation for controlling mobile terminal 100.Such as, when mobile terminal 100 is embodied as sliding-type mobile phone, sensing cell 140 can sense this sliding-type phone and open or close.In addition, whether whether sensing cell 140 can detect power subsystem 190 provides electric power or interface unit 170 to couple with external device (ED).Sensing cell 140 can comprise proximity transducer 1410 and will be described this in conjunction with touch-screen below.
Interface unit 170 is used as at least one external device (ED) and is connected the interface that can pass through with mobile terminal 100.Such as, external device (ED) can comprise wired or wireless head-band earphone port, external power source (or battery charger) port, wired or wireless FPDP, memory card port, for connecting the port, audio frequency I/O (I/O) port, video i/o port, ear port etc. of the device with identification module.Identification module can be that storage uses the various information of mobile terminal 100 for authentication of users and can comprise subscriber identification module (UIM), client identification module (SIM), Universal Subscriber identification module (USIM) etc.In addition, the device (hereinafter referred to " recognition device ") with identification module can take the form of smart card, and therefore, recognition device can be connected with mobile terminal 100 via port or other jockey.Interface unit 170 may be used for receive from external device (ED) input (such as, data message, electric power etc.) and the input received be transferred to the one or more element in mobile terminal 100 or may be used for transmitting data between mobile terminal and external device (ED).
In addition, when mobile terminal 100 is connected with external base, interface unit 170 can be used as to allow by it electric power to be provided to the path of mobile terminal 100 from base or can be used as the path that allows to be transferred to mobile terminal by it from the various command signals of base input.The various command signal inputted from base or electric power can be used as and identify whether mobile terminal is arranged on the signal base exactly.Output unit 150 is constructed to provide output signal (such as, audio signal, vision signal, alarm signal, vibration signal etc.) with vision, audio frequency and/or tactile manner.Output unit 150 can comprise display unit 151, dio Output Modules 152, alarm unit 153 etc.
Display unit 151 may be displayed on the information of process in mobile terminal 100.Such as, when mobile terminal 100 is in telephone calling model, display unit 151 can show with call or other communicate (such as, text messaging, multimedia file are downloaded etc.) be correlated with user interface (UI) or graphic user interface (GUI).When mobile terminal 100 is in video calling pattern or image capture mode, display unit 151 can the image of display capture and/or the image of reception, UI or GUI that video or image and correlation function are shown etc.
Meanwhile, when display unit 151 and touch pad as a layer superposed on one another to form touch-screen time, display unit 151 can be used as input unit and output device.Display unit 151 can comprise at least one in liquid crystal display (LCD), thin-film transistor LCD (TFT-LCD), Organic Light Emitting Diode (OLED) display, flexible display, three-dimensional (3D) display etc.Some in these displays can be constructed to transparence and watch from outside to allow user, and this can be called transparent display, and typical transparent display can be such as TOLED (transparent organic light emitting diode) display etc.According to the specific execution mode wanted, mobile terminal 100 can comprise two or more display units (or other display unit), such as, mobile terminal can comprise outernal display unit (not shown) and inner display unit (not shown).Touch-screen can be used for detecting touch input pressure and touch input position and touch and inputs area.
When dio Output Modules 152 can be under the isotypes such as call signal receiving mode, call mode, logging mode, speech recognition mode, broadcast reception mode at mobile terminal, voice data convert audio signals that is that wireless communication unit 110 is received or that store in memory 160 and exporting as sound.And dio Output Modules 152 can provide the audio frequency relevant to the specific function that mobile terminal 100 performs to export (such as, call signal receives sound, message sink sound etc.).Dio Output Modules 152 can comprise loud speaker, buzzer etc.
Alarm unit 153 can provide and export that event informed to mobile terminal 100.Typical event can comprise calling reception, message sink, key signals input, touch input etc.Except audio or video exports, alarm unit 153 can provide in a different manner and export with the generation of notification event.Such as, alarm unit 153 can provide output with the form of vibration, when receive calling, message or some other enter communication (incomingcommunication) time, alarm unit 153 can provide sense of touch to export (that is, vibrating) to notify to user.By providing such sense of touch to export, even if when the mobile phone of user is in the pocket of user, user also can identify the generation of various event.Alarm unit 153 also can provide the output of the generation of notification event via display unit 151 or dio Output Modules 152.
Memory 160 software program that can store process and the control operation performed by controller 180 etc., or temporarily can store oneself through exporting the data (such as, telephone directory, message, still image, video etc.) that maybe will export.And, memory 160 can store about when touch be applied to touch-screen time the vibration of various modes that exports and the data of audio signal.
Memory 160 can comprise the storage medium of at least one type, described storage medium comprises flash memory, hard disk, multimedia card, card-type memory (such as, SD or DX memory etc.), random access storage device (RAM), static random-access memory (SRAM), read-only memory (ROM), Electrically Erasable Read Only Memory (EEPROM), programmable read only memory (PROM), magnetic storage, disk, CD etc.And mobile terminal 100 can be connected the memory function of execute store 160 network storage device with by network cooperates.
