CN106209344A - The method of testing of a kind of voice encryption and test equipment - Google Patents
The method of testing of a kind of voice encryption and test equipment Download PDFInfo
- Publication number
- CN106209344A CN106209344A CN201610505815.4A CN201610505815A CN106209344A CN 106209344 A CN106209344 A CN 106209344A CN 201610505815 A CN201610505815 A CN 201610505815A CN 106209344 A CN106209344 A CN 106209344A
- Authority
- CN
- China
- Prior art keywords
- terminal
- test equipment
- encrypted
- vop
- voice
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/03—Protecting confidentiality, e.g. by encryption
- H04W12/033—Protecting confidentiality, e.g. by encryption of the user plane, e.g. user's traffic
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/26—Testing cryptographic entity, e.g. testing integrity of encryption key or encryption algorithm
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Telephonic Communication Services (AREA)
- Telephone Function (AREA)
Abstract
The embodiment of the invention discloses method of testing and the test equipment of a kind of voice encryption, the method includes: send source VoP to terminal, source VoP utilizes Voice Encryption algorithm to be encrypted source VoP for terminal and obtains the first encrypted voice data bag, and Voice Encryption algorithm is that test equipment is consulted in advance with terminal;Receive the first encrypted voice data bag that terminal sends;Utilize the Voice Encryption algorithm consulted in advance with test equipment and terminal that source VoP is encrypted, obtain the second encrypted voice data bag;Verify whether the first encrypted voice data bag and the second encrypted voice data bag mate;If, it is determined that terminal is tested by voice encryption.Use the present invention, can accurately detect whether terminal possesses voice encryption function.
Description
Technical field
The present invention relates to communication technical field, be specifically related to method of testing and the test equipment of a kind of voice encryption.
Background technology
Along with popularizing of the intelligent terminal such as mobile phone, the function of intelligent terminal also gets more and more.In order to ensure intelligent terminal's
Call safety, many intelligent terminal have voice encryption function, and call voice can be encrypted by intelligent terminal.Intelligence is eventually
End is before dispatching from the factory, and the test equipment that the third-party institution typically can be used to provide carries out the test of voice encryption to intelligent terminal,
With test intelligent terminal, whether there is voice encryption function.Current voice encryption method of testing is: terminal is sent out to test equipment
Send the first encrypted voice data that initial speech data and initial speech data obtain after intelligent terminal encrypts, test equipment
After receiving initial speech data, initial speech equipment is encrypted, obtains the second encrypted voice data, when the first voice adds
When ciphertext data and the second voice encryption Data Matching, determine that intelligent terminal possesses voice encryption function.
But, some intelligent terminal does not has voice encryption function, some bad manufacturer pre-guide in intelligent terminal
Enter to need the initial speech data and the most encrypted good encrypted voice data, the test equipment of can out-tricking that carry out testing.It is visible,
Current test equipment often cannot accurately detect whether intelligent terminal possesses encryption function.
Summary of the invention
The embodiment of the present invention provides method of testing and the test equipment of a kind of voice encryption, accurately whether can detect terminal
Possesses voice encryption function.
First aspect, it is provided that the method for testing of a kind of voice encryption, including:
Sending source VoP to terminal, described source VoP utilizes Voice Encryption algorithm for described terminal
Being encrypted described source VoP and obtain the first encrypted voice data bag, described Voice Encryption algorithm is test equipment
Consult in advance with described terminal;
Receive the described first encrypted voice data bag that described terminal sends;
Utilize the Voice Encryption algorithm consulted in advance with described test equipment and described terminal to described source VoP
It is encrypted, obtains the second encrypted voice data bag;
Verify whether described first encrypted voice data bag mates with described second encrypted voice data bag;
If, it is determined that described terminal is tested by voice encryption.
In conjunction with first aspect, in the first implementation of first aspect, the described first encryption voice number of described checking
Whether after mating with described second encrypted voice data bag according to bag, described method also includes:
If described first encrypted voice data bag mates with described second encrypted voice data bag, then by described source voice number
Sending to third-party testing equipment according to bag, described source VoP adds for voice described in described third-party testing equipment utilization
Close algorithm is encrypted to described source VoP and obtains the close VoP of Acanthopanan trifoliatus (L.) Merr., and described Voice Encryption algorithm is institute
State what third-party testing equipment, described test equipment and described terminal were consulted in advance;
Receive the described close VoP of Acanthopanan trifoliatus (L.) Merr. that described third-party testing equipment sends;
Judge the described close VoP of Acanthopanan trifoliatus (L.) Merr. and described first encrypted voice data bag or described second encryption voice
Whether packet mates;
The most then perform the described step determining that described terminal is tested by voice encryption.
In conjunction with the first implementation of first aspect, in the second implementation of first aspect, described by source language
Sound packet sent before terminal, and described method also includes:
Voice Encryption algorithm is consulted with described terminal;
If consulting successfully, then perform the described step by source VoP transmission to terminal.
In conjunction with the second implementation of first aspect, in the third implementation of first aspect, described and described
Terminal consults Voice Encryption algorithm, including:
Determine that the Voice Encryption algorithm that test equipment is supported is the most identical with the Voice Encryption algorithm that described terminal is supported;
The Voice Encryption algorithm the most described test equipment and described terminal jointly supported is as described test equipment
The Voice Encryption algorithm consulted in advance with described terminal.
In conjunction with the first of first aspect or first aspect to any one implementation in the third, in the of first aspect
In four kinds of implementations, described by before source VoP transmission to terminal, described method also includes:
Acquisition source VoP, described source VoP is the voice number that the sound pick-up outfit from test equipment obtains
According to middle extraction, or described source VoP is to extract in the speech data prestored from described test equipment.
In conjunction with the first of first aspect or first aspect to any one implementation in the third, in the of first aspect
In five kinds of implementations, described by before source VoP transmission to terminal, described method also includes:
With described terminal arranging key;
If consulting successfully, perform the described step by source VoP transmission to terminal;
Wherein, described key utilizes the first encrypted voice data bag described in described double secret key to add for described terminal
Close, obtain the first key encrypted voice data bag;Described key is for described in double secret key described in described test equipment utilization first
Key encrypted voice data bag is decrypted, and obtains described first encrypted voice data bag.
