CN106209344A - The method of testing of a kind of voice encryption and test equipment - Google Patents

The method of testing of a kind of voice encryption and test equipment Download PDF

Info

Publication number
CN106209344A
CN106209344A CN201610505815.4A CN201610505815A CN106209344A CN 106209344 A CN106209344 A CN 106209344A CN 201610505815 A CN201610505815 A CN 201610505815A CN 106209344 A CN106209344 A CN 106209344A
Authority
CN
China
Prior art keywords
described
terminal
test equipment
encrypted
voice
Prior art date
Application number
CN201610505815.4A
Other languages
Chinese (zh)
Inventor
钟焰涛
傅文治
蒋罗
Original Assignee
宇龙计算机通信科技(深圳)有限公司
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by 宇龙计算机通信科技(深圳)有限公司 filed Critical 宇龙计算机通信科技(深圳)有限公司
Priority to CN201610505815.4A priority Critical patent/CN106209344A/en
Publication of CN106209344A publication Critical patent/CN106209344A/en

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communication including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements, e.g. access security or fraud detection; Authentication, e.g. verifying user identity or authorisation; Protecting privacy or anonymity ; Protecting confidentiality; Key management; Integrity; Mobile application security; Using identity modules; Secure pairing of devices; Context aware security; Lawful interception
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/26Testing cryptographic entity, e.g. testing integrity of encryption key or encryption algorithm

Abstract

The embodiment of the invention discloses method of testing and the test equipment of a kind of voice encryption, the method includes: send source VoP to terminal, source VoP utilizes Voice Encryption algorithm to be encrypted source VoP for terminal and obtains the first encrypted voice data bag, and Voice Encryption algorithm is that test equipment is consulted in advance with terminal;Receive the first encrypted voice data bag that terminal sends;Utilize the Voice Encryption algorithm consulted in advance with test equipment and terminal that source VoP is encrypted, obtain the second encrypted voice data bag;Verify whether the first encrypted voice data bag and the second encrypted voice data bag mate;If, it is determined that terminal is tested by voice encryption.Use the present invention, can accurately detect whether terminal possesses voice encryption function.

Description

The method of testing of a kind of voice encryption and test equipment

Technical field

The present invention relates to communication technical field, be specifically related to method of testing and the test equipment of a kind of voice encryption.

Background technology

Along with popularizing of the intelligent terminal such as mobile phone, the function of intelligent terminal also gets more and more.In order to ensure intelligent terminal's Call safety, many intelligent terminal have voice encryption function, and call voice can be encrypted by intelligent terminal.Intelligence is eventually End is before dispatching from the factory, and the test equipment that the third-party institution typically can be used to provide carries out the test of voice encryption to intelligent terminal, With test intelligent terminal, whether there is voice encryption function.Current voice encryption method of testing is: terminal is sent out to test equipment Send the first encrypted voice data that initial speech data and initial speech data obtain after intelligent terminal encrypts, test equipment After receiving initial speech data, initial speech equipment is encrypted, obtains the second encrypted voice data, when the first voice adds When ciphertext data and the second voice encryption Data Matching, determine that intelligent terminal possesses voice encryption function.

But, some intelligent terminal does not has voice encryption function, some bad manufacturer pre-guide in intelligent terminal Enter to need the initial speech data and the most encrypted good encrypted voice data, the test equipment of can out-tricking that carry out testing.It is visible, Current test equipment often cannot accurately detect whether intelligent terminal possesses encryption function.

Summary of the invention

The embodiment of the present invention provides method of testing and the test equipment of a kind of voice encryption, accurately whether can detect terminal Possesses voice encryption function.

First aspect, it is provided that the method for testing of a kind of voice encryption, including:

Sending source VoP to terminal, described source VoP utilizes Voice Encryption algorithm for described terminal Being encrypted described source VoP and obtain the first encrypted voice data bag, described Voice Encryption algorithm is test equipment Consult in advance with described terminal;

Receive the described first encrypted voice data bag that described terminal sends;

Utilize the Voice Encryption algorithm consulted in advance with described test equipment and described terminal to described source VoP It is encrypted, obtains the second encrypted voice data bag;

Verify whether described first encrypted voice data bag mates with described second encrypted voice data bag;

If, it is determined that described terminal is tested by voice encryption.

In conjunction with first aspect, in the first implementation of first aspect, the described first encryption voice number of described checking Whether after mating with described second encrypted voice data bag according to bag, described method also includes:

If described first encrypted voice data bag mates with described second encrypted voice data bag, then by described source voice number Sending to third-party testing equipment according to bag, described source VoP adds for voice described in described third-party testing equipment utilization Close algorithm is encrypted to described source VoP and obtains the close VoP of Acanthopanan trifoliatus (L.) Merr., and described Voice Encryption algorithm is institute State what third-party testing equipment, described test equipment and described terminal were consulted in advance;

Receive the described close VoP of Acanthopanan trifoliatus (L.) Merr. that described third-party testing equipment sends;

Judge the described close VoP of Acanthopanan trifoliatus (L.) Merr. and described first encrypted voice data bag or described second encryption voice Whether packet mates;

The most then perform the described step determining that described terminal is tested by voice encryption.

In conjunction with the first implementation of first aspect, in the second implementation of first aspect, described by source language Sound packet sent before terminal, and described method also includes:

Voice Encryption algorithm is consulted with described terminal;

If consulting successfully, then perform the described step by source VoP transmission to terminal.

In conjunction with the second implementation of first aspect, in the third implementation of first aspect, described and described Terminal consults Voice Encryption algorithm, including:

Determine that the Voice Encryption algorithm that test equipment is supported is the most identical with the Voice Encryption algorithm that described terminal is supported;

The Voice Encryption algorithm the most described test equipment and described terminal jointly supported is as described test equipment The Voice Encryption algorithm consulted in advance with described terminal.

In conjunction with the first of first aspect or first aspect to any one implementation in the third, in the of first aspect In four kinds of implementations, described by before source VoP transmission to terminal, described method also includes:

Acquisition source VoP, described source VoP is the voice number that the sound pick-up outfit from test equipment obtains According to middle extraction, or described source VoP is to extract in the speech data prestored from described test equipment.