Controller 180 controls the overall operation of mobile terminal usually.Such as, controller 180 performs the control relevant to voice call, data communication, video calling etc. and process.In addition, controller 180 can comprise the multi-media module 1810 for reproducing (or playback) multi-medium data, and multi-media module 1810 can be configured in controller 180, or can be configured to be separated with controller 180.Controller 180 can pattern recognition process, is identified as character or image so that input is drawn in the handwriting input performed on the touchscreen or picture.
Power subsystem 190 receives external power or internal power and provides each element of operation and the suitable electric power needed for assembly under the control of controller 180.
Various execution mode described herein can to use such as computer software, the computer-readable medium of hardware or its any combination implements.For hardware implementation, execution mode described herein can by using application-specific IC (ASIC), digital signal processor (DSP), digital signal processing device (DSPD), programmable logic device (PLD), field programmable gate array (FPGA), processor, controller, microcontroller, microprocessor, being designed at least one performed in the electronic unit of function described herein and implementing, in some cases, such execution mode can be implemented in controller 180.For implement software, the execution mode of such as process or function can be implemented with allowing the independent software module performing at least one function or operation.Software code can be implemented by the software application (or program) write with any suitable programming language, and software code can be stored in memory 160 and to be performed by controller 180.
So far, oneself is through the mobile terminal according to its functional description.Below, for the sake of brevity, by the slide type mobile terminal that describes in various types of mobile terminals of such as folded form, board-type, oscillating-type, slide type mobile terminal etc. exemplarily.Therefore, the present invention can be applied to the mobile terminal of any type, and is not limited to slide type mobile terminal.
Mobile terminal 100 as shown in Figure 1 can be constructed to utilize and send the such as wired and wireless communication system of data via frame or grouping and satellite-based communication system operates.
Describe wherein according to the communication system that mobile terminal of the present invention can operate referring now to Fig. 2.
Such communication system can use different air interfaces and/or physical layer.Such as, the air interface used by communication system comprises such as frequency division multiple access (FDMA), time division multiple access (TDMA), code division multiple access (CDMA) and universal mobile telecommunications system (UMTS) (especially, Long Term Evolution (LTE)), global system for mobile communications (GSM) etc.As non-limiting example, description below relates to cdma communication system, but such instruction is equally applicable to the system of other type.
With reference to figure 2, cdma wireless communication system can comprise multiple mobile terminal 100, multiple base station (BS) 270, base station controller (BSC) 275 and mobile switching centre (MSC) 2800MSC280 and be constructed to form interface with Public Switched Telephony Network (PSTN) 290.MSC280 is also constructed to form interface with the BSC275 that can be couple to base station 270 via back haul link.Back haul link can construct according to any one in some interfaces that oneself knows, described interface comprises such as E1/T1, ATM, IP, PPP, frame relay, HDSL, ADSL or xDSL.Will be appreciated that system as shown in Figure 2 can comprise multiple BSC2750.
Each BS270 can serve one or more subregion (or region), by multidirectional antenna or point to specific direction each subregion of antenna cover radially away from BS270.Or each subregion can by two or more antenna covers for diversity reception.Each BS270 can be constructed to support multiple parallel compensate, and each parallel compensate has specific frequency spectrum (such as, 1.25MHz, 5MHz etc.).
Subregion can be called as CDMA Channel with intersecting of parallel compensate.BS270 also can be called as base station transceiver subsystem (BTS) or other equivalent terms.Under these circumstances, term " base station " may be used for broadly representing single BSC275 and at least one BS270.Base station also can be called as " cellular station ".Or each subregion of particular B S270 can be called as multiple cellular station.
As shown in Figure 2, broadcast singal is sent to the mobile terminal 100 at operate within systems by broadcsting transmitter (BT) 295.Broadcast reception module 111 as shown in Figure 1 is arranged on mobile terminal 100 and sentences the broadcast singal receiving and sent by BT295.In fig. 2, several global positioning system (GPS) satellite 300 is shown.Satellite 300 helps at least one in the multiple mobile terminal 100 in location.
In fig. 2, depict multiple satellite 300, but understand, the satellite of any number can be utilized to obtain useful locating information.GPS module 115 as shown in Figure 1 is constructed to coordinate to obtain the locating information wanted with satellite 300 usually.Substitute GPS tracking technique or outside GPS tracking technique, can use can other technology of position of tracking mobile terminal.In addition, at least one gps satellite 300 optionally or extraly can process satellite dmb transmission.
As a typical operation of wireless communication system, BS270 receives the reverse link signal from various mobile terminal 100.Mobile terminal 100 participates in call usually, information receiving and transmitting communicates with other type.Each reverse link signal that certain base station 270 receives is processed by particular B S270.The data obtained are forwarded to relevant BSC275.BSC provides call Resourse Distribute and comprises the mobile management function of coordination of the soft switching process between BS270.The data received also are routed to MSC280 by BSC275, and it is provided for the extra route service forming interface with PSTN290.Similarly, PSTN290 and MSC280 forms interface, and MSC and BSC275 forms interface, and BSC275 correspondingly control BS270 so that forward link signals is sent to mobile terminal 100.
Based on above-mentioned mobile terminal hardware configuration and communication system, each embodiment of method of testing of voice call encryption of the present invention is proposed.
As shown in Figure 3, first embodiment of the invention proposes a kind of method of testing of voice call encryption, comprising:
Step S10, obtains the voice call data of terminal, and encrypts front voice call data as voice call data after the first data and encryption as the second data from described voice call extracting data;
In the present embodiment, described terminal includes but not limited to that mobile phone, notebook, pad etc. have the electric terminal of voice call function.Obtain the voice call packet of terminal, such as, captured the packet of terminal air interface transmission by instrument, namely, capture the packet that terminal finally mails to base station, preferably, the packet captured is that crawl modem side is up, the voice call packet of downlink channel transmission.After grabbing voice call packet, voice call data are captured from grabbed voice call packet, according to the flag bit arranged in cryptographic algorithm, from the voice call data before the encryption of captured voice call extracting data as the first data, and the voice call data extracted after encryption are as the second data, that is, using extract encryption before voice call data as the first data, using extract encryption after voice call data as the second data.
With reference to figure 4, after the failure of acquisition voice call packet, also comprise:
Step S40, sends to auxiliary survey terminal and presets speech data as the first data;
Step S50, the speech data sent after extracting described auxiliary survey terminal encryption is as the second data.
In the present embodiment, described default speech data can shift to an earlier date typing one section of speech data by terminal, or when capturing voice call data failure, typing one section of speech data is as the speech data etc. preset, described default speech data can one section of song, or the speech data such as one section of session.
After the described voice call data failure of acquisition, if voice call data cannot be captured by instrument, such as, the voice call data before encryption cannot be got by Tool grasper, after can talkthrough be set, fix and send a default speech data (not gathering the sound of described terminal surrounding) to auxiliary survey terminal, the speech data toward server end is passed after so only needing to extract secret, namely, using described default speech data as the first data, described biography is the second data toward the speech data of server end, speech data before having grabbed encryption and after encryption.
Step S20, is encrypted described first data and obtains the 3rd data;
In the present embodiment, with reference to figure 5, describedly the process obtaining the 3rd data be encrypted to described first data comprise:
Step S21, determines the cryptographic algorithm of obtained voice call data;
Step S22, to be encrypted described first data according to determined algorithm and to obtain the 3rd data.
After partial data before extracting encryption and after encryption, determine the cryptographic algorithm of obtained voice call data, the cryptographic algorithm of obtained voice call data can be determined in several ways, such as, from the installation path of the call software of terminal local, 1) get the cryptographic algorithm of described call voice data; 2) resolve the voice call data after described encryption, obtain the cryptographic algorithm of described voice call data.The determination mode of the cryptographic algorithm enumerated is above only exemplary; those skilled in the art utilize technological thought of the present invention; the determination mode of other cryptographic algorithm proposed according to its real needs, all in protection scope of the present invention, is not carried out exhaustive one by one at this.
After determining cryptographic algorithm, according to cryptographic algorithm principle, described first data are calculated, be converted to the data of being encrypted by cryptographic algorithm, be namely converted to the 3rd data.
Step S30, when the mating of described second data and described 3rd data, judges described voice call data encryption success.
Described second data and described 3rd data are compared, when described second data and described 3rd Data Matching, judges described voice call data encryption success.Various ways can be taked to judge, and whether described second data mate with described 3rd data, such as, 1) the second data described in comparison and described 3rd data, described second data and described 3rd data completely the same time, judge described second data and described 3rd Data Matching, 2) difference value of described second data and the 3rd data is calculated, when described difference value is less than default discrepancy threshold, judge described second data and described 3rd Data Matching, described default discrepancy threshold can be 5%, namely, described second data are identical with described 3rd data 95%, similarity is more than 95%, just judge to encrypt successfully, also can also be 8% or 10% etc., because the phenomenon of frame losing and/or interference may appear in voice call data in actual transmissions process, error to a certain degree can be there is between the data of described theoretical enciphered data and the rear actual transmissions of encryption, 3) extract the keyword of described second data, from keyword described in described 3rd extracting data, when from described 3rd extracting data to described keyword, judge described second data and described 3rd Data Matching.That enumerates above judges that the mode whether described second data and described 3rd data mate only is only exemplary; those skilled in the art utilize technological thought of the present invention; other proposition according to its real needs judges that mode that whether described second data and described 3rd data mate is all in protection scope of the present invention, does not carry out exhaustive one by one at this.
When described second data are not mated with described 3rd data, judge that described voice call data encryption is abnormal, failed encryption, current also when carrying out above-mentioned voice call, the current voice call environment being in poor stability of prompt terminal; Current terminated above-mentioned voice call time, the result of feedback voice failed encryption.After prompting, receive the response message of user based on described prompting, when described response message is for stopping communication process, stop current talking process, or directly when described second data are not mated with described 3rd data, stop current talking, and point out end of conversation; When described response message is for continuing communication process, then continue to pass through process.By above-described embodiment, make the test process of voice call encryption simple, be convenient to realize, and the scope of application is extensive.
In order to better describe the embodiment of the present invention, concrete, with reference to figure 6, the test process of voice call encryption of the present invention is described from an example:
In terminal call process, use instrument captures side's terminal uplink (speech data that this terminal sends) and descending (speech data that this terminal receives) speech data.According to flag bit set in program, after extracting the speech data A before encrypting and actual encrypted respectively, carry out the speech data B transmitted.Speech data A before encryption is encrypted by algorithm and draws the rear speech data C of theoretical encryption, described algorithm is the cryptographic algorithm of encrypted transmission, now by B and C comparison, check whether B and C is consistent and can judge whether cryptographic algorithm realizes correctly, namely whether encrypting successfully.Preferably, because data may occur the phenomenon such as frame losing and interference in actual transmissions process, so allow certain error between B and C, as long as more than 95%, we all can think that encryption is normal to similarity.
The present embodiment is by capturing the voice call data after the voice call data before voice call data encryption and encryption, and the data encryption before encryption is become the voice call comparing after the encryption of theoretical enciphered data and crawl, if coupling, then judge that encryption is correct.Extend the test specification of voice call encryption, and accurately test out voice call and whether encrypt.
It is the schematic flow sheet of the second embodiment of the method for testing of voice call encryption of the present invention with reference to figure 7, Fig. 7.Based on the first embodiment of the method for testing of above-mentioned voice call encryption, after described step S20, also comprise:
Step S60, when described second data are not mated with described 3rd data, determines the mode of operation that terminal is current;
Step S70, after described mode of operation is not for default mode of operation, has continued terminal call operation.
The call mode of operation that preset in advance is different, such as, the call mode of operation etc. that the low call mode of operation of security requirement, security requirement are high, under the call mode of operation that security requirement is low, can select voice call data encryption or not encrypt, under the call mode of operation that security requirement is high, voice call data could send after must encrypting.
In the present embodiment, described default mode of operation is preferably the high call mode of operation of security requirement, when described second data are not mated with described 3rd data, determine the mode of operation that terminal is current, when described mode of operation is not for presetting mode of operation, that is, for security requirement is low or when not requiring call fail safe, continued telephone operation; When described mode of operation is for presetting mode of operation, terminating current talking process, to guarantee the fail safe of communication process, preventing secret or private information from revealing.
At the present embodiment by presetting different call mode of operations, not under default mode of operation, if the second data are not mated with the 3rd data, also communication process is proceeded, when for presetting under mode of operation, when the second data are not mated with the 3rd data, finished call process.Effectively guarantee the fail safe of voice call data in communication process, and by the switching of different working modes, effectively ensure completing and experiencing of voice call operation.
The present invention further provides a kind of testing apparatus of voice call encryption.
With reference to the high-level schematic functional block diagram that Fig. 8, Fig. 8 are the first embodiment of the testing apparatus of voice call encryption of the present invention.
The testing apparatus of a kind of voice call encryption of the present embodiment, the testing apparatus of described voice call encryption comprises: acquisition module 10,
Described acquisition module 10, for obtaining the voice call data of terminal, and encrypts front voice call data as voice call data after the first data and encryption as the second data from described voice call extracting data;
In the present embodiment, described terminal includes but not limited to that mobile phone, notebook, pad etc. have the electric terminal of voice call function.Obtain the voice call packet of terminal, such as, captured the packet of terminal air interface transmission by instrument, namely, capture the packet that terminal finally mails to base station, preferably, the packet captured is that crawl modem side is up, the voice call packet of downlink channel transmission.After grabbing voice call packet, voice call data are captured from grabbed voice call packet, according to the flag bit arranged in cryptographic algorithm, from the voice call data before the encryption of captured voice call extracting data as the first data, and the voice call data extracted after encryption are as the second data, that is, using extract encryption before voice call data as the first data, using extract encryption after voice call data as the second data.
Described sending module 20, presets speech data as the first data for sending to auxiliary survey terminal;
Described acquisition module 10, also for the speech data that sends after extracting described auxiliary survey terminal encryption as the second data.
In the present embodiment, described default speech data can shift to an earlier date typing one section of speech data by terminal, or when capturing voice call data failure, typing one section of speech data is as the speech data etc. preset, described default speech data can one section of song, or the speech data such as one section of session.
After the described voice call data failure of acquisition, if voice call data cannot be captured by instrument, such as, the voice call data before encryption cannot be got by Tool grasper, after can talkthrough be set, fix and send a default speech data (not gathering the sound of described terminal surrounding) to auxiliary survey terminal, the speech data toward server end is passed after so only needing to extract secret, namely, using described default speech data as the first data, described biography is the second data toward the speech data of server end, speech data before having grabbed encryption and after encryption.
Described encrypting module 30, obtains the 3rd data for being encrypted described first data;
In the present embodiment, with reference to figure 9, described encrypting module 30 comprises determining unit 31 and ciphering unit 32,
Described determining unit 31, for determining the cryptographic algorithm of obtained voice call data;
Described ciphering unit 32, obtains the 3rd data for being encrypted described first data according to determined algorithm.
After partial data before extracting encryption and after encryption, determine the cryptographic algorithm of obtained voice call data, the cryptographic algorithm of obtained voice call data can be determined in several ways, such as, from the installation path of the call software of terminal local, 1) get the cryptographic algorithm of described call voice data; 2) resolve the voice call data after described encryption, obtain the cryptographic algorithm of described voice call data.The determination mode of the cryptographic algorithm enumerated is above only exemplary; those skilled in the art utilize technological thought of the present invention; the determination mode of other cryptographic algorithm proposed according to its real needs, all in protection scope of the present invention, is not carried out exhaustive one by one at this.
After determining cryptographic algorithm, according to cryptographic algorithm principle, described first data are calculated, be converted to the data of being encrypted by cryptographic algorithm, be namely converted to the 3rd data.
Described test module 40, for when the mating of described second data and described 3rd data, judges described voice call data encryption success.
Described second data and described 3rd data are compared, when described second data and described 3rd Data Matching, judges described voice call data encryption success.Various ways can be taked to judge, and whether described second data mate with described 3rd data, such as, 1) the second data described in comparison and described 3rd data, described second data and described 3rd data completely the same time, judge described second data and described 3rd Data Matching, 2) difference value of described second data and the 3rd data is calculated, when described difference value is less than default discrepancy threshold, judge described second data and described 3rd Data Matching, described default discrepancy threshold can be 5%, namely, described second data are identical with described 3rd data 95%, similarity is more than 95%, just judge to encrypt successfully, also can also be 8% or 10% etc., because the phenomenon of frame losing and/or interference may appear in voice call data in actual transmissions process, error to a certain degree can be there is between the data of described theoretical enciphered data and the rear actual transmissions of encryption, 3) extract the keyword of described second data, from keyword described in described 3rd extracting data, when from described 3rd extracting data to described keyword, judge described second data and described 3rd Data Matching.That enumerates above judges that the mode whether described second data and described 3rd data mate only is only exemplary; those skilled in the art utilize technological thought of the present invention; other proposition according to its real needs judges that mode that whether described second data and described 3rd data mate is all in protection scope of the present invention, does not carry out exhaustive one by one at this.
When described second data are not mated with described 3rd data, judge that described voice call data encryption is abnormal, failed encryption, current also when carrying out above-mentioned voice call, the current voice call environment being in poor stability of prompt terminal; Current terminated above-mentioned voice call time, the result of feedback voice failed encryption.After prompting, receive the response message of user based on described prompting, when described response message is for stopping communication process, stop current talking process, or directly when described second data are not mated with described 3rd data, stop current talking, and point out end of conversation; When described response message is for continuing communication process, then continue to pass through process.By above-described embodiment, make the test process of voice call encryption simple, be convenient to realize, and the scope of application is extensive.
In order to better describe the embodiment of the present invention, concrete, with reference to figure 6, the test process of voice call encryption of the present invention is described from an example:
In terminal call process, use instrument captures side's terminal uplink (speech data that this terminal sends) and descending (speech data that this terminal receives) speech data.According to flag bit set in program, after extracting the speech data A before encrypting and actual encrypted respectively, carry out the speech data B transmitted.Speech data A before encryption is encrypted by algorithm and draws the rear speech data C of theoretical encryption, described algorithm is the cryptographic algorithm of encrypted transmission, now by B and C comparison, check whether B and C is consistent and can judge whether cryptographic algorithm realizes correctly, namely whether encrypting successfully.Preferably, because data may occur the phenomenon such as frame losing and interference in actual transmissions process, so allow certain error between B and C, as long as more than 95%, we all can think that encryption is normal to similarity.
The present embodiment is by capturing the voice call data after the voice call data before voice call data encryption and encryption, and the data encryption before encryption is become the voice call comparing after the encryption of theoretical enciphered data and crawl, if coupling, then judge that encryption is correct.Extend the test specification of voice call encryption, and accurately test out voice call and whether encrypt.
With reference to the high-level schematic functional block diagram that Figure 10, Figure 10 are the second embodiment of the testing apparatus of voice call encryption of the present invention.The testing apparatus of described voice call encryption also comprises call module 50,
Described determining unit 31, also for when described second data are not mated with described 3rd data, determines the mode of operation that terminal is current;
Described call module 50, for after described mode of operation is not for default mode of operation, has continued terminal call operation.
The call mode of operation that preset in advance is different, such as, the call mode of operation etc. that the low call mode of operation of security requirement, security requirement are high, under the call mode of operation that security requirement is low, can select voice call data encryption or not encrypt, under the call mode of operation that security requirement is high, voice call data could send after must encrypting.
In the present embodiment, described default mode of operation is preferably the high call mode of operation of security requirement, when described second data are not mated with described 3rd data, determine the mode of operation that terminal is current, when described mode of operation is not for presetting mode of operation, that is, for security requirement is low or when not requiring call fail safe, continued telephone operation; When described mode of operation is for presetting mode of operation, terminating current talking process, to guarantee the fail safe of communication process, preventing secret or private information from revealing.
At the present embodiment by presetting different call mode of operations, not under default mode of operation, if the second data are not mated with the 3rd data, also communication process is proceeded, when for presetting under mode of operation, when the second data are not mated with the 3rd data, finished call process.Effectively guarantee the fail safe of voice call data in communication process, and by the switching of different working modes, effectively ensure completing and experiencing of voice call operation.
It should be noted that, in this article, term " comprises ", " comprising " or its any other variant are intended to contain comprising of nonexcludability, thus make to comprise the process of a series of key element, method, article or device and not only comprise those key elements, but also comprise other key elements clearly do not listed, or also comprise by the intrinsic key element of this process, method, article or device.When not more restrictions, the key element limited by statement " comprising ... ", and be not precluded within process, method, article or the device comprising this key element and also there is other identical element.
The invention described above embodiment sequence number, just to describing, does not represent the quality of embodiment.
Through the above description of the embodiments, those skilled in the art can be well understood to the mode that above-described embodiment method can add required general hardware platform by software and realize, hardware can certainly be passed through, but in a lot of situation, the former is better execution mode.Based on such understanding, technical scheme of the present invention can embody with the form of software product the part that prior art contributes in essence in other words, this computer software product is stored in a storage medium (as ROM/RAM, magnetic disc, CD), comprising some instructions in order to make a station terminal equipment (can be mobile phone, computer, server, air conditioner, or the network equipment etc.) perform method described in each embodiment of the present invention.
These are only the preferred embodiments of the present invention; not thereby the scope of the claims of the present invention is limited; every utilize specification of the present invention and accompanying drawing content to do equivalent structure or equivalent flow process conversion; or be directly or indirectly used in other relevant technical fields, be all in like manner included in scope of patent protection of the present invention.

Claims (10)

1. a method of testing for voice call encryption, is characterized in that, comprising:
Obtain the voice call packet of terminal, and from described voice call packet, extract the front voice call data of encryption as voice call data after the first data and encryption as the second data;
Described first data are encrypted and obtain the 3rd data;
When described second data and described 3rd Data Matching, judge described voice call data encryption success;
When described second data are not mated with described 3rd data, determine the mode of operation that terminal is current;
After described mode of operation is not for default mode of operation, continue terminal call operation.
2. the method for testing of voice call encryption as claimed in claim 1, it is characterized in that, the voice call packet of described acquisition terminal, and extract encryption from described voice call packet before, voice call data comprise as the step of voice call data after the first data and encryption as enciphered data:
The packet of terminal air interface transmission is captured by instrument;
According to the flag bit arranged, from captured packet, extract the voice call data before encryption as voice call data after the first data and encryption as the second data.
3. the method for testing of voice call encryption as claimed in claim 2, is characterized in that, described described first data are encrypted to the step obtaining the 3rd data before, also comprise:
When obtaining the failure of voice call packet, send to auxiliary survey terminal and preset speech data as the first data, and the speech data sent after extracting described auxiliary survey terminal encryption is as the second data.
4. the method for testing of the voice call encryption as described in any one of claims 1 to 3, is characterized in that, is describedly encrypted to described first data the step obtaining the 3rd data and comprises:
Determine the cryptographic algorithm of obtained voice call data;
According to determined algorithm described first data are encrypted and obtain the 3rd data.
5. the method for testing of the voice call encryption as described in any one of claims 1 to 3, is characterized in that, described described first data are encrypted to the step obtaining the 3rd data after, also comprise:
When described second data are not mated with described 3rd data, judge described voice call data encryption failure.
6. a testing apparatus for voice call encryption, is characterized in that, comprising:
Acquisition module, for obtaining the voice call data of terminal, and encrypts front voice call data as voice call data after the first data and encryption as the second data from described voice call extracting data;
Encrypting module, obtains the 3rd data for being encrypted described first data;
Test module, for when the difference of described second data and described 3rd data is less than preset difference value threshold value, judges described voice call data encryption success;
The testing apparatus of described voice encryption communicating data also comprises call module, and described encrypting module comprises determining unit,
Described determining unit, for when described second data are not mated with described 3rd data, determines the mode of operation that terminal is current;
Described call module, for after described mode of operation is not for default mode of operation, has continued terminal call operation.。
7. the testing apparatus of voice encryption communicating data as claimed in claim 6, is characterized in that, described acquisition module, also for being captured the packet of terminal air interface transmission by instrument; Also for according to the flag bit arranged, from captured packet, extract the voice call data before encryption as voice call data after the first data and encryption as the second data.
8. the testing apparatus of voice encryption communicating data as claimed in claims 6 or 7, it is characterized in that, the testing apparatus of described voice encryption communicating data also comprises:
Sending module, for when obtaining the failure of voice call packet, sending to auxiliary survey terminal and presetting speech data as the first data;
Described acquisition module, also for the speech data that sends after extracting described auxiliary survey terminal encryption as the second data.
9. the testing apparatus of voice encryption communicating data as claimed in claims 6 or 7, it is characterized in that, described encrypting module also comprises: ciphering unit,
Described determining unit, also for determining the cryptographic algorithm of obtained voice call data;
Ciphering unit, obtains the 3rd data for being encrypted described first data according to determined algorithm.
10. the testing apparatus of voice encryption communicating data as claimed in claims 6 or 7, is characterized in that, described test module, also for when described second data are not mated with described 3rd data, judges described voice call data encryption failure.
CN201510165865.8A 2015-04-09 2015-04-09 The method of testing of voice call encryption and device Active CN104883679B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510165865.8A CN104883679B (en) 2015-04-09 2015-04-09 The method of testing of voice call encryption and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510165865.8A CN104883679B (en) 2015-04-09 2015-04-09 The method of testing of voice call encryption and device

Publications (2)

Publication Number Publication Date
CN104883679A CN104883679A (en) 2015-09-02
CN104883679B true CN104883679B (en) 2016-04-20

Family

ID=53950979

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510165865.8A Active CN104883679B (en) 2015-04-09 2015-04-09 The method of testing of voice call encryption and device

Country Status (1)

Country Link
CN (1) CN104883679B (en)

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106209344A (en) * 2016-06-30 2016-12-07 宇龙计算机通信科技(深圳)有限公司 The method of testing of a kind of voice encryption and test equipment

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101946454A (en) * 2008-02-13 2011-01-12 摩托罗拉公司 Method to allow secure communications among communication units

Family Cites Families (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20130168450A1 (en) * 2011-12-30 2013-07-04 Clay W. von Mueller Format preserving cipher system and method
CN103795531A (en) * 2012-11-02 2014-05-14 海尔集团公司 Secret key authentication method based on two-dimension code and system thereof
EP2920907A2 (en) * 2012-11-16 2015-09-23 Raytheon BBN Technologies Corp. Method for secure symbol comparison
CN104008344A (en) * 2013-02-21 2014-08-27 福建福昕软件开发股份有限公司北京分公司 Method and system for ePub document data safety protection

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101946454A (en) * 2008-02-13 2011-01-12 摩托罗拉公司 Method to allow secure communications among communication units

Also Published As

Publication number Publication date
CN104883679A (en) 2015-09-02

Similar Documents

Publication Publication Date Title
CN104732133A (en) Electronic contract signing method and system
CN105101052A (en) Method, system and mobile terminal for transferring SIM card
CN105208011A (en) Verification system and method
CN104660912A (en) Photographing method and photographing device
CN104915119A (en) Regulation method and device of terminal desktop icon
CN104793849A (en) Application icon display method and device
CN104992109A (en) Method and device for password setting and method and device for password matching
CN105187521A (en) Service processing device and method
CN104915606A (en) File encryption and decryption methods and devices
CN104980588A (en) Method and apparatus for detecting state of mobile terminal
CN105095790A (en) Hidden object view method and device
CN104636030A (en) Method and device for starting application programs and mobile terminal
CN105099669A (en) Recording encryption and decryption method and device
CN104834863A (en) Wi-Fi password storage method and apparatus
CN105138874A (en) Screen unlocking control device and method
CN104732162A (en) File encryption processing method and device
CN104837113A (en) Privacy information display method and terminal
CN104932697A (en) Gesture unlocking method and device
CN105138880A (en) Processing apparatus and method for terminal operation data
CN105138871A (en) Unlocking method and apparatus for mobile terminal and mobile terminal
CN105101187A (en) Method and system for processing encrypted information
CN105160215A (en) Digital unlocking method and apparatus
CN104820797A (en) Method and device for managing application account
CN104809406A (en) Method and device for safe file sharing
CN104935577A (en) Authentication certification method, intelligent card cloud, APP cloud, apparatus and system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
EXSB Decision made by sipo to initiate substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant