CN111356133A - Security testing method and device for wireless communication module and computer equipment - Google Patents

Security testing method and device for wireless communication module and computer equipment Download PDF

Info

Publication number
CN111356133A
CN111356133A CN201811584710.8A CN201811584710A CN111356133A CN 111356133 A CN111356133 A CN 111356133A CN 201811584710 A CN201811584710 A CN 201811584710A CN 111356133 A CN111356133 A CN 111356133A
Authority
CN
China
Prior art keywords
random
wireless communication
communication module
identification code
module
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201811584710.8A
Other languages
Chinese (zh)
Other versions
CN111356133B (en
Inventor
张凯旋
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fibocom Wireless Inc
Original Assignee
Fibocom Wireless Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fibocom Wireless Inc filed Critical Fibocom Wireless Inc
Priority to CN201811584710.8A priority Critical patent/CN111356133B/en
Publication of CN111356133A publication Critical patent/CN111356133A/en
Application granted granted Critical
Publication of CN111356133B publication Critical patent/CN111356133B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/02Protecting privacy or anonymity, e.g. protecting personally identifiable information [PII]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0861Generation of secret information including derivation or calculation of cryptographic keys or passwords
    • H04L9/0869Generation of secret information including derivation or calculation of cryptographic keys or passwords involving random numbers or seeds
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/04Key management, e.g. using generic bootstrapping architecture [GBA]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W12/00Security arrangements; Authentication; Protecting privacy or anonymity
    • H04W12/06Authentication
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04WWIRELESS COMMUNICATION NETWORKS
    • H04W24/00Supervisory, monitoring or testing arrangements
    • H04W24/02Arrangements for optimising operational condition
    • YGENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
    • Y02TECHNOLOGIES OR APPLICATIONS FOR MITIGATION OR ADAPTATION AGAINST CLIMATE CHANGE
    • Y02DCLIMATE CHANGE MITIGATION TECHNOLOGIES IN INFORMATION AND COMMUNICATION TECHNOLOGIES [ICT], I.E. INFORMATION AND COMMUNICATION TECHNOLOGIES AIMING AT THE REDUCTION OF THEIR OWN ENERGY USE
    • Y02D30/00Reducing energy consumption in communication networks
    • Y02D30/70Reducing energy consumption in communication networks in wireless communication networks

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Storage Device Security (AREA)
  • Mobile Radio Communication Systems (AREA)

Abstract

The application relates to the technical field of computers, and provides a security testing method and device for a wireless communication module, computer equipment and a storage medium. The method comprises the following steps: the encryption instruction is received, the random authority password is generated through a preset algorithm according to the encryption instruction, the random authority password is written into the current wireless communication module, the current wireless communication module is encrypted, the encrypted unique module identification code of the current wireless communication module is obtained, the random authority password and the unique module identification code are stored in a database with safety protection in a one-to-one correspondence mode, the random authority password is generated for each wireless communication module and written into the wireless communication module to encrypt the wireless communication module, the risk that the wireless communication module is cracked is reduced, the unique module identification code of the wireless communication module and the corresponding random authority password are stored in the database with safety protection in a one-to-one correspondence mode, and the safety of the wireless communication module is improved.