Second aspect, it is provided that a kind of test equipment, including:
First transmitting element, for sending source VoP to terminal, described source VoP is used for described end
End utilizes Voice Encryption algorithm be encrypted described source VoP and obtain the first encrypted voice data bag, described voice
AES is that test equipment is consulted in advance with described terminal;
First receives unit, for receiving the described first encrypted voice data bag that described terminal sends;
Ciphering unit, for utilizing the Voice Encryption algorithm consulted in advance with described test equipment and described terminal to described
Source VoP is encrypted, and obtains the second encrypted voice data bag;
Authentication unit, is used for verifying that whether described first encrypted voice data bag and described second encrypted voice data bag
Join;
Determine unit, for when described authentication unit the result is for being, determine that described terminal is surveyed by voice encryption
Examination.
In conjunction with second aspect, in the first implementation of second aspect, described test equipment also includes:
Second transmitting element, for mating with described second encrypted voice data bag when described first encrypted voice data bag
Time, then described source VoP being sent to third-party testing equipment, described source VoP is surveyed for described third party
Described source VoP is encrypted and obtains the close VoP of Acanthopanan trifoliatus (L.) Merr. by Voice Encryption algorithm described in examination equipment utilization,
Described Voice Encryption algorithm is that described third-party testing equipment, described test equipment and described terminal are consulted in advance;
Second receives unit, for receiving the described close VoP of Acanthopanan trifoliatus (L.) Merr. that described third-party testing equipment sends;
Judging unit, is used for judging the described close VoP of Acanthopanan trifoliatus (L.) Merr. and described first encrypted voice data bag or described
Whether the second encrypted voice data bag mates;
Described determine unit, be additionally operable to, when described judging unit judged result is for being, determine that described terminal passes through voice
Add density test.
In conjunction with the first implementation of second aspect, in the second implementation of second aspect, described test sets
For also including:
Negotiation element, for consulting Voice Encryption algorithm with described terminal;
Described first transmitting element, is additionally operable to when described negotiation element consults Voice Encryption algorithm success with described terminal
After, source VoP is sent to described terminal.
In conjunction with the second implementation of second aspect, in the third implementation of second aspect, described negotiation is single
Unit includes:
First determines subelement, for determining the voice that the Voice Encryption algorithm that test equipment is supported is supported with described terminal
AES is the most identical;
Second determines subelement, is used for when described first determines that subelement determines the voice encryption that described test equipment is supported
When algorithm is the most identical with the voice encryption that described terminal is supported, the voice that described test equipment and described terminal are supported jointly
The Voice Encryption algorithm that AES is consulted in advance as described test equipment and described terminal.
In conjunction with the first of second aspect or second aspect to any one implementation in the third, in the of second aspect
In four kinds of implementations, described test equipment also includes:
Acquiring unit, for being sent before terminal by source VoP at described first transmitting element, obtains source language
Sound packet, described source VoP is to extract in the speech data that the sound pick-up outfit from test equipment obtains, or
Described source VoP is to extract in the speech data prestored from described test equipment.
In conjunction with the first of second aspect or second aspect to any one implementation in the third, in the of second aspect
In five kinds of implementations, described test equipment also includes:
Key agreement unit, is used for and described terminal arranging key;
Described first transmitting element, be additionally operable to when described key agreement unit for described terminal arranging key success
After, source VoP is sent to described terminal;Wherein, described key utilizes described in described double secret key for described terminal
One encrypted voice data bag is encrypted, and obtains the first key encrypted voice data bag;Described key is used for described test equipment
Utilize the first key encrypted voice data bag described in described double secret key to be decrypted, obtain described first encrypted voice data bag.
In the embodiment of the present invention, test equipment transmission source VoP is consulted to terminal, terminal and test equipment
Source VoP is encrypted by Voice Encryption algorithm respectively, respectively obtains the first encrypted voice data bag and second and adds cipher
Sound packet, when testing device authentication the first encrypted voice data bag and the second encrypted voice data bag coupling, it is determined that eventually
End is tested by voice encryption.Implement the embodiment of the present invention, test equipment provide source VoP to test, can in case
Only source VoP is provided to cause terminal to be out-tricked test equipment, such that it is able to accurately whether detection terminal possesses language due to terminal
Sound encryption function.
Accompanying drawing explanation
In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing
In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this
Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to
Other accompanying drawing is obtained according to these accompanying drawings.
Fig. 1 is a kind of system architecture schematic diagram disclosed in the embodiment of the present invention;
Fig. 2 is the schematic flow sheet of the method for testing of a kind of voice encryption disclosed in the embodiment of the present invention;
Fig. 3 is the schematic flow sheet of the method for testing of another kind of voice encryption disclosed in the embodiment of the present invention;
Fig. 4 is the schematic flow sheet of the method for testing of another kind of voice encryption disclosed in the embodiment of the present invention;
Fig. 5 is a kind of structural representation testing equipment disclosed in the embodiment of the present invention;
Fig. 6 is the structural representation of another kind of test equipment disclosed in the embodiment of the present invention;
Fig. 7 is the structural representation of another kind of test equipment disclosed in the embodiment of the present invention;
Fig. 8 is the structural representation of another kind of test equipment disclosed in the embodiment of the present invention;
Fig. 9 is the structural representation of another kind of test equipment disclosed in the embodiment of the present invention;
Figure 10 is the structural representation of another kind of test equipment disclosed in the embodiment of the present invention;
Figure 11 is the structural representation of another the test equipment that the embodiment of the present invention provides.
Detailed description of the invention
Below in conjunction with the accompanying drawing in embodiment of the present invention, the technical scheme in embodiment of the present invention is carried out clearly
Chu, it is fully described by.Obviously, described embodiment is a part of embodiment of the present invention rather than whole embodiment party
Formula.Based on the embodiment in the present invention, those of ordinary skill in the art are obtained on the premise of not making creative work
The every other embodiment obtained, all should belong to the scope of protection of the invention.
Term " first ", " second " and " the 3rd " in description and claims of this specification and Figure of description
Etc. being for distinguishing different object rather than for describing particular order.Additionally, term " includes " and " having " and they
Any deformation, it is intended that cover non-exclusive comprising.Such as contain series of steps or the process of unit, method, system,
Product or equipment are not limited to step or the unit listed, but optionally also include step or the unit do not listed,
Or optionally also include other steps intrinsic to these processes, method, product or equipment or unit.
The embodiment of the present invention provides method of testing and the test equipment of a kind of voice encryption, accurately whether can detect terminal
Possesses voice encryption function.It is described in detail individually below.
In order to be better understood from the embodiment of the present invention, a kind of system architecture being the most first suitable for the embodiment of the present invention is carried out
Describe.Referring to Fig. 1, Fig. 1 is a kind of system architecture schematic diagram disclosed in the embodiment of the present invention.As it is shown in figure 1, include that test sets
Standby 101 and terminal 102, wherein, test equipment 101 can pass through wired connection (such as, by terminal 102 with terminal 102
Earphone interface, USB interface are connected with test equipment 101), it is also possible to by wireless connections (such as, by bluetooth connection, WiFi
Connect), test equipment 101 can include that encoding and decoding speech module, voice encryption/decryption module, audio processing modules, data are received
Sending out module etc., encoding and decoding speech module is for encoding voice data and decoding, and voice encryption/decryption module is for audio frequency
Data encrypt and decrypt, and audio processing modules can be recorded, data transmit-receive module can carry out data transmission and
Receive.Terminal 102 can include that mobile phone, computer, panel computer etc. can carry out the equipment of speech processes.Implement shown in Fig. 1
System architecture, accurately can detect whether terminal 102 possesses voice encryption function by test equipment 101.
Referring to Fig. 2, Fig. 2 is the schematic flow sheet of the method for testing of a kind of voice encryption disclosed in the embodiment of the present invention.
As in figure 2 it is shown, the method for testing of the voice encryption described in the present embodiment, comprise the steps.
201, source VoP is sent to terminal by test equipment, and source VoP utilizes voice encryption for terminal
Source VoP is encrypted and obtains the first encrypted voice data bag by algorithm, and Voice Encryption algorithm is test equipment and end
End is consulted in advance.
In the embodiment of the present invention, source VoP can be to extract from the audio frequency that test equipment obtains in real time, example
As, one section of recording that test equipment is obtained in real time by sound pick-up outfit, one section of voice etc. that test equipment is downloaded on network, will
Above-mentioned one section of recording, one section of voice, through analog digital conversion, are converted to digital signal, i.e. can get source VoP;Source voice
Packet can also be that test equipment prestores, for example, it is possible to deposit in advance in the nonvolatile memory of test equipment
Store up multiple speech data (such as, a section of song, one section of ringing sound of cell phone etc.), when test equipment needs transmission source VoP
Time, from above-mentioned multiple speech datas, randomly draw a speech data, by said one speech data through analog digital conversion,
To digital signal, source VoP i.e. can be obtained.Source VoP is sent after terminal by test equipment, terminal profit
Being encrypted source VoP with Voice Encryption algorithm and obtain the first encrypted voice data bag, wherein, terminal utilizes language
Source VoP (binary data stream) is processed by sound AES, obtains the first encrypted voice data bag (through language
Binary data stream after the process of sound AES).Above-mentioned Voice Encryption algorithm is that test equipment is supported jointly with terminal
Algorithm, i.e. test equipment and terminal must have the same Voice Encryption algorithm of common support.Wherein, Voice Encryption algorithm is for surveying
Examination equipment and terminal are consulted in advance.Before performing step 201, test equipment and terminal consult can consult one in advance in advance
The Voice Encryption algorithm that kind test equipment and terminal are supported jointly, terminal and test equipment are with the voice encryption of above-mentioned common support
Algorithm carries out voice encryption respectively.Obvious, before performing step 201, test equipment needs to set up with terminal and is connected, test
Equipment and terminal can pass through wired connection (such as, be connected with test equipment) by the earphone interface in terminal, USB interface,
Wireless connections (such as, by bluetooth connection, WiFi connection etc.) can also be passed through.
Optionally, performing before step 201, can perform following steps:
Acquisition source VoP, source VoP is in the speech data that the sound pick-up outfit from test equipment obtains
Extract, or source VoP is to extract in the speech data prestored from test equipment.
Wherein, source VoP can be to extract in the speech data that the sound pick-up outfit from test equipment obtains,
Such as, one section of recording that test equipment is obtained in real time by sound pick-up outfit, test equipment extracts part from above-mentioned one section of recording
Recording data, is converted to digital signal by above-mentioned part recording data, i.e. can get source VoP;Source VoP is also
Can be that the speech data prestored from test equipment extracts, for example, it is possible to deposit test the non-volatile of equipment
Reservoir prestores multiple speech data (such as, a section of song, one section of ringing sound of cell phone etc.), when test equipment needs transmission source
During VoP, from above-mentioned multiple speech datas, randomly draw a speech data, from the voice number randomly drawed
According to middle extraction part speech data, above-mentioned part of speech data are converted to digital signal, i.e. can get source VoP.
202, test equipment receives the first encrypted voice data bag that terminal sends.
In the embodiment of the present invention, when terminal utilizes Voice Encryption algorithm be encrypted source VoP and obtain first
After encrypted voice data bag, above-mentioned first encrypted voice data bag is sent to testing equipment by terminal, and test equipment receives eventually
The first encrypted voice data bag that end sends.
203, the Voice Encryption algorithm that test equipment utilization and test equipment and terminal are consulted in advance is to source VoP
It is encrypted, obtains the second encrypted voice data bag.
In the embodiment of the present invention, after test equipment receives the first encrypted voice data bag that terminal sends, test sets
Source VoP is encrypted by the standby Voice Encryption algorithm utilizing test equipment and terminal to consult in advance, obtains the second encryption
VoP.Source VoP (binary data stream) is processed by test equipment utilization Voice Encryption algorithm, obtains
Second encrypted voice data bag (binary data stream after Voice Encryption algorithm processes).Above-mentioned Voice Encryption algorithm is
The algorithm that test equipment and terminal are supported jointly, i.e. test equipment and terminal must have the same voice encryption of common support to calculate
Method.Wherein, Voice Encryption algorithm is that test equipment is consulted in advance with terminal.
204, whether test device authentication the first encrypted voice data bag and the second encrypted voice data bag mate.If so,
Perform step 205, if it is not, perform step 206.
In the embodiment of the present invention, when test equipment obtain the first encrypted voice data bag and the second encrypted voice data bag it
After, whether test device authentication the first encrypted voice data bag and the second encrypted voice data bag mate.Wherein, source speech data
Bag is binary data stream, and source VoP (binary data stream) is located by test equipment utilization Voice Encryption algorithm
Reason, obtains the second encrypted voice data bag (binary data stream after Voice Encryption algorithm processes).Test equipment is tested
Demonstrate,prove the first encrypted voice data bag and whether the second encrypted voice data bag mates, can be by contrasting the first encrypted voice data
Bag (binary data stream) is the most identical with each binary number in the second encrypted voice data bag (binary data stream), when the
One encrypted voice data bag (binary data stream) and binary number in the second encrypted voice data bag (binary data stream)
When same ratio reaches predetermined threshold value, then judge the first encrypted voice data bag and the second encrypted voice data bag coupling, preset
Threshold value can be 80%, 85%, 90%, 95% etc., when transmitting between terminal and test equipment due to packet, it may appear that lose
The situations such as bag, many times the first encrypted voice data bag and the second encrypted voice data bag can not mate completely, only need to reach
It is it is believed that tested by voice encryption to predetermined threshold value.
205, test equipment determines that terminal is tested by voice encryption.
206, test equipment determines that terminal is tested not over voice encryption.
In the embodiment of the present invention, test equipment transmission source VoP is consulted to terminal, terminal and test equipment
Source VoP is encrypted by Voice Encryption algorithm respectively, respectively obtains the first encrypted voice data bag and second and adds cipher
Sound packet, when testing device authentication the first encrypted voice data bag and the second encrypted voice data bag coupling, it is determined that eventually
End is tested by voice encryption.Implement the embodiment shown in Fig. 2, test equipment provide source VoP to test, can
To prevent owing to terminal provides source VoP to cause terminal to be out-tricked test equipment, such that it is able to accurately whether detection terminal has
Standby voice encryption function, improves the accuracy of test result.
Refer to the flow process signal that Fig. 3, Fig. 3 are the method for testings of another kind of voice encryption disclosed in the embodiment of the present invention
Figure.As it is shown on figure 3, the method for testing of the voice encryption described in the present embodiment, comprise the steps.
301, source VoP is sent to terminal by test equipment, and source VoP utilizes voice encryption for terminal
Source VoP is encrypted and obtains the first encrypted voice data bag by algorithm, and Voice Encryption algorithm is test equipment and end
End is consulted in advance.
302, test equipment receives the first encrypted voice data bag that terminal sends.
303, the Voice Encryption algorithm that test equipment utilization and test equipment and terminal are consulted in advance is to source VoP
It is encrypted, obtains the second encrypted voice data bag.
304, whether test device authentication the first encrypted voice data bag and the second encrypted voice data bag mate.If so,
Then perform step 305, if it is not, then process ends.
305, source VoP is sent to third-party testing equipment by test equipment, and source VoP is used for third party
Source VoP is encrypted and obtains the close VoP of Acanthopanan trifoliatus (L.) Merr. by test equipment utilization Voice Encryption algorithm, and voice adds
Close algorithm is that third-party testing equipment, test equipment and terminal are consulted in advance.
In the embodiment of the present invention, when test device authentication the first encrypted voice data bag and the second encrypted voice data bag
Timing, source VoP is sent to third-party testing equipment by test equipment, and third-party testing equipment can be that another is surveyed
Examination equipment, after third-party testing equipment receives source VoP, third-party testing equipment utilization Voice Encryption algorithm
Source VoP is encrypted and obtains the close VoP of Acanthopanan trifoliatus (L.) Merr..Wherein, source VoP can be from test
Extracting in the audio frequency that equipment obtains in real time, such as, one section of recording that test equipment is obtained in real time by sound pick-up outfit, test sets
The standby one section of voice etc. downloaded on network, by above-mentioned one section of recording, one section of voice through analog digital conversion, is converted to numeral letter
Number, i.e. can get source VoP;Source VoP can also be that test equipment prestores, for example, it is possible to surveying
The nonvolatile memory of examination equipment prestores multiple speech data (such as, a section of song, one section of ringing sound of cell phone etc.), when
When test equipment needs transmission source VoP, from above-mentioned multiple speech datas, randomly draw a speech data, by upper
State a speech data through analog digital conversion, obtain digital signal, i.e. can obtain source VoP.
Source VoP is sent after third-party testing equipment by test equipment, third-party testing equipment utilization voice
AES is encrypted and obtains the close VoP of Acanthopanan trifoliatus (L.) Merr., wherein, third-party testing equipment profit to source VoP
With Voice Encryption algorithm, source VoP (binary data stream) is processed, obtain Acanthopanan trifoliatus (L.) Merr. close VoP (warp
Cross the binary data stream after Voice Encryption algorithm processes).Above-mentioned Voice Encryption algorithm be third-party testing equipment, test set
The algorithm that standby and terminal is supported jointly, i.e. third-party testing equipment, test equipment and terminal three must have the same of common support
A kind of Voice Encryption algorithm.Wherein, Voice Encryption algorithm is that third-party testing equipment, test equipment and terminal are consulted in advance.
306, test equipment receives the close VoP of Acanthopanan trifoliatus (L.) Merr. that third-party testing equipment sends.
307, test equipment judges the close VoP of Acanthopanan trifoliatus (L.) Merr. and the first encrypted voice data bag or the second encryption voice
Whether packet mates;The most then perform step 307, if it is not, then perform step 308.
In the embodiment of the present invention, after test equipment obtains the close VoP of Acanthopanan trifoliatus (L.) Merr., test equipment judges the 3rd
Whether encrypted voice data bag mates with the first encrypted voice data bag or the second encrypted voice data bag.Wherein, source voice number
Being binary data stream according to bag, source VoP (binary data stream) is located by test equipment utilization Voice Encryption algorithm
Reason, obtains the second encrypted voice data bag (binary data stream after Voice Encryption algorithm processes).Test equipment is sentenced
Whether the disconnected close VoP of Acanthopanan trifoliatus (L.) Merr. mates with the first encrypted voice data bag or the second encrypted voice data bag, can pass through
Contrast the close VoP of Acanthopanan trifoliatus (L.) Merr. (binary data stream) and the first encrypted voice data bag (binary data stream) or second
In encrypted voice data bag (binary data stream), each binary number is the most identical, and when the close VoP of Acanthopanan trifoliatus (L.) Merr., (two enter
Data stream processed) reach predetermined threshold value with the same ratio of binary number in the first encrypted voice data bag (binary data stream),
Or two enter in the close VoP of Acanthopanan trifoliatus (L.) Merr. (binary data stream) and the second encrypted voice data bag (binary data stream)
When the same ratio of number processed reaches predetermined threshold value, then judge the first encrypted voice data bag and the second encrypted voice data bag
Joining, predetermined threshold value can be 80%, 85%, 90%, 95% etc., owing to packet is at terminal and test equipment, test equipment with
Between third-party testing equipment during transmission, it may appear that the situations such as packet loss, many times the close VoP of Acanthopanan trifoliatus (L.) Merr. and first adds
Close VoP or the second encrypted voice data bag can not mate completely, and only need to reach predetermined threshold value is it is believed that pass through language
Sound adds density test.Implement the embodiment of the present invention, by introducing third-party testing equipment, can be surveyed by two test equipment
Examination, when two test equipment are all by test, just judge that terminal is tested by voice encryption, can improve test knot further
The accuracy of fruit, such that it is able to more whether detection terminal possesses voice encryption function.
308, test equipment determines that terminal is tested by voice encryption.
309, test equipment determines that terminal is tested not over voice encryption.
Step 301 shown in Fig. 3 to step 304 may refer to the step 201 shown in Fig. 2 to step 204, shown in Fig. 3
Step 308 to step 309 may refer to the step 205 shown in Fig. 2 and repeats no more to step 206, the embodiment of the present invention.
Implement the embodiment shown in Fig. 3, by introducing third-party testing equipment, can be surveyed by two test equipment
Examination, when two test equipment are all by test, just judge that terminal is tested by voice encryption, can improve test knot further
The accuracy of fruit, such that it is able to more whether detection terminal possesses voice encryption function.
Refer to the flow process signal that Fig. 4, Fig. 4 are the method for testings of another kind of voice encryption disclosed in the embodiment of the present invention
Figure.As shown in Figure 4, the method for testing of the voice encryption described in the present embodiment, comprise the steps.
401, test equipment consults Voice Encryption algorithm with terminal.If consulting successfully, then perform step 402, if consulting not
Success, then process ends.
In the embodiment of the present invention, source VoP was sent before terminal by test equipment, and test equipment is assisted with terminal
Business's Voice Encryption algorithm, i.e. at the AES determining that a test equipment and terminal are all supported, equal with terminal to test equipment
The AES supported carries out voice encryption test.In the embodiment of the present invention,
Optionally, step 401 may include steps of:
(11) test equipment determines that the Voice Encryption algorithm of test equipment support with the Voice Encryption algorithm of terminal support is
No identical;
(12) Voice Encryption algorithm that if so, test equipment and terminal are supported by test equipment jointly as test equipment with
The Voice Encryption algorithm that terminal is consulted in advance.
In the embodiment of the present invention, test equipment and terminal can support some Voice Encryption algorithm, such as, test equipment
Supporting four kinds of Voice Encryption algorithm A, B, C, D, terminal only supports Voice Encryption algorithm A, the then language that test equipment is consulted with terminal
Sound AES is A;The most such as, test equipment supports four kinds of Voice Encryption algorithm A, B, C, D, and terminal only supports that voice encryption is calculated
Method A and B, then the Voice Encryption algorithm that test equipment and terminal are consulted is A and B, then test equipment is utilized respectively voice with terminal
AES is A and Voice Encryption algorithm is that B carries out voice encryption test.
Optionally, before performing step 402, it is also possible to execution following steps:
Test equipment and terminal arranging key;If consulting successfully, perform step 402.
Wherein, key utilizes double secret key the first encrypted voice data bag to be encrypted for terminal, obtains the first key and adds
Close VoP;Key is used for testing equipment utilization double secret key the first key encrypted voice data bag and is decrypted, and obtains
One encrypted voice data bag.
In order to prevent the first encrypted voice data from wrapping between terminal and test equipment the safety of transmission, test equipment with
Terminal arranging key in advance, terminal utilizes above-mentioned double secret key the first encrypted voice data bag to be encrypted, obtains the first key and add
Close VoP, after test equipment receives the first key encrypted voice data bag, tests equipment utilization double secret key first
Key encrypted voice data bag is decrypted, and obtains the first encrypted voice data bag.Implement the embodiment of the present invention, can be by association
The method of business's key encryption, improves the safety of voice encryption.
402, source VoP is sent to terminal by test equipment, and source VoP utilizes voice encryption for terminal
Source VoP is encrypted and obtains the first encrypted voice data bag by algorithm, and Voice Encryption algorithm is test equipment and end
End is consulted in advance.
403, test equipment receives the first encrypted voice data bag that terminal sends.
404, the Voice Encryption algorithm that test equipment utilization and test equipment and terminal are consulted in advance is to source VoP
It is encrypted, obtains the second encrypted voice data bag.
405, whether test device authentication the first encrypted voice data bag and the second encrypted voice data bag mate.If so,
Then perform step 406, if it is not, then process ends.
406, source VoP is sent to third-party testing equipment by test equipment, and source VoP is used for third party
Source VoP is encrypted and obtains the close VoP of Acanthopanan trifoliatus (L.) Merr. by test equipment utilization Voice Encryption algorithm, and voice adds
Close algorithm is that third-party testing equipment, test equipment and terminal are consulted in advance.
407, test equipment receives the close VoP of Acanthopanan trifoliatus (L.) Merr. that third-party testing equipment sends.
408, test equipment judges the close VoP of Acanthopanan trifoliatus (L.) Merr. and the first encrypted voice data bag or the second encryption voice
Whether packet mates;The most then perform step 409, if it is not, then perform step 410.
409, test equipment determines that terminal is tested by voice encryption.
410, test equipment determines that terminal is tested not over voice encryption.
Step 402 shown in Fig. 4 to step 410 may refer to the step 301 shown in Fig. 3 and implements to step 309, the present invention
Example repeats no more.
Implement the embodiment shown in Fig. 4, Voice Encryption algorithm and key can be consulted in advance, can voice through consultation
AES and double secret key speech data are encrypted, and accurately whether detection terminal possesses voice encryption function, improve test knot
The accuracy of fruit.
Referring to Fig. 5, Fig. 5 is a kind of structural representation testing equipment disclosed in the embodiment of the present invention.As it is shown in figure 5,
Test equipment described in the present embodiment, receives unit 502, ciphering unit 503 including the first transmitting element 501, first, tests
Demonstrate,prove unit 504 and determine unit 505, wherein:
First transmitting element 501, for being sent by source VoP to terminal, source VoP utilizes for terminal
Source VoP is encrypted and obtains the first encrypted voice data bag by Voice Encryption algorithm, and Voice Encryption algorithm is test
Equipment and terminal are consulted in advance.
First receives unit 502, for receiving the first encrypted voice data bag that terminal sends.
Ciphering unit 503, for utilizing and test Voice Encryption algorithm that equipment and terminal consult in advance to source voice number
It is encrypted according to bag, obtains the second encrypted voice data bag.
Whether authentication unit 504, mate for checking the first encrypted voice data bag and the second encrypted voice data bag.
Determine unit 505, for when authentication unit 504 the result is for being, determine that terminal is tested by voice encryption.
Optionally, referring to Fig. 6, Fig. 6 is the structural representation of another kind of test equipment disclosed in the embodiment of the present invention, as
Shown in Fig. 6, test equipment also includes acquiring unit 506, wherein:
Acquiring unit 506, for being sent before terminal by source VoP at the first transmitting element 501, obtains source
VoP, source VoP is to extract in the speech data that the sound pick-up outfit from test equipment obtains, or source
VoP is to extract in the speech data prestored from test equipment.
Referring to Fig. 7, Fig. 7 is the structural representation of another kind of test equipment disclosed in the embodiment of the present invention.Such as Fig. 7 institute
Showing, Fig. 7 is except including that the first transmitting element 501, first shown in Fig. 5 receives unit 502, ciphering unit 503, authentication unit
504 and determine outside unit 505, also include that the second transmitting element 507, second receives unit 508, judging unit 509, wherein:
Second transmitting element 507, is used for when the first encrypted voice data bag and the second encrypted voice data bag mate, then
Being sent by source VoP to third-party testing equipment, source VoP is used for third-party testing equipment utilization voice encryption
Source VoP is encrypted and obtains the close VoP of Acanthopanan trifoliatus (L.) Merr. by algorithm, and Voice Encryption algorithm is that third-party testing sets
Standby, test equipment and terminal are consulted in advance.
Second receives unit 508, for receiving the close VoP of Acanthopanan trifoliatus (L.) Merr. that third-party testing equipment sends.
Judging unit 509, for judging the close VoP of Acanthopanan trifoliatus (L.) Merr. and the first encrypted voice data bag or the second encryption
Whether VoP mates.
Determine unit 505, be additionally operable to, when judging unit 509 judged result is for being, determine that terminal is surveyed by voice encryption
Examination.
Referring to Fig. 8, Fig. 8 is the structural representation of another kind of test equipment disclosed in the embodiment of the present invention.Such as Fig. 8 institute
Showing, Fig. 8 is except including that the first transmitting element 501, first shown in Fig. 7 receives unit 502, ciphering unit 503, authentication unit
504, determine that unit the 505, second transmitting element 507, second receives outside unit 508, judging unit 509, also include consulting list
Unit 510, wherein:
Negotiation element 510, for consulting Voice Encryption algorithm with terminal.
First transmitting element 501, is additionally operable to after negotiation element 510 and terminal consult Voice Encryption algorithm success, will
Source VoP sends to terminal.
Optionally, as it is shown in figure 9, Fig. 9 is the structural representation of another kind of test equipment, figure disclosed in the embodiment of the present invention
9 optimize further on the basis of Fig. 8 and obtain, and the negotiation element 510 in Fig. 9 includes that first determines subelement 5101 and the
Two determine subelement 5102, wherein:
First determines subelement 5101, for determining the voice that the Voice Encryption algorithm that test equipment is supported is supported with terminal
AES is the most identical;
Second determines subelement 5102, determines that subelement 5101 determines the voice encryption that test equipment is supported for working as first
When voice encryption that algorithm and terminal are supported is the most identical, the Voice Encryption algorithm that test equipment and terminal are supported jointly as
The Voice Encryption algorithm that test equipment and terminal are consulted in advance.
Optionally, as shown in Figure 10, Figure 10 is the structural representation of another kind of test equipment disclosed in the embodiment of the present invention,
Figure 10 optimizes further on the basis of Fig. 5 and obtains, and Figure 10 is except including the first transmitting element 501, first shown in Fig. 5
Receive unit 502, ciphering unit 503, authentication unit 504 and determine outside unit 505, also including key agreement unit 511, its
In:
Key agreement unit 511, is used for and terminal arranging key.
First transmitting element 501, is additionally operable to when key agreement unit 511 is after successful with terminal arranging key, will
Source VoP sends to terminal;Wherein, key utilizes double secret key the first encrypted voice data bag to be encrypted for terminal,
Obtain the first key encrypted voice data bag;Key is used for testing equipment utilization double secret key the first key encrypted voice data bag and enters
Row deciphering, obtains the first encrypted voice data bag.
Implement the test equipment shown in Fig. 5 to Figure 10, test equipment provide source VoP to test, can in case
Only source VoP is provided to cause terminal to be out-tricked test equipment, such that it is able to accurately whether detection terminal possesses language due to terminal
Sound encryption function, improves the accuracy of test result.
Refer to the structural representation that Figure 11, Figure 11 are another the test equipment that the embodiment of the present invention provides, this enforcement
Test equipment described in example includes: network interface 1000;At least one processor 2000, such as CPU;And memorizer
3000, above-mentioned network interface 1000, processor 2000 and memorizer 3000 are connected by bus 4000.
Wherein, above-mentioned network interface 1000 concretely AUI interface, bnc interface, Console interface etc., for receive and
Send VoP.
Above-mentioned memorizer 3000 can be high-speed RAM memorizer, it is possible to for non-labile memorizer (non-volatile
Memory), such as disk memory, it is also possible to for nonvolatile memory.Above-mentioned memorizer 3000 is used for storing batch processing
Code, above-mentioned processor 2000, for calling the program code of storage in memorizer 3000, performs to operate as follows:
Being sent by source VoP to terminal, source VoP utilizes Voice Encryption algorithm to source voice for terminal
Packet is encrypted and obtains the first encrypted voice data bag, and Voice Encryption algorithm is that test equipment is consulted in advance with terminal
's;
Receive the first encrypted voice data bag that terminal sends;
Utilize the Voice Encryption algorithm consulted in advance with test equipment and terminal that source VoP is encrypted, obtain
Second encrypted voice data bag;
Verify whether the first encrypted voice data bag and the second encrypted voice data bag mate;
If, it is determined that terminal is tested by voice encryption.
In implementing, the processor 2000 described in the embodiment of the present invention can perform the figure that the embodiment of the present invention provides
Implementation described by the method for testing of the voice encryption shown in 2 to Fig. 4, it is possible to perform Fig. 5 that the embodiment of the present invention provides
To the implementation of the test equipment described by Figure 10, do not repeat them here.
Module in all embodiments of the invention or submodule, can pass through universal integrated circuit, such as CPU (Central
Processing Unit, central processing unit), or by ASIC (Application Specific Integrated
Circuit, special IC) realize.
Step in embodiment of the present invention method can carry out order according to actual needs and adjust, merges and delete.
Unit in embodiment of the present invention device can merge according to actual needs, divides and delete.
One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, be permissible
Instructing relevant hardware by computer program to complete, described program can be stored in a computer read/write memory medium
In, this program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic
Dish, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access
Memory, RAM) etc..
The above disclosed present pre-ferred embodiments that is only, can not limit the right model of the present invention with this certainly
Enclose, the equivalent variations therefore made according to the claims in the present invention, still belong to the scope that the present invention is contained.
Claims (10)
1. the method for testing of a voice encryption, it is characterised in that including:
Sending source VoP to terminal, described source VoP utilizes Voice Encryption algorithm to institute for described terminal
The source VoP of stating is encrypted and obtains the first encrypted voice data bag, and described Voice Encryption algorithm is test equipment and institute
State what terminal was consulted in advance;
Receive the described first encrypted voice data bag that described terminal sends;
Utilize the Voice Encryption algorithm consulted in advance with described test equipment and described terminal that described source VoP is carried out
Encryption, obtains the second encrypted voice data bag;
Verify whether described first encrypted voice data bag mates with described second encrypted voice data bag;
If, it is determined that described terminal is tested by voice encryption.
Method the most according to claim 1, it is characterised in that the described first encrypted voice data bag of described checking is with described
After whether the second encrypted voice data bag mates, described method also includes:
If described first encrypted voice data bag mates with described second encrypted voice data bag, then by described source VoP
Sending to third-party testing equipment, described source VoP is calculated for voice encryption described in described third-party testing equipment utilization
Method is encrypted to described source VoP and obtains the close VoP of Acanthopanan trifoliatus (L.) Merr., and described Voice Encryption algorithm is described
Tripartite tests what equipment, described test equipment and described terminal were consulted in advance;
Receive the described close VoP of Acanthopanan trifoliatus (L.) Merr. that described third-party testing equipment sends;
Judge the described close VoP of Acanthopanan trifoliatus (L.) Merr. and described first encrypted voice data bag or described second encrypted voice data
Whether bag mates;
The most then perform the described step determining that described terminal is tested by voice encryption.
Method the most according to claim 2, it is characterised in that described source VoP is sent to before terminal, institute
Method of stating also includes:
Voice Encryption algorithm is consulted with described terminal;
If consulting successfully, then perform the described step by source VoP transmission to terminal.
Method the most according to claim 3, it is characterised in that described and described terminal consults Voice Encryption algorithm, including:
Determine that the Voice Encryption algorithm that test equipment is supported is the most identical with the Voice Encryption algorithm that described terminal is supported;
The Voice Encryption algorithm the most described test equipment and described terminal jointly supported is as described test equipment and institute
State the Voice Encryption algorithm that terminal is consulted in advance.
5. according to the method described in any one of Claims 1-4, it is characterised in that described by source VoP send to end
Before end, described method also includes:
Acquisition source VoP, described source VoP is in the speech data that the sound pick-up outfit from test equipment obtains
Extract, or described source VoP is to extract in the speech data prestored from described test equipment.
6. a test equipment, it is characterised in that including:
First transmitting element, for sending source VoP to terminal, described source VoP is for described terminal profit
With Voice Encryption algorithm described source VoP it is encrypted and obtains the first encrypted voice data bag, described voice encryption
Algorithm is that test equipment is consulted in advance with described terminal;
First receives unit, for receiving the described first encrypted voice data bag that described terminal sends;
Ciphering unit, for utilizing the Voice Encryption algorithm consulted in advance with described test equipment and described terminal to described source language
Sound packet is encrypted, and obtains the second encrypted voice data bag;
Authentication unit, is used for verifying whether described first encrypted voice data bag mates with described second encrypted voice data bag;
Determine unit, for when described authentication unit the result is for being, determine that described terminal is tested by voice encryption.
Test equipment the most according to claim 6, it is characterised in that described test equipment also includes:
Second transmitting element, is used for when described first encrypted voice data bag mates with described second encrypted voice data bag,
Then being sent by described source VoP to third-party testing equipment, described source VoP sets for described third-party testing
For utilizing described Voice Encryption algorithm described source VoP to be encrypted and obtained the close VoP of Acanthopanan trifoliatus (L.) Merr., described
Voice Encryption algorithm is that described third-party testing equipment, described test equipment and described terminal are consulted in advance;
Second receives unit, for receiving the described close VoP of Acanthopanan trifoliatus (L.) Merr. that described third-party testing equipment sends;
Judging unit, is used for judging the described close VoP of Acanthopanan trifoliatus (L.) Merr. and described first encrypted voice data bag or described second
Whether encrypted voice data bag mates;
Described determine unit, be additionally operable to, when described judging unit judged result is for being, determine that described terminal passes through voice encryption
Test.
Test equipment the most according to claim 7, it is characterised in that described test equipment also includes:
Negotiation element, for consulting Voice Encryption algorithm with described terminal;
Described first transmitting element, is additionally operable to after described negotiation element and described terminal consult Voice Encryption algorithm success,
Source VoP is sent to described terminal.
Test equipment the most according to claim 8, it is characterised in that described negotiation element includes:
First determines subelement, for determining the voice encryption that the Voice Encryption algorithm that test equipment is supported is supported with described terminal
Algorithm is the most identical;
Second determines subelement, is used for when described first determines that subelement determines the Voice Encryption algorithm that described test equipment is supported
Time the most identical with the voice encryption that described terminal is supported, the voice encryption that described test equipment and described terminal are supported jointly
The Voice Encryption algorithm that algorithm is consulted in advance as described test equipment and described terminal.
10. according to the test equipment described in any one of claim 6 to 9, it is characterised in that described test equipment also includes:
Acquiring unit, for being sent before terminal by source VoP at described first transmitting element, obtains source voice number
According to bag, described source VoP is to extract in the speech data that the sound pick-up outfit from test equipment obtains, or described
Source VoP is to extract in the speech data prestored from described test equipment.
Priority Applications (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610505815.4A CN106209344A (en) | 2016-06-30 | 2016-06-30 | The method of testing of a kind of voice encryption and test equipment |
PCT/CN2016/100635 WO2018000640A1 (en) | 2016-06-30 | 2016-09-28 | Voice encryption testing method and testing device |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201610505815.4A CN106209344A (en) | 2016-06-30 | 2016-06-30 | The method of testing of a kind of voice encryption and test equipment |
Publications (1)
Publication Number | Publication Date |
---|---|
CN106209344A true CN106209344A (en) | 2016-12-07 |
Family
ID=57463844
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201610505815.4A Pending CN106209344A (en) | 2016-06-30 | 2016-06-30 | The method of testing of a kind of voice encryption and test equipment |
Country Status (2)
Country | Link |
---|---|
CN (1) | CN106209344A (en) |
WO (1) | WO2018000640A1 (en) |
Cited By (4)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107465503A (en) * | 2017-07-21 | 2017-12-12 | 山东华芯半导体有限公司 | A kind of method of the safe storage chip cryptographic algorithm correctness of fast verification |
CN107819650A (en) * | 2017-11-28 | 2018-03-20 | 中共中央办公厅电子科技学院 | Data safety method of testing and device |
CN109257371A (en) * | 2018-10-30 | 2019-01-22 | 王根平 | Negotiate safeguards system and dynamic negotiation method |
CN110187202A (en) * | 2019-05-05 | 2019-08-30 | 珠海格力电器股份有限公司 | Test method, the device and system of electrical equipment startup password |
Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103987032A (en) * | 2014-03-28 | 2014-08-13 | 张大中 | Mobile communication terminal voice encryption method |
CN104883679A (en) * | 2015-04-09 | 2015-09-02 | 努比亚技术有限公司 | Voice communication encryption testing method and apparatus |
CN104902053A (en) * | 2015-04-30 | 2015-09-09 | 努比亚技术有限公司 | Encryption card function testing method and system |
CN104955091A (en) * | 2015-04-29 | 2015-09-30 | 努比亚技术有限公司 | Testing method and device |
CN105245348A (en) * | 2015-10-21 | 2016-01-13 | 广州视源电子科技股份有限公司 | Factory detection method, device and system of HDCP function |
CN105357007A (en) * | 2014-08-21 | 2016-02-24 | 深圳市中兴微电子技术有限公司 | Encryption communication method and communication terminal |
Family Cites Families (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070038868A1 (en) * | 2005-08-15 | 2007-02-15 | Top Digital Co., Ltd. | Voiceprint-lock system for electronic data |
EP2920907A2 (en) * | 2012-11-16 | 2015-09-23 | Raytheon BBN Technologies Corp. | Method for secure symbol comparison |
CN104794052B (en) * | 2015-04-01 | 2018-01-19 | 努比亚技术有限公司 | The method and device of encryption display test |
-
2016
- 2016-06-30 CN CN201610505815.4A patent/CN106209344A/en active Pending
- 2016-09-28 WO PCT/CN2016/100635 patent/WO2018000640A1/en active Application Filing
Patent Citations (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN103987032A (en) * | 2014-03-28 | 2014-08-13 | 张大中 | Mobile communication terminal voice encryption method |
CN105357007A (en) * | 2014-08-21 | 2016-02-24 | 深圳市中兴微电子技术有限公司 | Encryption communication method and communication terminal |
CN104883679A (en) * | 2015-04-09 | 2015-09-02 | 努比亚技术有限公司 | Voice communication encryption testing method and apparatus |
CN104955091A (en) * | 2015-04-29 | 2015-09-30 | 努比亚技术有限公司 | Testing method and device |
CN104902053A (en) * | 2015-04-30 | 2015-09-09 | 努比亚技术有限公司 | Encryption card function testing method and system |
CN105245348A (en) * | 2015-10-21 | 2016-01-13 | 广州视源电子科技股份有限公司 | Factory detection method, device and system of HDCP function |
Cited By (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN107465503A (en) * | 2017-07-21 | 2017-12-12 | 山东华芯半导体有限公司 | A kind of method of the safe storage chip cryptographic algorithm correctness of fast verification |
CN107819650A (en) * | 2017-11-28 | 2018-03-20 | 中共中央办公厅电子科技学院 | Data safety method of testing and device |
CN107819650B (en) * | 2017-11-28 | 2020-03-17 | 中共中央办公厅电子科技学院 | Data security test method and device |
CN109257371A (en) * | 2018-10-30 | 2019-01-22 | 王根平 | Negotiate safeguards system and dynamic negotiation method |
CN110187202A (en) * | 2019-05-05 | 2019-08-30 | 珠海格力电器股份有限公司 | Test method, the device and system of electrical equipment startup password |
Also Published As
Publication number | Publication date |
---|---|
WO2018000640A1 (en) | 2018-01-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
CN106209344A (en) | The method of testing of a kind of voice encryption and test equipment | |
CN104602364B (en) | The method and wireless device, intelligent terminal of wireless device connection wireless access point | |
CN106484484B (en) | Application program installs management method and terminal device | |
US9130753B1 (en) | Authentication using security device with electronic interface | |
CN105792194B (en) | Authentication method, authentication device, the network equipment, the Verification System of base station legitimacy | |
CN103795807B (en) | Task data processing method, apparatus and system based on P2P networks | |
CN107358441A (en) | Method, system and the mobile device and safety certificate equipment of payment verification | |
CN104346560B (en) | A kind of safe verification method and device | |
CN112823503B (en) | Data access method, data access device and mobile terminal | |
CN104660589A (en) | Method and system for controlling encryption of information and analyzing information as well as terminal | |
CN106559783A (en) | A kind of authentication method to WIFI network, device and system | |
CN106792637A (en) | International mobile equipment identification number wiring method, device and mobile terminal | |
CN105208028A (en) | Data transmission method and related device and equipment | |
CN106550359A (en) | The authentication method and system of a kind of terminal and SIM | |
EP3113528B1 (en) | Wifi hotspot connection and selection method, communications terminal and system | |
CN113920616A (en) | Vehicle and Bluetooth key safety connection method, Bluetooth module and Bluetooth key | |
CN109495885A (en) | Authentication method, mobile terminal, management system and Bluetooth IC | |
CN113038463B (en) | Communication encryption authentication experimental device | |
CN107248910A (en) | Method for security protection and equipment | |
CN105791954B (en) | Digital TV terminal condition receiving method, terminal and system | |
CN106412812A (en) | Bluetooth voice communication method, Bluetooth voice communication system and Bluetooth headset | |
CN106131837A (en) | Method, terminal and the communication system that a kind of wireless network connects | |
CN110519715B (en) | Addressing method and device for mobile terminal | |
CN108123918A (en) | A kind of account authentication login method and device | |
CN105681256A (en) | Audio communication method and audio communication application device |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
RJ01 | Rejection of invention patent application after publication | ||
RJ01 | Rejection of invention patent application after publication |
Application publication date: 20161207 |