In conjunction with the first of first aspect or first aspect to any one implementation in the third, in the of first aspect In five kinds of implementations, described by before source VoP transmission to terminal, described method also includes:

With described terminal arranging key;

If consulting successfully, perform the described step by source VoP transmission to terminal;

Wherein, described key utilizes the first encrypted voice data bag described in described double secret key to add for described terminal Close, obtain the first key encrypted voice data bag;Described key is for described in double secret key described in described test equipment utilization first Key encrypted voice data bag is decrypted, and obtains described first encrypted voice data bag.

Second aspect, it is provided that a kind of test equipment, including:

First transmitting element, for sending source VoP to terminal, described source VoP is used for described end End utilizes Voice Encryption algorithm be encrypted described source VoP and obtain the first encrypted voice data bag, described voice AES is that test equipment is consulted in advance with described terminal;

First receives unit, for receiving the described first encrypted voice data bag that described terminal sends;

Ciphering unit, for utilizing the Voice Encryption algorithm consulted in advance with described test equipment and described terminal to described Source VoP is encrypted, and obtains the second encrypted voice data bag;

Authentication unit, is used for verifying that whether described first encrypted voice data bag and described second encrypted voice data bag Join;

Determine unit, for when described authentication unit the result is for being, determine that described terminal is surveyed by voice encryption Examination.

In conjunction with second aspect, in the first implementation of second aspect, described test equipment also includes:

Second transmitting element, for mating with described second encrypted voice data bag when described first encrypted voice data bag Time, then described source VoP being sent to third-party testing equipment, described source VoP is surveyed for described third party Described source VoP is encrypted and obtains the close VoP of Acanthopanan trifoliatus (L.) Merr. by Voice Encryption algorithm described in examination equipment utilization, Described Voice Encryption algorithm is that described third-party testing equipment, described test equipment and described terminal are consulted in advance;

Second receives unit, for receiving the described close VoP of Acanthopanan trifoliatus (L.) Merr. that described third-party testing equipment sends;

Judging unit, is used for judging the described close VoP of Acanthopanan trifoliatus (L.) Merr. and described first encrypted voice data bag or described Whether the second encrypted voice data bag mates;

Described determine unit, be additionally operable to, when described judging unit judged result is for being, determine that described terminal passes through voice Add density test.

In conjunction with the first implementation of second aspect, in the second implementation of second aspect, described test sets For also including:

Negotiation element, for consulting Voice Encryption algorithm with described terminal;

Described first transmitting element, is additionally operable to when described negotiation element consults Voice Encryption algorithm success with described terminal After, source VoP is sent to described terminal.

In conjunction with the second implementation of second aspect, in the third implementation of second aspect, described negotiation is single Unit includes:

First determines subelement, for determining the voice that the Voice Encryption algorithm that test equipment is supported is supported with described terminal AES is the most identical;

Second determines subelement, is used for when described first determines that subelement determines the voice encryption that described test equipment is supported When algorithm is the most identical with the voice encryption that described terminal is supported, the voice that described test equipment and described terminal are supported jointly The Voice Encryption algorithm that AES is consulted in advance as described test equipment and described terminal.

In conjunction with the first of second aspect or second aspect to any one implementation in the third, in the of second aspect In four kinds of implementations, described test equipment also includes:

Acquiring unit, for being sent before terminal by source VoP at described first transmitting element, obtains source language Sound packet, described source VoP is to extract in the speech data that the sound pick-up outfit from test equipment obtains, or Described source VoP is to extract in the speech data prestored from described test equipment.

In conjunction with the first of second aspect or second aspect to any one implementation in the third, in the of second aspect In five kinds of implementations, described test equipment also includes:

Key agreement unit, is used for and described terminal arranging key;

Described first transmitting element, be additionally operable to when described key agreement unit for described terminal arranging key success After, source VoP is sent to described terminal;Wherein, described key utilizes described in described double secret key for described terminal One encrypted voice data bag is encrypted, and obtains the first key encrypted voice data bag;Described key is used for described test equipment Utilize the first key encrypted voice data bag described in described double secret key to be decrypted, obtain described first encrypted voice data bag.

In the embodiment of the present invention, test equipment transmission source VoP is consulted to terminal, terminal and test equipment Source VoP is encrypted by Voice Encryption algorithm respectively, respectively obtains the first encrypted voice data bag and second and adds cipher Sound packet, when testing device authentication the first encrypted voice data bag and the second encrypted voice data bag coupling, it is determined that eventually End is tested by voice encryption.Implement the embodiment of the present invention, test equipment provide source VoP to test, can in case Only source VoP is provided to cause terminal to be out-tricked test equipment, such that it is able to accurately whether detection terminal possesses language due to terminal Sound encryption function.

Accompanying drawing explanation

In order to be illustrated more clearly that the embodiment of the present invention or technical scheme of the prior art, below will be to embodiment or existing In having technology to describe, the required accompanying drawing used is briefly described, it should be apparent that, the accompanying drawing in describing below is only this Some embodiments of invention, for those of ordinary skill in the art, on the premise of not paying creative work, it is also possible to Other accompanying drawing is obtained according to these accompanying drawings.

Fig. 1 is a kind of system architecture schematic diagram disclosed in the embodiment of the present invention;

Fig. 2 is the schematic flow sheet of the method for testing of a kind of voice encryption disclosed in the embodiment of the present invention;

Fig. 3 is the schematic flow sheet of the method for testing of another kind of voice encryption disclosed in the embodiment of the present invention;

Fig. 4 is the schematic flow sheet of the method for testing of another kind of voice encryption disclosed in the embodiment of the present invention;

Fig. 5 is a kind of structural representation testing equipment disclosed in the embodiment of the present invention;

Fig. 6 is the structural representation of another kind of test equipment disclosed in the embodiment of the present invention;

Fig. 7 is the structural representation of another kind of test equipment disclosed in the embodiment of the present invention;

Fig. 8 is the structural representation of another kind of test equipment disclosed in the embodiment of the present invention;

Fig. 9 is the structural representation of another kind of test equipment disclosed in the embodiment of the present invention;

Figure 10 is the structural representation of another kind of test equipment disclosed in the embodiment of the present invention;

Figure 11 is the structural representation of another the test equipment that the embodiment of the present invention provides.

Detailed description of the invention

Below in conjunction with the accompanying drawing in embodiment of the present invention, the technical scheme in embodiment of the present invention is carried out clearly Chu, it is fully described by.Obviously, described embodiment is a part of embodiment of the present invention rather than whole embodiment party Formula.Based on the embodiment in the present invention, those of ordinary skill in the art are obtained on the premise of not making creative work The every other embodiment obtained, all should belong to the scope of protection of the invention.

Term " first ", " second " and " the 3rd " in description and claims of this specification and Figure of description Etc. being for distinguishing different object rather than for describing particular order.Additionally, term " includes " and " having " and they Any deformation, it is intended that cover non-exclusive comprising.Such as contain series of steps or the process of unit, method, system, Product or equipment are not limited to step or the unit listed, but optionally also include step or the unit do not listed, Or optionally also include other steps intrinsic to these processes, method, product or equipment or unit.

The embodiment of the present invention provides method of testing and the test equipment of a kind of voice encryption, accurately whether can detect terminal Possesses voice encryption function.It is described in detail individually below.

In order to be better understood from the embodiment of the present invention, a kind of system architecture being the most first suitable for the embodiment of the present invention is carried out Describe.Referring to Fig. 1, Fig. 1 is a kind of system architecture schematic diagram disclosed in the embodiment of the present invention.As it is shown in figure 1, include that test sets Standby 101 and terminal 102, wherein, test equipment 101 can pass through wired connection (such as, by terminal 102 with terminal 102 Earphone interface, USB interface are connected with test equipment 101), it is also possible to by wireless connections (such as, by bluetooth connection, WiFi Connect), test equipment 101 can include that encoding and decoding speech module, voice encryption/decryption module, audio processing modules, data are received Sending out module etc., encoding and decoding speech module is for encoding voice data and decoding, and voice encryption/decryption module is for audio frequency Data encrypt and decrypt, and audio processing modules can be recorded, data transmit-receive module can carry out data transmission and Receive.Terminal 102 can include that mobile phone, computer, panel computer etc. can carry out the equipment of speech processes.Implement shown in Fig. 1 System architecture, accurately can detect whether terminal 102 possesses voice encryption function by test equipment 101.

Referring to Fig. 2, Fig. 2 is the schematic flow sheet of the method for testing of a kind of voice encryption disclosed in the embodiment of the present invention. As in figure 2 it is shown, the method for testing of the voice encryption described in the present embodiment, comprise the steps.

201, source VoP is sent to terminal by test equipment, and source VoP utilizes voice encryption for terminal Source VoP is encrypted and obtains the first encrypted voice data bag by algorithm, and Voice Encryption algorithm is test equipment and end End is consulted in advance.

In the embodiment of the present invention, source VoP can be to extract from the audio frequency that test equipment obtains in real time, example As, one section of recording that test equipment is obtained in real time by sound pick-up outfit, one section of voice etc. that test equipment is downloaded on network, will Above-mentioned one section of recording, one section of voice, through analog digital conversion, are converted to digital signal, i.e. can get source VoP;Source voice Packet can also be that test equipment prestores, for example, it is possible to deposit in advance in the nonvolatile memory of test equipment Store up multiple speech data (such as, a section of song, one section of ringing sound of cell phone etc.), when test equipment needs transmission source VoP Time, from above-mentioned multiple speech datas, randomly draw a speech data, by said one speech data through analog digital conversion, To digital signal, source VoP i.e. can be obtained.Source VoP is sent after terminal by test equipment, terminal profit Being encrypted source VoP with Voice Encryption algorithm and obtain the first encrypted voice data bag, wherein, terminal utilizes language Source VoP (binary data stream) is processed by sound AES, obtains the first encrypted voice data bag (through language Binary data stream after the process of sound AES).Above-mentioned Voice Encryption algorithm is that test equipment is supported jointly with terminal Algorithm, i.e. test equipment and terminal must have the same Voice Encryption algorithm of common support.Wherein, Voice Encryption algorithm is for surveying Examination equipment and terminal are consulted in advance.Before performing step 201, test equipment and terminal consult can consult one in advance in advance The Voice Encryption algorithm that kind test equipment and terminal are supported jointly, terminal and test equipment are with the voice encryption of above-mentioned common support Algorithm carries out voice encryption respectively.Obvious, before performing step 201, test equipment needs to set up with terminal and is connected, test Equipment and terminal can pass through wired connection (such as, be connected with test equipment) by the earphone interface in terminal, USB interface, Wireless connections (such as, by bluetooth connection, WiFi connection etc.) can also be passed through.

Optionally, performing before step 201, can perform following steps:

Acquisition source VoP, source VoP is in the speech data that the sound pick-up outfit from test equipment obtains Extract, or source VoP is to extract in the speech data prestored from test equipment.

Wherein, source VoP can be to extract in the speech data that the sound pick-up outfit from test equipment obtains, Such as, one section of recording that test equipment is obtained in real time by sound pick-up outfit, test equipment extracts part from above-mentioned one section of recording Recording data, is converted to digital signal by above-mentioned part recording data, i.e. can get source VoP;Source VoP is also Can be that the speech data prestored from test equipment extracts, for example, it is possible to deposit test the non-volatile of equipment Reservoir prestores multiple speech data (such as, a section of song, one section of ringing sound of cell phone etc.), when test equipment needs transmission source During VoP, from above-mentioned multiple speech datas, randomly draw a speech data, from the voice number randomly drawed According to middle extraction part speech data, above-mentioned part of speech data are converted to digital signal, i.e. can get source VoP.

202, test equipment receives the first encrypted voice data bag that terminal sends.

In the embodiment of the present invention, when terminal utilizes Voice Encryption algorithm be encrypted source VoP and obtain first After encrypted voice data bag, above-mentioned first encrypted voice data bag is sent to testing equipment by terminal, and test equipment receives eventually The first encrypted voice data bag that end sends.

203, the Voice Encryption algorithm that test equipment utilization and test equipment and terminal are consulted in advance is to source VoP It is encrypted, obtains the second encrypted voice data bag.

In the embodiment of the present invention, after test equipment receives the first encrypted voice data bag that terminal sends, test sets Source VoP is encrypted by the standby Voice Encryption algorithm utilizing test equipment and terminal to consult in advance, obtains the second encryption VoP.Source VoP (binary data stream) is processed by test equipment utilization Voice Encryption algorithm, obtains Second encrypted voice data bag (binary data stream after Voice Encryption algorithm processes).Above-mentioned Voice Encryption algorithm is The algorithm that test equipment and terminal are supported jointly, i.e. test equipment and terminal must have the same voice encryption of common support to calculate Method.Wherein, Voice Encryption algorithm is that test equipment is consulted in advance with terminal.

204, whether test device authentication the first encrypted voice data bag and the second encrypted voice data bag mate.If so, Perform step 205, if it is not, perform step 206.

In the embodiment of the present invention, when test equipment obtain the first encrypted voice data bag and the second encrypted voice data bag it After, whether test device authentication the first encrypted voice data bag and the second encrypted voice data bag mate.Wherein, source speech data Bag is binary data stream, and source VoP (binary data stream) is located by test equipment utilization Voice Encryption algorithm Reason, obtains the second encrypted voice data bag (binary data stream after Voice Encryption algorithm processes).Test equipment is tested Demonstrate,prove the first encrypted voice data bag and whether the second encrypted voice data bag mates, can be by contrasting the first encrypted voice data Bag (binary data stream) is the most identical with each binary number in the second encrypted voice data bag (binary data stream), when the One encrypted voice data bag (binary data stream) and binary number in the second encrypted voice data bag (binary data stream) When same ratio reaches predetermined threshold value, then judge the first encrypted voice data bag and the second encrypted voice data bag coupling, preset Threshold value can be 80%, 85%, 90%, 95% etc., when transmitting between terminal and test equipment due to packet, it may appear that lose The situations such as bag, many times the first encrypted voice data bag and the second encrypted voice data bag can not mate completely, only need to reach It is it is believed that tested by voice encryption to predetermined threshold value.

205, test equipment determines that terminal is tested by voice encryption.

206, test equipment determines that terminal is tested not over voice encryption.

In the embodiment of the present invention, test equipment transmission source VoP is consulted to terminal, terminal and test equipment Source VoP is encrypted by Voice Encryption algorithm respectively, respectively obtains the first encrypted voice data bag and second and adds cipher Sound packet, when testing device authentication the first encrypted voice data bag and the second encrypted voice data bag coupling, it is determined that eventually End is tested by voice encryption.Implement the embodiment shown in Fig. 2, test equipment provide source VoP to test, can To prevent owing to terminal provides source VoP to cause terminal to be out-tricked test equipment, such that it is able to accurately whether detection terminal has Standby voice encryption function, improves the accuracy of test result.

Refer to the flow process signal that Fig. 3, Fig. 3 are the method for testings of another kind of voice encryption disclosed in the embodiment of the present invention Figure.As it is shown on figure 3, the method for testing of the voice encryption described in the present embodiment, comprise the steps.

301, source VoP is sent to terminal by test equipment, and source VoP utilizes voice encryption for terminal Source VoP is encrypted and obtains the first encrypted voice data bag by algorithm, and Voice Encryption algorithm is test equipment and end End is consulted in advance.

302, test equipment receives the first encrypted voice data bag that terminal sends.

303, the Voice Encryption algorithm that test equipment utilization and test equipment and terminal are consulted in advance is to source VoP It is encrypted, obtains the second encrypted voice data bag.

304, whether test device authentication the first encrypted voice data bag and the second encrypted voice data bag mate.If so, Then perform step 305, if it is not, then process ends.

305, source VoP is sent to third-party testing equipment by test equipment, and source VoP is used for third party Source VoP is encrypted and obtains the close VoP of Acanthopanan trifoliatus (L.) Merr. by test equipment utilization Voice Encryption algorithm, and voice adds Close algorithm is that third-party testing equipment, test equipment and terminal are consulted in advance.

In the embodiment of the present invention, when test device authentication the first encrypted voice data bag and the second encrypted voice data bag Timing, source VoP is sent to third-party testing equipment by test equipment, and third-party testing equipment can be that another is surveyed Examination equipment, after third-party testing equipment receives source VoP, third-party testing equipment utilization Voice Encryption algorithm Source VoP is encrypted and obtains the close VoP of Acanthopanan trifoliatus (L.) Merr..Wherein, source VoP can be from test Extracting in the audio frequency that equipment obtains in real time, such as, one section of recording that test equipment is obtained in real time by sound pick-up outfit, test sets The standby one section of voice etc. downloaded on network, by above-mentioned one section of recording, one section of voice through analog digital conversion, is converted to numeral letter Number, i.e. can get source VoP;Source VoP can also be that test equipment prestores, for example, it is possible to surveying The nonvolatile memory of examination equipment prestores multiple speech data (such as, a section of song, one section of ringing sound of cell phone etc.), when When test equipment needs transmission source VoP, from above-mentioned multiple speech datas, randomly draw a speech data, by upper State a speech data through analog digital conversion, obtain digital signal, i.e. can obtain source VoP.

Source VoP is sent after third-party testing equipment by test equipment, third-party testing equipment utilization voice AES is encrypted and obtains the close VoP of Acanthopanan trifoliatus (L.) Merr., wherein, third-party testing equipment profit to source VoP With Voice Encryption algorithm, source VoP (binary data stream) is processed, obtain Acanthopanan trifoliatus (L.) Merr. close VoP (warp Cross the binary data stream after Voice Encryption algorithm processes).Above-mentioned Voice Encryption algorithm be third-party testing equipment, test set The algorithm that standby and terminal is supported jointly, i.e. third-party testing equipment, test equipment and terminal three must have the same of common support A kind of Voice Encryption algorithm.Wherein, Voice Encryption algorithm is that third-party testing equipment, test equipment and terminal are consulted in advance.

306, test equipment receives the close VoP of Acanthopanan trifoliatus (L.) Merr. that third-party testing equipment sends.

307, test equipment judges the close VoP of Acanthopanan trifoliatus (L.) Merr. and the first encrypted voice data bag or the second encryption voice Whether packet mates;The most then perform step 307, if it is not, then perform step 308.

In the embodiment of the present invention, after test equipment obtains the close VoP of Acanthopanan trifoliatus (L.) Merr., test equipment judges the 3rd Whether encrypted voice data bag mates with the first encrypted voice data bag or the second encrypted voice data bag.Wherein, source voice number Being binary data stream according to bag, source VoP (binary data stream) is located by test equipment utilization Voice Encryption algorithm Reason, obtains the second encrypted voice data bag (binary data stream after Voice Encryption algorithm processes).Test equipment is sentenced Whether the disconnected close VoP of Acanthopanan trifoliatus (L.) Merr. mates with the first encrypted voice data bag or the second encrypted voice data bag, can pass through Contrast the close VoP of Acanthopanan trifoliatus (L.) Merr. (binary data stream) and the first encrypted voice data bag (binary data stream) or second In encrypted voice data bag (binary data stream), each binary number is the most identical, and when the close VoP of Acanthopanan trifoliatus (L.) Merr., (two enter Data stream processed) reach predetermined threshold value with the same ratio of binary number in the first encrypted voice data bag (binary data stream), Or two enter in the close VoP of Acanthopanan trifoliatus (L.) Merr. (binary data stream) and the second encrypted voice data bag (binary data stream) When the same ratio of number processed reaches predetermined threshold value, then judge the first encrypted voice data bag and the second encrypted voice data bag Joining, predetermined threshold value can be 80%, 85%, 90%, 95% etc., owing to packet is at terminal and test equipment, test equipment with Between third-party testing equipment during transmission, it may appear that the situations such as packet loss, many times the close VoP of Acanthopanan trifoliatus (L.) Merr. and first adds Close VoP or the second encrypted voice data bag can not mate completely, and only need to reach predetermined threshold value is it is believed that pass through language Sound adds density test.Implement the embodiment of the present invention, by introducing third-party testing equipment, can be surveyed by two test equipment Examination, when two test equipment are all by test, just judge that terminal is tested by voice encryption, can improve test knot further The accuracy of fruit, such that it is able to more whether detection terminal possesses voice encryption function.

308, test equipment determines that terminal is tested by voice encryption.

309, test equipment determines that terminal is tested not over voice encryption.

Step 301 shown in Fig. 3 to step 304 may refer to the step 201 shown in Fig. 2 to step 204, shown in Fig. 3 Step 308 to step 309 may refer to the step 205 shown in Fig. 2 and repeats no more to step 206, the embodiment of the present invention.

Implement the embodiment shown in Fig. 3, by introducing third-party testing equipment, can be surveyed by two test equipment Examination, when two test equipment are all by test, just judge that terminal is tested by voice encryption, can improve test knot further The accuracy of fruit, such that it is able to more whether detection terminal possesses voice encryption function.

Refer to the flow process signal that Fig. 4, Fig. 4 are the method for testings of another kind of voice encryption disclosed in the embodiment of the present invention Figure.As shown in Figure 4, the method for testing of the voice encryption described in the present embodiment, comprise the steps.

401, test equipment consults Voice Encryption algorithm with terminal.If consulting successfully, then perform step 402, if consulting not Success, then process ends.

In the embodiment of the present invention, source VoP was sent before terminal by test equipment, and test equipment is assisted with terminal Business's Voice Encryption algorithm, i.e. at the AES determining that a test equipment and terminal are all supported, equal with terminal to test equipment The AES supported carries out voice encryption test.In the embodiment of the present invention,

Optionally, step 401 may include steps of:

(11) test equipment determines that the Voice Encryption algorithm of test equipment support with the Voice Encryption algorithm of terminal support is No identical;

(12) Voice Encryption algorithm that if so, test equipment and terminal are supported by test equipment jointly as test equipment with The Voice Encryption algorithm that terminal is consulted in advance.

In the embodiment of the present invention, test equipment and terminal can support some Voice Encryption algorithm, such as, test equipment Supporting four kinds of Voice Encryption algorithm A, B, C, D, terminal only supports Voice Encryption algorithm A, the then language that test equipment is consulted with terminal Sound AES is A;The most such as, test equipment supports four kinds of Voice Encryption algorithm A, B, C, D, and terminal only supports that voice encryption is calculated Method A and B, then the Voice Encryption algorithm that test equipment and terminal are consulted is A and B, then test equipment is utilized respectively voice with terminal AES is A and Voice Encryption algorithm is that B carries out voice encryption test.

Optionally, before performing step 402, it is also possible to execution following steps:

Test equipment and terminal arranging key;If consulting successfully, perform step 402.

Wherein, key utilizes double secret key the first encrypted voice data bag to be encrypted for terminal, obtains the first key and adds Close VoP;Key is used for testing equipment utilization double secret key the first key encrypted voice data bag and is decrypted, and obtains One encrypted voice data bag.

In order to prevent the first encrypted voice data from wrapping between terminal and test equipment the safety of transmission, test equipment with Terminal arranging key in advance, terminal utilizes above-mentioned double secret key the first encrypted voice data bag to be encrypted, obtains the first key and add Close VoP, after test equipment receives the first key encrypted voice data bag, tests equipment utilization double secret key first Key encrypted voice data bag is decrypted, and obtains the first encrypted voice data bag.Implement the embodiment of the present invention, can be by association The method of business's key encryption, improves the safety of voice encryption.

402, source VoP is sent to terminal by test equipment, and source VoP utilizes voice encryption for terminal Source VoP is encrypted and obtains the first encrypted voice data bag by algorithm, and Voice Encryption algorithm is test equipment and end End is consulted in advance.

403, test equipment receives the first encrypted voice data bag that terminal sends.

404, the Voice Encryption algorithm that test equipment utilization and test equipment and terminal are consulted in advance is to source VoP It is encrypted, obtains the second encrypted voice data bag.

405, whether test device authentication the first encrypted voice data bag and the second encrypted voice data bag mate.If so, Then perform step 406, if it is not, then process ends.

406, source VoP is sent to third-party testing equipment by test equipment, and source VoP is used for third party Source VoP is encrypted and obtains the close VoP of Acanthopanan trifoliatus (L.) Merr. by test equipment utilization Voice Encryption algorithm, and voice adds Close algorithm is that third-party testing equipment, test equipment and terminal are consulted in advance.

407, test equipment receives the close VoP of Acanthopanan trifoliatus (L.) Merr. that third-party testing equipment sends.

408, test equipment judges the close VoP of Acanthopanan trifoliatus (L.) Merr. and the first encrypted voice data bag or the second encryption voice Whether packet mates;The most then perform step 409, if it is not, then perform step 410.

409, test equipment determines that terminal is tested by voice encryption.

410, test equipment determines that terminal is tested not over voice encryption.

Step 402 shown in Fig. 4 to step 410 may refer to the step 301 shown in Fig. 3 and implements to step 309, the present invention Example repeats no more.

Implement the embodiment shown in Fig. 4, Voice Encryption algorithm and key can be consulted in advance, can voice through consultation AES and double secret key speech data are encrypted, and accurately whether detection terminal possesses voice encryption function, improve test knot The accuracy of fruit.

Referring to Fig. 5, Fig. 5 is a kind of structural representation testing equipment disclosed in the embodiment of the present invention.As it is shown in figure 5, Test equipment described in the present embodiment, receives unit 502, ciphering unit 503 including the first transmitting element 501, first, tests Demonstrate,prove unit 504 and determine unit 505, wherein:

First transmitting element 501, for being sent by source VoP to terminal, source VoP utilizes for terminal Source VoP is encrypted and obtains the first encrypted voice data bag by Voice Encryption algorithm, and Voice Encryption algorithm is test Equipment and terminal are consulted in advance.

First receives unit 502, for receiving the first encrypted voice data bag that terminal sends.

Ciphering unit 503, for utilizing and test Voice Encryption algorithm that equipment and terminal consult in advance to source voice number It is encrypted according to bag, obtains the second encrypted voice data bag.

Whether authentication unit 504, mate for checking the first encrypted voice data bag and the second encrypted voice data bag.

Determine unit 505, for when authentication unit 504 the result is for being, determine that terminal is tested by voice encryption.

Optionally, referring to Fig. 6, Fig. 6 is the structural representation of another kind of test equipment disclosed in the embodiment of the present invention, as Shown in Fig. 6, test equipment also includes acquiring unit 506, wherein:

Acquiring unit 506, for being sent before terminal by source VoP at the first transmitting element 501, obtains source VoP, source VoP is to extract in the speech data that the sound pick-up outfit from test equipment obtains, or source VoP is to extract in the speech data prestored from test equipment.

Referring to Fig. 7, Fig. 7 is the structural representation of another kind of test equipment disclosed in the embodiment of the present invention.Such as Fig. 7 institute Showing, Fig. 7 is except including that the first transmitting element 501, first shown in Fig. 5 receives unit 502, ciphering unit 503, authentication unit 504 and determine outside unit 505, also include that the second transmitting element 507, second receives unit 508, judging unit 509, wherein:

Second transmitting element 507, is used for when the first encrypted voice data bag and the second encrypted voice data bag mate, then Being sent by source VoP to third-party testing equipment, source VoP is used for third-party testing equipment utilization voice encryption Source VoP is encrypted and obtains the close VoP of Acanthopanan trifoliatus (L.) Merr. by algorithm, and Voice Encryption algorithm is that third-party testing sets Standby, test equipment and terminal are consulted in advance.

Second receives unit 508, for receiving the close VoP of Acanthopanan trifoliatus (L.) Merr. that third-party testing equipment sends.

Judging unit 509, for judging the close VoP of Acanthopanan trifoliatus (L.) Merr. and the first encrypted voice data bag or the second encryption Whether VoP mates.

Determine unit 505, be additionally operable to, when judging unit 509 judged result is for being, determine that terminal is surveyed by voice encryption Examination.

Referring to Fig. 8, Fig. 8 is the structural representation of another kind of test equipment disclosed in the embodiment of the present invention.Such as Fig. 8 institute Showing, Fig. 8 is except including that the first transmitting element 501, first shown in Fig. 7 receives unit 502, ciphering unit 503, authentication unit 504, determine that unit the 505, second transmitting element 507, second receives outside unit 508, judging unit 509, also include consulting list Unit 510, wherein:

Negotiation element 510, for consulting Voice Encryption algorithm with terminal.

First transmitting element 501, is additionally operable to after negotiation element 510 and terminal consult Voice Encryption algorithm success, will Source VoP sends to terminal.

Optionally, as it is shown in figure 9, Fig. 9 is the structural representation of another kind of test equipment, figure disclosed in the embodiment of the present invention 9 optimize further on the basis of Fig. 8 and obtain, and the negotiation element 510 in Fig. 9 includes that first determines subelement 5101 and the Two determine subelement 5102, wherein:

First determines subelement 5101, for determining the voice that the Voice Encryption algorithm that test equipment is supported is supported with terminal AES is the most identical;

Second determines subelement 5102, determines that subelement 5101 determines the voice encryption that test equipment is supported for working as first When voice encryption that algorithm and terminal are supported is the most identical, the Voice Encryption algorithm that test equipment and terminal are supported jointly as The Voice Encryption algorithm that test equipment and terminal are consulted in advance.

Optionally, as shown in Figure 10, Figure 10 is the structural representation of another kind of test equipment disclosed in the embodiment of the present invention, Figure 10 optimizes further on the basis of Fig. 5 and obtains, and Figure 10 is except including the first transmitting element 501, first shown in Fig. 5 Receive unit 502, ciphering unit 503, authentication unit 504 and determine outside unit 505, also including key agreement unit 511, its In:

Key agreement unit 511, is used for and terminal arranging key.

First transmitting element 501, is additionally operable to when key agreement unit 511 is after successful with terminal arranging key, will Source VoP sends to terminal;Wherein, key utilizes double secret key the first encrypted voice data bag to be encrypted for terminal, Obtain the first key encrypted voice data bag;Key is used for testing equipment utilization double secret key the first key encrypted voice data bag and enters Row deciphering, obtains the first encrypted voice data bag.

Implement the test equipment shown in Fig. 5 to Figure 10, test equipment provide source VoP to test, can in case Only source VoP is provided to cause terminal to be out-tricked test equipment, such that it is able to accurately whether detection terminal possesses language due to terminal Sound encryption function, improves the accuracy of test result.

Refer to the structural representation that Figure 11, Figure 11 are another the test equipment that the embodiment of the present invention provides, this enforcement Test equipment described in example includes: network interface 1000;At least one processor 2000, such as CPU;And memorizer 3000, above-mentioned network interface 1000, processor 2000 and memorizer 3000 are connected by bus 4000.

Wherein, above-mentioned network interface 1000 concretely AUI interface, bnc interface, Console interface etc., for receive and Send VoP.

Above-mentioned memorizer 3000 can be high-speed RAM memorizer, it is possible to for non-labile memorizer (non-volatile Memory), such as disk memory, it is also possible to for nonvolatile memory.Above-mentioned memorizer 3000 is used for storing batch processing Code, above-mentioned processor 2000, for calling the program code of storage in memorizer 3000, performs to operate as follows:

Being sent by source VoP to terminal, source VoP utilizes Voice Encryption algorithm to source voice for terminal Packet is encrypted and obtains the first encrypted voice data bag, and Voice Encryption algorithm is that test equipment is consulted in advance with terminal 's;

Receive the first encrypted voice data bag that terminal sends;

Utilize the Voice Encryption algorithm consulted in advance with test equipment and terminal that source VoP is encrypted, obtain Second encrypted voice data bag;

Verify whether the first encrypted voice data bag and the second encrypted voice data bag mate;

If, it is determined that terminal is tested by voice encryption.

In implementing, the processor 2000 described in the embodiment of the present invention can perform the figure that the embodiment of the present invention provides Implementation described by the method for testing of the voice encryption shown in 2 to Fig. 4, it is possible to perform Fig. 5 that the embodiment of the present invention provides To the implementation of the test equipment described by Figure 10, do not repeat them here.

Module in all embodiments of the invention or submodule, can pass through universal integrated circuit, such as CPU (Central Processing Unit, central processing unit), or by ASIC (Application Specific Integrated Circuit, special IC) realize.

Step in embodiment of the present invention method can carry out order according to actual needs and adjust, merges and delete.

Unit in embodiment of the present invention device can merge according to actual needs, divides and delete.

One of ordinary skill in the art will appreciate that all or part of flow process realizing in above-described embodiment method, be permissible Instructing relevant hardware by computer program to complete, described program can be stored in a computer read/write memory medium In, this program is upon execution, it may include such as the flow process of the embodiment of above-mentioned each method.Wherein, described storage medium can be magnetic Dish, CD, read-only store-memory body (Read-Only Memory, ROM) or random store-memory body (Random Access Memory, RAM) etc..

The above disclosed present pre-ferred embodiments that is only, can not limit the right model of the present invention with this certainly Enclose, the equivalent variations therefore made according to the claims in the present invention, still belong to the scope that the present invention is contained.

Claims (10)

1. the method for testing of a voice encryption, it is characterised in that including:
Sending source VoP to terminal, described source VoP utilizes Voice Encryption algorithm to institute for described terminal The source VoP of stating is encrypted and obtains the first encrypted voice data bag, and described Voice Encryption algorithm is test equipment and institute State what terminal was consulted in advance;
Receive the described first encrypted voice data bag that described terminal sends;
Utilize the Voice Encryption algorithm consulted in advance with described test equipment and described terminal that described source VoP is carried out Encryption, obtains the second encrypted voice data bag;
Verify whether described first encrypted voice data bag mates with described second encrypted voice data bag;
If, it is determined that described terminal is tested by voice encryption.
Method the most according to claim 1, it is characterised in that the described first encrypted voice data bag of described checking is with described After whether the second encrypted voice data bag mates, described method also includes:
If described first encrypted voice data bag mates with described second encrypted voice data bag, then by described source VoP Sending to third-party testing equipment, described source VoP is calculated for voice encryption described in described third-party testing equipment utilization Method is encrypted to described source VoP and obtains the close VoP of Acanthopanan trifoliatus (L.) Merr., and described Voice Encryption algorithm is described Tripartite tests what equipment, described test equipment and described terminal were consulted in advance;
Receive the described close VoP of Acanthopanan trifoliatus (L.) Merr. that described third-party testing equipment sends;
Judge the described close VoP of Acanthopanan trifoliatus (L.) Merr. and described first encrypted voice data bag or described second encrypted voice data Whether bag mates;
The most then perform the described step determining that described terminal is tested by voice encryption.
Method the most according to claim 2, it is characterised in that described source VoP is sent to before terminal, institute Method of stating also includes:
Voice Encryption algorithm is consulted with described terminal;
If consulting successfully, then perform the described step by source VoP transmission to terminal.
Method the most according to claim 3, it is characterised in that described and described terminal consults Voice Encryption algorithm, including:
Determine that the Voice Encryption algorithm that test equipment is supported is the most identical with the Voice Encryption algorithm that described terminal is supported;
The Voice Encryption algorithm the most described test equipment and described terminal jointly supported is as described test equipment and institute State the Voice Encryption algorithm that terminal is consulted in advance.
5. according to the method described in any one of Claims 1-4, it is characterised in that described by source VoP send to end Before end, described method also includes:
Acquisition source VoP, described source VoP is in the speech data that the sound pick-up outfit from test equipment obtains Extract, or described source VoP is to extract in the speech data prestored from described test equipment.
6. a test equipment, it is characterised in that including:
First transmitting element, for sending source VoP to terminal, described source VoP is for described terminal profit With Voice Encryption algorithm described source VoP it is encrypted and obtains the first encrypted voice data bag, described voice encryption Algorithm is that test equipment is consulted in advance with described terminal;
First receives unit, for receiving the described first encrypted voice data bag that described terminal sends;
Ciphering unit, for utilizing the Voice Encryption algorithm consulted in advance with described test equipment and described terminal to described source language Sound packet is encrypted, and obtains the second encrypted voice data bag;
Authentication unit, is used for verifying whether described first encrypted voice data bag mates with described second encrypted voice data bag;
Determine unit, for when described authentication unit the result is for being, determine that described terminal is tested by voice encryption.
Test equipment the most according to claim 6, it is characterised in that described test equipment also includes:
Second transmitting element, is used for when described first encrypted voice data bag mates with described second encrypted voice data bag, Then being sent by described source VoP to third-party testing equipment, described source VoP sets for described third-party testing For utilizing described Voice Encryption algorithm described source VoP to be encrypted and obtained the close VoP of Acanthopanan trifoliatus (L.) Merr., described Voice Encryption algorithm is that described third-party testing equipment, described test equipment and described terminal are consulted in advance;
Second receives unit, for receiving the described close VoP of Acanthopanan trifoliatus (L.) Merr. that described third-party testing equipment sends;
Judging unit, is used for judging the described close VoP of Acanthopanan trifoliatus (L.) Merr. and described first encrypted voice data bag or described second Whether encrypted voice data bag mates;
Described determine unit, be additionally operable to, when described judging unit judged result is for being, determine that described terminal passes through voice encryption Test.
Test equipment the most according to claim 7, it is characterised in that described test equipment also includes:
Negotiation element, for consulting Voice Encryption algorithm with described terminal;
Described first transmitting element, is additionally operable to after described negotiation element and described terminal consult Voice Encryption algorithm success, Source VoP is sent to described terminal.
Test equipment the most according to claim 8, it is characterised in that described negotiation element includes:
First determines subelement, for determining the voice encryption that the Voice Encryption algorithm that test equipment is supported is supported with described terminal Algorithm is the most identical;
Second determines subelement, is used for when described first determines that subelement determines the Voice Encryption algorithm that described test equipment is supported Time the most identical with the voice encryption that described terminal is supported, the voice encryption that described test equipment and described terminal are supported jointly The Voice Encryption algorithm that algorithm is consulted in advance as described test equipment and described terminal.
10. according to the test equipment described in any one of claim 6 to 9, it is characterised in that described test equipment also includes:
Acquiring unit, for being sent before terminal by source VoP at described first transmitting element, obtains source voice number According to bag, described source VoP is to extract in the speech data that the sound pick-up outfit from test equipment obtains, or described Source VoP is to extract in the speech data prestored from described test equipment.
CN201610505815.4A 2016-06-30 2016-06-30 The method of testing of a kind of voice encryption and test equipment CN106209344A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610505815.4A CN106209344A (en) 2016-06-30 2016-06-30 The method of testing of a kind of voice encryption and test equipment

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
CN201610505815.4A CN106209344A (en) 2016-06-30 2016-06-30 The method of testing of a kind of voice encryption and test equipment
PCT/CN2016/100635 WO2018000640A1 (en) 2016-06-30 2016-09-28 Voice encryption testing method and testing device

Publications (1)

Publication Number Publication Date
CN106209344A true CN106209344A (en) 2016-12-07

Family

ID=57463844

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610505815.4A CN106209344A (en) 2016-06-30 2016-06-30 The method of testing of a kind of voice encryption and test equipment

Country Status (2)

Country Link
CN (1) CN106209344A (en)
WO (1) WO2018000640A1 (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107465503A (en) * 2017-07-21 2017-12-12 山东华芯半导体有限公司 A kind of method of the safe storage chip cryptographic algorithm correctness of fast verification
CN107819650A (en) * 2017-11-28 2018-03-20 中共中央办公厅电子科技学院 Data safety method of testing and device

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103987032A (en) * 2014-03-28 2014-08-13 张大中 Mobile communication terminal voice encryption method
CN104883679A (en) * 2015-04-09 2015-09-02 努比亚技术有限公司 Voice communication encryption testing method and apparatus
CN104902053A (en) * 2015-04-30 2015-09-09 努比亚技术有限公司 Encryption card function testing method and system
CN104955091A (en) * 2015-04-29 2015-09-30 努比亚技术有限公司 Testing method and device
CN105245348A (en) * 2015-10-21 2016-01-13 广州视源电子科技股份有限公司 Factory detection method, device and system of HDCP function
CN105357007A (en) * 2014-08-21 2016-02-24 深圳市中兴微电子技术有限公司 Encryption communication method and communication terminal

Family Cites Families (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070038868A1 (en) * 2005-08-15 2007-02-15 Top Digital Co., Ltd. Voiceprint-lock system for electronic data
EP2920907A2 (en) * 2012-11-16 2015-09-23 Raytheon BBN Technologies Method for secure symbol comparison
CN104794052B (en) * 2015-04-01 2018-01-19 努比亚技术有限公司 The method and device of encryption display test

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103987032A (en) * 2014-03-28 2014-08-13 张大中 Mobile communication terminal voice encryption method
CN105357007A (en) * 2014-08-21 2016-02-24 深圳市中兴微电子技术有限公司 Encryption communication method and communication terminal
CN104883679A (en) * 2015-04-09 2015-09-02 努比亚技术有限公司 Voice communication encryption testing method and apparatus
CN104955091A (en) * 2015-04-29 2015-09-30 努比亚技术有限公司 Testing method and device
CN104902053A (en) * 2015-04-30 2015-09-09 努比亚技术有限公司 Encryption card function testing method and system
CN105245348A (en) * 2015-10-21 2016-01-13 广州视源电子科技股份有限公司 Factory detection method, device and system of HDCP function

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107465503A (en) * 2017-07-21 2017-12-12 山东华芯半导体有限公司 A kind of method of the safe storage chip cryptographic algorithm correctness of fast verification
CN107819650A (en) * 2017-11-28 2018-03-20 中共中央办公厅电子科技学院 Data safety method of testing and device

Also Published As

Publication number Publication date
WO2018000640A1 (en) 2018-01-04

Similar Documents

Publication Publication Date Title
US8027472B2 (en) Using a trusted-platform-based shared-secret derivation and WWAN infrastructure-based enrollment to establish a secure local channel
US5481610A (en) Digital radio transceiver with encrypted key storage
JP4263384B2 (en) Improved method for authentication of user subscription identification module
KR100372495B1 (en) Method and system for securely transferring a data set in a data communications system
CN101261675B (en) Secure method for loading service access data in an NFC chipset
US6504932B1 (en) Method of transferring information between a subscriber identification module and a radiocommunication mobile terminal, and a corresponding subscriber identification module and mobile terminal
US20070254614A1 (en) Secure wireless connections using ssid fields
CN1309210C (en) Method and apparatus for multiple authentication sessions for content protection
CN104703170B (en) Methods and equipment for downloading file of operator
SK161396A3 (en) Device for transmitting messages in a mobile communication network
KR20010032407A (en) Method and system for securely transferring a data set in a data communications system
US20060236116A1 (en) Provisioning root keys
CN1183202A (en) Checking the access right of a subscriber equipment
EP1402746A2 (en) Method for remote loading of an encryption key in a telecommunication network station
CN103927654B (en) A kind of mobile terminal contacts the means of communication, device and method of payment with POS
US7284123B2 (en) Secure communication system and method for integrated mobile communication terminals comprising a short-distance communication module
CN104657674B (en) The insulation blocking system and method for private data in a kind of mobile phone
CN110505616A (en) The method and apparatus of wireless device are registered in a wireless communication system
CN103634109B (en) Operation right authentication method and device
JP4819286B2 (en) Cryptographically inspectable identification method for physical units in public wireless telecommunications networks
JP2001308850A (en) Method and device for connecting to network by communication terminal device
US20030220095A1 (en) Biometric authentication of a wireless device user
JP2007328777A (en) Mobile electronic device, data protecting method, protection data outputting method, control program and recording medium
CN103347257B (en) Virtual user identification data distribution method, acquisition methods and equipment
CN104618115A (en) Identity card information obtaining method and system

Legal Events

Date Code Title Description
PB01 Publication
C06 Publication
SE01 Entry into force of request for substantive examination
C10 Entry into substantive examination