Description

Security testing method and device for wireless communication module and computer equipment
Technical Field
The present application relates to the field of computer technologies, and in particular, to a security testing method and apparatus for a wireless communication module, a computer device, and a storage medium.
Background
With the rapid development of computer technology, wireless communication modules are widely applied to terminal devices such as mobile phones and computers, and performance parameters of the wireless communication modules can directly affect the performance of the terminal devices, so that the performance parameters of the wireless communication modules cannot be changed under ordinary conditions. At present, Unlock codes, namely Unlock codes, are uniformly arranged on wireless communication modules, for example, the Unlock codes are uniformly arranged to be 6 or 6 to 8, developers can obtain modification permission for modifying performance parameters of the wireless communication modules by inputting the Unlock codes during production tests, however, the Unlock codes uniformly arranged on the wireless communication modules are easy to crack by hackers, the hackers can easily crack the Unlock codes of the wireless communication modules and then modify the performance parameters of the wireless communication modules, and the security is low.
Disclosure of Invention
In view of the above, it is necessary to provide a security testing method and apparatus for a wireless communication module, a computer device, and a storage medium, for solving the technical problem of low security of the wireless communication module.
A method of security testing of a wireless communication module, the method comprising:
receiving an encryption instruction, and generating a random authority password through a preset algorithm according to the encryption instruction;
writing the random authority password into a current wireless communication module, and encrypting the current wireless communication module;
and acquiring the encrypted unique module identification code of the current wireless communication module, and storing the random authority password and the unique module identification code into a database in a one-to-one correspondence manner, wherein the database is provided with safety protection.
In one embodiment, the method further comprises:
receiving a decryption instruction, wherein the decryption instruction carries a unique module identification code of a tested wireless communication module;
and acquiring a target random authority password corresponding to the unique module identification code of the tested wireless communication module from the database, and decrypting the tested wireless communication module.
In one embodiment, the step of receiving an encryption instruction and generating a random authority password according to the encryption instruction by using a preset algorithm includes:
receiving the encryption instruction, and confirming that the preset algorithm is a random number algorithm according to the encryption instruction;
acquiring a random seed, wherein the random seed is used for initializing a random number generator;
and taking the random number generated by the initialized random number generator as the random authority password.
In one embodiment, the step of obtaining the random seed includes:
acquiring an initial time value and a current time value;
calculating to obtain a time region between the initial time value and the current time value;
and calculating to obtain an integer value by taking seconds as a unit according to the time region, and taking the integer value as the random seed.
In one embodiment, the storing the random authority password and the unique module identification code in a database in a one-to-one correspondence, where the database is provided with a security protection step, includes:
establishing an identification authority corresponding table, wherein the identification authority corresponding table comprises an identification code field and a random authority password field, and the identification code field is set as a main key;
and storing the unique module identification code in the identification code field through an SQL database insertion statement, and storing the random authority password in the identification code field.
In one embodiment, the obtaining of the target random permission password corresponding to the unique module identification code of the tested wireless communication module from the database includes:
querying a target position of the unique module identification code of the tested wireless communication module in the identification code field through an SQL database query statement;
and acquiring the target random authority password in the random authority password field corresponding to the target position.
A security testing apparatus of a wireless communication module, the apparatus comprising:
the encryption instruction receiving module is used for receiving an encryption instruction;
the random authority password generating module is used for generating a random authority password through a preset algorithm according to the encryption instruction;
the encryption module is used for writing the random authority password into the wireless communication module and encrypting the wireless communication module;
and the random authority password storage module is used for acquiring the encrypted unique module identification code of the wireless communication module, storing the random authority password and the unique module identification code to a database in a one-to-one correspondence manner, and the database is provided with safety protection.
In one embodiment, the apparatus further comprises:
the decryption instruction receiving module is used for receiving a decryption instruction, and the decryption instruction carries the unique module identification code of the tested wireless communication module;
and the decryption module is used for acquiring the target random authority password corresponding to the unique module identification code of the tested wireless communication module from the database and decrypting the tested wireless communication module.
A computer device comprising a memory and a processor, the memory storing a computer program operable on the processor, the processor implementing the steps in the various method embodiments described above when executing the computer program.
A computer-readable storage medium, on which a computer program is stored which, when being executed by a processor, carries out the steps of the respective method embodiment described above.
According to the security test method, the device, the computer equipment and the storage medium of the wireless communication module, the encryption instruction is received, the random authority password is generated through the preset algorithm according to the encryption instruction, the random authority password is written into the current wireless communication module, each wireless communication module is encrypted according to different random authority passwords, the performance parameters of the encrypted wireless communication module cannot be modified, namely the modification authority of the performance parameters of each wireless communication module is set, the risk that the random authority password of the wireless communication module is easy to crack is reduced, in the production test link, the only module identification code and the random authority password of the current wireless communication module after encryption are correspondingly stored in a database with security protection one by one, and the security of the wireless communication module is ensured and improved.
Drawings
FIG. 1 is a diagram illustrating an exemplary embodiment of a security testing method for a wireless communication module;
FIG. 2 is a flow diagram illustrating a method for security testing of a wireless communication module, according to one embodiment;
FIG. 3 is a flow chart illustrating a security testing method of a wireless communication module according to another embodiment;
FIG. 4 is a flowchart illustrating the steps of generating a random access password in one embodiment;
FIG. 5 is a flow diagram illustrating the steps of obtaining a random seed in one embodiment;
FIG. 6 is a flowchart illustrating steps for saving a random access password in one embodiment;
FIG. 7 is a flowchart illustrating the steps of obtaining a target random access password in one embodiment;
FIG. 8 is a block diagram showing a safety testing apparatus for a wireless communication module according to an embodiment;
FIG. 9 is a diagram illustrating an internal structure of a computer device according to an embodiment.
Detailed Description
In order to make the objects, technical solutions and advantages of the present application more apparent, the present application is described in further detail below with reference to the accompanying drawings and embodiments. It should be understood that the specific embodiments described herein are merely illustrative of the present application and are not intended to limit the present application.
The security testing method of the wireless communication module provided by the application can be applied to the application environment shown in fig. 1. Fig. 1 is a diagram of an application environment in which a security testing method of a wireless communication module operates according to an embodiment. As shown in fig. 1, the application environment includes a terminal 110 and a server 120, and communication between the terminal 110 and the server 120 is performed through a network, and the communication network may be a wireless or wired communication network, such as an IP network, a cellular mobile communication network, and the like, where the number of the terminal and the server is not limited.
The terminal may be, but is not limited to, various personal computers, notebook computers, smart phones, tablet computers, and portable wearable devices. The server may be implemented as a stand-alone server or as a server cluster consisting of a plurality of servers. The terminal 110 or the server 120 is connected with the wireless communication module, the terminal 110 or the server 120 generates a random authority password through a preset algorithm according to an encryption instruction by receiving the encryption instruction, the random authority password is written into the current wireless communication module, each wireless communication module is encrypted according to different random authority passwords, performance parameters of the encrypted wireless communication module cannot be modified, namely modification authority of the performance parameters of each wireless communication module is set, the risk that the random authority password of the wireless communication module is easy to crack is reduced, in a production test link, a unique module identification code and the random authority password of the current wireless communication module after encryption are correspondingly stored in a database with safety protection one by one, and the safety of the wireless communication module is ensured and improved.
In one embodiment, as shown in fig. 2, a security testing method for a wireless communication module is provided, which is described by taking the method as an example applied to the server in fig. 1, and includes the following steps:
step 210, receiving an encryption instruction, and generating a random authority password through a preset algorithm according to the encryption instruction.
Wherein, the encryption instruction is a relevant instruction for triggering the encryption test. The encryption test is a test process for setting the modification permission of the performance parameters of the wireless communication module by encrypting the wireless communication module. The random authority password is generated randomly, namely keys input to different wireless communication modules are different, and the random authority password is a key required to be input when the modification authority of the performance parameters of the wireless communication modules is acquired. The random authority password can be a pure numerical type, a pure letter type and a numerical letter mixed type. In this embodiment, when the server receives the encryption instruction, the server generates a random authority password with a preset number of bits, such as a 6-bit or 8-bit character, through a preset algorithm, and the number of bits of the character may be set in advance.
And step 220, writing the random authority password into the current wireless communication module, and encrypting the current wireless communication module.
The wireless communication module in this embodiment mainly refers to a wireless communication module applied to a terminal device such as a mobile phone and a computer. The random authority password is written into the current wireless communication module through a serial port of the wireless communication module, the current wireless communication module is encrypted, the performance parameters of the encrypted wireless communication module cannot be changed at will, and research personnel can modify the performance parameters only after decrypting the wireless communication module by using the random authority password when needing to modify the performance parameters. The performance parameter refers to an operation parameter of the wireless communication module, such as rated power, rated current, and the like.
And step 230, acquiring the encrypted unique module identification code of the current wireless communication module, and storing the random authority password and the unique module identification code into a database in a one-to-one correspondence manner, wherein the database is provided with safety protection.
Specifically, the unique module identification code is an identification code capable of distinguishing different wireless communication modules, and has uniqueness and no repeatability. And correspondingly storing the unique module identification code of the current wireless communication module and the random authority password written into the current wireless communication module into a database one by one. And recording and storing the unique module identification codes and all random authority passwords of all wireless communication modules in the production testing link in a database. The database refers to a database that has been secured.
The security test method of the wireless communication module generates the random authority password through the preset algorithm according to the encryption instruction by receiving the encryption instruction, writes the random authority password into the current wireless communication module, encrypting the current wireless communication module, acquiring the encrypted unique module identification code of the current wireless communication module, storing the random authority password and the unique module identification code into a database in a one-to-one correspondence manner, wherein the database is provided with safety protection, in a production test link, random authority passwords are generated for each wireless communication module, the random authority passwords are written into the wireless communication modules to encrypt the wireless communication modules, and then the unique module identification codes of the wireless communication modules and the corresponding random authority passwords are stored in a database with safety protection in a one-to-one correspondence mode, so that the safety of the wireless communication modules is improved.
In one embodiment, as shown in fig. 3, the method further comprises:
and 310, receiving a decryption instruction, wherein the decryption instruction carries the unique module identification code of the tested wireless communication module.
The decryption instruction is a related instruction for triggering decryption test, and the decryption test is a test process for obtaining the modification permission of the performance parameters of the tested wireless communication module by decrypting the tested wireless communication module. The server automatically acquires the unique module identification code of the tested wireless communication module through the serial port of the wireless communication module after the research and development tester inputs the decryption instruction.
And 320, acquiring a target random authority password corresponding to the unique module identification code of the tested wireless communication module from the database, and decrypting the tested wireless communication module.
The target random authority password is a key input when the modification authority of the performance parameters of the tested wireless communication module is acquired. The target random authority password and the unique module identification code of the tested wireless communication module are stored in the database in a one-to-one correspondence mode. The decryption is a test process of inputting the target random authority password into the wireless communication module to obtain the modification authority.
In this embodiment, when the decryption instruction is received, the decryption instruction carries the unique module identification code of the tested wireless communication module, and only if the target random permission password corresponding to the unique module identification code of the tested wireless communication module is obtained from the database, the tested wireless communication module is decrypted, and the modification permission of the performance parameter of the tested wireless communication module can be obtained through decryption, the performance parameter of the tested wireless communication module can be modified, so that the security of the wireless communication module is greatly improved and ensured.
In one embodiment, as shown in fig. 4, step 210 further comprises:
and step 211, receiving the encryption instruction, and confirming that the preset algorithm is a random number algorithm according to the encryption instruction.
Step 212, a random seed is obtained, which is used to initialize the random number generator.
Step 213, taking the random number generated by the initialized random number generator as the random authority password.
In this embodiment, the preset algorithm for generating the random authority password is determined as the random algorithm. The random value generated by the random algorithm is used as the random authority password, so that the random authority passwords written into each wireless communication module are different. Specifically, the random number generator refers to a random function rand () function that generates a random number, and a random number seed needs to be obtained before the rand () function generates a random number sequence, that is, a random () function needs to be called before the rand () function is called. The srand () function is an initialization function of the rand () function for setting a random number seed. The function of srand () and the function of rand () are used together to generate a random number sequence, and when the value of the random number seed set by the function of srand () is changed, the random number generated by the function of rand () is also changed.
In one specific embodiment, the general expression for generating a range of random numbers is the (rand ()% (b-a +1)) + a formula, which is used to generate random numbers in the range of [ a, b ]. For example, a is set to be 100000, b is set to be 999999, and when the random number is generated, the random number in the range of [100000,999999] is generated, and then the random number is written into the wireless communication module as the random authority password to encrypt the wireless communication module.
In one embodiment, as shown in FIG. 5, step 212 includes:
in step 212A, an initial time value and a current time value are obtained.
Wherein, the initial time value refers to a specific time value for participating in the calculation, and the initial time value can be set as an epoch, namely 1970-01-0100: 00: 00. The current time value refers to the computer system time, i.e., the current actual time.
And 212B, calculating a time region between the initial time value and the current time value.
The time zone refers to a time period from an initial time value to a current time value, for example, the initial time value is 2000-01-0100: 00:00, the current time value is 2018-01-0100: 00:00, and the time zone refers to 18 years.
And 212C, calculating an integer value in seconds according to the time region, and taking the integer value as the random seed.
The integer value is a value obtained by calculating the time zone in seconds, for example, the time zone is 5 minutes, and is 300 seconds by calculating the time zone in seconds, and 300 is an integer value obtained by calculating the time zone in seconds. Because the current time value is changed, and the initial time value is fixed and unchanged, the time period from the initial time value to the current time value is changed, and the integer value obtained by calculating the time zone by taking seconds as a unit is also changed, namely when the current time value is changed, the integer value is also gradually increased and changed along with the seconds. When the integer value is used as the random seed, the random function rand () can be initialized by the random seed which is changed constantly, and different random number sequences are generated.
In a specific embodiment, the key code for generating the random number may be srand (null); long unlock code ═ (rand ()% (999999-; wherein the longunlockCode refers to a random authority password.
In one embodiment, as shown in fig. 6, step 230 further comprises:
step 231, establishing an identification authority corresponding table, wherein the identification authority corresponding table comprises an identification code field and a random authority password field, and the identification code field is set as a main key.
The identification authority corresponding table is a data table which is established in an SQL SERVER database and stores a unique module identification code and a random authority password, wherein the identification code field is set as a main key, and the data value in the identification code field must be a unique value and cannot contain a null value.
Step 232, the unique module identification code is stored in the identification code field through an SQL database insertion statement, and the random authority password is stored in the identification code field.
The syntax of the SQL database insertion statement is as follows: INSERT INTO table name VALUES (value 1, value 2). The unique module identification code of the wireless communication module and the random authority password written into the wireless communication module are stored in a one-to-one correspondence manner, for example, data values with the unique module identification code of '863212030071747' and the random authority password of '126510' are inserted into the identification authority correspondence table. The identifier authority correspondence table is shown as the following table:
identification code Random authority password
863212030071747 126510
863212030012345 365303
863212030012332 598324
... ...
In one embodiment, as shown in fig. 7, step 320 further comprises:
step 321, querying a target position of the unique module identification code of the tested wireless communication module in the identification code field through an SQL database query statement.
Step 322, obtaining the target random permission password in the random permission password field corresponding to the target position.
The syntax of the query statement of the SQL database is as follows: SELECT column name FROM table name the WHER operator value. As shown in the above table, the random right password queried in the identification right correspondence table by the unique module identification code having a value of "863212030012345" is "365303".
It should be understood that although the various steps in the flow charts of fig. 2-7 are shown in order as indicated by the arrows, the steps are not necessarily performed in order as indicated by the arrows. The steps are not performed in the exact order shown and described, and may be performed in other orders, unless explicitly stated otherwise. Moreover, at least some of the steps in fig. 2-7 may include multiple sub-steps or multiple stages that are not necessarily performed at the same time, but may be performed at different times, and the order of performance of the sub-steps or stages is not necessarily sequential, but may be performed in turn or alternating with other steps or at least some of the sub-steps or stages of other steps.
In one embodiment, as shown in fig. 8, there is provided a security testing apparatus for a wireless communication module, including an encryption command receiving module 410, a random authority password generating module 420, an encryption module 430, and a random authority password saving module 440, wherein:
and the encryption instruction receiving module is used for receiving the encryption instruction.
And the random authority password generating module is used for generating a random authority password through a preset algorithm according to the encryption instruction.
And the encryption module is used for writing the random authority password into the current wireless communication module and encrypting the current wireless communication module.
And the random authority password storage module is used for acquiring the encrypted unique module identification code of the current wireless communication module, storing the random authority password and the unique module identification code into a database in a one-to-one correspondence manner, and the database is provided with safety protection.
In one embodiment, the apparatus further comprises a decryption instruction receiving module 450, a decryption module 460, wherein:
the decryption instruction receiving module 450 is configured to receive a decryption instruction, where the decryption instruction carries the unique module identification code of the tested wireless communication module.
And the decryption module 460 is configured to obtain the target random permission password corresponding to the unique module identification code of the tested wireless communication module from the database, and decrypt the tested wireless communication module.
In one embodiment, the random authority password generation module includes an algorithm confirmation unit, a random number generator initialization unit, and a random authority password confirmation unit, wherein:
and the algorithm confirming unit is used for confirming that the preset algorithm is a random number algorithm according to the encryption instruction.
The random number generator initialization unit is used for acquiring a random seed, and the random seed is used for initializing the random number generator.
And the random authority password confirmation unit is used for taking the random number generated by the initialized random number generator as the random authority password.
In one embodiment, the apparatus further comprises a time acquisition module, a time region calculation module, and a random seed confirmation module, wherein:
and the time acquisition module is used for acquiring the initial time value and the current time value.
And the time zone calculation module is used for calculating a time zone between the initial time value and the current time value.
And the random seed confirmation module is used for calculating an integer value by taking seconds as a unit according to the time region and taking the integer value as the random seed.
In one embodiment, the apparatus further includes an identifier authority correspondence table establishing module and a random authority password saving module, wherein:
and the identification authority corresponding table establishing module is used for establishing an identification authority corresponding table, the identification authority corresponding table comprises an identification code field and a random authority password field, and the identification code field is set as a main key.
And the random authority password storage module is used for storing the unique module identification code in the identification code field through SQL database insertion statements and storing the random authority password in the identification code field.
In one embodiment, the apparatus further comprises a target random authority password query module, wherein:
and the target random permission password query module is used for querying a target position of the unique module identification code of the tested wireless communication module in the identification code field through an SQL database query statement and also used for acquiring the target random permission password in the random permission password field corresponding to the target position.
For the specific definition of the safety testing device of the wireless communication module, reference may be made to the above definition of the safety testing device method of the wireless communication module, and details are not described herein again. Each module in the security testing apparatus of the wireless communication module may be wholly or partially implemented by software, hardware, or a combination thereof. The modules can be embedded in a hardware form or independent from a processor in the computer device, and can also be stored in a memory in the computer device in a software form, so that the processor can call and execute operations corresponding to the modules.
In one embodiment, a computer device is provided, which may be a server, and its internal structure diagram may be as shown in fig. 9. The computer device includes a processor, a memory, a network interface, and a database connected by a system bus. Wherein the processor of the computer device is configured to provide computing and control capabilities. The memory of the computer device comprises a nonvolatile storage medium and an internal memory. The non-volatile storage medium stores an operating system, a computer program, and a database. The internal memory provides an environment for the operation of an operating system and computer programs in the non-volatile storage medium. The database of the computer device is used for storing video related data. The network interface of the computer device is used for communicating with an external terminal through a network connection. The computer program is executed by a processor to implement a method of security testing of a wireless communication module.
Those skilled in the art will appreciate that the architecture shown in fig. 9 is merely a block diagram of some of the structures associated with the disclosed aspects and is not intended to limit the computing devices to which the disclosed aspects apply, as particular computing devices may include more or less components than those shown, or may combine certain components, or have a different arrangement of components.
In one embodiment, there is provided a computer device comprising a memory storing a computer program and a processor implementing the following steps when the processor executes the computer program: and receiving an encryption instruction, and generating a random authority password through a preset algorithm according to the encryption instruction. And writing the random authority password into the current wireless communication module, and encrypting the current wireless communication module. And acquiring the encrypted unique module identification code of the current wireless communication module, and storing the random authority password and the unique module identification code into a database in a one-to-one correspondence manner, wherein the database is provided with safety protection.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and receiving a decryption instruction, wherein the decryption instruction carries the unique module identification code of the tested wireless communication module. And acquiring a target random authority password corresponding to the unique module identification code of the tested wireless communication module from the database, and decrypting the tested wireless communication module.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and receiving the encryption instruction, and confirming that the preset algorithm is a random number algorithm according to the encryption instruction. A random seed is obtained for initializing a random number generator. And taking the random number generated by the initialized random number generator as the random authority password.
In one embodiment, the processor, when executing the computer program, further performs the steps of: an initial time value and a current time value are obtained. And calculating to obtain a time region between the initial time value and the current time value. And calculating to obtain an integer value by taking seconds as a unit according to the time region, and taking the integer value as the random seed.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and establishing an identification authority corresponding table, wherein the identification authority corresponding table comprises an identification code field and a random authority password field, and the identification code field is set as a main key. And storing the unique module identification code in the identification code field through an SQL database insertion statement, and storing the random authority password in the identification code field.
In one embodiment, the processor, when executing the computer program, further performs the steps of: and querying the target position of the unique module identification code of the tested wireless communication module in the identification code field through an SQL database query statement. And acquiring the target random authority password in the random authority password field corresponding to the target position.
In one embodiment, a computer-readable storage medium is provided, having a computer program stored thereon, which when executed by a processor, performs the steps of: and receiving an encryption instruction, and generating a random authority password through a preset algorithm according to the encryption instruction. And writing the random authority password into the current wireless communication module, and encrypting the current wireless communication module. And acquiring the encrypted unique module identification code of the current wireless communication module, and storing the random authority password and the unique module identification code into a database in a one-to-one correspondence manner, wherein the database is provided with safety protection.
In one embodiment, the computer program when executed by the processor further performs the steps of: and receiving a decryption instruction, wherein the decryption instruction carries the unique module identification code of the tested wireless communication module. And acquiring a target random authority password corresponding to the unique module identification code of the tested wireless communication module from the database, and decrypting the tested wireless communication module.
In one embodiment, the computer program when executed by the processor further performs the steps of: and receiving the encryption instruction, and confirming that the preset algorithm is a random number algorithm according to the encryption instruction. A random seed is obtained for initializing a random number generator. And taking the random number generated by the initialized random number generator as the random authority password.
In one embodiment, the computer program when executed by the processor further performs the steps of: an initial time value and a current time value are obtained. And calculating to obtain a time region between the initial time value and the current time value. And calculating to obtain an integer value by taking seconds as a unit according to the time region, and taking the integer value as the random seed.
In one embodiment, the computer program when executed by the processor further performs the steps of: and establishing an identification authority corresponding table, wherein the identification authority corresponding table comprises an identification code field and a random authority password field, and the identification code field is set as a main key. And storing the unique module identification code in the identification code field through an SQL database insertion statement, and storing the random authority password in the identification code field.
In one embodiment, the computer program when executed by the processor further performs the steps of: and querying the target position of the unique module identification code of the tested wireless communication module in the identification code field through an SQL database query statement. And acquiring the target random authority password in the random authority password field corresponding to the target position.
It will be understood by those skilled in the art that all or part of the processes of the methods of the embodiments described above can be implemented by hardware instructions of a computer program, which can be stored in a non-volatile computer-readable storage medium, and when executed, can include the processes of the embodiments of the methods described above. Any reference to memory, storage, database, or other medium used in the embodiments provided herein may include non-volatile and/or volatile memory, among others. Non-volatile memory can include read-only memory (ROM), Programmable ROM (PROM), Electrically Programmable ROM (EPROM), Electrically Erasable Programmable ROM (EEPROM), or flash memory. Volatile memory can include Random Access Memory (RAM) or external cache memory. By way of illustration and not limitation, RAM is available in a variety of forms such as Static RAM (SRAM), Dynamic RAM (DRAM), Synchronous DRAM (SDRAM), Double Data Rate SDRAM (DDRSDRAM), Enhanced SDRAM (ESDRAM), synchronous link (Synchlink), DRAM (SLDRAM), Rambus Direct RAM (RDRAM), direct bus dynamic RAM (DRDRAM), and memory bus dynamic RAM (RDRAM).
The technical features of the above embodiments can be arbitrarily combined, and for the sake of brevity, all possible combinations of the technical features in the above embodiments are not described, but should be considered as the scope of the present specification as long as there is no contradiction between the combinations of the technical features.
The above-mentioned embodiments only express several embodiments of the present application, and the description thereof is more specific and detailed, but not construed as limiting the scope of the invention. It should be noted that, for a person skilled in the art, several variations and modifications can be made without departing from the concept of the present application, which falls within the scope of protection of the present application. Therefore, the protection scope of the present patent shall be subject to the appended claims.

Claims (10)

1. A method for security testing of a wireless communication module, the method comprising:
receiving an encryption instruction, and generating a random authority password through a preset algorithm according to the encryption instruction;
writing the random authority password into a current wireless communication module, and encrypting the current wireless communication module;
and acquiring the encrypted unique module identification code of the current wireless communication module, and storing the random authority password and the unique module identification code into a database in a one-to-one correspondence manner, wherein the database is provided with safety protection.
2. The method of claim 1, further comprising:
receiving a decryption instruction, wherein the decryption instruction carries a unique module identification code of a tested wireless communication module;
and acquiring a target random authority password corresponding to the unique module identification code of the tested wireless communication module from the database, and decrypting the tested wireless communication module.
3. The method according to claim 1, wherein the step of receiving an encryption command and generating a random authority password according to the encryption command by a preset algorithm comprises:
receiving the encryption instruction, and confirming that the preset algorithm is a random number algorithm according to the encryption instruction;
acquiring a random seed, wherein the random seed is used for initializing a random number generator;
and taking the random number generated by the initialized random number generator as the random authority password.
4. The method of claim 3, wherein the step of obtaining the random seed comprises:
acquiring an initial time value and a current time value;
calculating to obtain a time region between the initial time value and the current time value;
and calculating to obtain an integer value by taking seconds as a unit according to the time region, and taking the integer value as the random seed.
5. The method of claim 1, wherein the step of storing the random access passwords and the unique module identification codes in a database in a one-to-one correspondence, the database being provided with security protection comprises:
establishing an identification authority corresponding table, wherein the identification authority corresponding table comprises an identification code field and a random authority password field, and the identification code field is set as a main key;
and storing the unique module identification code in the identification code field through an SQL database insertion statement, and storing the random authority password in the identification code field.
6. The method of claim 2, wherein obtaining the target random permission password corresponding to the unique module identification code of the tested wireless communication module from the database comprises:
querying a target position of the unique module identification code of the tested wireless communication module in the identification code field through an SQL database query statement;
and acquiring the target random authority password in the random authority password field corresponding to the target position.
7. A security testing apparatus of a wireless communication module, the apparatus comprising:
the encryption instruction receiving module is used for receiving an encryption instruction;
the random authority password generating module is used for generating a random authority password through a preset algorithm according to the encryption instruction;
the encryption module is used for writing the random authority password into the current wireless communication module and encrypting the current wireless communication module;
and the random authority password storage module is used for acquiring the encrypted unique module identification code of the current wireless communication module, storing the random authority password and the unique module identification code into a database in a one-to-one correspondence manner, and the database is provided with safety protection.
8. The apparatus of claim 6, further comprising:
the decryption instruction receiving module is used for receiving a decryption instruction, and the decryption instruction carries the unique module identification code of the tested wireless communication module;
and the decryption module is used for acquiring the target random authority password corresponding to the unique module identification code of the tested wireless communication module from the database and decrypting the tested wireless communication module.
9. A computer device comprising a memory and a processor, the memory storing a computer program, wherein the processor implements the steps of the method of any one of claims 1 to 6 when executing the computer program.
10. A computer-readable storage medium, on which a computer program is stored, which, when being executed by a processor, carries out the steps of the method of any one of claims 1 to 6.
CN201811584710.8A 2018-12-24 2018-12-24 Security test method and device for wireless communication module and computer equipment Active CN111356133B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201811584710.8A CN111356133B (en) 2018-12-24 2018-12-24 Security test method and device for wireless communication module and computer equipment

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201811584710.8A CN111356133B (en) 2018-12-24 2018-12-24 Security test method and device for wireless communication module and computer equipment

Publications (2)

Publication Number Publication Date
CN111356133A true CN111356133A (en) 2020-06-30
CN111356133B CN111356133B (en) 2023-09-08

Family

ID=71195645

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201811584710.8A Active CN111356133B (en) 2018-12-24 2018-12-24 Security test method and device for wireless communication module and computer equipment

Country Status (1)

Country Link
CN (1) CN111356133B (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118093443A (en) * 2024-04-25 2024-05-28 江铃汽车股份有限公司 Method and device for generating password of debugging interface of network connection module

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2469441A1 (en) * 2010-12-21 2012-06-27 Research In Motion Limited System and method for hardware strenghtened passwords
CN104185167A (en) * 2013-05-20 2014-12-03 华为技术有限公司 Method and terminal for updating cardlock information of terminal
CN105306218A (en) * 2015-11-12 2016-02-03 青岛海信宽带多媒体技术有限公司 Optical module parameter modification method, optical module parameter modification device and optical module
CN106571926A (en) * 2016-10-31 2017-04-19 深圳市证通金信科技有限公司 Authorization management method and authorization management system based on dynamic password
CN107332660A (en) * 2017-06-28 2017-11-07 深圳市对接平台科技发展有限公司 A kind of Novel movable data encryption security system
CN108021816A (en) * 2017-12-05 2018-05-11 广东欧珀移动通信有限公司 Test method, device, storage medium and the electronic equipment of electronic equipment

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP2469441A1 (en) * 2010-12-21 2012-06-27 Research In Motion Limited System and method for hardware strenghtened passwords
CN104185167A (en) * 2013-05-20 2014-12-03 华为技术有限公司 Method and terminal for updating cardlock information of terminal
CN105306218A (en) * 2015-11-12 2016-02-03 青岛海信宽带多媒体技术有限公司 Optical module parameter modification method, optical module parameter modification device and optical module
CN106571926A (en) * 2016-10-31 2017-04-19 深圳市证通金信科技有限公司 Authorization management method and authorization management system based on dynamic password
CN107332660A (en) * 2017-06-28 2017-11-07 深圳市对接平台科技发展有限公司 A kind of Novel movable data encryption security system
CN108021816A (en) * 2017-12-05 2018-05-11 广东欧珀移动通信有限公司 Test method, device, storage medium and the electronic equipment of electronic equipment

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN118093443A (en) * 2024-04-25 2024-05-28 江铃汽车股份有限公司 Method and device for generating password of debugging interface of network connection module

Also Published As

Publication number Publication date
CN111356133B (en) 2023-09-08

Similar Documents

Publication Publication Date Title
CN109462602B (en) Login information storage method, login verification method, device, equipment and medium
CN108304698B (en) Product authorized use method and device, computer equipment and storage medium
CN106452770B (en) Data encryption method, data decryption method, device and system
WO2017202025A1 (en) Terminal file encryption method, terminal file decryption method, and terminal
CN109889333B (en) Firmware data encryption method and device, computer equipment and storage medium
CN109450622A (en) Data ciphering method, data verification method, device, equipment and storage medium
CN109936546B (en) Data encryption storage method and device and computing equipment
CN112800393B (en) Authorization authentication method, software development kit generation method, device and electronic equipment
CN107944234B (en) Machine refreshing control method for Android equipment
CN112637156B (en) Key distribution method, device, computer equipment and storage medium
CN107315966B (en) Solid state disk data encryption method and system
CN109768979A (en) Data encryption and transmission method, device, computer equipment and storage medium
CN109460639A (en) A kind of license authentication control method, device, terminal and storage medium
CN110727949A (en) Data storage method and device, computer equipment and storage medium
US20190007383A1 (en) Method of receiving data within an electronic entity and associated electronic entity
CN111401901B (en) Authentication method and device of biological payment device, computer device and storage medium
US20180013551A1 (en) Apparatus for obfuscating and restoring program execution code and method thereof
US20200044838A1 (en) Data encryption method and system using device authentication key
CN112087417B (en) Terminal authority control method and device, computer equipment and storage medium
CN111356133B (en) Security test method and device for wireless communication module and computer equipment
CN109784072B (en) Security file management method and system
CN108390758B (en) User password processing method and device and internal control security monitoring system
EP3214797B1 (en) Deriving a device unique encryption key of a system on chip using a physical unclonable function
CN111542050B (en) TEE-based method for guaranteeing remote initialization safety of virtual SIM card
CN114239004A (en) Electronic signature generation method and device, computer equipment and storage medium

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant